On this week's podcast, we have special guest Zachary Sarakun on to talk about cryptocurrencies. In segment one, we discuss the basics of cryptocurrencies and their current trends in the market.
During the second segment, we dive into mining cryptocurrencies such as Bitcoin and Ethereum. The team also discusses the real question around mining, "Is it worth it?"
Special Guest: Zachary Sarakun, Security Analyst at CBI
"Zachary brings high energy, dedication to craft, and excellent interpersonal skills to CBI’s Strategic Programs team. Zachary’s technical aptitude and ease of learning are beneficial to any team he works with or project he works on. Utilizing community groups, online sources, podcasts, and interpersonal sources, Zachary stays updated with best practices and regulations within the Information Security industry.
Links
- Data Coin - $600 Billion: Cryptocurrency Market Cap Sets New Record
- Coin Dance – Random Bitcoin Stats
- Forbes - Why The Massive Fears Around Cryptocurrency Will Rise And What's Next For 201
- UPROXX - What Is Ethereum? A Guide To The Unusual Cryptocurrency Network
- Tech Crunch - Bitcoin mining marketplace NiceHash loses tens of millions of dollars following hack
- Verge - Founders of hacked crypto-mining site apologize over Facebook Livestream
On this week's podcast, we have special guest Zachary Sarakun on to talk about cryptocurrencies. In segment one, we discuss the basics of cryptocurrencies and their current trends in the market.
During the second segment, we dive into mining cryptocurrencies such as Bitcoin and Ethereum. The team also discusses the real question around mining, "Is it worth it?"
Special Guest: Zachary Sarakun, Security Analyst at CBI
"Zachary brings high energy, dedication to craft, and excellent interpersonal skills to CBI’s Strategic Programs team. Zachary’s technical aptitude and ease of learning are beneficial to any team he works with or project he works on. Utilizing community groups, online sources, podcasts, and interpersonal sources, Zachary stays updated with best practices and regulations within the Information Security industry.
Links
- Data Coin - $600 Billion: Cryptocurrency Market Cap Sets New Record
- Coin Dance – Random Bitcoin Stats
- Forbes - Why The Massive Fears Around Cryptocurrency Will Rise And What's Next For 201
- UPROXX - What Is Ethereum? A Guide To The Unusual Cryptocurrency Network
- Tech Crunch - Bitcoin mining marketplace NiceHash loses tens of millions of dollars following hack
- Verge - Founders of hacked crypto-mining site apologize over Facebook Livestream
Interview with Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Links
- Verizon - Verizon 2017 Payment Security Report
- Security Boulevard - Leveraging PCI DSS Principles for General Data Protection
Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Links:
In segment three we discuss a recent report regarding cyber security trends and predictions for 2018. There are even some positive trends!
Links
- CSO Online – What’s Next for Cyber Security in 2018?
In this segment we discuss net neutrality and the role of government regarding the internet.
Links
- Engadget - What you need to know about net neutrality (before it gets taken away)
- Engadget - Over half of FCC net neutrality comments may be fake, study says
- Fortune - Mark Cuban Thinks Net Neutrality Puts Donald Trump 'In Charge' of the Internet
The team discusses a recent story about Uber paying hackers hush money and our experiences with the service.
Links
Links
- Science Daily - Experts call for ethics rules to protect privacy, free will, as brain implants advance
- Venture Beat - Why cybersecurity workers are some of the hardest to retain
- Slate - Why America’s Current Approach to Cybersecurity Is So Dangerous
- Dark Reading - 6 Steps for Sharing Threat Intelligence
Interview with
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.
Special Guest
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.
Links
- CBS Detroit - Cyber Security Summit In Detroit Focuses On Emerging Trends, Technology
- Detroit News - Snyder preps ‘Marshall Plan’ for talent, high-tech ed
- CSO Online - Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021
- SecurityIntellegence.com - It Takes All Kinds: Identifying New Sources of Cybersecurity Talent
We opened the show talking about the crazy around McDonald’s Szechuan Sauce. Later in the show, the team talked about the latest WiFi vulnerability Krack and the infamous hacking group Fin7.
We're available on iTunes, Google Play in addition to SoundCloud.
Links from the Show
Here’s what you can do to protect yourself from the KRACK WiFi vulnerability
New Cybercrime Campaign a 'Clear and Imminent' Threat to Banks Worldwide
Insider tries to scam Dice after hacking company he sold to Dice
Cybercrime Group FIN7 Takes Phishing Attacks to the Next Level
State of Cybercrime 2017: Security events decline, but not the impact
We were joined in studio by Tom Lawrence. He's the owner of Lawrence Systems, a Podcast Master, and knows everything about Linux. Tom was recently at Microsoft Ignite, and you're going to want to listen to some of his stories. The team and Tom also spent a segment discussing what the best and worst security functions to outsource are.
We're back to our weekly schedule starting October 16th, so catch us live in Studio 1 on the PodcastDetroit.com website or on-demand on iTunes, Google Play in addition to SoundCloud.
Special Guest:
Tom Lawrence, Owner, Lawrence Systems
Tech Enthusiast, IT Business Owner, Entrepreneur, Open Source Advocate, Public Speaker, Podcaster & YouTube Creator.
Where you can find Tom
Lawrence Systems Website
Facebook
LinkedIn
YouTube
Sunday Morning Linux Review Podcast
Links From the Show
PC Mag - iPhone 8s splitting in half during charging
CNBC - Shake Shack Going Cashless
Reuters - Russian firm provides new internet connection to North Korea
Free Code Camp - How I hacked hundreds of companies through their helpdesk
Dark Reading - Best and Worst Security Functions to Outsource