Comment

EPISODE 32: SEGMENT 2 – Mining and Exchanging Cryptocurrencies

Security Jabber, Episode 32, Part 2

On this week's podcast, we have special guest Zachary Sarakun on to talk about cryptocurrencies. In segment one, we discuss the basics of cryptocurrencies and their current trends in the market.

During the second segment, we dive into mining cryptocurrencies such as Bitcoin and Ethereum. The team also discusses the real question around mining, "Is it worth it?"

Special Guest: Zachary Sarakun, Security Analyst at CBI
"Zachary brings high energy, dedication to craft, and excellent interpersonal skills to CBI’s Strategic Programs team. Zachary’s technical aptitude and ease of learning are beneficial to any team he works with or project he works on. Utilizing community groups, online sources, podcasts, and interpersonal sources, Zachary stays updated with best practices and regulations within the Information Security industry.

Links

Comment

Comment

Episode 32: Segment 1 – Intro to Cryptocurrencies

Security Jabber, Episode 32, Part 1

On this week's podcast, we have special guest Zachary Sarakun on to talk about cryptocurrencies. In segment one, we discuss the basics of cryptocurrencies and their current trends in the market.

During the second segment, we dive into mining cryptocurrencies such as Bitcoin and Ethereum. The team also discusses the real question around mining, "Is it worth it?"

Special Guest: Zachary Sarakun, Security Analyst at CBI
"Zachary brings high energy, dedication to craft, and excellent interpersonal skills to CBI’s Strategic Programs team. Zachary’s technical aptitude and ease of learning are beneficial to any team he works with or project he works on. Utilizing community groups, online sources, podcasts, and interpersonal sources, Zachary stays updated with best practices and regulations within the Information Security industry.

Links

Comment

Comment

Episode 31 - Segment 2: PCI Compliance with Special Guest Rachel Snyder

Security Jabber, Episode 31, part 2

Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.

Links

 

Comment

Comment

Episode 31: Segment 1 - Cryptocurriency Mania, HP Keylogger

Security Jabber, Episode 31, part 1

Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.

Links: 

Comment

Comment

Episode 27: Interview with Jeff Reava

Security Jabber, Episode 27

Interview with
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.

Comment

Comment

Episode 26: Cyber Security Talent Challenges and Fixes, Special Guest Jeff Reava

Security Jabber, Episode 26

Special Guest
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.

Links

 

Comment

Comment

Episode 24: Szechuan Sauce Madness, Fin7, and Why Everyone Has Been Hacked

Comment

Comment

Episode 23: Best & Worst Security Functions to Outsource & All Things Linux with Special Guest Tom Lawrence

Security Jabber, Episode 23

We were joined in studio by Tom Lawrence. He's the owner of Lawrence Systems, a Podcast Master, and knows everything about Linux. Tom was recently at Microsoft Ignite, and you're going to want to listen to some of his stories. The team and Tom also spent a segment discussing what the best and worst security functions to outsource are.

We're back to our weekly schedule starting October 16th, so catch us live in Studio 1 on the PodcastDetroit.com website or on-demand on iTunesGoogle Play in addition to SoundCloud.

Special Guest:
Tom Lawrence, Owner, Lawrence Systems
Tech Enthusiast, IT Business Owner, Entrepreneur, Open Source Advocate, Public Speaker, Podcaster & YouTube Creator.

Where you can find Tom
Lawrence Systems Website 
Facebook 
LinkedIn
YouTube
Sunday Morning Linux Review Podcast

Links From the Show

Buzzfeed - Three American Scientists Who Figured Out How Our Body "Clocks" Work Have Won The Nobel Prize In Medicine 

PC Mag - iPhone 8s splitting in half during charging

CNBC - Shake Shack Going Cashless

Reuters - Russian firm provides new internet connection to North Korea 

Free Code Camp - How I hacked hundreds of companies through their helpdesk

Dark Reading - Best and Worst Security Functions to Outsource

Comment