Episode Transcript
WEBVTT
1
00:00:02.960 --> 00:00:05.639
Alright, alright, it's that time
again, Rich Cassan over here in the
2
00:00:05.679 --> 00:00:09.439
Global Podcast Studios live from Atlanta.
Alongside me, we have the guest of
3
00:00:09.480 --> 00:00:12.759
the hour as always, Mr Duayanne
Hart. Uh you can check him out
4
00:00:12.800 --> 00:00:17.160
at Dwayne Hart dot com. So
we're gonna, as usuill be talking cybersecurity,
5
00:00:17.199 --> 00:00:20.519
but this is a great one.
We're gonna be talking about why cybercrime
6
00:00:20.640 --> 00:00:24.399
is growing and why are criminals succeeding. But the second half of the show
7
00:00:24.399 --> 00:00:29.359
we're gonna dedicate to a kind of
a recap of all things cybersecurity, Duyne
8
00:00:29.399 --> 00:00:34.039
Hart and what kind of what what's
happened in two? We might give you
9
00:00:34.439 --> 00:00:38.119
a teaser for three. But the
man of the hour, Mr Duayne Heart,
10
00:00:38.119 --> 00:00:41.280
Welcome to the show. Thank you. It's always a flursure to be
11
00:00:41.399 --> 00:00:46.159
here and in Global Podcast Studio.
I can say that the year of two
12
00:00:46.240 --> 00:00:51.439
has been very successful. I made
a lot of great moves, one of
13
00:00:51.479 --> 00:00:54.600
you. You've been a busy dude
to whatever. We're gonna talk about that
14
00:00:54.600 --> 00:00:58.159
in the second half. What's happening, But let's jump right into today's topic
15
00:00:58.200 --> 00:01:03.719
again is why is crime still growing
and how are criminals succeeding? We actually
16
00:01:03.719 --> 00:01:07.000
have six topics along this um uh
with this segment. But here's what we're
17
00:01:07.000 --> 00:01:11.120
gonna do for this show. We're
only gonna give you three. You gotta
18
00:01:11.120 --> 00:01:15.719
stay tuned for three. With the
other three, but real quickly, the
19
00:01:15.719 --> 00:01:19.519
bullet points are um. You know, really when you look at there are
20
00:01:19.640 --> 00:01:23.799
six topics, it's really business basic
one oh one. This is what actually
21
00:01:23.799 --> 00:01:26.920
businesses, successful businesses to do.
We don't think of, you know,
22
00:01:26.959 --> 00:01:30.359
typically of cybersecurity hackers as a business, but it's a it's a venture for
23
00:01:30.400 --> 00:01:33.319
them. They're they're making profit.
Right, it's not the right kind of
24
00:01:33.359 --> 00:01:37.840
business, right, you could argue, But here's the topics rapid fire.
25
00:01:38.519 --> 00:01:44.000
UM what cyber criminals are. Why
they're succeeding because they're targeting people and their
26
00:01:44.000 --> 00:01:48.159
weakest link. Number two, they're
doing their homework. Number three, it's
27
00:01:48.159 --> 00:01:52.040
a numbers game. Think we if
you have your business hat on instead of
28
00:01:52.040 --> 00:01:56.879
your hackers, had these same principles
apply. Number four is UH scams keep
29
00:01:56.959 --> 00:01:59.920
evolving in business, that would be
technology. You gotta stay ahead of the
30
00:02:00.640 --> 00:02:04.640
UH. Five is patients pays off. Right, a successful business entrepreneur,
31
00:02:04.920 --> 00:02:06.920
you gotta stick it, you gotta
stick it out you've gotta be in the
32
00:02:06.959 --> 00:02:10.400
game right until it pays off and
then finally, um, you know,
33
00:02:10.599 --> 00:02:15.520
the criminals can operate from everywhere.
Hello. Have you heard of remote working
34
00:02:15.680 --> 00:02:19.319
lately? Right? Yes, I
have. So let's start with number one
35
00:02:19.319 --> 00:02:21.800
about targeting people. Right, So, in a business, you've got to
36
00:02:21.800 --> 00:02:24.879
know your audience and who to target. So um uh, talk to us
37
00:02:24.879 --> 00:02:31.479
about that hackers hat, but specifically
the cyber criminals. Um, what's involved
38
00:02:31.520 --> 00:02:36.520
in them targeting? Who's their audience, who's the weakest link? Some examples
39
00:02:36.520 --> 00:02:38.919
of that. Well, well,
first of all, hacks are lazy,
40
00:02:39.280 --> 00:02:44.000
okay, So let's just be honest
about that. I've always stated this,
41
00:02:44.319 --> 00:02:51.360
right, hackers are probably one group
of people that actually don't have a job,
42
00:02:51.400 --> 00:02:54.680
but they find a way to get
rich, okay. So and they
43
00:02:54.719 --> 00:02:58.960
like to pray upon the weakest link. You know, in this world of
44
00:02:59.000 --> 00:03:06.240
cybersecurity, we always like to call
them solf targets, okay. And and
45
00:03:06.319 --> 00:03:13.000
the idea is to find those soft
targets because that's the easiest entrance into a
46
00:03:13.120 --> 00:03:17.439
network. But but I've always stated
that technology is a standard and humans are
47
00:03:17.479 --> 00:03:23.319
flexible, So we look at humans. Um, cyber hackers are humans themselves.
48
00:03:23.360 --> 00:03:28.639
And we often understand that that they
come from a human mindset, so
49
00:03:28.680 --> 00:03:31.599
they understand people. I mean,
what's almost been done since day one?
50
00:03:31.879 --> 00:03:37.080
You know the pot picker, I
mean the picket said the pocket pickers.
51
00:03:37.719 --> 00:03:40.599
Right, Um, now they're just
taking it online, right with phishing attacks
52
00:03:40.599 --> 00:03:44.759
for example, Yes, yes,
so they go and take it online.
53
00:03:44.800 --> 00:03:46.159
But you know, let's just get
to the root of this here, and
54
00:03:46.240 --> 00:03:53.680
that hackles prey up part humans because
humans lose awareness. If I now where
55
00:03:53.719 --> 00:03:58.039
to go back and think about all
the cyber texts that happened though the past
56
00:03:58.120 --> 00:04:02.039
five years, and if we at
the root cause analysis, the answer always
57
00:04:02.039 --> 00:04:06.639
surfaces that why did they do that? Do they know that you're not supposed
58
00:04:06.719 --> 00:04:12.520
to open these malicious attacks? I
mean, you know, like the attachments.
59
00:04:13.080 --> 00:04:15.279
Did they even know that when you're
on Facebook and so forth, that
60
00:04:15.319 --> 00:04:18.399
you don't put your personal information up
there? And see, Now, these
61
00:04:18.399 --> 00:04:26.040
are things that the cybersecur cybersecurity industry
talks about every day, and through cyber
62
00:04:26.120 --> 00:04:30.839
awareness training is supposed to have users
race race the awareness Okay, Now,
63
00:04:31.160 --> 00:04:34.600
now, part of the reason why
that humans are always prayed, they are
64
00:04:34.639 --> 00:04:40.480
preyed upon because they can be easily
tricked right, if you find a disgrunted
65
00:04:40.480 --> 00:04:44.480
employee that's sitting in a bar somewhere, and if you are acting and if
66
00:04:44.519 --> 00:04:47.000
you want to do some social social
engineering, all you have to do is
67
00:04:47.000 --> 00:04:50.920
to have a conversation with that person
and they'll tell you everything you need to
68
00:04:50.920 --> 00:04:57.959
know. All right. Hackers are
hackers are friendly, and hackers are friendly
69
00:04:58.040 --> 00:05:01.199
because because they wanted from Asian,
A lot of times they approach you like
70
00:05:01.480 --> 00:05:05.720
um with we're here to help you
solve your problem. And many times they
71
00:05:05.759 --> 00:05:10.079
put that malware on your computer and
they're gonna help you deal with that.
72
00:05:10.160 --> 00:05:13.240
Right. But also to let's just
go on back. And one of the
73
00:05:13.240 --> 00:05:18.079
reasons that that I think humans are
praised because in most organizations and businesses,
74
00:05:18.360 --> 00:05:23.839
if you're not established in the human
firewalls, you are gonna have problem.
75
00:05:23.879 --> 00:05:28.319
And you know the concept of human
firewall is someone with a defensive mindset is
76
00:05:28.360 --> 00:05:36.079
always thinking about bandy guardian, bandy
defender being being that security guard in the
77
00:05:36.079 --> 00:05:41.439
front of a t Yeah. So
now they've they've identified their target. The
78
00:05:41.480 --> 00:05:44.639
next thing we're gonna talk about is
them doing their homework. Again, just
79
00:05:44.680 --> 00:05:46.360
like in a business, you gotta
find out who your customers are you gotta
80
00:05:46.360 --> 00:05:50.240
research your customers? Right? Their
customers are the people that are gonna be
81
00:05:50.240 --> 00:05:56.480
avaulnable to these attacks. Uh you
kind of teased on social media. So
82
00:05:57.120 --> 00:06:00.600
um, that's an example. Talk
to us about them doing their homework online
83
00:06:00.879 --> 00:06:05.160
from all of the profiles you've created. Okay, Well, first of all,
84
00:06:05.959 --> 00:06:11.560
if you go online, here's the
way it works if you really want
85
00:06:11.600 --> 00:06:14.600
to find a way to care out
its cyber attack. If you go to
86
00:06:15.879 --> 00:06:19.879
Facebook and you can create a page
yourself and you say, hey, I
87
00:06:19.879 --> 00:06:26.560
I personally would actually like to do
I'd like to do an age game where
88
00:06:26.600 --> 00:06:30.680
you have people to say, okay, back in nineteen seventy three, how
89
00:06:30.720 --> 00:06:34.000
old are you right? And tell
us what you was doing then and where
90
00:06:34.000 --> 00:06:39.360
did you live? Where you're just
giving ways two pieces of pieces of pieces
91
00:06:39.399 --> 00:06:46.720
of pieces of information your age one
and two is what did you reside.
92
00:06:46.800 --> 00:06:50.519
So so if someone calls up a
bank, then those are two types of
93
00:06:50.920 --> 00:06:56.839
authentication methods they use to gain assets
to to your account. Now it's caused
94
00:06:56.839 --> 00:07:01.120
the age game. Okay, all
right, So so with people, they
95
00:07:01.199 --> 00:07:06.480
become the weakest link because of lack
of awareness and not really taking cybersecurity.
96
00:07:06.600 --> 00:07:13.040
Um. Um, how could I
say real or just not taking cybersecurity as
97
00:07:13.439 --> 00:07:18.040
as being critical. And you know, it's sad to say that most organizations
98
00:07:18.079 --> 00:07:24.240
and people are not gonna take action
unless there is a negative event that happens.
99
00:07:24.560 --> 00:07:26.519
Let's say, for instant, they
go to a bank, then they
100
00:07:26.560 --> 00:07:30.560
realize that all that money has been
taken out of the hand because because they
101
00:07:30.600 --> 00:07:34.319
gave some information away. All right, that's that shouldn't have happened. Now
102
00:07:36.040 --> 00:07:43.360
we should not be getting to that
level. But in this world today that
103
00:07:43.519 --> 00:07:48.279
stills counts elapse. And hackers are
smart people, okay, and I'm gonna
104
00:07:48.399 --> 00:07:53.639
meet him. Okay, yes,
yes, they do that homework because they
105
00:07:53.680 --> 00:08:01.560
share information exactly. Two hackers are
hackers are a recipient of regular people.
106
00:08:01.079 --> 00:08:05.279
Okay? They what did people that
were on Facebook trying to protect themselves with
107
00:08:05.439 --> 00:08:09.639
some kind of way. Hackers realized
that it's much more fun to become an
108
00:08:09.639 --> 00:08:16.079
act and and there's a there's a
gap in there or there's a lack and
109
00:08:16.160 --> 00:08:18.199
so they see it as an opportunity. Again, like business, you find
110
00:08:18.240 --> 00:08:22.000
your audience. You're doing where you
find out where their market is, where
111
00:08:22.000 --> 00:08:26.199
there's a gap in the marketplace.
Right, Um, so you talked about
112
00:08:26.360 --> 00:08:30.959
UM, you know the age game. We're gonna uh finish this segment with
113
00:08:31.600 --> 00:08:35.600
the third on the list of six
is the numbers game. Right, so
114
00:08:35.720 --> 00:08:39.159
billions of people online UM talk to
us about you know, you know,
115
00:08:39.240 --> 00:08:45.399
invoicing and UM emails with instant messages, you know, bulk that kind of
116
00:08:45.399 --> 00:08:48.120
thing. He goes, he goes
way to look at it is. Here's
117
00:08:48.120 --> 00:08:54.679
that the infrastructure about two changes as
an organization moves from a thousand assets up
118
00:08:54.679 --> 00:08:58.960
to fifty tho assets. You're most
so sutable to cyber text. You think
119
00:09:00.039 --> 00:09:03.720
about the number of endpoints you have. You think about software programs, You
120
00:09:03.759 --> 00:09:07.120
think about the number of people in
your company. Think about the way that
121
00:09:07.159 --> 00:09:11.720
your architect is dispersed. Because your
architect is probably in the clouds, it's
122
00:09:11.720 --> 00:09:16.399
probably located in California, privately located
in the Midwest. Right now, you
123
00:09:16.480 --> 00:09:20.600
have to have your security features in
place. I'm talking physical security as well
124
00:09:20.679 --> 00:09:26.799
too, because if it's located in
a rural place that never have crime,
125
00:09:26.360 --> 00:09:31.639
they may not take cybersecurity, uh
you know seriously. And and you know
126
00:09:31.720 --> 00:09:35.720
that's the data center that kind of
resides over there, Okay, And all
127
00:09:35.720 --> 00:09:39.519
that really takes is one person to
gain assets to that data center, and
128
00:09:39.559 --> 00:09:43.480
they could cause disruption for your entire
enterprise. So so when we look at
129
00:09:43.600 --> 00:09:48.200
the infrastructure, and knowing that the
infrastructure is always growing, problems are always
130
00:09:48.200 --> 00:09:52.679
gonna surface. But also too and
the numbers game, you know, we
131
00:09:52.759 --> 00:09:56.919
have to look at people too,
because there are a great number of people
132
00:09:56.960 --> 00:10:03.279
that are gaining interests and hacking and
I'm talking, uh from the unethical side,
133
00:10:03.279 --> 00:10:09.519
because ethical hacking is there to try
to prevent the unethical hacking from happening.
134
00:10:09.639 --> 00:10:13.559
So that basically the same group of
people, except except that one side
135
00:10:13.600 --> 00:10:18.720
is a is a chromical and the
other side is not a chrominal. Okay,
136
00:10:18.919 --> 00:10:22.200
see that's the only difference. And
and I think the numbers game have
137
00:10:22.399 --> 00:10:26.799
to play as well too because as
you put these endpoints in your system,
138
00:10:26.879 --> 00:10:33.279
you're gonna have more issues. Um
and also too when it comes to numbers,
139
00:10:33.559 --> 00:10:37.600
it's money, yeah there there,
Yeah, there's some um there's some
140
00:10:37.679 --> 00:10:41.120
dollar bills on some currency on the
other end. So yeah, that's a
141
00:10:41.159 --> 00:10:45.080
great way to um sum that up. And just to kind of recap on
142
00:10:45.120 --> 00:10:48.720
the numbers game before we move into
recapping two, what you've accomplished in some
143
00:10:48.759 --> 00:10:52.279
of the stats there But what's interesting
to me about the numbers game. Again,
144
00:10:52.679 --> 00:10:56.879
the business. If you send out
enough emails, making up, phone
145
00:10:56.879 --> 00:11:00.679
calls, making up is this go
to enough networking evention, you're to succeed
146
00:11:00.720 --> 00:11:03.840
at some point. Right. So
same thing with hackers, right, it's
147
00:11:03.840 --> 00:11:05.399
a business to them. You know, don't kid yourself. It's a business
148
00:11:05.399 --> 00:11:09.799
model right for profit And UM some
of the things we talked about there with
149
00:11:09.879 --> 00:11:15.480
the billions of people online, two
or three quick examples about this. UM
150
00:11:15.679 --> 00:11:20.200
is just that simple inbox, right, that's the biggest enter one of the
151
00:11:20.240 --> 00:11:24.159
biggest entry points. And the UM
and attaching an invoice to be paid.
152
00:11:24.519 --> 00:11:28.000
I know, as a business owner, sometimes I'll get an invoice. I'm
153
00:11:28.039 --> 00:11:31.200
like that company. I don't think
I've ever done business with that company.
154
00:11:31.200 --> 00:11:35.440
But if it's a large enough organization
and you have somebody that that's responsibility is
155
00:11:35.480 --> 00:11:39.919
to clear all those invoices, they
may not, you know, UM double
156
00:11:39.000 --> 00:11:41.679
check all this stuff because it's a
similar company they've done business in the past.
157
00:11:41.679 --> 00:11:45.600
They just arbitrarily pay. They don't
want late payments, and the bosses
158
00:11:45.639 --> 00:11:48.159
told them, you know, you're
in charge of account and get that paid
159
00:11:48.240 --> 00:11:52.120
right. Well. And again,
if they send out five thousand and fifty
160
00:11:52.120 --> 00:11:54.679
thousand, a hundred thousand, somebody's
going to hit the pay button somewhere,
161
00:11:54.759 --> 00:11:58.440
right and generate money. And then
finally, um, the newest thing that's
162
00:11:58.440 --> 00:12:03.919
started hit I phone is a text
that appears from quote my I'm holding up
163
00:12:03.960 --> 00:12:09.440
air quotes from my bank or some
type of financial institution. Right, I
164
00:12:09.480 --> 00:12:13.279
mean, I guess because I've sat
across the dude the cybersecurity so long.
165
00:12:13.480 --> 00:12:16.240
I'm not clicking on those links.
But there's somebody on the other end of
166
00:12:16.320 --> 00:12:22.200
that phone. If they send out
ten thousand text messages, somebody's gonna click.
167
00:12:22.639 --> 00:12:28.399
That's right. It's always it,
always talking about the lois coming DNOM.
168
00:12:28.440 --> 00:12:33.200
All the ready takes is for one
person out of a ten thousand actually
169
00:12:33.240 --> 00:12:39.279
calls having That's all it really takes, you know, because we're dealing with
170
00:12:39.360 --> 00:12:43.000
digital crimes. Because the physical crime, you may need six people to break
171
00:12:43.000 --> 00:12:46.480
into a bank, yeah, and
about hours in the day, right,
172
00:12:46.559 --> 00:12:50.679
You're it's a finite, right,
But in these digital crime you need one
173
00:12:50.720 --> 00:12:54.240
person that sitting behind a computer,
right, That's that's pretty much all you
174
00:12:54.320 --> 00:12:56.639
need. And they can run a
software program that like it used to be,
175
00:12:56.679 --> 00:13:01.240
like, um, hold on too
don't keep out your cell phone number.
176
00:13:01.320 --> 00:13:03.039
Right, But now they're not even
concerned about what number it is.
177
00:13:03.120 --> 00:13:07.039
It just runs through a program and
just starts spitting out digits twenty four hours
178
00:13:07.039 --> 00:13:09.519
a day, right, and they
don't care if it's a landline or a
179
00:13:09.559 --> 00:13:13.519
cell phone or wherever. Right.
And it's coming from sometimes from foreign countries
180
00:13:13.879 --> 00:13:18.279
that don't our laws can't really protect
us. Yeah, we gotta protect ourselves.
181
00:13:18.360 --> 00:13:22.120
See, So I want to um, I want to say one thing
182
00:13:22.159 --> 00:13:28.320
about cyber security. It's on us
as individuals because in the end of the
183
00:13:28.399 --> 00:13:33.879
day, when a negative events happened, it's much harder to clean that issue
184
00:13:33.000 --> 00:13:37.480
up. So it's easier to just
make sure that you stay aware and you
185
00:13:37.519 --> 00:13:43.639
stay safe because you can uh prevent
issues and also too, you can avoid
186
00:13:43.679 --> 00:13:52.080
the headaches because because I've always had
the belief at the end of the day,
187
00:13:52.120 --> 00:13:54.000
it's on you as a person because
we know what a hack it does,
188
00:13:54.080 --> 00:13:56.919
because we can't complain about it,
okay, because we know their sold
189
00:13:56.960 --> 00:14:03.120
premises is to call having and damage, so we become wise of people.
190
00:14:03.000 --> 00:14:07.840
Then we can counter that concept and
we can beat them to the finish line.
191
00:14:09.480 --> 00:14:11.080
Well said, and speaking to finish
line, Uh, this is a
192
00:14:11.080 --> 00:14:16.360
perfect time to segue into our next
segment and stay tune again at UM upcoming
193
00:14:16.480 --> 00:14:20.399
for the new year, we're gonna
be talking about the other three uh topics
194
00:14:20.759 --> 00:14:24.679
in these areas of cyber crime and
why it's growing and what we can do
195
00:14:24.679 --> 00:14:28.679
about it. UM and again Rich
casting over here in the Global podcast studios
196
00:14:28.679 --> 00:14:33.080
here Atlanta, Georgia, having a
great conversation as always with Mr Dwayne Hart
197
00:14:33.279 --> 00:14:35.799
and all these topics that you've heard
about. If it's you know, raises
198
00:14:35.840 --> 00:14:39.440
a flag or of interest, you
can contact just reach out to Dwayne at
199
00:14:39.480 --> 00:14:43.840
duyne hart dot com. There you
can find everything we're gonna talk about,
200
00:14:43.039 --> 00:14:46.919
all things hybersecurity, all of his
media releases. Again, you don't need
201
00:14:46.919 --> 00:14:50.320
a bunch of different websites and handles
and social media, just go to Dwayne
202
00:14:50.360 --> 00:14:54.840
Hart dot com. So, Dwayne, let's talk about twenty twenty two and
203
00:14:54.919 --> 00:14:58.639
kind of a recap. So,
Um, there's a number of things you
204
00:14:58.679 --> 00:15:03.440
accomplished and it continue young. So
for example, Uh, your ongoing series
205
00:15:03.840 --> 00:15:07.240
for your podcast is just wrap it
up Season two, right, Yes,
206
00:15:07.519 --> 00:15:13.799
season season two is in the house. And season two was forever important because
207
00:15:13.399 --> 00:15:18.679
season two was about trying to connect
cybersecurity. All right. You know,
208
00:15:18.720 --> 00:15:22.399
I wanted to focus on looking at
the cybersecurity sectors that you have, looking
209
00:15:22.399 --> 00:15:26.960
at the different programs, looking at
some of the issues such as digital parenting,
210
00:15:28.440 --> 00:15:33.799
and trying to connect all of those
together into cybersecurity because because when I
211
00:15:33.840 --> 00:15:39.080
did my UH speaker's video, that
was one of the topics that I brought
212
00:15:39.159 --> 00:15:46.960
up, um about cyber talk and
cyber talk is about connecting cybersecurity because I've
213
00:15:48.039 --> 00:15:52.679
always felt that if we can connect
cybersecurity, we can resolve problems. Because
214
00:15:52.679 --> 00:15:58.120
we have a problem in the industry
now where where we have solos solos of
215
00:15:58.279 --> 00:16:03.200
saying that the only new piece of
sober secuter I need to be worried about
216
00:16:03.320 --> 00:16:07.840
is my password. Okay, that's
that's so nineteen nineties whatever. Yeah.
217
00:16:07.919 --> 00:16:12.960
Yeah, So that's so let's look
at the much wider picture and make a
218
00:16:12.960 --> 00:16:18.399
determination on how we can connects obficecuity, which was what this season did.
219
00:16:18.799 --> 00:16:23.480
It focus on all the connectors that
you have, and um, there was
220
00:16:23.519 --> 00:16:27.240
a whole lot of success with it. And also too, you know,
221
00:16:27.279 --> 00:16:32.399
this season brought on something else for
you too, Rich because now I think
222
00:16:32.480 --> 00:16:34.320
you've got the picture about the heckles
at right. Yeah, I got my
223
00:16:34.360 --> 00:16:38.559
halfer headphones on, but yeah,
I actually might have but yeah. But
224
00:16:38.919 --> 00:16:45.159
um so, speaking of season two
and two, I've got three uh topics
225
00:16:45.159 --> 00:16:48.120
that you covered, and i'd be
interesting to see what's on your shortlist as
226
00:16:48.159 --> 00:16:51.519
far as topics. But to me, I'm gonna turn to you next about
227
00:16:51.519 --> 00:16:55.360
your topics. But we really covered
A to Z but I thought if I
228
00:16:55.360 --> 00:16:57.559
had a narrow down to just two
or three, uh, what we're cut
229
00:16:57.840 --> 00:17:03.920
very intriguing. I think the her
in this episode about veterans and active military.
230
00:17:04.359 --> 00:17:10.400
Also, the auto transportation topic was
very fascinating. And finally on churches.
231
00:17:10.839 --> 00:17:11.759
So I don't know if you want
to elaborate on some of these or
232
00:17:11.799 --> 00:17:15.519
what else besides those three on your
list of it that you thought would really
233
00:17:15.519 --> 00:17:19.119
spiked you know what. I am
a veteran, so I'm gonna take that
234
00:17:19.200 --> 00:17:23.240
one veterans see now. When it
comes to veterans, I also focus on
235
00:17:23.240 --> 00:17:27.799
workforce development too, because I realized
a lot of veterans are transfer transition out
236
00:17:27.799 --> 00:17:32.400
of the military, and when you
transition out of military, you hear so
237
00:17:32.480 --> 00:17:37.400
much boglos information about what you need
to do for your career, right you
238
00:17:37.440 --> 00:17:42.000
know it is UM one one bogos
theory is that they're gonna hold your job
239
00:17:42.039 --> 00:17:45.839
for ninety days. Nobody will hold
your job for ning days. Okay,
240
00:17:45.000 --> 00:17:49.079
all right, so let's just get
rid of that one. Part of the
241
00:17:49.119 --> 00:17:55.240
other one that was discussed this the
scams that occurring for veterans as well too,
242
00:17:55.799 --> 00:17:57.920
and you know, to just recap
on that. And they normally happened
243
00:17:57.960 --> 00:18:06.079
because veterans live in a private,
enclosed environment with the government and UM.
244
00:18:06.160 --> 00:18:11.240
They are also victims because of the
way the monetary system work, because veterans
245
00:18:11.240 --> 00:18:15.440
getta guaranteed paycheck every month. So
if you can get them to fall into
246
00:18:15.440 --> 00:18:18.279
a scam and to sign a piece
of paper, then guess what, that's
247
00:18:18.319 --> 00:18:23.440
guaranteed money to you every month.
Uh. Focusing on that and also to
248
00:18:23.720 --> 00:18:30.079
yes, looking at the churches and
UM talking about the protection reins and knowing
249
00:18:30.119 --> 00:18:34.799
that churches are so setable to cyber
attacks because because they don't produce goods and
250
00:18:34.839 --> 00:18:41.720
services, so they're really sometimes not
so focused into cybersecurity and nobody would think
251
00:18:41.759 --> 00:18:47.559
that they are a hacker's appetite.
Yeah, you wouldn't think like there would
252
00:18:47.559 --> 00:18:51.119
be great opportunity there. And you
also think it's a it's a nonprofit typically
253
00:18:51.319 --> 00:18:56.160
a lot of volunteers. Um,
but yeah, it's and again going back
254
00:18:56.200 --> 00:19:00.240
to our earlier conversation about doing their
homework and targeting, Uh, that's a
255
00:19:00.839 --> 00:19:04.559
unfortunately somewhat of an easy target.
Well, what I did some research and
256
00:19:04.599 --> 00:19:07.799
I went to a couple of church's
website just to get an indication of the
257
00:19:07.880 --> 00:19:14.720
cybersecuity practice is I'm finding that some
of them are practicing, um, the
258
00:19:14.880 --> 00:19:18.119
idea of an NDA. Let's say, before you join that church, you
259
00:19:18.200 --> 00:19:22.359
gotta sign a none a none disclosure
agreement. Some of the other ones are
260
00:19:23.279 --> 00:19:30.279
are having portals set up where where
you register to become a member. But
261
00:19:30.359 --> 00:19:33.440
then after that you get an encrypted
email. Okay, right, all right,
262
00:19:33.559 --> 00:19:37.519
which is which is also good.
And then I've noticed that when it
263
00:19:37.559 --> 00:19:44.960
comes to donors and so forth,
um, some of them are resorting to
264
00:19:45.880 --> 00:19:51.039
donation in a physical form as well
too. But but if we go back
265
00:19:51.039 --> 00:19:52.920
and look at this year, you
know, there's been a couple of cyber
266
00:19:53.039 --> 00:19:57.039
tacks on on some churches, and
you know, some personal data have been
267
00:19:57.079 --> 00:20:02.240
stole. But but churches have make
sure that they have cyber insurance in place,
268
00:20:02.880 --> 00:20:07.279
because if you have a congregation of
ten thousand people, and if five
269
00:20:07.319 --> 00:20:11.079
thousand accounts get compromised and somebody's heyl
responsible, yea, it can literally you
270
00:20:11.079 --> 00:20:14.920
know, put them out of business
virtually. So, uh, we've got
271
00:20:14.960 --> 00:20:17.839
about ten minutes left. We've got
four other topics to hit on here real
272
00:20:17.880 --> 00:20:22.640
quick, wrapping up highlights and looking
back on so um. Next on the
273
00:20:22.720 --> 00:20:27.960
list is let's talk your book.
Give us your best elevator pitch about your
274
00:20:27.960 --> 00:20:32.759
book, UM, and how to
become an industry tool. Okay, here
275
00:20:32.759 --> 00:20:37.640
goes the elevator pitch for the cybersecurity
mindset. UM. It serves. It
276
00:20:37.759 --> 00:20:45.759
serves as a thinking models so that
people can um operate cybersecurity in a proactive
277
00:20:45.799 --> 00:20:49.519
state. So that means that when
I wrote the book, I was always
278
00:20:49.799 --> 00:20:56.720
warning, okay, what is these
simplistic way to scructtion cybersecurity and a format
279
00:20:56.920 --> 00:21:00.920
that would allow people to think proactice
so that people and see the truth.
280
00:21:00.880 --> 00:21:07.359
Part of the problems that I noticed
in the industry was that cybersecurity was very
281
00:21:07.400 --> 00:21:14.400
complex, okay, and much of
the written information pertaining to cybersecurity comes in
282
00:21:14.680 --> 00:21:18.920
a very complex format. So I
believe that that if I could write a
283
00:21:19.039 --> 00:21:25.799
book and a common sense approach,
I could help remediate some of those concerns
284
00:21:26.079 --> 00:21:30.400
for cybersecurity itself. So so when
you think of the cybersecurity mindset, you
285
00:21:30.400 --> 00:21:33.880
know, you think of it as
a thinking model, okay, and it's
286
00:21:33.880 --> 00:21:38.880
going to allow you to think proactally
about engaging cybersecurity. And it's somewhat similar
287
00:21:40.559 --> 00:21:45.519
similar to let's say, if I
was an NFL coach, Right, it's
288
00:21:45.519 --> 00:21:48.799
like your playbook. Yes, that's
right, it is your resource guide,
289
00:21:48.960 --> 00:21:53.160
is your playbook UM, and it's
your twol kit that you can use.
290
00:21:53.519 --> 00:22:00.559
So so when NFL coaches come out
on Sunday, so we noticed noticed that
291
00:22:00.319 --> 00:22:07.920
the coaches have a plate card offensive
and defensive strategy. So so just imagine
292
00:22:07.960 --> 00:22:12.519
the cybersecurity mindset in itself. It's
just serving as a playbook. So that
293
00:22:12.559 --> 00:22:17.240
means that if that if you have
a cybersecurity expert, then you could use
294
00:22:17.279 --> 00:22:21.559
that on a daily basis just to
understand how to navigate cybersecurity. If you're
295
00:22:21.519 --> 00:22:25.559
a student in college, then it
serves it serves as your resource guide,
296
00:22:25.920 --> 00:22:29.160
so right, I mean, it
really covers the whole gambut of UM,
297
00:22:29.559 --> 00:22:33.319
not just the the industry of cybersecurity, but also pertinent to UM where you
298
00:22:33.359 --> 00:22:37.880
find yourself as an individual or a
company or nonprofit uh in that space.
299
00:22:37.920 --> 00:22:41.720
And again you can check out get
a copy of that book right at Dwayne
300
00:22:41.759 --> 00:22:45.799
Heart dot com. And uh so
next on the shortlist is this should be
301
00:22:45.839 --> 00:22:49.839
relatively brief, but there's an annual
conference for the industry. Talk to us
302
00:22:51.039 --> 00:22:53.640
UH in thirty seconds or less,
what where and where that conference was and
303
00:22:53.799 --> 00:23:00.759
what you leaned about that and why
somebody might attend on Forces Communication Electronic Association.
304
00:23:00.880 --> 00:23:04.000
I went to Technic Cyber which was
located in Augusta, Georgia. I
305
00:23:04.039 --> 00:23:08.039
go there every year. UM.
This is a major conference where all the
306
00:23:08.119 --> 00:23:15.240
government technology vendors come to learn more
about cybersecurity and to see what the government
307
00:23:15.319 --> 00:23:18.680
is headed and as of now,
the government is headed towards zero trust.
308
00:23:18.240 --> 00:23:25.119
Zero zero trust is a mythology UM
that the government is really trying to bring
309
00:23:25.160 --> 00:23:30.000
on boards so that they can um, you know, so that so that
310
00:23:30.640 --> 00:23:37.119
they can remove away from trust but
verify into you don't trust no one at
311
00:23:37.160 --> 00:23:42.319
all. Okay, so you consistently
want to have that that type of identification
312
00:23:42.400 --> 00:23:47.960
for users. But but that's another
one called SPIC, which is which is
313
00:23:48.039 --> 00:23:52.640
Special Operations UM conference that they held
down in Temple, Florida as well too.
314
00:23:52.680 --> 00:23:56.319
So if you're out there, UM, type type and tech that T
315
00:23:56.519 --> 00:24:00.920
E C H N E T and
attend some of those versus. Yeah.
316
00:24:00.960 --> 00:24:03.359
So again this is the man that's
not only written the book on it,
317
00:24:03.400 --> 00:24:07.279
has the podcast on it, but
is staying on top of what's what's current
318
00:24:07.599 --> 00:24:11.640
in the industry. Um okay,
so uh four and five on the list.
319
00:24:11.000 --> 00:24:15.599
So you've had your YouTube channel for
a minute, as they say,
320
00:24:15.720 --> 00:24:18.000
UM, give us a stat what
kind of numbers are you getting on your
321
00:24:18.000 --> 00:24:22.720
YouTube platform for this year? I
saw that I had one point one million
322
00:24:22.759 --> 00:24:26.359
views. Wow. Yeah, it's
intense. That's been a lot of views
323
00:24:26.400 --> 00:24:30.920
on my YouTube channel and I think
it is driving for the content that I
324
00:24:32.000 --> 00:24:40.440
have because of content is based on
workforce development and all different sectors of cybersecurity
325
00:24:40.480 --> 00:24:48.359
itself and also serves as a repository
for marketing the cybersecurity mindset. Yes,
326
00:24:48.480 --> 00:24:52.519
so that that speaks to two points. One is that, um, this
327
00:24:52.599 --> 00:24:56.759
is a topic that's of high interest. People are searching for more information on
328
00:24:56.799 --> 00:25:00.599
cybersecurity on YouTube, which is the
second largest search engine on the and obviously
329
00:25:00.599 --> 00:25:06.000
behind Google. Um so people are
on YouTube wanting to learn and they're finding
330
00:25:06.039 --> 00:25:08.720
you. Obviously is a valuable resource
because you're all in this, You've done
331
00:25:08.759 --> 00:25:15.000
your homework, you've uh you persistent
and consistent on creating content on that subject
332
00:25:15.079 --> 00:25:19.119
matter. So one point one million, that's that's very impressive. So our
333
00:25:19.200 --> 00:25:25.640
last topic is something excited. You
literally just got into UM creating near the
334
00:25:25.720 --> 00:25:30.400
end of two UH, talk to
us about your live stream platform. Oh.
335
00:25:30.559 --> 00:25:37.000
Live screens were dedicated to the career
development area of cybersecurity. I've always
336
00:25:37.039 --> 00:25:42.039
felt that the cybersecurity industry has some
great people that are trying to progressus at
337
00:25:42.039 --> 00:25:45.079
career. So I wanted to take
all the take all the information that I
338
00:25:45.200 --> 00:25:51.680
knew and experiencing my career and to
deliver it in a new platform. So
339
00:25:51.720 --> 00:25:56.839
I thought about live screaming and it
kind of worked out well and it has
340
00:25:56.960 --> 00:26:03.000
helped a lot of UM individual channel
career through cybersecurity. Some of the some
341
00:26:03.119 --> 00:26:08.519
of the Facebook groups and some of
the linked In groups and UM and all
342
00:26:08.599 --> 00:26:18.720
the connectors on LinkedIn are definitely enjoying
it. UM. I guess you know,
343
00:26:18.880 --> 00:26:25.079
periodically I go get a inbox UH
message to say that you know,
344
00:26:25.200 --> 00:26:29.880
the YouTube channels, I have been
out a lot and on Facebook as well
345
00:26:30.000 --> 00:26:33.519
too. I try to share it
as much as possible. So so you
346
00:26:33.559 --> 00:26:38.240
know, the live screams served its
purpose. I wanted to be most I
347
00:26:38.279 --> 00:26:41.519
want to be closer when I speak
to people, so I decided to go
348
00:26:41.640 --> 00:26:45.880
live screames, have a video,
you know, authentic in real time and
349
00:26:45.880 --> 00:26:51.799
all of that stuff. Yeah,
that's awesome, right, So Dwayne,
350
00:26:51.920 --> 00:26:55.519
Um again, it's been fun.
It's been educational in my part. I've
351
00:26:55.599 --> 00:26:59.319
enjoyed being on the other side of
the microphone uh no, listen to your
352
00:26:59.319 --> 00:27:02.599
podcast, but interacting as well.
So I think, um, this has
353
00:27:02.640 --> 00:27:06.720
been great. Looking forward to three
and with that, stay tuned for our
354
00:27:06.799 --> 00:27:10.759
next episode. That's our actual topic. Any closing thoughts on your part less
355
00:27:10.799 --> 00:27:14.119
stay cyber safe, unlet's keep the
cybersecuting mindset engaged.