Secret Tips On Addressing The Cybercrime Growth Part 1

January 03, 2023 00:27:16
Secret Tips On Addressing The Cybercrime Growth Part 1
Chief of Cybersecurity
Secret Tips On Addressing The Cybercrime Growth Part 1

Jan 03 2023 | 00:27:16

/

Hosted By

Dewayne Hart

Show Notes

In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate security programs and infrastructure advances. The end state makes a firm determination whether cybercrime is outperforming cyber protection.This podcast provides insights that reflect the ever-changing aspects of technology and system disruption through cybercrime and examines how human behavior can become solid defensive shields.

View Full Transcript

Episode Transcript

WEBVTT 1 00:00:02.960 --> 00:00:05.639 Alright, alright, it's that time again, Rich Cassan over here in the 2 00:00:05.679 --> 00:00:09.439 Global Podcast Studios live from Atlanta. Alongside me, we have the guest of 3 00:00:09.480 --> 00:00:12.759 the hour as always, Mr Duayanne Hart. Uh you can check him out 4 00:00:12.800 --> 00:00:17.160 at Dwayne Hart dot com. So we're gonna, as usuill be talking cybersecurity, 5 00:00:17.199 --> 00:00:20.519 but this is a great one. We're gonna be talking about why cybercrime 6 00:00:20.640 --> 00:00:24.399 is growing and why are criminals succeeding. But the second half of the show 7 00:00:24.399 --> 00:00:29.359 we're gonna dedicate to a kind of a recap of all things cybersecurity, Duyne 8 00:00:29.399 --> 00:00:34.039 Hart and what kind of what what's happened in two? We might give you 9 00:00:34.439 --> 00:00:38.119 a teaser for three. But the man of the hour, Mr Duayne Heart, 10 00:00:38.119 --> 00:00:41.280 Welcome to the show. Thank you. It's always a flursure to be 11 00:00:41.399 --> 00:00:46.159 here and in Global Podcast Studio. I can say that the year of two 12 00:00:46.240 --> 00:00:51.439 has been very successful. I made a lot of great moves, one of 13 00:00:51.479 --> 00:00:54.600 you. You've been a busy dude to whatever. We're gonna talk about that 14 00:00:54.600 --> 00:00:58.159 in the second half. What's happening, But let's jump right into today's topic 15 00:00:58.200 --> 00:01:03.719 again is why is crime still growing and how are criminals succeeding? We actually 16 00:01:03.719 --> 00:01:07.000 have six topics along this um uh with this segment. But here's what we're 17 00:01:07.000 --> 00:01:11.120 gonna do for this show. We're only gonna give you three. You gotta 18 00:01:11.120 --> 00:01:15.719 stay tuned for three. With the other three, but real quickly, the 19 00:01:15.719 --> 00:01:19.519 bullet points are um. You know, really when you look at there are 20 00:01:19.640 --> 00:01:23.799 six topics, it's really business basic one oh one. This is what actually 21 00:01:23.799 --> 00:01:26.920 businesses, successful businesses to do. We don't think of, you know, 22 00:01:26.959 --> 00:01:30.359 typically of cybersecurity hackers as a business, but it's a it's a venture for 23 00:01:30.400 --> 00:01:33.319 them. They're they're making profit. Right, it's not the right kind of 24 00:01:33.359 --> 00:01:37.840 business, right, you could argue, But here's the topics rapid fire. 25 00:01:38.519 --> 00:01:44.000 UM what cyber criminals are. Why they're succeeding because they're targeting people and their 26 00:01:44.000 --> 00:01:48.159 weakest link. Number two, they're doing their homework. Number three, it's 27 00:01:48.159 --> 00:01:52.040 a numbers game. Think we if you have your business hat on instead of 28 00:01:52.040 --> 00:01:56.879 your hackers, had these same principles apply. Number four is UH scams keep 29 00:01:56.959 --> 00:01:59.920 evolving in business, that would be technology. You gotta stay ahead of the 30 00:02:00.640 --> 00:02:04.640 UH. Five is patients pays off. Right, a successful business entrepreneur, 31 00:02:04.920 --> 00:02:06.920 you gotta stick it, you gotta stick it out you've gotta be in the 32 00:02:06.959 --> 00:02:10.400 game right until it pays off and then finally, um, you know, 33 00:02:10.599 --> 00:02:15.520 the criminals can operate from everywhere. Hello. Have you heard of remote working 34 00:02:15.680 --> 00:02:19.319 lately? Right? Yes, I have. So let's start with number one 35 00:02:19.319 --> 00:02:21.800 about targeting people. Right, So, in a business, you've got to 36 00:02:21.800 --> 00:02:24.879 know your audience and who to target. So um uh, talk to us 37 00:02:24.879 --> 00:02:31.479 about that hackers hat, but specifically the cyber criminals. Um, what's involved 38 00:02:31.520 --> 00:02:36.520 in them targeting? Who's their audience, who's the weakest link? Some examples 39 00:02:36.520 --> 00:02:38.919 of that. Well, well, first of all, hacks are lazy, 40 00:02:39.280 --> 00:02:44.000 okay, So let's just be honest about that. I've always stated this, 41 00:02:44.319 --> 00:02:51.360 right, hackers are probably one group of people that actually don't have a job, 42 00:02:51.400 --> 00:02:54.680 but they find a way to get rich, okay. So and they 43 00:02:54.719 --> 00:02:58.960 like to pray upon the weakest link. You know, in this world of 44 00:02:59.000 --> 00:03:06.240 cybersecurity, we always like to call them solf targets, okay. And and 45 00:03:06.319 --> 00:03:13.000 the idea is to find those soft targets because that's the easiest entrance into a 46 00:03:13.120 --> 00:03:17.439 network. But but I've always stated that technology is a standard and humans are 47 00:03:17.479 --> 00:03:23.319 flexible, So we look at humans. Um, cyber hackers are humans themselves. 48 00:03:23.360 --> 00:03:28.639 And we often understand that that they come from a human mindset, so 49 00:03:28.680 --> 00:03:31.599 they understand people. I mean, what's almost been done since day one? 50 00:03:31.879 --> 00:03:37.080 You know the pot picker, I mean the picket said the pocket pickers. 51 00:03:37.719 --> 00:03:40.599 Right, Um, now they're just taking it online, right with phishing attacks 52 00:03:40.599 --> 00:03:44.759 for example, Yes, yes, so they go and take it online. 53 00:03:44.800 --> 00:03:46.159 But you know, let's just get to the root of this here, and 54 00:03:46.240 --> 00:03:53.680 that hackles prey up part humans because humans lose awareness. If I now where 55 00:03:53.719 --> 00:03:58.039 to go back and think about all the cyber texts that happened though the past 56 00:03:58.120 --> 00:04:02.039 five years, and if we at the root cause analysis, the answer always 57 00:04:02.039 --> 00:04:06.639 surfaces that why did they do that? Do they know that you're not supposed 58 00:04:06.719 --> 00:04:12.520 to open these malicious attacks? I mean, you know, like the attachments. 59 00:04:13.080 --> 00:04:15.279 Did they even know that when you're on Facebook and so forth, that 60 00:04:15.319 --> 00:04:18.399 you don't put your personal information up there? And see, Now, these 61 00:04:18.399 --> 00:04:26.040 are things that the cybersecur cybersecurity industry talks about every day, and through cyber 62 00:04:26.120 --> 00:04:30.839 awareness training is supposed to have users race race the awareness Okay, Now, 63 00:04:31.160 --> 00:04:34.600 now, part of the reason why that humans are always prayed, they are 64 00:04:34.639 --> 00:04:40.480 preyed upon because they can be easily tricked right, if you find a disgrunted 65 00:04:40.480 --> 00:04:44.480 employee that's sitting in a bar somewhere, and if you are acting and if 66 00:04:44.519 --> 00:04:47.000 you want to do some social social engineering, all you have to do is 67 00:04:47.000 --> 00:04:50.920 to have a conversation with that person and they'll tell you everything you need to 68 00:04:50.920 --> 00:04:57.959 know. All right. Hackers are hackers are friendly, and hackers are friendly 69 00:04:58.040 --> 00:05:01.199 because because they wanted from Asian, A lot of times they approach you like 70 00:05:01.480 --> 00:05:05.720 um with we're here to help you solve your problem. And many times they 71 00:05:05.759 --> 00:05:10.079 put that malware on your computer and they're gonna help you deal with that. 72 00:05:10.160 --> 00:05:13.240 Right. But also to let's just go on back. And one of the 73 00:05:13.240 --> 00:05:18.079 reasons that that I think humans are praised because in most organizations and businesses, 74 00:05:18.360 --> 00:05:23.839 if you're not established in the human firewalls, you are gonna have problem. 75 00:05:23.879 --> 00:05:28.319 And you know the concept of human firewall is someone with a defensive mindset is 76 00:05:28.360 --> 00:05:36.079 always thinking about bandy guardian, bandy defender being being that security guard in the 77 00:05:36.079 --> 00:05:41.439 front of a t Yeah. So now they've they've identified their target. The 78 00:05:41.480 --> 00:05:44.639 next thing we're gonna talk about is them doing their homework. Again, just 79 00:05:44.680 --> 00:05:46.360 like in a business, you gotta find out who your customers are you gotta 80 00:05:46.360 --> 00:05:50.240 research your customers? Right? Their customers are the people that are gonna be 81 00:05:50.240 --> 00:05:56.480 avaulnable to these attacks. Uh you kind of teased on social media. So 82 00:05:57.120 --> 00:06:00.600 um, that's an example. Talk to us about them doing their homework online 83 00:06:00.879 --> 00:06:05.160 from all of the profiles you've created. Okay, Well, first of all, 84 00:06:05.959 --> 00:06:11.560 if you go online, here's the way it works if you really want 85 00:06:11.600 --> 00:06:14.600 to find a way to care out its cyber attack. If you go to 86 00:06:15.879 --> 00:06:19.879 Facebook and you can create a page yourself and you say, hey, I 87 00:06:19.879 --> 00:06:26.560 I personally would actually like to do I'd like to do an age game where 88 00:06:26.600 --> 00:06:30.680 you have people to say, okay, back in nineteen seventy three, how 89 00:06:30.720 --> 00:06:34.000 old are you right? And tell us what you was doing then and where 90 00:06:34.000 --> 00:06:39.360 did you live? Where you're just giving ways two pieces of pieces of pieces 91 00:06:39.399 --> 00:06:46.720 of pieces of information your age one and two is what did you reside. 92 00:06:46.800 --> 00:06:50.519 So so if someone calls up a bank, then those are two types of 93 00:06:50.920 --> 00:06:56.839 authentication methods they use to gain assets to to your account. Now it's caused 94 00:06:56.839 --> 00:07:01.120 the age game. Okay, all right, So so with people, they 95 00:07:01.199 --> 00:07:06.480 become the weakest link because of lack of awareness and not really taking cybersecurity. 96 00:07:06.600 --> 00:07:13.040 Um. Um, how could I say real or just not taking cybersecurity as 97 00:07:13.439 --> 00:07:18.040 as being critical. And you know, it's sad to say that most organizations 98 00:07:18.079 --> 00:07:24.240 and people are not gonna take action unless there is a negative event that happens. 99 00:07:24.560 --> 00:07:26.519 Let's say, for instant, they go to a bank, then they 100 00:07:26.560 --> 00:07:30.560 realize that all that money has been taken out of the hand because because they 101 00:07:30.600 --> 00:07:34.319 gave some information away. All right, that's that shouldn't have happened. Now 102 00:07:36.040 --> 00:07:43.360 we should not be getting to that level. But in this world today that 103 00:07:43.519 --> 00:07:48.279 stills counts elapse. And hackers are smart people, okay, and I'm gonna 104 00:07:48.399 --> 00:07:53.639 meet him. Okay, yes, yes, they do that homework because they 105 00:07:53.680 --> 00:08:01.560 share information exactly. Two hackers are hackers are a recipient of regular people. 106 00:08:01.079 --> 00:08:05.279 Okay? They what did people that were on Facebook trying to protect themselves with 107 00:08:05.439 --> 00:08:09.639 some kind of way. Hackers realized that it's much more fun to become an 108 00:08:09.639 --> 00:08:16.079 act and and there's a there's a gap in there or there's a lack and 109 00:08:16.160 --> 00:08:18.199 so they see it as an opportunity. Again, like business, you find 110 00:08:18.240 --> 00:08:22.000 your audience. You're doing where you find out where their market is, where 111 00:08:22.000 --> 00:08:26.199 there's a gap in the marketplace. Right, Um, so you talked about 112 00:08:26.360 --> 00:08:30.959 UM, you know the age game. We're gonna uh finish this segment with 113 00:08:31.600 --> 00:08:35.600 the third on the list of six is the numbers game. Right, so 114 00:08:35.720 --> 00:08:39.159 billions of people online UM talk to us about you know, you know, 115 00:08:39.240 --> 00:08:45.399 invoicing and UM emails with instant messages, you know, bulk that kind of 116 00:08:45.399 --> 00:08:48.120 thing. He goes, he goes way to look at it is. Here's 117 00:08:48.120 --> 00:08:54.679 that the infrastructure about two changes as an organization moves from a thousand assets up 118 00:08:54.679 --> 00:08:58.960 to fifty tho assets. You're most so sutable to cyber text. You think 119 00:09:00.039 --> 00:09:03.720 about the number of endpoints you have. You think about software programs, You 120 00:09:03.759 --> 00:09:07.120 think about the number of people in your company. Think about the way that 121 00:09:07.159 --> 00:09:11.720 your architect is dispersed. Because your architect is probably in the clouds, it's 122 00:09:11.720 --> 00:09:16.399 probably located in California, privately located in the Midwest. Right now, you 123 00:09:16.480 --> 00:09:20.600 have to have your security features in place. I'm talking physical security as well 124 00:09:20.679 --> 00:09:26.799 too, because if it's located in a rural place that never have crime, 125 00:09:26.360 --> 00:09:31.639 they may not take cybersecurity, uh you know seriously. And and you know 126 00:09:31.720 --> 00:09:35.720 that's the data center that kind of resides over there, Okay, And all 127 00:09:35.720 --> 00:09:39.519 that really takes is one person to gain assets to that data center, and 128 00:09:39.559 --> 00:09:43.480 they could cause disruption for your entire enterprise. So so when we look at 129 00:09:43.600 --> 00:09:48.200 the infrastructure, and knowing that the infrastructure is always growing, problems are always 130 00:09:48.200 --> 00:09:52.679 gonna surface. But also too and the numbers game, you know, we 131 00:09:52.759 --> 00:09:56.919 have to look at people too, because there are a great number of people 132 00:09:56.960 --> 00:10:03.279 that are gaining interests and hacking and I'm talking, uh from the unethical side, 133 00:10:03.279 --> 00:10:09.519 because ethical hacking is there to try to prevent the unethical hacking from happening. 134 00:10:09.639 --> 00:10:13.559 So that basically the same group of people, except except that one side 135 00:10:13.600 --> 00:10:18.720 is a is a chromical and the other side is not a chrominal. Okay, 136 00:10:18.919 --> 00:10:22.200 see that's the only difference. And and I think the numbers game have 137 00:10:22.399 --> 00:10:26.799 to play as well too because as you put these endpoints in your system, 138 00:10:26.879 --> 00:10:33.279 you're gonna have more issues. Um and also too when it comes to numbers, 139 00:10:33.559 --> 00:10:37.600 it's money, yeah there there, Yeah, there's some um there's some 140 00:10:37.679 --> 00:10:41.120 dollar bills on some currency on the other end. So yeah, that's a 141 00:10:41.159 --> 00:10:45.080 great way to um sum that up. And just to kind of recap on 142 00:10:45.120 --> 00:10:48.720 the numbers game before we move into recapping two, what you've accomplished in some 143 00:10:48.759 --> 00:10:52.279 of the stats there But what's interesting to me about the numbers game. Again, 144 00:10:52.679 --> 00:10:56.879 the business. If you send out enough emails, making up, phone 145 00:10:56.879 --> 00:11:00.679 calls, making up is this go to enough networking evention, you're to succeed 146 00:11:00.720 --> 00:11:03.840 at some point. Right. So same thing with hackers, right, it's 147 00:11:03.840 --> 00:11:05.399 a business to them. You know, don't kid yourself. It's a business 148 00:11:05.399 --> 00:11:09.799 model right for profit And UM some of the things we talked about there with 149 00:11:09.879 --> 00:11:15.480 the billions of people online, two or three quick examples about this. UM 150 00:11:15.679 --> 00:11:20.200 is just that simple inbox, right, that's the biggest enter one of the 151 00:11:20.240 --> 00:11:24.159 biggest entry points. And the UM and attaching an invoice to be paid. 152 00:11:24.519 --> 00:11:28.000 I know, as a business owner, sometimes I'll get an invoice. I'm 153 00:11:28.039 --> 00:11:31.200 like that company. I don't think I've ever done business with that company. 154 00:11:31.200 --> 00:11:35.440 But if it's a large enough organization and you have somebody that that's responsibility is 155 00:11:35.480 --> 00:11:39.919 to clear all those invoices, they may not, you know, UM double 156 00:11:39.000 --> 00:11:41.679 check all this stuff because it's a similar company they've done business in the past. 157 00:11:41.679 --> 00:11:45.600 They just arbitrarily pay. They don't want late payments, and the bosses 158 00:11:45.639 --> 00:11:48.159 told them, you know, you're in charge of account and get that paid 159 00:11:48.240 --> 00:11:52.120 right. Well. And again, if they send out five thousand and fifty 160 00:11:52.120 --> 00:11:54.679 thousand, a hundred thousand, somebody's going to hit the pay button somewhere, 161 00:11:54.759 --> 00:11:58.440 right and generate money. And then finally, um, the newest thing that's 162 00:11:58.440 --> 00:12:03.919 started hit I phone is a text that appears from quote my I'm holding up 163 00:12:03.960 --> 00:12:09.440 air quotes from my bank or some type of financial institution. Right, I 164 00:12:09.480 --> 00:12:13.279 mean, I guess because I've sat across the dude the cybersecurity so long. 165 00:12:13.480 --> 00:12:16.240 I'm not clicking on those links. But there's somebody on the other end of 166 00:12:16.320 --> 00:12:22.200 that phone. If they send out ten thousand text messages, somebody's gonna click. 167 00:12:22.639 --> 00:12:28.399 That's right. It's always it, always talking about the lois coming DNOM. 168 00:12:28.440 --> 00:12:33.200 All the ready takes is for one person out of a ten thousand actually 169 00:12:33.240 --> 00:12:39.279 calls having That's all it really takes, you know, because we're dealing with 170 00:12:39.360 --> 00:12:43.000 digital crimes. Because the physical crime, you may need six people to break 171 00:12:43.000 --> 00:12:46.480 into a bank, yeah, and about hours in the day, right, 172 00:12:46.559 --> 00:12:50.679 You're it's a finite, right, But in these digital crime you need one 173 00:12:50.720 --> 00:12:54.240 person that sitting behind a computer, right, That's that's pretty much all you 174 00:12:54.320 --> 00:12:56.639 need. And they can run a software program that like it used to be, 175 00:12:56.679 --> 00:13:01.240 like, um, hold on too don't keep out your cell phone number. 176 00:13:01.320 --> 00:13:03.039 Right, But now they're not even concerned about what number it is. 177 00:13:03.120 --> 00:13:07.039 It just runs through a program and just starts spitting out digits twenty four hours 178 00:13:07.039 --> 00:13:09.519 a day, right, and they don't care if it's a landline or a 179 00:13:09.559 --> 00:13:13.519 cell phone or wherever. Right. And it's coming from sometimes from foreign countries 180 00:13:13.879 --> 00:13:18.279 that don't our laws can't really protect us. Yeah, we gotta protect ourselves. 181 00:13:18.360 --> 00:13:22.120 See, So I want to um, I want to say one thing 182 00:13:22.159 --> 00:13:28.320 about cyber security. It's on us as individuals because in the end of the 183 00:13:28.399 --> 00:13:33.879 day, when a negative events happened, it's much harder to clean that issue 184 00:13:33.000 --> 00:13:37.480 up. So it's easier to just make sure that you stay aware and you 185 00:13:37.519 --> 00:13:43.639 stay safe because you can uh prevent issues and also too, you can avoid 186 00:13:43.679 --> 00:13:52.080 the headaches because because I've always had the belief at the end of the day, 187 00:13:52.120 --> 00:13:54.000 it's on you as a person because we know what a hack it does, 188 00:13:54.080 --> 00:13:56.919 because we can't complain about it, okay, because we know their sold 189 00:13:56.960 --> 00:14:03.120 premises is to call having and damage, so we become wise of people. 190 00:14:03.000 --> 00:14:07.840 Then we can counter that concept and we can beat them to the finish line. 191 00:14:09.480 --> 00:14:11.080 Well said, and speaking to finish line, Uh, this is a 192 00:14:11.080 --> 00:14:16.360 perfect time to segue into our next segment and stay tune again at UM upcoming 193 00:14:16.480 --> 00:14:20.399 for the new year, we're gonna be talking about the other three uh topics 194 00:14:20.759 --> 00:14:24.679 in these areas of cyber crime and why it's growing and what we can do 195 00:14:24.679 --> 00:14:28.679 about it. UM and again Rich casting over here in the Global podcast studios 196 00:14:28.679 --> 00:14:33.080 here Atlanta, Georgia, having a great conversation as always with Mr Dwayne Hart 197 00:14:33.279 --> 00:14:35.799 and all these topics that you've heard about. If it's you know, raises 198 00:14:35.840 --> 00:14:39.440 a flag or of interest, you can contact just reach out to Dwayne at 199 00:14:39.480 --> 00:14:43.840 duyne hart dot com. There you can find everything we're gonna talk about, 200 00:14:43.039 --> 00:14:46.919 all things hybersecurity, all of his media releases. Again, you don't need 201 00:14:46.919 --> 00:14:50.320 a bunch of different websites and handles and social media, just go to Dwayne 202 00:14:50.360 --> 00:14:54.840 Hart dot com. So, Dwayne, let's talk about twenty twenty two and 203 00:14:54.919 --> 00:14:58.639 kind of a recap. So, Um, there's a number of things you 204 00:14:58.679 --> 00:15:03.440 accomplished and it continue young. So for example, Uh, your ongoing series 205 00:15:03.840 --> 00:15:07.240 for your podcast is just wrap it up Season two, right, Yes, 206 00:15:07.519 --> 00:15:13.799 season season two is in the house. And season two was forever important because 207 00:15:13.399 --> 00:15:18.679 season two was about trying to connect cybersecurity. All right. You know, 208 00:15:18.720 --> 00:15:22.399 I wanted to focus on looking at the cybersecurity sectors that you have, looking 209 00:15:22.399 --> 00:15:26.960 at the different programs, looking at some of the issues such as digital parenting, 210 00:15:28.440 --> 00:15:33.799 and trying to connect all of those together into cybersecurity because because when I 211 00:15:33.840 --> 00:15:39.080 did my UH speaker's video, that was one of the topics that I brought 212 00:15:39.159 --> 00:15:46.960 up, um about cyber talk and cyber talk is about connecting cybersecurity because I've 213 00:15:48.039 --> 00:15:52.679 always felt that if we can connect cybersecurity, we can resolve problems. Because 214 00:15:52.679 --> 00:15:58.120 we have a problem in the industry now where where we have solos solos of 215 00:15:58.279 --> 00:16:03.200 saying that the only new piece of sober secuter I need to be worried about 216 00:16:03.320 --> 00:16:07.840 is my password. Okay, that's that's so nineteen nineties whatever. Yeah. 217 00:16:07.919 --> 00:16:12.960 Yeah, So that's so let's look at the much wider picture and make a 218 00:16:12.960 --> 00:16:18.399 determination on how we can connects obficecuity, which was what this season did. 219 00:16:18.799 --> 00:16:23.480 It focus on all the connectors that you have, and um, there was 220 00:16:23.519 --> 00:16:27.240 a whole lot of success with it. And also too, you know, 221 00:16:27.279 --> 00:16:32.399 this season brought on something else for you too, Rich because now I think 222 00:16:32.480 --> 00:16:34.320 you've got the picture about the heckles at right. Yeah, I got my 223 00:16:34.360 --> 00:16:38.559 halfer headphones on, but yeah, I actually might have but yeah. But 224 00:16:38.919 --> 00:16:45.159 um so, speaking of season two and two, I've got three uh topics 225 00:16:45.159 --> 00:16:48.120 that you covered, and i'd be interesting to see what's on your shortlist as 226 00:16:48.159 --> 00:16:51.519 far as topics. But to me, I'm gonna turn to you next about 227 00:16:51.519 --> 00:16:55.360 your topics. But we really covered A to Z but I thought if I 228 00:16:55.360 --> 00:16:57.559 had a narrow down to just two or three, uh, what we're cut 229 00:16:57.840 --> 00:17:03.920 very intriguing. I think the her in this episode about veterans and active military. 230 00:17:04.359 --> 00:17:10.400 Also, the auto transportation topic was very fascinating. And finally on churches. 231 00:17:10.839 --> 00:17:11.759 So I don't know if you want to elaborate on some of these or 232 00:17:11.799 --> 00:17:15.519 what else besides those three on your list of it that you thought would really 233 00:17:15.519 --> 00:17:19.119 spiked you know what. I am a veteran, so I'm gonna take that 234 00:17:19.200 --> 00:17:23.240 one veterans see now. When it comes to veterans, I also focus on 235 00:17:23.240 --> 00:17:27.799 workforce development too, because I realized a lot of veterans are transfer transition out 236 00:17:27.799 --> 00:17:32.400 of the military, and when you transition out of military, you hear so 237 00:17:32.480 --> 00:17:37.400 much boglos information about what you need to do for your career, right you 238 00:17:37.440 --> 00:17:42.000 know it is UM one one bogos theory is that they're gonna hold your job 239 00:17:42.039 --> 00:17:45.839 for ninety days. Nobody will hold your job for ning days. Okay, 240 00:17:45.000 --> 00:17:49.079 all right, so let's just get rid of that one. Part of the 241 00:17:49.119 --> 00:17:55.240 other one that was discussed this the scams that occurring for veterans as well too, 242 00:17:55.799 --> 00:17:57.920 and you know, to just recap on that. And they normally happened 243 00:17:57.960 --> 00:18:06.079 because veterans live in a private, enclosed environment with the government and UM. 244 00:18:06.160 --> 00:18:11.240 They are also victims because of the way the monetary system work, because veterans 245 00:18:11.240 --> 00:18:15.440 getta guaranteed paycheck every month. So if you can get them to fall into 246 00:18:15.440 --> 00:18:18.279 a scam and to sign a piece of paper, then guess what, that's 247 00:18:18.319 --> 00:18:23.440 guaranteed money to you every month. Uh. Focusing on that and also to 248 00:18:23.720 --> 00:18:30.079 yes, looking at the churches and UM talking about the protection reins and knowing 249 00:18:30.119 --> 00:18:34.799 that churches are so setable to cyber attacks because because they don't produce goods and 250 00:18:34.839 --> 00:18:41.720 services, so they're really sometimes not so focused into cybersecurity and nobody would think 251 00:18:41.759 --> 00:18:47.559 that they are a hacker's appetite. Yeah, you wouldn't think like there would 252 00:18:47.559 --> 00:18:51.119 be great opportunity there. And you also think it's a it's a nonprofit typically 253 00:18:51.319 --> 00:18:56.160 a lot of volunteers. Um, but yeah, it's and again going back 254 00:18:56.200 --> 00:19:00.240 to our earlier conversation about doing their homework and targeting, Uh, that's a 255 00:19:00.839 --> 00:19:04.559 unfortunately somewhat of an easy target. Well, what I did some research and 256 00:19:04.599 --> 00:19:07.799 I went to a couple of church's website just to get an indication of the 257 00:19:07.880 --> 00:19:14.720 cybersecuity practice is I'm finding that some of them are practicing, um, the 258 00:19:14.880 --> 00:19:18.119 idea of an NDA. Let's say, before you join that church, you 259 00:19:18.200 --> 00:19:22.359 gotta sign a none a none disclosure agreement. Some of the other ones are 260 00:19:23.279 --> 00:19:30.279 are having portals set up where where you register to become a member. But 261 00:19:30.359 --> 00:19:33.440 then after that you get an encrypted email. Okay, right, all right, 262 00:19:33.559 --> 00:19:37.519 which is which is also good. And then I've noticed that when it 263 00:19:37.559 --> 00:19:44.960 comes to donors and so forth, um, some of them are resorting to 264 00:19:45.880 --> 00:19:51.039 donation in a physical form as well too. But but if we go back 265 00:19:51.039 --> 00:19:52.920 and look at this year, you know, there's been a couple of cyber 266 00:19:53.039 --> 00:19:57.039 tacks on on some churches, and you know, some personal data have been 267 00:19:57.079 --> 00:20:02.240 stole. But but churches have make sure that they have cyber insurance in place, 268 00:20:02.880 --> 00:20:07.279 because if you have a congregation of ten thousand people, and if five 269 00:20:07.319 --> 00:20:11.079 thousand accounts get compromised and somebody's heyl responsible, yea, it can literally you 270 00:20:11.079 --> 00:20:14.920 know, put them out of business virtually. So, uh, we've got 271 00:20:14.960 --> 00:20:17.839 about ten minutes left. We've got four other topics to hit on here real 272 00:20:17.880 --> 00:20:22.640 quick, wrapping up highlights and looking back on so um. Next on the 273 00:20:22.720 --> 00:20:27.960 list is let's talk your book. Give us your best elevator pitch about your 274 00:20:27.960 --> 00:20:32.759 book, UM, and how to become an industry tool. Okay, here 275 00:20:32.759 --> 00:20:37.640 goes the elevator pitch for the cybersecurity mindset. UM. It serves. It 276 00:20:37.759 --> 00:20:45.759 serves as a thinking models so that people can um operate cybersecurity in a proactive 277 00:20:45.799 --> 00:20:49.519 state. So that means that when I wrote the book, I was always 278 00:20:49.799 --> 00:20:56.720 warning, okay, what is these simplistic way to scructtion cybersecurity and a format 279 00:20:56.920 --> 00:21:00.920 that would allow people to think proactice so that people and see the truth. 280 00:21:00.880 --> 00:21:07.359 Part of the problems that I noticed in the industry was that cybersecurity was very 281 00:21:07.400 --> 00:21:14.400 complex, okay, and much of the written information pertaining to cybersecurity comes in 282 00:21:14.680 --> 00:21:18.920 a very complex format. So I believe that that if I could write a 283 00:21:19.039 --> 00:21:25.799 book and a common sense approach, I could help remediate some of those concerns 284 00:21:26.079 --> 00:21:30.400 for cybersecurity itself. So so when you think of the cybersecurity mindset, you 285 00:21:30.400 --> 00:21:33.880 know, you think of it as a thinking model, okay, and it's 286 00:21:33.880 --> 00:21:38.880 going to allow you to think proactally about engaging cybersecurity. And it's somewhat similar 287 00:21:40.559 --> 00:21:45.519 similar to let's say, if I was an NFL coach, Right, it's 288 00:21:45.519 --> 00:21:48.799 like your playbook. Yes, that's right, it is your resource guide, 289 00:21:48.960 --> 00:21:53.160 is your playbook UM, and it's your twol kit that you can use. 290 00:21:53.519 --> 00:22:00.559 So so when NFL coaches come out on Sunday, so we noticed noticed that 291 00:22:00.319 --> 00:22:07.920 the coaches have a plate card offensive and defensive strategy. So so just imagine 292 00:22:07.960 --> 00:22:12.519 the cybersecurity mindset in itself. It's just serving as a playbook. So that 293 00:22:12.559 --> 00:22:17.240 means that if that if you have a cybersecurity expert, then you could use 294 00:22:17.279 --> 00:22:21.559 that on a daily basis just to understand how to navigate cybersecurity. If you're 295 00:22:21.519 --> 00:22:25.559 a student in college, then it serves it serves as your resource guide, 296 00:22:25.920 --> 00:22:29.160 so right, I mean, it really covers the whole gambut of UM, 297 00:22:29.559 --> 00:22:33.319 not just the the industry of cybersecurity, but also pertinent to UM where you 298 00:22:33.359 --> 00:22:37.880 find yourself as an individual or a company or nonprofit uh in that space. 299 00:22:37.920 --> 00:22:41.720 And again you can check out get a copy of that book right at Dwayne 300 00:22:41.759 --> 00:22:45.799 Heart dot com. And uh so next on the shortlist is this should be 301 00:22:45.839 --> 00:22:49.839 relatively brief, but there's an annual conference for the industry. Talk to us 302 00:22:51.039 --> 00:22:53.640 UH in thirty seconds or less, what where and where that conference was and 303 00:22:53.799 --> 00:23:00.759 what you leaned about that and why somebody might attend on Forces Communication Electronic Association. 304 00:23:00.880 --> 00:23:04.000 I went to Technic Cyber which was located in Augusta, Georgia. I 305 00:23:04.039 --> 00:23:08.039 go there every year. UM. This is a major conference where all the 306 00:23:08.119 --> 00:23:15.240 government technology vendors come to learn more about cybersecurity and to see what the government 307 00:23:15.319 --> 00:23:18.680 is headed and as of now, the government is headed towards zero trust. 308 00:23:18.240 --> 00:23:25.119 Zero zero trust is a mythology UM that the government is really trying to bring 309 00:23:25.160 --> 00:23:30.000 on boards so that they can um, you know, so that so that 310 00:23:30.640 --> 00:23:37.119 they can remove away from trust but verify into you don't trust no one at 311 00:23:37.160 --> 00:23:42.319 all. Okay, so you consistently want to have that that type of identification 312 00:23:42.400 --> 00:23:47.960 for users. But but that's another one called SPIC, which is which is 313 00:23:48.039 --> 00:23:52.640 Special Operations UM conference that they held down in Temple, Florida as well too. 314 00:23:52.680 --> 00:23:56.319 So if you're out there, UM, type type and tech that T 315 00:23:56.519 --> 00:24:00.920 E C H N E T and attend some of those versus. Yeah. 316 00:24:00.960 --> 00:24:03.359 So again this is the man that's not only written the book on it, 317 00:24:03.400 --> 00:24:07.279 has the podcast on it, but is staying on top of what's what's current 318 00:24:07.599 --> 00:24:11.640 in the industry. Um okay, so uh four and five on the list. 319 00:24:11.000 --> 00:24:15.599 So you've had your YouTube channel for a minute, as they say, 320 00:24:15.720 --> 00:24:18.000 UM, give us a stat what kind of numbers are you getting on your 321 00:24:18.000 --> 00:24:22.720 YouTube platform for this year? I saw that I had one point one million 322 00:24:22.759 --> 00:24:26.359 views. Wow. Yeah, it's intense. That's been a lot of views 323 00:24:26.400 --> 00:24:30.920 on my YouTube channel and I think it is driving for the content that I 324 00:24:32.000 --> 00:24:40.440 have because of content is based on workforce development and all different sectors of cybersecurity 325 00:24:40.480 --> 00:24:48.359 itself and also serves as a repository for marketing the cybersecurity mindset. Yes, 326 00:24:48.480 --> 00:24:52.519 so that that speaks to two points. One is that, um, this 327 00:24:52.599 --> 00:24:56.759 is a topic that's of high interest. People are searching for more information on 328 00:24:56.799 --> 00:25:00.599 cybersecurity on YouTube, which is the second largest search engine on the and obviously 329 00:25:00.599 --> 00:25:06.000 behind Google. Um so people are on YouTube wanting to learn and they're finding 330 00:25:06.039 --> 00:25:08.720 you. Obviously is a valuable resource because you're all in this, You've done 331 00:25:08.759 --> 00:25:15.000 your homework, you've uh you persistent and consistent on creating content on that subject 332 00:25:15.079 --> 00:25:19.119 matter. So one point one million, that's that's very impressive. So our 333 00:25:19.200 --> 00:25:25.640 last topic is something excited. You literally just got into UM creating near the 334 00:25:25.720 --> 00:25:30.400 end of two UH, talk to us about your live stream platform. Oh. 335 00:25:30.559 --> 00:25:37.000 Live screens were dedicated to the career development area of cybersecurity. I've always 336 00:25:37.039 --> 00:25:42.039 felt that the cybersecurity industry has some great people that are trying to progressus at 337 00:25:42.039 --> 00:25:45.079 career. So I wanted to take all the take all the information that I 338 00:25:45.200 --> 00:25:51.680 knew and experiencing my career and to deliver it in a new platform. So 339 00:25:51.720 --> 00:25:56.839 I thought about live screaming and it kind of worked out well and it has 340 00:25:56.960 --> 00:26:03.000 helped a lot of UM individual channel career through cybersecurity. Some of the some 341 00:26:03.119 --> 00:26:08.519 of the Facebook groups and some of the linked In groups and UM and all 342 00:26:08.599 --> 00:26:18.720 the connectors on LinkedIn are definitely enjoying it. UM. I guess you know, 343 00:26:18.880 --> 00:26:25.079 periodically I go get a inbox UH message to say that you know, 344 00:26:25.200 --> 00:26:29.880 the YouTube channels, I have been out a lot and on Facebook as well 345 00:26:30.000 --> 00:26:33.519 too. I try to share it as much as possible. So so you 346 00:26:33.559 --> 00:26:38.240 know, the live screams served its purpose. I wanted to be most I 347 00:26:38.279 --> 00:26:41.519 want to be closer when I speak to people, so I decided to go 348 00:26:41.640 --> 00:26:45.880 live screames, have a video, you know, authentic in real time and 349 00:26:45.880 --> 00:26:51.799 all of that stuff. Yeah, that's awesome, right, So Dwayne, 350 00:26:51.920 --> 00:26:55.519 Um again, it's been fun. It's been educational in my part. I've 351 00:26:55.599 --> 00:26:59.319 enjoyed being on the other side of the microphone uh no, listen to your 352 00:26:59.319 --> 00:27:02.599 podcast, but interacting as well. So I think, um, this has 353 00:27:02.640 --> 00:27:06.720 been great. Looking forward to three and with that, stay tuned for our 354 00:27:06.799 --> 00:27:10.759 next episode. That's our actual topic. Any closing thoughts on your part less 355 00:27:10.799 --> 00:27:14.119 stay cyber safe, unlet's keep the cybersecuting mindset engaged.

Other Episodes

Episode

October 10, 2022 00:25:07
Episode Cover

Improving Businesses Cybersecurity Engagements

Business engagements for cybersecurity have focused on being the medium between suppliers, customers, and hackers. Many organizations suffer significant security risks due to changing...

Listen

Episode

October 11, 2021 00:27:22
Episode Cover

Everyone Is Trying To Protect Themselves - Are You Doing The Same?

Individual protection standards are sometimes misunderstood and carry varying practices that are confusing. This podcast session brings into attention user-base security standards and processes...

Listen

Episode

June 28, 2022 00:26:50
Episode Cover

Cyber Agency: Voting Software Vulnerable in Some States

Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed....

Listen