Episode Transcript
WEBVTT
1
00:00:05.080 --> 00:00:09.279
Wow, it's three. Can you
believe it? Rich casting over here in
2
00:00:09.320 --> 00:00:13.919
Atlanta in our Global Podcasts Studios headquarters, and we've got the man of the
3
00:00:13.919 --> 00:00:19.079
hour, Dwayne Hart. I'm gonna
call you Mr Cybersecurity or Mayor of Cybersecurity
4
00:00:19.160 --> 00:00:22.239
or the Governor of the President.
But this guy wears lots of hats in
5
00:00:22.280 --> 00:00:25.600
this industry, and we've got some
great ground to cover what we had a
6
00:00:25.600 --> 00:00:29.559
phenomenal twenty two. I hope you
listen to that wrap up episode what happened
7
00:00:29.600 --> 00:00:35.479
in two? But happy New Year
man, welcome Dwayne to Can you believe
8
00:00:35.520 --> 00:00:40.840
It's Yes, I can believe its
three. There was a lot of success
9
00:00:40.920 --> 00:00:47.280
in two. What the cyberge gonna
mindset? But but in three we're gonna
10
00:00:47.280 --> 00:00:53.880
take it to the next level because
as technology grows, the podcast has to
11
00:00:53.920 --> 00:00:57.200
grow as well. Exactly want to
take it to the next level? Yeah,
12
00:00:57.320 --> 00:01:02.560
So again, Um, anything piques
your interest during this show, just
13
00:01:02.640 --> 00:01:06.040
check out Dwayne Heart dot com.
Allow it to always give the call to
14
00:01:06.079 --> 00:01:10.319
accent the opening the show because as
a podcast listeners, UM sometimes that I'll
15
00:01:10.319 --> 00:01:11.719
make it in the show where I'm
waiting to find out how how do I
16
00:01:11.719 --> 00:01:15.799
reach this dude? Right? So
um. But speaking of Dwayne Hart so
17
00:01:15.920 --> 00:01:19.480
UM, he's our guests here in
the studio. UM, and we just
18
00:01:19.519 --> 00:01:23.480
can't believe it's got some exciting news
to announce some announcements. But first let's
19
00:01:23.680 --> 00:01:26.640
pick back up where we left off
our last episode last year. We were
20
00:01:26.680 --> 00:01:33.239
talking about in the last episode about
cybercrime, why it's growing, and why
21
00:01:33.239 --> 00:01:37.560
criminals are succeeding UM, and we
talked about the analogy of UH. We
22
00:01:37.640 --> 00:01:44.319
think about cybercrime as something completely outside
the box, but it's really basic business
23
00:01:44.319 --> 00:01:49.120
one oh one, right, what
you're doing in business. These guys and
24
00:01:49.159 --> 00:01:53.319
gals are doing in quote air quotes
their business, which is the business of
25
00:01:53.359 --> 00:01:57.319
trying to hack and make a profit
off of you, your industry or you
26
00:01:57.840 --> 00:02:00.560
as an individual. So the six
top picks UH real quick and bullet point.
27
00:02:00.719 --> 00:02:05.239
In our last episode, we talked
about number one, how they're targeting
28
00:02:05.239 --> 00:02:07.280
people and finding the weakest link.
They're doing their homework, much like in
29
00:02:07.280 --> 00:02:10.360
business, you've got to find your
customers, research them. And then finally
30
00:02:10.400 --> 00:02:14.199
we talked about the numbers game.
So much like in business, it's a
31
00:02:14.240 --> 00:02:16.479
matter of how many phone calls or
emails you're gonna send. That's what they're
32
00:02:16.479 --> 00:02:20.840
doing so uh. Today, in
the second part of this series, we're
33
00:02:20.840 --> 00:02:24.919
gonna talk about um the remaining three
points, which are scams keep evolving.
34
00:02:25.520 --> 00:02:30.560
Uh. Patients pays off in criminal
operating from anywhere. So let's talk about
35
00:02:30.599 --> 00:02:35.960
scams much like a business. So
technology advances, so in cybersecurity, you
36
00:02:35.960 --> 00:02:39.599
know, they're looking at new opportunities
for um, you know, ways to
37
00:02:39.680 --> 00:02:45.639
scam. So what are some examples
of um, uh you know, techniques
38
00:02:45.680 --> 00:02:47.759
they use in terms of scams.
What are some uh, you know,
39
00:02:47.840 --> 00:02:53.879
schemes and that kind of thing.
Okay, Now everyone is all custom tottle
40
00:02:53.960 --> 00:03:00.000
emails that they get and stayed and
that that somebody has a check and um
41
00:03:00.080 --> 00:03:02.199
that that they're not from the US, and there's a million dollars in the
42
00:03:02.240 --> 00:03:06.759
bank account that they're trying to get
rid of. So so I think the
43
00:03:06.840 --> 00:03:10.080
citizens and the people have gotten smarter
and not to engage into that scap.
44
00:03:10.919 --> 00:03:15.840
Here goes another part of the scams
that are happening is that people need assets
45
00:03:15.879 --> 00:03:20.840
to your personal information, like your
banking account. All right, So you
46
00:03:20.879 --> 00:03:25.159
get a Bogos web link and you
go up there and and if you're told
47
00:03:25.199 --> 00:03:29.240
that you need to change your password, you need to update your information.
48
00:03:29.840 --> 00:03:32.319
Right, then you put the information
in the Buggles website and it says in
49
00:03:32.360 --> 00:03:39.560
a repository somewhere where someone can have
someone can carry out a cyber cyber attack.
50
00:03:39.719 --> 00:03:45.560
Now, now, the other type
of schemes out there too, is
51
00:03:45.599 --> 00:03:53.639
that if you are you are using
online um site the shop okay, and
52
00:03:53.879 --> 00:03:55.960
you know it sounds like a really
good deal, and it's usually have from
53
00:03:57.000 --> 00:04:00.080
because your profile. You know,
someone profiles you and learns that you like
54
00:04:00.159 --> 00:04:02.680
a certain pair of shoes and something
like that, and so they send your
55
00:04:02.680 --> 00:04:06.639
email and and so you go to
this website, and and you think it's
56
00:04:06.680 --> 00:04:12.120
a deal, right, and it's
kind of not a not a deal.
57
00:04:12.879 --> 00:04:16.519
It's really a honeypot that you've fallen
into, you know, which is a
58
00:04:16.560 --> 00:04:23.680
criminal honey pot. I always like
to think that the type of crimes that
59
00:04:23.720 --> 00:04:30.639
are curring mostly targeted for personal or
financial game. So, you know,
60
00:04:30.680 --> 00:04:34.079
without going into deep and talking about
all the different type of crimes out there,
61
00:04:34.480 --> 00:04:38.120
just think about all the ways that
someone can steal your money. Just
62
00:04:38.160 --> 00:04:43.439
think about all the ways someone can
gain your personal information. And usually it
63
00:04:43.519 --> 00:04:51.240
happens because either a ransomware attack or
somebody go to a bogus website. I
64
00:04:51.360 --> 00:04:59.399
think that now citizens are probably over
the fact of letting their laptops stay open
65
00:05:00.079 --> 00:05:01.800
right in a public setting or even
in their office. Right. Yes,
66
00:05:01.879 --> 00:05:06.839
WiFi, WiFi settings and Starbucks.
You know, they are some other features
67
00:05:06.879 --> 00:05:12.879
as for ads, say passwords,
um, you know, for password managers
68
00:05:13.120 --> 00:05:18.040
using Google and so forth. That's
I think that's an that sent in like
69
00:05:18.079 --> 00:05:23.920
an enclosed environment and um, you
know it's optional, but you know you
70
00:05:23.959 --> 00:05:26.639
still have to be careful about that. Yeah, I'm thinking two things for
71
00:05:26.680 --> 00:05:30.519
the new year. Right, So, um, often you know, when
72
00:05:30.560 --> 00:05:35.800
you're engaging with a uh, some
type of organization, you know, it's
73
00:05:35.839 --> 00:05:40.240
likely that they can say, hey, we're updating our new policies and procedure
74
00:05:40.240 --> 00:05:43.639
for for the new year three right, and so you need to update your
75
00:05:43.680 --> 00:05:46.360
you know, agreed to these terms. A lot of those are legitimate.
76
00:05:46.519 --> 00:05:49.839
But that's another opportunity for that that
window that cyber hacker can you know,
77
00:05:49.879 --> 00:05:55.959
access for information. And then um, and then secondly, they're as excited
78
00:05:56.000 --> 00:05:58.639
about the new year as well,
a new I don't know if you saw
79
00:05:58.680 --> 00:06:00.360
this. This is a recent article. I thought this was you know,
80
00:06:00.480 --> 00:06:04.160
fascinating in a kind of a crazy
kind of sense. But talking about how
81
00:06:04.319 --> 00:06:11.800
um, these bad actors have grown
in boldness innovation. Talk about touch screens,
82
00:06:12.240 --> 00:06:18.040
so um they've actually there's another hack
for cyberski. The experts have even
83
00:06:18.079 --> 00:06:24.000
seen what appears what on your digital
touch screen laptop, what appears like a
84
00:06:24.839 --> 00:06:28.879
human hair follicle they're gonna swipe,
or a flea or dust particle that you
85
00:06:28.879 --> 00:06:32.160
want to clean your screen with.
They actually create that, um like on
86
00:06:32.199 --> 00:06:35.839
a website that looks like there's a
piece of hair on your screen, see
87
00:06:35.879 --> 00:06:40.439
what I'm saying, and you swipe
to get that that um, that hair
88
00:06:40.519 --> 00:06:44.720
off your screen, and it downloads
malware. That's pretty wild, right,
89
00:06:44.800 --> 00:06:49.639
talk about innovation, I mean yeah, yeah, that part of innovation.
90
00:06:50.160 --> 00:06:56.399
But you know there's something that I
always like to say, is that that
91
00:06:56.439 --> 00:07:00.759
you just have to be careful.
Okay, spice about using different difference technology.
92
00:07:00.839 --> 00:07:04.360
Now, maybe turn off your computer
when you're cleaning your screen, you
93
00:07:04.399 --> 00:07:09.279
know. Start there. Well,
well, that's some scams going around,
94
00:07:09.360 --> 00:07:15.240
like the imposta scam. Okay,
uh, you know it's just you know,
95
00:07:15.279 --> 00:07:19.480
it's faking to be a femine member
so that you can wire money,
96
00:07:19.680 --> 00:07:25.040
right all right, you know,
if you are a parent and you get
97
00:07:25.079 --> 00:07:29.279
this little text metchage or let's say
an email your college kid is in trouble.
98
00:07:29.720 --> 00:07:32.839
College kids in trouble, call your
kid right first before you start,
99
00:07:33.360 --> 00:07:38.439
right, yeah, yeah, yeah, but you know that's that's what she
100
00:07:38.480 --> 00:07:42.519
would occur. You know, not
only that, it's another one called you've
101
00:07:42.600 --> 00:07:46.160
won scams. Right, okay,
you just want a million dollars. You
102
00:07:46.160 --> 00:07:50.800
need to switch information in here because
you went to the concert and your ticket
103
00:07:50.879 --> 00:07:57.360
was drawing as a potential winner or
something like that. Right, and um,
104
00:07:57.399 --> 00:08:01.560
you know the health healthcare scams as
well too. Okay, you know,
105
00:08:01.720 --> 00:08:05.040
well you need to report to your
doctor's office. You need to go
106
00:08:05.120 --> 00:08:07.959
to this website. You need to
put this information in. Um if you
107
00:08:09.079 --> 00:08:11.879
reply back which are so security number, then then you know we can update
108
00:08:11.920 --> 00:08:16.319
your record. Does that this one? Oh? I got another one too.
109
00:08:18.000 --> 00:08:22.120
Tech support scams. Now those other
ones that you have to watch out
110
00:08:22.600 --> 00:08:30.519
because someone caused you and state that
you have a problem with your laptop that
111
00:08:30.600 --> 00:08:37.519
has not been identified and so they're
calling from HP tech support and usually with
112
00:08:37.679 --> 00:08:43.080
tech support they want remote access to
the laptop so to get your road assets.
113
00:08:43.159 --> 00:08:48.279
So you're giving a foul link that
is actually emailed to you and if
114
00:08:48.320 --> 00:08:52.759
you hit the file link, then
it automatically creates a connection with the other
115
00:08:54.039 --> 00:08:58.879
person on the other end, which
is the tech support person. And yeah,
116
00:09:00.720 --> 00:09:03.840
okay, so you so you have
to be careful about that. That's
117
00:09:03.879 --> 00:09:05.759
got to be probably almost the worst, right, that's the holy grail because
118
00:09:05.759 --> 00:09:11.240
literally at that point you might as
well just handed over your computer and your
119
00:09:11.759 --> 00:09:15.679
credit cards and everything to the right
because what people have stored access as the
120
00:09:15.679 --> 00:09:18.440
computer. Basically it's like just handing
them your computer with all of your passwords.
121
00:09:18.919 --> 00:09:22.519
Um, okay, so we got
two more items to cover. We
122
00:09:22.559 --> 00:09:26.240
want to jump to three. So
let's talk about Um, you know,
123
00:09:26.399 --> 00:09:31.399
it's again business one oh one practice
and patients pays off. Right. These
124
00:09:31.440 --> 00:09:37.200
guys are persistent, yes, or
yes they are. They are persistent because
125
00:09:37.240 --> 00:09:43.519
eventually, out of ten thousand people, you're gonna find one weakness. You're
126
00:09:43.519 --> 00:09:48.200
gonna find one person that's gonna follow
to pray and to fall into track.
127
00:09:48.480 --> 00:09:52.120
And that's all you need, especially
if there as an organization. And let's
128
00:09:52.159 --> 00:09:58.080
say if your user base is about
three thousand people, right, and you
129
00:09:58.159 --> 00:10:03.720
have a very large footprint of that
three thousand, imagine if one person you're
130
00:10:03.759 --> 00:10:09.039
tricked into giving assets to a hacker
to the system. See, that's all
131
00:10:09.080 --> 00:10:13.639
it takes. So if they're persistent
enough, eventually they're gonna find one person.
132
00:10:13.679 --> 00:10:18.519
But the way you counter that is
to have that con is to have
133
00:10:18.799 --> 00:10:28.399
that consistent and continuous cybersecurity engagement where
you are making employees aware of their surroundings
134
00:10:28.519 --> 00:10:37.360
and preventing those types of cyber texts
from occurrent. Likewise, the larger your
135
00:10:37.399 --> 00:10:41.559
I T infrastructure, the more problems
you're gonna have, all right, and
136
00:10:41.600 --> 00:10:46.200
it becomes increasing harder because that's a
lot of cyber attacks that happen every day,
137
00:10:46.240 --> 00:10:48.840
but we don't know about them because
companies don't publicize that all the time.
138
00:10:50.960 --> 00:10:54.759
Many many times these breaches take can
take weeks to be discovered. So
139
00:10:54.840 --> 00:11:00.360
meanwhile, they're gleaning all your information
and talk about patients. A lot of
140
00:11:00.360 --> 00:11:03.799
times they'll access your information, but
they don't leverage it immediately, right or
141
00:11:03.879 --> 00:11:09.000
it's kind of a trickle effect,
right, So they was drawing small amounts
142
00:11:09.000 --> 00:11:13.159
just to make sure everything's legit,
and then out of nowhere proof you know,
143
00:11:13.360 --> 00:11:18.120
it's they're all in right. Well, you know what, because you
144
00:11:18.159 --> 00:11:22.720
know, the longer you reside on
the system. It makes it seem like
145
00:11:22.759 --> 00:11:28.360
that you are legitimate, right,
so so so on this obersecurity industry,
146
00:11:28.519 --> 00:11:33.519
there's something called rogue devices. Right. These are deemed as assets that just
147
00:11:33.600 --> 00:11:39.639
pop upon enterprise and you've never seen
before. And imagine the enterprise that has
148
00:11:39.080 --> 00:11:45.159
about three hundred thousand assets. Right, And if you're a threat intelligent platform
149
00:11:45.360 --> 00:11:50.440
or if you're artificial intelligent platform and
you're talking, people have not identified that
150
00:11:50.480 --> 00:11:54.720
asset and it sists there for three
weeks. Well, you know, a
151
00:11:54.759 --> 00:12:01.159
person that works into threat monitoring and
pretty much in it's cured operations center may
152
00:12:01.159 --> 00:12:03.240
say, okay, well it's been
on the network for three weeks, and
153
00:12:03.279 --> 00:12:09.559
they may assume that it's okay,
right, yeah, because it's been adapted
154
00:12:09.600 --> 00:12:13.399
as the norm motor. Yes,
yes, yes, it has become a
155
00:12:13.440 --> 00:12:18.639
part of the infrascription. Now all
right, so it's sitting there and oh
156
00:12:18.679 --> 00:12:22.840
wow, yes, yes, yeah, so it is legit. But this
157
00:12:22.919 --> 00:12:28.159
is why, this is why I've
always thought of that that when someone has
158
00:12:28.240 --> 00:12:35.720
that human firewall concept, they're gonna
investigate the information. Okay, you just
159
00:12:35.759 --> 00:12:39.240
don't look at an indicator and say
that it's right or wrong. Now,
160
00:12:39.279 --> 00:12:43.519
this is part of the situational awareness
and I and I always talk about the
161
00:12:43.559 --> 00:12:50.519
cyber senses and the environmental knowledge and
knowing your surroundings because if you don't know
162
00:12:50.600 --> 00:12:58.080
your surroundings and cybersecurity, you can't
identify what's right or wrong. Yeah,
163
00:12:58.159 --> 00:13:01.039
yeah, you don't know, um
at if this is a good analogy,
164
00:13:01.080 --> 00:13:03.440
But kind of like what they're talking
about is kind of this this drip approach
165
00:13:03.480 --> 00:13:09.279
where it's small and incremental. So
maybe especially in a large organization, they're
166
00:13:09.279 --> 00:13:15.320
taking out relatively small withdrawals or small
hacks, right, and it's not gonna
167
00:13:15.840 --> 00:13:18.480
become a blip on the radar,
right, because they're they're balancing so many
168
00:13:18.559 --> 00:13:20.639
numbers. It's almost like, I
don't know if this is a good analogy,
169
00:13:20.639 --> 00:13:24.960
but imagine you have a medium or
small somewhat boat, right, and
170
00:13:24.000 --> 00:13:26.960
you have a handful of people in
there, and they start adding one person
171
00:13:28.039 --> 00:13:30.519
at a time doesn't say like a
big deal, but as to add more
172
00:13:30.559 --> 00:13:31.879
people, all of a sudden,
the boat's gonna sink. But they don't
173
00:13:31.919 --> 00:13:35.799
attack it with a torpedo, right. Because again, if if you got
174
00:13:35.840 --> 00:13:39.720
if your entire system was hacked,
you shut everything down, you go into
175
00:13:39.759 --> 00:13:43.480
insurance mode, and you go into
recovery mode. But if it happens over
176
00:13:43.600 --> 00:13:48.120
weeks, months, or even years, it's too late at some point.
177
00:13:48.200 --> 00:13:50.480
Right, well, well, just
going back to my theory there, when
178
00:13:50.519 --> 00:13:56.200
you when you look at these assets
and people that on a system for about
179
00:13:56.440 --> 00:13:58.279
three weeks, stan, see,
they become a part of the environment,
180
00:13:58.279 --> 00:14:03.360
which is the first stage. Right, let me build my profile like I'm
181
00:14:03.440 --> 00:14:07.639
legitimate, and then after that,
let me see if I can get a
182
00:14:07.720 --> 00:14:13.320
dollar. If you find a thousand
people and you take out a dollar,
183
00:14:13.919 --> 00:14:16.919
right, then you move on and
you say, okay, then I'm gonna
184
00:14:18.000 --> 00:14:22.000
find fifty people and I'm gonna get
ten cents out of the account, or
185
00:14:22.000 --> 00:14:26.480
even ten dollars. For a longer
organization, nobody's gonna It's more of an
186
00:14:26.480 --> 00:14:30.279
annoyance to like figure out where is
that ten dollars membership thing I signed up
187
00:14:30.279 --> 00:14:33.600
for or whatever. Yeah, if
you got a bank account with what about
188
00:14:33.759 --> 00:14:37.080
two million dollars, I mean,
are you trying you know that ten cents
189
00:14:37.080 --> 00:14:41.799
they came out of your account?
Yeah? Yeah. But but see,
190
00:14:41.840 --> 00:14:48.159
the idea is that the presence if
you are consistently engaged and if you look
191
00:14:48.320 --> 00:14:54.200
legitimate, and if you just draw
smaller amounts over a particular time and it
192
00:14:54.240 --> 00:15:00.600
makes it looks like it's legit.
And then one day you decided to greedy,
193
00:15:00.720 --> 00:15:05.159
right right, yeah, okay,
you want to hit the lottery,
194
00:15:05.399 --> 00:15:11.840
and that's when the major disruptions happened. And when investigation happens, it funds
195
00:15:11.879 --> 00:15:16.480
out that somebody was on the asset
printed much day, was on the network
196
00:15:16.559 --> 00:15:20.200
for three weeks and it was never
identified. And especially if it goes on
197
00:15:20.320 --> 00:15:26.639
for that period of a year or
there accounting year. In theory, once
198
00:15:26.639 --> 00:15:31.159
it's off the books, they're not
going to revisit you know, last year's
199
00:15:31.200 --> 00:15:35.159
once they file those taxes and closed
the books on that year, that hundred
200
00:15:35.200 --> 00:15:39.519
thousand that's you know the hackers got
access to. They're not gonna revisit that,
201
00:15:39.600 --> 00:15:41.039
right because they've kind of closed the
books and move on, right,
202
00:15:41.399 --> 00:15:43.879
Um, speaking of moving on,
so we have one more topic before we
203
00:15:43.919 --> 00:15:48.840
jump into and what's happening again.
You're listening to Rich Casting over here alongside
204
00:15:48.879 --> 00:15:52.240
Dayne Hart in the Global Podcast Studios
and we're talking all things hybersecurity. UH.
205
00:15:52.240 --> 00:15:56.519
For these topics and more, check
out Dwayne heart dot COM's our last
206
00:15:56.519 --> 00:16:02.480
topic, Dwayne about criminals and cyber
crime and why they're succeeding is criminals can
207
00:16:02.519 --> 00:16:07.879
operate from anywhere, right They've so, so I think that most of the
208
00:16:07.960 --> 00:16:14.559
communities is definitely aware of the remote
workforce. Okay, So you know,
209
00:16:14.639 --> 00:16:21.639
with the remote workforce, it has
opened up um different type of attack vectors.
210
00:16:21.639 --> 00:16:23.600
Okay, when you think of an
attack vectors, uh, you know
211
00:16:23.759 --> 00:16:30.759
that just saying that the interest into
a network has has changed, not so
212
00:16:30.840 --> 00:16:36.440
much looking at all of the all
of the devices that you have, okay,
213
00:16:36.519 --> 00:16:38.759
but just going and looking at the
footprint of all the different assets that
214
00:16:38.840 --> 00:16:42.720
you have, okay, because the
gateway is not open, you know.
215
00:16:44.000 --> 00:16:49.039
So, so when you have a
remote workforce, you have a dispersed group
216
00:16:49.039 --> 00:16:55.759
of people that are located in different
regions of the US, and and so
217
00:16:55.840 --> 00:17:00.720
what happens is that you have to
ensure that that their wife, I and
218
00:17:00.000 --> 00:17:06.640
UM, that that communication channel channel
is secure. But but most organizations are
219
00:17:06.759 --> 00:17:12.039
used on VPN, a virtual private
network anyway is to kind of remediate that
220
00:17:12.079 --> 00:17:17.079
concern. But but if you think
about actors, they can go operating in
221
00:17:17.119 --> 00:17:18.799
the middle of the ocean. Yeah, I mean as long as they have
222
00:17:19.359 --> 00:17:23.400
however WiFi something like that, they
can they can be in a basement.
223
00:17:23.759 --> 00:17:26.000
You know, they can be in
a cave. You know, they don't
224
00:17:26.039 --> 00:17:30.039
have to be down the street,
oh no, or in your building.
225
00:17:30.440 --> 00:17:34.880
They can virtually be anywhere at any
time. And uh. And they've been
226
00:17:34.920 --> 00:17:41.079
operating mostly in that in that space
for for many many years. It's relatively
227
00:17:41.119 --> 00:17:45.119
new to most of the workforce.
But now I think it should be more
228
00:17:45.160 --> 00:17:48.240
in your radar. If you can
work from anywhere for your job, for
229
00:17:48.319 --> 00:17:51.880
your business, they can do the
same, right, right, right.
230
00:17:52.079 --> 00:17:59.559
I've always brought into discussion and cybersecuted
mindset when I talked about the hackers hack
231
00:18:00.359 --> 00:18:07.240
is that hackers operated in sales.
A sale is a secret location and they
232
00:18:07.240 --> 00:18:11.559
share information. Right. They can
be in a basement, they can be
233
00:18:12.279 --> 00:18:15.480
you know, I hate to say
it is they can be they can be
234
00:18:17.440 --> 00:18:18.920
under Walmart somewhere. You know,
I don't know if that's true. And
235
00:18:18.920 --> 00:18:25.039
now I'm just bringing up they can
discussion. They can be an old building
236
00:18:25.160 --> 00:18:30.400
somewhere and and kara a cyber attack. Right. They can be in a
237
00:18:30.400 --> 00:18:32.799
foreign country where you're not gonna be
able to track them. You know,
238
00:18:32.839 --> 00:18:36.880
they keep changing their IP addresses and
so forth. So um so great great
239
00:18:36.920 --> 00:18:41.279
topics along this line. I think
um uh, I think this will kind
240
00:18:41.279 --> 00:18:44.960
of summarize much of what we talked
about is you should almost have this bumper
241
00:18:44.960 --> 00:18:48.240
sticker on or on your laptop,
probably a post it note, if not
242
00:18:48.279 --> 00:18:52.799
some type of permanent on your post
think before you click. Yeah, right,
243
00:18:52.119 --> 00:18:57.400
that's that would that would kind of
like that would prevent probably upwards of
244
00:18:57.759 --> 00:19:02.680
your challenges, um, the headaches
he might have as a result of a
245
00:19:02.759 --> 00:19:07.160
hacker. Well, what I think
that I think the I think when people
246
00:19:07.200 --> 00:19:15.160
become more so accustomed to thinking,
it becomes first nature. All right.
247
00:19:15.240 --> 00:19:18.960
It's it's it's something that is part
of you every day. There's just like
248
00:19:18.039 --> 00:19:22.440
people get up and eat every day, right right, Well, well,
249
00:19:22.519 --> 00:19:27.599
to think before you click would be
you know, at first nature to you,
250
00:19:29.079 --> 00:19:33.279
all right, so you automatically know
not to click on that. See,
251
00:19:33.319 --> 00:19:37.759
it's like a growing process, you
know, and and and just thinking
252
00:19:37.799 --> 00:19:42.039
about how their mindset operates. Because
I will say that that if a reader
253
00:19:42.079 --> 00:19:47.920
engages into the cybergecuate of mindset,
it becomes part of you as you start
254
00:19:47.920 --> 00:19:52.000
off talking about the cyber security culture
and then moving on to a situation wherein
255
00:19:52.039 --> 00:19:56.279
it's and looking at risk bace thinking
and then then it talks about transforming your
256
00:19:56.279 --> 00:20:02.119
mindset. And then the last piece
is you put sobersecurity and action and what
257
00:20:02.240 --> 00:20:06.720
you need to do. All of
this becomes part of a person and then
258
00:20:06.839 --> 00:20:11.799
they can think proactly about how they
engage cybersecurity. Because I've had people that
259
00:20:11.359 --> 00:20:17.079
have inboxed me on LinkedIn and said, you know you've you made it very
260
00:20:17.119 --> 00:20:22.480
simple to understand how cybersecurity offers.
I mean, but if you're unaware,
261
00:20:22.839 --> 00:20:26.960
as we all are at some point
in our life. As a kid,
262
00:20:26.960 --> 00:20:30.000
you're unaware how to tie your shoe
right. But once you learn that,
263
00:20:30.759 --> 00:20:33.680
you don't think, uh, you
just do it right. You don't think
264
00:20:33.720 --> 00:20:37.359
about what uh string goes over the
right hand the left hand, and how
265
00:20:37.400 --> 00:20:41.279
you're tying the knot right. Driving
a car, I mean, it's kind
266
00:20:41.279 --> 00:20:45.200
of crazy. We've all been in
that situation where you drive home and your
267
00:20:45.240 --> 00:20:48.680
mind is thinking elsewhere and you just
you're on an autopilot and you just get
268
00:20:48.680 --> 00:20:52.319
home, get to your destination right. So you should have that mind repetition
269
00:20:52.359 --> 00:20:55.519
to putting in the reps, as
they say, right for um and uh,
270
00:20:55.599 --> 00:20:57.559
what's great about this new year?
In three? This is a great
271
00:20:57.599 --> 00:21:03.119
point um to kind of revisit,
reevaluate. Um, uh, what may
272
00:21:03.119 --> 00:21:07.559
have happened in your business where hackers
or there was a cyber issue. But
273
00:21:07.640 --> 00:21:11.039
more importantly to kind of you know, check in with Dwayne Hart. Go
274
00:21:11.079 --> 00:21:15.160
to the website, UM, check
out the podcast, get a copy of
275
00:21:15.160 --> 00:21:18.559
the book. Whatever you need to
do, um to do some research and
276
00:21:18.599 --> 00:21:22.480
prepare for right. So this is
a good one whenever in business or in
277
00:21:22.480 --> 00:21:26.599
personal life. With all those New
Year's resolutions, one of your New Year's
278
00:21:26.240 --> 00:21:33.960
resolutions should be what to engage into
cybersecurity. I call it active involvement and
279
00:21:33.039 --> 00:21:38.200
operating cybersecurity from the front line.
Just like before someone comes through your front
280
00:21:38.200 --> 00:21:44.359
door, you go check them out. Right, Well, guess what before
281
00:21:44.440 --> 00:21:49.720
you open that door, or pretty
much before you even engage your laptop,
282
00:21:51.559 --> 00:21:56.519
then cybersecurity ship be in the front
piece of your brain sales. Time to
283
00:21:56.559 --> 00:22:00.720
refresh things and probably a good time. Maybe much like they say, like
284
00:22:00.279 --> 00:22:03.880
daylight saving, it's time to change
the battery and your smoke alarm. Um.
285
00:22:04.079 --> 00:22:07.160
The new year, at the very
least, time to change all your
286
00:22:07.200 --> 00:22:10.519
passwords, right, you know,
kind of reboot. So speaking of the
287
00:22:10.519 --> 00:22:12.519
new year, uh, kind of
a rapid fire here, just a quick
288
00:22:12.559 --> 00:22:17.880
recap of something we talked about last
episode, but it's coming up in So
289
00:22:18.000 --> 00:22:22.200
for your podcast, The Chap of
Cybersecurity Podcast, you're going into season three
290
00:22:22.680 --> 00:22:26.400
right so, UM and we're gonna
we're gonna close with a teaser about what's
291
00:22:26.400 --> 00:22:30.640
happening for book sales were um are
rocking and rolling and you can get a
292
00:22:30.640 --> 00:22:34.160
copy again at Dwayne Haart dot com. Um and I'm gonna put you to
293
00:22:34.200 --> 00:22:37.440
ten seconds. I'm gonna start the
timer right now, UM, talk to
294
00:22:37.480 --> 00:22:42.640
me in ten seconds about the book. The book itself has been doing outstanding.
295
00:22:44.240 --> 00:22:48.200
If you want to learn how to
think correctly about trying to engage obvious
296
00:22:48.240 --> 00:22:53.000
security, go out and process the
cybersecurity mindset great. And then conferences.
297
00:22:53.000 --> 00:22:56.839
You attended a number of conferences.
I'm sure you're gonna be tending some of
298
00:22:56.839 --> 00:23:00.920
those again this year. UM live
stream an UM that was a big hit
299
00:23:02.000 --> 00:23:06.720
and very interesting lunching in two.
So you're gonna be doing more of the
300
00:23:06.759 --> 00:23:10.279
lime streams for this year as well. Oh yes, I want to bring
301
00:23:10.400 --> 00:23:15.720
influential people on the live scream because
this year on the live screams is about
302
00:23:15.920 --> 00:23:18.680
the community. It's about you.
What is it that you are doing in
303
00:23:18.720 --> 00:23:25.200
the world of cybersecurity that is so
critical and that everyone wants to hear because
304
00:23:25.240 --> 00:23:29.440
I know you have a story to
tell. Maybe you maybe you can share
305
00:23:29.559 --> 00:23:34.279
some knowledge on workforce development and have
o those channel their career through the cybersecurity
306
00:23:34.480 --> 00:23:42.160
market. And maybe you're on LinkedIn
and maybe you have a hundred thousand connections
307
00:23:42.160 --> 00:23:45.640
on LinkedIn and you have a lot
of information to share for the community.
308
00:23:47.000 --> 00:23:51.160
So I would enjoy for you to
come on my podcast session so I can
309
00:23:51.359 --> 00:23:56.960
engage with you and to take cybersecurity
to the next level. Because there are
310
00:23:56.960 --> 00:24:00.599
some smart people at the end of
the world in UM, I want to
311
00:24:00.640 --> 00:24:03.400
see who they are. Yeah,
that's what's great about the livestream. Get
312
00:24:03.440 --> 00:24:07.079
to actually interact in real time,
one on one with some of your your
313
00:24:07.119 --> 00:24:11.720
audience and um you know new members
of the community, so to speak.
314
00:24:11.000 --> 00:24:15.359
But what's interesting for the podcast as
well as live stream, UM is you're
315
00:24:15.359 --> 00:24:19.400
gonna be incorporating in twenty and this
year three some industry experts as guests.
316
00:24:19.880 --> 00:24:23.920
Uh so doing someone on one interviewing
and gleaning some of their information. UH
317
00:24:25.039 --> 00:24:27.960
talk to us about Also, UM, your you just created uh you're creating
318
00:24:29.000 --> 00:24:33.599
a sizzler reel um in front of
a TV camera set experience talk to us
319
00:24:33.799 --> 00:24:37.920
in uh just a minute. Less
about that. Here's a little secret from
320
00:24:37.920 --> 00:24:41.359
the audience. When it comes to
a podcasting a live scream, I'm a
321
00:24:41.440 --> 00:24:45.799
very nervous person. And now it
may not sound that I'm nervous, but
322
00:24:45.960 --> 00:24:49.000
trust me, when I walk into
the studio and and it's lights, camera,
323
00:24:49.079 --> 00:24:55.279
actually I'm not nervous anymore. So
I figured it out when I was
324
00:24:55.319 --> 00:24:59.920
doing my reel. Okay, and
you know, the Realist designed to folk.
325
00:25:00.000 --> 00:25:02.960
It was more towards speaking because for
this year, I want to get
326
00:25:03.000 --> 00:25:10.559
involved with more speaking engagements and to
take the cybersecurity mindset concept onto the speaking
327
00:25:10.599 --> 00:25:14.880
stage, all right, because there
are a great number of people that like
328
00:25:14.960 --> 00:25:18.839
to hear a great story. And
you know, ever since I have been
329
00:25:18.039 --> 00:25:22.720
a youngster in this world, you
know, my family tells me that I
330
00:25:22.799 --> 00:25:26.519
talked too much. So I decided
to say, Okay, if I like
331
00:25:26.640 --> 00:25:30.079
to talk too much, then why
why don't I go to a stage somewhere?
332
00:25:30.359 --> 00:25:34.440
Okay, exactly? We talk.
Yeah, And that's what's exciting for
333
00:25:34.440 --> 00:25:37.319
this new year is that this has
all been building towards that, right,
334
00:25:37.400 --> 00:25:41.759
the book, the podcast, the
conferences, the livestream. What's exciting for
335
00:25:41.839 --> 00:25:48.400
this year is um UH taking the
Sizzler Rule, which we were excited to
336
00:25:48.440 --> 00:25:53.039
help participate in creating that for you
and now UM looking for speaking engagements and
337
00:25:53.079 --> 00:25:56.680
gigs. So, if you have
an organization that would like to have Dwayne
338
00:25:56.720 --> 00:26:00.240
Heart speak at your event, this
is your call to action. This is
339
00:26:00.279 --> 00:26:03.839
your invite to reach out to Dwayne
at Dwayne Heart dot com. UM just
340
00:26:03.920 --> 00:26:07.079
contact him there. UM. Whether
it's a organization, a nonprofit, whether
341
00:26:07.119 --> 00:26:11.519
it's a church, a government agency, military agency, UM, a company,
342
00:26:11.640 --> 00:26:18.759
right, UM, even some UM
social organizations communities, banks for example,
343
00:26:18.799 --> 00:26:22.400
but also UM you know, any
faith based organization. If you or
344
00:26:22.400 --> 00:26:29.720
your organization UM are concerned about cybersecurity
or misinformed or want to learn more,
345
00:26:30.240 --> 00:26:33.079
this is an opportunity to engage with
Dwayne and UH invite him out to speak
346
00:26:33.079 --> 00:26:37.160
at your event. UM. Maybe
it's your your family's Fourth of July,
347
00:26:38.279 --> 00:26:42.319
whatever it is, right, So
I'm gonna wrap things up, Dwayne and
348
00:26:42.519 --> 00:26:48.160
UH closing thoughts or UM comments you
may have for the new year. Always
349
00:26:48.359 --> 00:26:52.559
oh yes, the any of the
speaking topics I have. You can go
350
00:26:52.640 --> 00:26:57.119
to www dot Dwayne Heart dot com
and as a link call speaking, and
351
00:26:57.400 --> 00:27:00.960
uh, there's the information on the
topics that I'll be discussing, and I'm
352
00:27:00.960 --> 00:27:07.079
gonna bring up one I think that
you would like the most. Okay,
353
00:27:07.119 --> 00:27:10.960
all right, here we go.
It's called you heard it once, now
354
00:27:11.039 --> 00:27:15.680
here it again. Stop feeding the
hackers appetite. That's a good one.
355
00:27:17.279 --> 00:27:22.559
Onto onto those. I am also
doing some workshops and some seminars um pretty
356
00:27:22.599 --> 00:27:32.079
much on vulnerability management and the and
the cybersecurity um leadership, and also focusing
357
00:27:32.240 --> 00:27:37.599
on the career development career development pipeline
as well too. So so there's a
358
00:27:37.599 --> 00:27:41.960
lot of speaking engagements that actually can
occur. So you go to my web
359
00:27:41.960 --> 00:27:47.519
page, book me and you can
hear me talk on stage. He has
360
00:27:47.720 --> 00:27:51.079
very affordable speaking of fees, they're
way less than a million dollars, so
361
00:27:52.039 --> 00:27:56.240
reach reach out right, all right, Dwayne. So look forward to having
362
00:27:56.240 --> 00:27:59.839
you back in the studio, and
happy new Year to you, your family,
363
00:28:00.480 --> 00:28:03.640
um, all the people in your
life. And uh we'll see you
364
00:28:03.640 --> 00:28:08.119
next time on the show. Thank
you, m hm.