chat:CYBR

De: Jordan Deiuliis James Jacobs
  • Resumen

  • A podcast that explores cyber policy and its impact on our future.
    chat:CYBR 2024
    Más Menos
Episodios
  • Tad Schnaufer - chat:CYBR – Episode 11
    Apr 29 2025

    Keywords

    Ukrainian conflict, cyber operations, military strategy, cyber attacks, critical infrastructure, Russia, Ukraine, NATO, cybersecurity, hybrid warfare

    Summary

    In this conversation, James Jacobs and Tad discuss the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities with military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in places like Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.

    Takeaways

    • The Ukrainian conflict has roots dating back to 2014 with the annexation of Crimea.
    • Cyber operations have been a key component of Russia's strategy in Ukraine.
    • Russia has conducted numerous cyber attacks targeting critical infrastructure in Ukraine.
    • The integration of cyber capabilities into military operations is crucial in modern warfare.
    • Ukraine has developed significant cyber defense capabilities since 2014.
    • Education and awareness are vital for defending against cyber attacks.
    • Private partnerships can enhance a nation's cyber defense.
    • Chaos and misinformation are tactics used in cyber warfare.
    • Redundant systems are essential for maintaining operations during cyber attacks.
    • Lessons from Ukraine can inform cybersecurity strategies in other regions.

    Titles

    Understanding the Ukrainian Conflict

    Sound Bites

    • "Russian aggression in Ukraine."
    • "Ukrainians were able to respond."
    • "Thank you so much for joining us."

    Chapters

    00:00 Overview of the Ukrainian Conflict

    03:48 Cyber Operations and Attacks

    10:13 Integration of Cyber and Military Operations

    16:00 Preparing for Cyber Attacks in Florida

    Más Menos
    22 m
  • Mike Duffey - chat:CYBR – Episode 10
    Mar 25 2025

    Keywords

    cybersecurity, law enforcement, cyber incidents, cybercrime, technology, AI, public policy, digital forensics, incident response, victim support

    Summary

    This conversation explores the multifaceted world of cybersecurity, focusing on the role of law enforcement, the challenges faced in incident response, and the importance of supporting victims of cybercrime. The discussion also highlights emerging technologies, particularly AI, and their implications for both law enforcement and cybercriminals.

    Takeaways

    • Cybersecurity is a pressing public policy issue.
    • Law enforcement agencies are adapting to the evolving cyber landscape.
    • A hybrid approach is essential in tackling cybercrime.
    • Incident response requires collaboration across various teams.
    • Having a cyber incident response plan is crucial for organizations.
    • AI can enhance data analysis but also poses risks.
    • Victims of cybercrime include vulnerable populations, not just businesses.
    • Education and awareness are key in preventing cybercrime.
    • Partnerships between agencies can improve response efforts.
    • Emerging technologies must be handled with caution to protect sensitive data.

    Titles

    • Navigating the Cybersecurity Landscape
    • Law Enforcement's Evolving Role in Cybersecurity

    Sound Bites

    • "If I can understand it, they can understand it."
    • "It's not just a computer, it's a phone, it's a car."
    • "We have a hybrid approach now."
    • "AI is the ultimate question for us."

    Chapters

    00:00 Introduction and Overview of Cyber Florida

    09:52 The Role of Law Enforcement in Cybersecurity

    19:51 Challenges in Cyber Incident Response

    24:37 Supporting Victims of Cybercrime

    Más Menos
    20 m
  • June Teufel Dreyer - chat:CYBR - Episode 9
    Feb 18 2025

    Keywords

    China, cybersecurity, military strategy, Baltic Sea, fiber optic cables, geopolitical tensions, US-China relations, cyber warfare, international security, technology

    Summary

    In this conversation, Dr. June Teufel Dreyer discusses the evolving military strategy of China under Xi Jinping, focusing on their expanding military capabilities, particularly in naval power and cyber warfare. She highlights the implications of China's actions in the Baltic Sea regarding fiber optic cables and the potential threats to global communications. The discussion also covers the cybersecurity landscape, emphasizing the need for the U.S. to adopt robust policies to counter China's cyber threats. Dr. Dreyer concludes with thoughts on the importance of STEM education and the balance between secrecy and transparency in national security.

    Takeaways

    • China is rapidly expanding its military capabilities, including naval power.
    • The 'Guam Killer' missile indicates aggressive military intentions.
    • Cybersecurity is a critical area where China aims to dominate.
    • Fiber optic cables in the Baltic Sea are vital for global communications.
    • The U.S. must enhance its cybersecurity measures against China.
    • International agreements may not be effective with adversarial nations.
    • Attacks on critical infrastructure should be off-limits in cyber warfare.
    • The intelligence community's assessment of incidents can be misleading.
    • STEM education is crucial for future national security.
    • A balance between secrecy and transparency is necessary for effective defense.

    Titles

    • Understanding China's Military Strategy
    • The Cybersecurity Race: China vs. the U.S.
    • Threats in the Baltic Sea: A New Front

    Sound Bites

    • "We have to triangulate Xi Jinping's mindset."
    • "The Guam Killer missile is a concerning development."
    • "They want to be the leading cyber power."
    • "We need to be super vigilant here."
    • "These cables carry over 90% of communications."
    • "Cyber operations should be off-limits."
    • "We need a sword behind the shield."

    Chapters

    00:00 Introduction to Dr. Dreier and Chinese Military Strategy

    07:11 China's Cybersecurity Ambitions and Strategies

    12:21 Concerns Over Baltic Sea Fiber Optic Cables

    20:54 Addressing the Cybersecurity Threat from China

    30:45 Closing Thoughts and Future Implications

    Más Menos
    37 m
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre chat:CYBR

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.