Artwork

Вміст надано DTC, Inc. and DTC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією DTC, Inc. and DTC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

Cyber Extortion

37:19
 
Поширити
 

Manage episode 373756031 series 3480294
Вміст надано DTC, Inc. and DTC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією DTC, Inc. and DTC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

What do cybercriminals do with the information they may take after a successful phishing attempt? On this episode of Cyber Savvy Andrew and Mike will discuss Cyber Extortion. Victims of cyber extortion can range from individuals to small businesses, to huge corporate entities. Listen in as Mike details some of the dangers and costs that can be faced once cybercriminals have gotten their hands on sensitive information.

Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.

Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.

Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
Some cyber crimes are more relatable than others. Join us next time as we discuss Identity Theft and speak to a member of the DTC team that was recently personally affected, and hear the steps they took to protect their personal data from this and future attacks.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!
Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!

  continue reading

Розділи

1. Cyber Extortion (00:00:00)

2. Welcome to Cyber Savvy (00:00:06)

3. Cyber Extortion (00:01:42)

4. Let's Break It Down (00:03:10)

5. Ransomware (00:05:34)

6. Cyber Liability Insurance (00:08:42)

7. Infected From Home Computers (00:11:51)

8. Victims of Ransomware (00:14:02)

9. Searching for Vulnerabilities (00:17:51)

10. Sensitive Data Extortion (00:19:13)

11. Nokia 2007 (00:21:13)

12. Sony Pictures 2014 (00:22:41)

13. DDoS Attacks (00:23:54)

14. Amazon Web Services 2020 (00:28:00)

15. The Three Styles of Attack (00:29:47)

16. 11 Days Without Computer Networks (00:31:27)

17. Extortion Isn't Just a Business Problem (00:31:53)

18. Find the Right Experts (00:33:27)

19. Kevin Mitnick (00:34:58)

20. What's Next Up on Cyber Savvy (00:35:33)

13 епізодів

Artwork

Cyber Extortion

Cyber Savvy

published

iconПоширити
 
Manage episode 373756031 series 3480294
Вміст надано DTC, Inc. and DTC. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією DTC, Inc. and DTC або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

What do cybercriminals do with the information they may take after a successful phishing attempt? On this episode of Cyber Savvy Andrew and Mike will discuss Cyber Extortion. Victims of cyber extortion can range from individuals to small businesses, to huge corporate entities. Listen in as Mike details some of the dangers and costs that can be faced once cybercriminals have gotten their hands on sensitive information.

Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusing on the topic. He is now an independent contractor and volunteers his time to bringing cybersecurity awareness, education, mitigation, and response to the ag and food supply chain (and other special projects). His focus is on mitigating emerging threats. In addition to his experience in cybersecurity, he has a deep understanding of banking/finance, risk management, and other professional service sectors related to food, agriculture, and climate.

Michael Urbanik is an Account Executive with R.K Tongue Co., Inc. and is licensed in both Life & Health and Property & Casualty Insurance. He has experience working with both large and middle market commercial clients. He enjoys helping his clients understand the risks they face and develop cost effective plans to successfully mitigate and transfer these risks.

Did you enjoy today’s episode? Personal experience to share? We here at DTC, Inc. would love to hear from you! Please email us your comments and questions at AskUs@DTCtoday.com.
Some cyber crimes are more relatable than others. Join us next time as we discuss Identity Theft and speak to a member of the DTC team that was recently personally affected, and hear the steps they took to protect their personal data from this and future attacks.
Looking for more cybersecurity related content? Check out DTC’s blogspace to read more!
Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!

  continue reading

Розділи

1. Cyber Extortion (00:00:00)

2. Welcome to Cyber Savvy (00:00:06)

3. Cyber Extortion (00:01:42)

4. Let's Break It Down (00:03:10)

5. Ransomware (00:05:34)

6. Cyber Liability Insurance (00:08:42)

7. Infected From Home Computers (00:11:51)

8. Victims of Ransomware (00:14:02)

9. Searching for Vulnerabilities (00:17:51)

10. Sensitive Data Extortion (00:19:13)

11. Nokia 2007 (00:21:13)

12. Sony Pictures 2014 (00:22:41)

13. DDoS Attacks (00:23:54)

14. Amazon Web Services 2020 (00:28:00)

15. The Three Styles of Attack (00:29:47)

16. 11 Days Without Computer Networks (00:31:27)

17. Extortion Isn't Just a Business Problem (00:31:53)

18. Find the Right Experts (00:33:27)

19. Kevin Mitnick (00:34:58)

20. What's Next Up on Cyber Savvy (00:35:33)

13 епізодів

Todos os episódios

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник