Episodes
In this episode, Ryan and Shannon discuss their podcast schedule and the different topics they cover throughout the week. They also talk about the TV shows and movies they've been watching, including Lopez vs. Lopez and Ghosts. The conversation then shifts to the recent diss tracks in the music industry, with Kendrick Lamar and Drake being the main focus. They discuss the beef between the two artists and the impact it has on their careers. They also touch on the NBA playoffs and the WNBA...
Published 05/10/24
Published 05/10/24
Elizabeth Stevens shares her cybersecurity origin story, starting with her love for technology and music. She discusses her diverse background, including her time in the Marine Corps and her experience at Microsoft. She highlights the importance of having a mindset that is willing to try new things and not take no for an answer. Elizabeth also emphasizes the need for cybersecurity professionals to understand the impact of their work on people's lives. She shares her journey of pivoting into...
Published 05/10/24
In this episode, Ryan and Shannon discuss an article about OpenAI's GPT-4 and its ability to exploit real vulnerabilities by reading security advisories. GPT-4 was able to exploit 87% of the vulnerabilities presented to it, while other models tested as low as 0%. Ryan is optimistic about the potential of AI in cybersecurity and sees it as an opportunity to build better defenses. However, he acknowledges that AI will also change the job landscape and professionals will need to evolve and...
Published 05/08/24
The UK has implemented a new law that bans default passwords on smart devices starting April 2024. This law aims to protect consumers from cyber attacks by requiring manufacturers to comply with the legislation and provide ongoing protection against cyber attacks. The law covers a wide range of smart devices, including smart speakers, smart TVs, streaming devices, smart doorbells, wearable fitness trackers, and smart domestic appliances. The UK is known for its forward-leaning approach to...
Published 05/07/24
Ryan and Shannon discuss how the US Cyber Command deployed cyber specialists to more than a dozen countries last year to fortify networks and expose tools that hackers are using. These deployments, known as 'Hunt Forward' missions, were conducted by the Cyber National Mission Force. Other countries have also sought assistance from the US in dealing with cyber threats. The Defense Department is seeking $14.5 billion for cyber activities in fiscal year 2025, indicating a growing recognition of...
Published 05/06/24
In this episode, the hosts discuss their recent TV show and movie recommendations. They talk about shows like 'The Irrational,' 'Lopez vs. Lopez,' and 'Matlock,' as well as movies like 'Civil War.' They share their thoughts on the storytelling, characters, and sound design of these shows and movies. The hosts also mention their excitement for upcoming releases like 'X-Men 97' and 'Fallout.' The conversation covers various topics including streaming services, movies, video games, and social...
Published 05/03/24
In this conversation, Ryan Williams Sr. interviews Chelsea Pierre, a serial entrepreneur and founder of Blerds Leading Technology and Pierre's TechHeads, LLC. Chelsea shares her background in cybersecurity and her journey as a public speaker and business owner. She emphasizes the importance of risk tolerance and understanding biases in order to succeed in the tech industry. Chelsea also discusses her expansion plans for Pierre's TechHeads and her decision to work with AAFES. Chelsea talks...
Published 05/03/24
In this episode, the hosts discuss a news article about the shooting of an Uber driver in Ohio and the scam surrounding it. The scam involved social engineering tactics targeting, William J. Brock, an elderly man, convincing him to hand over $12,000 to, Lo-Letha Hall, an Uber driver who was actually an innocent bystander. Lo-Letha was shot by William, resulting in her death.  The hosts emphasize the need to educate the elderly about these types of scams and the importance of having a code...
Published 05/01/24
This is the laziest thumbnail I've ever made but is it as lazy as UnitedHealth's alleged lack of remote access authentication? The jury is still out... The conversation discusses the recent ransomware attack on Change Healthcare and the failure to implement multi-factor authentication (MFA) as a basic security measure. The hosts express their frustration with the lack of MFA adoption and emphasize the importance of implementing adequate remote access authentication in today's digital age....
Published 04/30/24
The conversation revolves around the topic of TikTok and its potential shutdown in the US. The hosts discuss ByteDance's preference for shutting down TikTok rather than divesting or having an American company own it. They explore the reasons behind this preference, including the financial losses TikTok is experiencing and the value of its algorithm. The hosts also touch on the broader issues of social media platforms, their impact on society, and the potential for foreign interference. They...
Published 04/29/24
In this episode, the hosts discuss their recent activities and what they've been watching. They mention the latest episodes of Invincible and X-Men 97, as well as a comedy special by Neil Brennan. They also talk about their experiences with video games, including Fallout and Horizon. The hosts express their opinions on the adaptation of video games into TV series, with a particular focus on the Fallout series. They also discuss the release format of TV shows and whether binge-watching or...
Published 04/26/24
In this Throwback episode S1, Ep5), Ryan, Shannon, and LeVon discuss the SolarWinds supply chain attack, Sunburst, as the event was still unfolding. This was one of our first episodes and still sits at the top of one of the biggest cyber incidents in a decade. Topic 1: A supply chain attack on SolarWinds has resulted in a widespread cyber espionage campaign, with state-sponsored actors allegedly working for Russia targeting US government agencies and major companies. The attack exploited a...
Published 04/25/24
The conversation discusses an article about MITRE, a leading organization in cybersecurity, getting hacked. The hosts highlight the importance of transparency in cybersecurity incidents and commend MITRE for openly sharing the details of the attack. They emphasize that anyone can be a target and that there is no foolproof solution to cybersecurity. The conversation also mentions the significance of MITRE's role in the industry and its contributions to threat analysis and intelligence....
Published 04/24/24
**Sorry, the previous episode was a duplicate from yesterday. Here is the correct episode for today** In this episode, the hosts discuss the ongoing fallout from the Change Healthcare ransomware attack. They explore the leaked data, the potential for double extortion, and the long-term consequences for the company. They also touch on the need for better cybersecurity measures, including the implementation of a Zero Trust Model. The hosts speculate on the future of ransomware attacks and the...
Published 04/23/24
In this episode, the hosts discuss the ongoing fallout from the Change Healthcare ransomware attack. They explore the leaked data, the potential for double extortion, and the long-term consequences for the company. They also touch on the need for better cybersecurity measures, including the implementation of a Zero Trust Model. The hosts speculate on the future of ransomware attacks and the potential for individual targeting of high-profile individuals. They emphasize the importance of...
Published 04/23/24
Law enforcement officials in 19 countries shut down an online platform that was selling phishing kits to cybercriminals. The platform earned a million pounds by providing a subscription service to hackers, offering tools, scripts, and potential targets for phishing attempts. The operation involved the Metropolitan Police in the UK and resulted in the arrest of 37 suspects and the seizure of millions of pieces of sensitive information. This case highlights the growing sophistication of cyber...
Published 04/22/24
In this episode, the hosts introduce Daniel Acevedo, a special cohost, who shares his "cybersecurity origin-story" and experience. They discuss their military backgrounds and the opportunities it provided, as well as their current roles in the cybersecurity industry. They also talk about their personal interests, such as salsa dancing, watching TV shows and movies, and pursuing certifications and self-development. The conversation covers topics such as NVIDIA's advancements in AI, the...
Published 04/19/24
In this conversation, Ryan Williams and Kayne McGladrey discuss the evolving role of the CISO, the importance of governance, risk, and compliance (GRC), and the impact of AI in cybersecurity. They highlight the need for CISOs to have the full backing of their boards and the challenges they face in managing civil liability for processes they don't control. They also emphasize the importance of democratizing GRC knowledge and providing companies with tools like Hyperproof to assess and improve...
Published 04/18/24
In this episode, the hosts discuss a recent ransomware attack on UnitedHealth Group and the emergence of a second hacking group demanding a ransom. They explore the complex dynamics between the different hacking groups and the challenges faced by organizations in protecting sensitive data. The conversation highlights the need for robust incident response and disaster recovery plans, as well as the importance of balancing accessibility and security in the healthcare industry. The hosts also...
Published 04/17/24
In this episode, the hosts discuss a data breach at a government consulting firm where hackers stole over 340,000 social security numbers. They speculate on the cause of the breach and the potential implications. They also highlight the need to move away from using social security numbers as identifiers and suggest alternative solutions. The hosts emphasize the importance of protecting personal information and the potential consequences for companies that fail to do so. Please LISTEN 🎧 LIKE...
Published 04/16/24
In this episode, Ryan, Chris, and special guest, Daniel Acevedo, discuss the recent cyber attack on Roku, where approximately 576,000 accounts were compromised. The attackers used a technique called credential stuffing to gain access to the accounts. While Roku claims that no sensitive user information or full credit card information was accessed, the extent of the damage is still unknown. The hosts emphasize the importance of strong passwords and recommend using password managers. They also...
Published 04/15/24
In this week's episode of "The Other Side of the Firewall," host Ryan Williams Sr. takes a charming turn by inviting a very special guest—his wife, Chamire Williams. As Ryan introduces Chamire, he affectionately notes the dynamic she brings to the show, breaking away from the typical cybersecurity discussions to delve into the interplay of professional growth and personal support in their lives. Chamire, hailing from Buffalo, New York, shares her journey through various career pivots—from...
Published 04/12/24
In this episode of Ask A CISSP, Ryan Williams Sr. interviews Kenneth Ellington, founder of Ellington Cyber Academy (ECA), about the latest trends in cybersecurity and the integration of cybersecurity with artificial intelligence (AI). Kenneth discusses the growth of ECA and their partnerships with companies like Sentinel One and Splunk. He emphasizes the importance of customer feedback and the need to provide training in areas like SIEM, SOAR, and Linux. Whether you're new to cybersecurity...
Published 04/11/24
Join us to revisit our most popular episode of ALL TIME! This episode discusses the consumer class action lawsuits filed against Mr. Cooper, a mortgage lending company, following a cybersecurity incident. The breach exposed the personal information of 4.3 million customers, putting them at an increased risk of identity theft. Mr. Cooper has partially resumed operations and plans to provide affected customers with credit monitoring services. The lawsuits highlight the importance of...
Published 04/10/24