#CyberChats
#CyberChats is a podcast show focused on educating people of all ages about personal data care and cyber careers, skills, and pathways. #CyberChats aims to highlight positive figures in the cybersecurity community who care about increasing awareness and bridging industry gaps. Become a part of the cyber community by completing our cybersecurity challenges and asking us your original questions!

Jaksot(65)

031. Securing Systems: How to make your systems less attractive to bad actors

031. Securing Systems: How to make your systems less attractive to bad actors

The heat is on, Cyberheads! In this episode of the #CyberChats special edition summer series, we explore how to improve your system security. In today's episode, we discuss the basics of how to make your phone, laptop, or PC more secure and less attractive to bad actors. How do you reduce your attack surface? How do you limit access to your location data? Why should you remove apps you don't use? What makes a good password, and how do I remember all these passwords? The answers to all of these questions are in this episode, so tune in to find out. After the episode, put your new knowledge to practice in our second of three Summer Cyber Challenges on MetaCTF: Lost in the Woods! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: system security, location data, unused apps, strong password creation, password managers Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

4 Heinä 202411min

030. How to solve HexCryption, and basics of asymmetric Cryptography

030. How to solve HexCryption, and basics of asymmetric Cryptography

Happy summer, cyberheads! Like many of you, our guests are on break and out of office, so we have some special edition episodes just for the summer. Don't worry, guests will be back to chat with us in the fall. But until then, join us on #CyberChats as we stay cool in the summer heat and dive into the freshest topics in cyber. In this episode, we give a basic primer on how asymmetric cryptography works. What is asymmetric cryptography? How can two different keys open the same lock? Why do we need asymmetric cryptography? We also take you on a walkthrough of he thought process and some techniques for completing this month's challenge - HexCryption. Did you have a different way to solve it? Tune in next episode for our next challenge, and more entertaining cyber education. Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: cryptography, bash tools, hexadecimal number systems, CyberChef.io. Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

20 Kesä 20249min

029. Think Like a Computer: Putting the "Crypt" in Cryptography

029. Think Like a Computer: Putting the "Crypt" in Cryptography

Happy summer, cyberheads! Like many of you, our guests are on break and out of office, so we have some special edition episodes just for the summer. Don't worry, guests will be back to chat with us in the fall. But until then, join us on #CyberChats as we stay cool in the summer heat and dive into the freshest topics in cyber. In today's episode, we dip our toes into an introduction to cryptograhy. What is cryptography? Why do we need cryptography? How does cryptography work? To answer these questions, we'll talk about how computers think -- while you and I might look at a picture and see colors, a computer can't think in colors. So, how do computers understand reds, blues, and greens in images? Tune in to find out. After the episode, put your new knowledge to practice in our first of three Summer Cyber Challenges on MetaCTF: HexCryption! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: cryptography, binary, hexadecimal number systems, computers. Register here for the NCF’s FREE Summer challenges with MetaCTF:https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at:https://cryptologicfoundation.org/podcast

6 Kesä 20248min

028. Balancing Act - Women in Cybersecurity on Managing Risks and Opportunity featuring guests Erica Wilson and Jamie Kemp

028. Balancing Act - Women in Cybersecurity on Managing Risks and Opportunity featuring guests Erica Wilson and Jamie Kemp

In this throwback episode from Season 1, we hear from two incredible women in cyber to help us explore our risk appetite.Not all people or businesses can tolerate the same amount or type of risk… so that means everyone approaches manages risk differently. What are you risking when you decide to take a certain class or download a particular application? Are you missing out on friends? Are you sacrificing speed on your device? What does that type of analysis look like in the cyber career space? Ultimately, risk management is about making smart decisions for our own contexts. In this episode, we talk with Erica Wilson, VP of Global Cybersecurity and Privacy Risk Management at Reinsurance Group of America, and Jamie Kemp, President of Women in Cybersecurity(WiCyS) at Lakota West High School. We chat about the unique perspectives of our guests and how they got into cyber, as well as issues specific to girls and women in cybersecurity and resources to support them. By listening to our podcast and sharing it with your network, you’ll be helping us to raise awareness and accessibility of cybersecurity careers. Together, we can create a more diverse and resilient cybersecurity workforce that can tackle the challenges of the future. So, what are you waiting for? Tune in and join the conversation today! Connect with Erica:LinkedIn: https://www.linkedin.com/in/ericamwilson/ Twitter: @wilsonericamIG: @mrs_e3wWebsite: ericamwilson.com Facebook: Erica Hubbard Wilson Connect with Jamie:LinkedIn: https://www.linkedin.com/in/jamie-kemp-798722233/ Register here for the NCF’s FREE episode challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

23 Touko 202427min

027. Playing to Win: Game Theory and Cybersecurity- featuring guests Seth Hamman and DJ Strickland

027. Playing to Win: Game Theory and Cybersecurity- featuring guests Seth Hamman and DJ Strickland

We don't play around in cybersecurity, but we definitely game! In this episode, our guests detail the role that games and game strategy play in teaching us how to think like an adversary and keep safe online. We chat with DJ Strickland about his work and advocacy in bringing more representation into the cyber community through video games and comic books. But, like DJ experienced, we learn that hackers use adversarial thinking to exploit vulnerabilities in computer systems. So, our host challenges guest Dr. Seth Hamman to a tense game of rock-paper-scissors to show how game theory can help us understand the motivations of cybercriminals and anticipate their actions to protect ourselves against them. Whether you're a seasoned pro or just starting to learn about online safety, you won’t want to miss this episode to level up your cybersecurity skills and stay safe online! After you listen, you can put your own game theory skills to the test by completing this week’s episode challenge!

9 Touko 202430min

026. Join us for Cyber Saturday!

026. Join us for Cyber Saturday!

In this bonus episode, we talk about Cyber Saturday - a day of cyber exploration for rising 5th-10th grade students with workshops covering cybersecurity, data protection, and online safety. Cyber Saturday is Saturday May 4th, from 9am to 2pm, at TAC in Columbia, Maryland. https://cryptologicfoundation.org/students/events/cyber-saturday.html

25 Huhti 20245min

025. The Path to Becoming a Social Engineer

025. The Path to Becoming a Social Engineer

Alethe Dennis, mistress of social engineering, talks about what social engineering is, how it can improve overall security for a company, and her path to becoming a professional social engineer and DefCon Black Badge holder. She also discusses what to teach your kids about not getting engineered, how to ethically learn and practice your skills, and gives some reading recommendations. Connect with Alethe on Instagram: @alethedenis Register here for the NCF’s FREE episode challenges: https://metactf.com/join/cyberchats2 Find out more about our challenges on our website at: https://cryptologicfoundation.org/students/cyberchats/podcast/challenge.html

11 Huhti 202435min

024. How to Avoid Being Cyber Stalked with guest Kennedy Taylor

024. How to Avoid Being Cyber Stalked with guest Kennedy Taylor

Imagine working hard, finally starting a job, and hating it all while being cyberstalked. Would you know what to do? Our guest this episode shares how to approach these challenges so you can get the best outcome but also keep moving forward in a new career. Our guest Kennedy Taylor is a Senior Technology Risk Consultant for Ernst & Young, where she supports our Department of Defense. Topics discussed: starting jobs, cyber stalking, protecting yourself online via social media settings, asking for help Connect with Kennedy:LinkedIn: https://www.linkedin.com/in/kennedytaylors @missamericamd @kennedytaylorsRegister here for the NCF’s FREE episode challenges:https://metactf.com/join/cyberchats2Find out more about our challenges on our website at:https://cryptologicfoundation.org/students/cyberchats/podcast/challenge.html

28 Maalis 202424min

Suosittua kategoriassa Nuorille kuuntelijoille

lasten-sadut
rss-naapurissa
rss-hei-baby
iltasatu-lapselle
aitien-aani
satuhetki
satuillaan-yhteisia-satuhetkia-koko-perheelle
rss-satupalvelu-satuja-lapsille
kauneimmat-lastensadut
mammanutturat
rss-lastenohjelma-taikalipas
saran-kaverikirja
rss-iskat
docemilia
rss-eropodi
rss-kuumilla-aalloilla
nepsy-podcast-
odotushuone
puhutaan-koiraa
ihan-mamina-podcast