UA-56961821-1 New Cyber Frontier
New Cyber Frontier
NCF-122 High School Pioneers Special Cyber-Security Program

NCF-122 High School Pioneers Special Cyber-Security Program

May 15, 2019

On today’s show, host Dr. Shawn Murray sits down with Dr. Bob Gemingnani, the work-based learning program manager at Colorado Springs School District 49. Bob breaks down his career path leading to where he is now at the school, taking us back to his non-profit days helping young people between 16-24 that were either homeless, dropped out of high school, or had other disadvantages when it comes to finding a job. In July of 2017, Bob took over a similar program at District 49 and made it his own. Over time, the community really saw the benefits in his work-based program model and came together with other districts around the area to create a similar model, helping students find work. Because of his hard work and passion for the job, he will soon be taking over an even larger role as the Executive Director at the Pikes Peak Business Education Alliance. Listen as Bob breaks down the model he personally constructed in order to help the K-12 Colorado Springs youth and young adult community by attracting, informing, educating, and hiring them into positions. He also speaks on an internship opportunity that this program brings.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-121 Breaking Down the 3 Major Keys of Election Security and the Safety of your Vote

NCF-121 Breaking Down the 3 Major Keys of Election Security and the Safety of your Vote

May 7, 2019

On today’s show, host Chris Gorog sits down with a member of the El Paso County Clerk and  Recorder, Chuck Broerman, as he talks cyber security during elections. Chuck speaks on the advancement in United States elections and how the state of Colorado leads the way when it comes to easy, hard to cheat voting systems. Dive in as we break down the three major portions of keeping your vote safe during the election process: the physical security (the way ballots are laid out and designed), the cyber security side, and the informational/public security side of the process. There are many different election platforms, suppliers and methods across the 50 different U.S. states which each do something a little different in the voting process. Chuck speaks on how the secure voting got its start in the United States.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-CO10 Building a Model Cybersecurity Ecosystem

NCF-CO10 Building a Model Cybersecurity Ecosystem

May 1, 2019

Today’s special Colorado Update is timely to the establishment of the Colorado Springs model of Cybersecurity Ecosystem. Our guest today is the Director of Cybersecurity Programs for the Colorado Springs Chamber of Commerce and EDC, Vinnie Persichetti. He breaks down the initiative the city is taking in cybersecurity and the talents the city is bringing in to improve the security and safety of it. They are also taking big steps to bring the importance of cybersecurity into the community and explain the importance of it. Vinnie has worked in communications and in the United States Air Force for 30 plus years, bringing his expertise in the area. Vinnie brings his background in the industry and for the community and explains how he and the other 3,000 plus cybersecurity workers plan to bring these efforts to the Colorado Springs area. He also talks about how the area is a great place to make your start in the industry and create a name of your own. You can check out a lot of what is going on in the cybersecurity universe for yourself at coloradospringscybersecurity.com.  

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-120 Seamlessly Integrating New Cyber Security Talent into the Workforce

NCF-120 Seamlessly Integrating New Cyber Security Talent into the Workforce

April 23, 2019

Leaders from the top university programs speak on student transition to the workforce. University of Maryland’s Mansur Hasib provides insight from his vast experience training students in one of the world’s top cyber-security programs. It approaches cyber-security from a multidisciplinary angle, educating students about all the key components of the degree and also bringing on students with a background in multiple different subject matters/experience levels. Hasib talks about the importance of cyber-security in the real world as a whole and how graduate programs help advance students and prepare them for the career world. See how programs like these help plug students into conferences and other real-world aspects of the job world, while also teaching them the materials and valuable skills.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-119 Managing your “Bring Your Own Device” (BYOD) Work Environment

NCF-119 Managing your “Bring Your Own Device” (BYOD) Work Environment

April 16, 2019

On today’s show, host Chris Gorog sits down with Michael Parker, Chief Marketing Coordinator for Armis Security. Michael is one of the few marketing professionals we’ve had on the show, and brings a perspective we don’t often hear. He helps walk us through the advancements of technology in the workplace and how Cyber Security is a must in trying to help protect your business devices. If you have a BYOD environment at your workplace, you’ll want to hear this. He also talks about the rise and future of IOT and how much value (and risks) it can bring with it in a business setting. Michael tells us where he expects the industry to head and walks us through the precautions one must think about before deciding to connect your equipment to the internet.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-118 Turning Cyber Security into an Enabler for your Company

NCF-118 Turning Cyber Security into an Enabler for your Company

April 9, 2019

On today’s show, host Shawn Murray sits down with Gary Asp, the Senior Security and Compliance Engineer at Riverbend Technologies and local professor. We look at how Cyber Security brings value to your company and what it can bring to the table. We also talk about the importance of cyber security training and awareness and the value it can bring to the workforce.

Gary tells us how he changes Cyber Security from a cost center to an enabler in his company and how can do this for your own company or business.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-117 New Host Dr. Shawn Murray Introduction

NCF-117 New Host Dr. Shawn Murray Introduction

April 2, 2019

Our guest today is the new host of New Cyber Frontier, we look to hear big things from Dr. Shawn Murray. Shawn tells us about his path and how he got to be into Cyber Security. From Concrete to Cyber Security is that tagline that stands out to me. We hope you all enjoy getting to know our new host and hearing his unusual path to the industry. Standby as Dr. Murray brings on many guests from the Government Security Sector, we think you all enjoy the new spin he will bring.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-116 Social Engineering and The Art of Making People Say Yes

NCF-116 Social Engineering and The Art of Making People Say Yes

March 26, 2019

In today's show, we bring on persuasive communication expert Jeff Tippett to discuss the importance of communication skills in the cyber world. People who understand how to influence people to act can also influence them to take actions which may not be in their best interest. This process known as social engineering in the digital world is a new name for the century old art of conning. Modern day conn artist now have new tools and increased access to anyone in the world via the internet.

Jeff tell us about the persuasion and manipulation, what is the difference, and how do you recognize each. This is an eye opener and Jeff's book is a must read when it comes to understanding human nature and how to achieve win-win situations. This was definitely one of our favorite shows.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

 

NCF-115 What is DevOpps? New ways to look at Security Practices

NCF-115 What is DevOpps? New ways to look at Security Practices

March 19, 2019

Our guest today Willie Pee talks about the under appreciated practice of DevOpps. Many of you may have just now thought what is DevOpps? Well you are not alone, even our staff at New Cyber Frontier asked what DevOpps meant when we first met with Willie. This practice that every business needs to be involved with on some level is often called different names by various groups within an organization. What some see as SSDLC, others, configuration management, change management, or Quality assurance, are tied to DevOpps. As you will hear from Willie, his definition extends to connect all of these various management vocations under the DevOpps practice. If you are in any of the practices which manage security or development of new platforms or products you will want to hear his what Mr. Pee has to say. This enlightening conversation with Abe and Willie will change the way you think about developing security from the ground up.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services

NCF-114 Cybersecurity in State Government With Dan Lohrmann

NCF-114 Cybersecurity in State Government With Dan Lohrmann

March 5, 2019

Our guest today is known to many of you as “Lohrmann on Security” from his countless articles and blogs for “Government Security Magazine”. Dan which our host refers to in his introduction as “ENERGY” will impress everyone with his passion for the topic. It is easy to see why Dan was the CIO of the year during his days with the State of Michigan, and is so well known for his top followed blogging. If you are not inspired to jump into the public sector to lend a hand after hearing Dan, then probably nothing will get you excited. Dan has some great insight on ways to make local government more effective and secure, but definitely gives a positive perspective on how working for a State or local government has its perks.

Visit our sponsors:

Cyber Resilience Institute

Internet Broadcasting Network

Logic Central Online

SecureSet Academy

Murray Security Services