Episodes
Monday Jan 08, 2024
NCF-338 Disrupting Markets by Cybersecurity Economics
Monday Jan 08, 2024
Monday Jan 08, 2024
Welcome back, everybody, to New Cyber Frontier. We continue the Second in the Eight-episode series with Tim Montgomery and Dr. Gorog. Our discussion focuses on the nature of disruption in any market, identifying the critical
result of disruption is a change of philosophy. When an entire old way of doing something goes away based on technology, not only business changes, but society changes. If we go back to early 2000, there's a shift in the market, which is overseas manufacturing. Companies would allow their product to be made overseas, making it a quarter of the price; if you couldn't outsource fast enough, you could not keep up. When products are sent to be manufactured overseas, there is no control over that intellectual property. "A company found out that they would compete with their own products in the marketplace, and now we see that the risk surface for cyber-attacks is uncontrollable because it is not in our jurisdiction to enforce. The disruption of that era caused many of the problems we are facing with supply injection attacks today. (Gorog) Dr. Gorog explains further where things are heading now and how disruption again is surfacing but to regain control. Cybersecurity is the control structure in this new era with positive methods to Identify virtual assets, enforce software and data usage, and individualize every device made. Cybersecurity is the structure we stand on for the post-digital transformation economics, let's look at the future. Join us today and get involved at Logic Central Online – Where Logic meets Life
Monday Jan 01, 2024
NCF-337 Entering a New Year and New Phase for Cybersecurity
Monday Jan 01, 2024
Monday Jan 01, 2024
Happy New Year, everybody, and welcome back to New Cyber Frontier! To start 2024, we have an eight-episode series with Tim Montgomery and Dr. Gorog, Ph.D. CISSP is unveiling a new philosophy for Cybersecurity. Dr. Gorog elaborates with our host how working on the recently released work for the last seven years has progressed to a potential game changer. This first episode provides a kick-off point where the conversation focuses on the current state of the cybersecurity industry as we enter this new year. Dr. Gorog says we are still primarily working toward satisfying compliance, with most new approaches focused on data analysis and AI. (Gorog.) Billions of dollars have been spent on compliance and keeping up with the minimum standards to protect the massive data pool. In the last couple of years, digital transformations have been accelerating. Organizations and employees are spending less of their overall effort working toward physical world objects. In fact, many of us have not done anything that has resulted in physical products or outputs for many years. The conversations prelude to what later episodes will cover. Can we transfer everything to digital? Then, what does the world look like in the post-digital transformation?
Bringing the philosophical dilemma of "When everything becomes chunks of data, our wealth becomes data." How Does AI affect your data? AI is expanding operations, taking GB's worth of information from your email and devices—this information AI steals is thrown back into the data pool. In the future, how will we be able to tell what disinformation AI is starting to produce? Tune in to this episode of New Cyber Frontier. Join us to listen; you will not want to miss this series opener.
Monday Jan 01, 2024
NCF-335 Small Business Balances Cybersecurity Cost vs Value
Monday Jan 01, 2024
Monday Jan 01, 2024
Welcome back, everybody, to New Cyber Frontier. Our host, Chris Gorog, partnered with the Smalls Podcast on this episode with Dennis Kater and Nate Moser! The Smalls Podcast started in 2017 and deals with The Government Contractor Ecosystem, which aims towards Manufacturers, Service Providers, and Small Government Contractors. The primary audience for The Smalls is business development companies, Owners, and those who want to do business with the Government or Department of Defense. Companies are cautiously getting involved with cybersecurity mainly to implement the measures their contracts require, but not much more. How to identify the best balance for their minimal budgets vs the value they receive is the continued challenge they all experience. Nate and Dennis bring to light some progress in the industry compared with a few years back. Hear the latest from the small business community on cybersecurity; tune in to this week of New Cyber Frontier.
Check out The Smalls Podcast here: Podcast – The Smalls
Tuesday Dec 05, 2023
NCF-336 Confidential Computing Explained
Tuesday Dec 05, 2023
Tuesday Dec 05, 2023
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.
Monday Nov 13, 2023
NCF-334 Security Engineering for Industrial Systems
Monday Nov 13, 2023
Monday Nov 13, 2023
Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter explains his book further by saying, "Small Shoe factories and High-speed train rail switches are very different on the Industrial system spectrum. What determines the difference is worst case consequences of compromise." What would be the worst outcome to a Shoe factory versus Passenger Train Rail switches if all commands to computer systems fail? Shoe factories might have to replace all the equipment and a couple million dollars worth of expenses that insurance could cover, but for the switches on a train, if all computer commands fail, this could result in massive casualties and two trains colliding, which insurance can not cover. These are two diverse examples of industrial systems that need to face different approaches to computer systems. Mr Ginter also explains in his book that Engineering Security is a public safety issue with no room for errors. "In recent years, we have been automating everything, which is not always the best option; we must have fail-safes in place with security and protection." We face many problems and cyber attacks in the engineering world that must be considered today. Thank you for watching NewCyberFrontier.
Tuesday Oct 03, 2023
NCF-333 EDGE Symposium Presentation
Tuesday Oct 03, 2023
Tuesday Oct 03, 2023
On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring social and economic value to Blockframe customers, living up to the mission: "to enable customers to create resilient precision ecosystems for sustainable uniform consumption and production." Mr. Gorog describes this address as the day view of the last six years of his Ph.D. work, and we hope you enjoy it also. The talk explains how, in the chaotic industry that is Cybersecurity, businesses are in desperate need of holistic, modular, top-down security that spans across their entire ecosystem. The Blockframe approach implements simplicity. "We solve four significant issues: security for all segments of the Supply Chain, management of deployed devices and their safety, the integration of physical and digital Supply Chain, and lastly, the ability to scale." (Gorog). Blockframe has pioneered a way not to use mining, solving some of the major issues with blockchain and maintaining Carbon neutrality. Thank you for tuning in to this episode! If you have any questions or want to learn more about Blockframe, be sure to contact us on our website, newcyberfrontier.com
Monday Jul 24, 2023
NCF-332 Weaponized Documents and Content
Monday Jul 24, 2023
Monday Jul 24, 2023
Hello, Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself by tuning in to today’s episode.
Check our website NewCyberFrontier
Check out Votiro’s website
Visit our sponsors:
Monday Jun 19, 2023
NCF-330 High-risk is a Reality
Monday Jun 19, 2023
Monday Jun 19, 2023
On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand security. In this episode, we will discuss how that is trending in today's business culture, how security-related tools are or are not beneficial for remote working, and the manufacturing of oil and gas can benefit the most from security in these remote environments. With the idea of remote and the High Risk it brings to IT Systems of today, how can it benefit from understanding and having the experts evaluate security ramifications? Does security matter when using remote established work in a virtual ecosystem?
Visit our sponsors:
Tuesday Jun 13, 2023
NCF-329 API Marketplace and business opportunities
Tuesday Jun 13, 2023
Tuesday Jun 13, 2023
Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuses on four successful initiatives. "Usually, I reach out to financial and Industrial analyses to get their view on the matter. The third thing I do is Intensive Competitive Research, getting everybody's verdicts worldwide, big or small. The last step is building out the pricing strategy and competitive advantages and contacting buyers to make it relevant. Tune in to today's episode. Thank you.
Monday Jun 05, 2023
NCF-328 How fast is the Cloud Migration Moving
Monday Jun 05, 2023
Monday Jun 05, 2023
On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and compliance knowledge in the modern as-code environment. CISOs have a hold on the trending change and know how to use and secure cloud ecosystems for the organization's benefit. The idea of the Cloud has taken off and is now one of the top IT skills needed in today's business markets. So how is Security standing up and taking charge of the Cloud security and its virtual ecosystems?
Secberus Website
Secberus - Assess, understand and manage cloud infrastructure drift at enterprise scale.
Visit our sponsors: