Episodes
Monday Nov 28, 2022
NCF-311 Business Strategies with CISO
Monday Nov 28, 2022
Monday Nov 28, 2022
In today's Podcast, we Have Jason Hicks, Field CISO at Coalfire. Jason Hicks has worked on the Technical and Business side at CISO. Mr. Hicks helps people transition from being a technical CISO to being a business leader with skills he has learned and delivers business strategies back to his community and other businesses. Enjoy today's Podcast of New Cyber Frontier.
Visit our sponsors:
Monday Nov 21, 2022
NCF-310 Security of Digital Footprints
Monday Nov 21, 2022
Monday Nov 21, 2022
In this episode of New Cyber Frontier, our host Tim Montgomery Speaks with Steve Ginty, Director of Threat Intelligence at RiskIQ. Steve Ginty gives his knowledge of Digital Security and protection against malware across the internet. Additionally, RiskIQ has partnered with Microsoft to work with the vulnerability of their exchange systems. Join us on today's episode of New Cyber Frontier.
Visit our sponsors:
Monday Nov 14, 2022
NCF-IEEE8 Fielded Blockchain Energy Demonstrations
Monday Nov 14, 2022
Monday Nov 14, 2022
In this episode of New Cyber Frontier, we have two special guests. Sri Nikhil Gourisetti, master’s in systems engineering, Ph.D. Engineering Science. and Dr. James Kempf, Ph.D. in Systems engineering and Senior Consultant at Kempf and Associates. These professionals elaborate on their experience with IEE, Cybersecurity, Energy systems, Blockchain, and much more. In addition, these demonstrations touch on the international level of the value of the blockchain initiative. Sri gives insight into projects at the Pacific North West National Lab and where this might lead with other national labs in the future. Dr. James Kempf has a better view of professional projects globally on the EU and Australian sides of these topics. Join us on this episode of New Cyber Frontier.
Visit our sponsors:
Monday Nov 07, 2022
NCF-309 Department Of Defense Agent Conveys Security is Essential.
Monday Nov 07, 2022
Monday Nov 07, 2022
In today's episode, we have Christian Dalton, a professional in Counterintelligence for the United States Department Of Defense. Mr. Dalton gave us new tactics and procedures for Security today. "Tradecraft is limited to the imagination." However, Mr. Dalton expresses that tradecraft and business corporations constantly improve as technology advances and becomes more complicated. As these enhance, Security is an essential part of the process.
Visit our sponsors:
Monday Oct 31, 2022
NCF-308 UCCS Ph.D. Graduate describes his Mastery of CyberSecurity
Monday Oct 31, 2022
Monday Oct 31, 2022
On today's podcast, we have Tobi Akanbi, UCCS Ph.D. Graduate 2020, who brings a different perspective on getting a Ph.D. with 10 years of experience in Security and Cyber Security. Tobi says “Between the time I joined UCCS to the time I graduated, I saw an extreme amount of Improvement.” Ph.D. Akanbi believe over the next five years this improvement will continue. He will also give us some tips and tricks on how to complete your Ph.D. program along the way. So join us as we embark on a journey to explore the world of a Ph.D. student. Enjoy today's show!
Visit our sponsors:
Monday Oct 24, 2022
NCF-IEEE7 University Blockchain Program Engages Students
Monday Oct 24, 2022
Monday Oct 24, 2022
In this episode of New Cyber Frontier, our guest Jim Kyung-Soo Liew, Ph.D. | LinkedIn Professor at John Hopkins University talks about Blockchain and CryptoCurrency. Jim expresses his excitement about what he feels is a bright future for Digital Currencies. Jim says, "Some students were already managing over $10 million in CryptoCurrency." The focus of his class at John Hopkins incorporates blockchain for healthcare use cases.
Visit our sponsors:
Tuesday Sep 20, 2022
NCF-307 Uncovering Vulnerabilities from Unpatched Software
Tuesday Sep 20, 2022
Tuesday Sep 20, 2022
Today's podcast has Tina Williams-Koroma, President and Founder of TCecure, LLC, and skills at https://cyskills.com, who will discuss managing security through minor and significant changes to systems and the business environment. Managing third-party risk can impact your cybersecurity posture and budget, and an excellent risk-based approach to security will enhance your business environment. Enjoy today's show!
Visit our sponsors:
Tuesday Sep 13, 2022
NCF-306 Understanding Those Starting in Cybersecurity
Tuesday Sep 13, 2022
Tuesday Sep 13, 2022
In this episode of New Cyber Frontier, Dr. Shawn Murray changes gears to talk to Ryan Johnson, a cybersecurity intern, to understand the individuals starting out in cyber-security. What aspects of cybersecurity jobs are those starting off most interested in? What brings meaning to the cybersecurity workplace? We answer these questions and more in this episode of New Cyber Frontier!
Visit our sponsors:
Tuesday Sep 13, 2022
IEEE-6 Healthcare Infrastructure to Support Privacy
Tuesday Sep 13, 2022
Tuesday Sep 13, 2022
Today on New Cyber Frontier, our host Christopher Gorog talks with today's guests, Nicolae Goga, Cristian Taslitchi, Iuliana Marin, about the future of healthcare infrastructure. Personal healthcare information used for anything but an individual's health is undoubtedly something unwanted, as there is no purpose other than misuse. So how do we secure such private information while also proving such information is forensically true? This topic, and many others, is discussed today in this episode of New Cyber Frontier!
Visit our sponsors:
Tuesday Aug 16, 2022
NCF-305 Determining the Best Cybersecurity Principles
Tuesday Aug 16, 2022
Tuesday Aug 16, 2022
Our guest Steve Ginti talks about defense contracting in the cybersecurity landscape. When your company switches to the cloud and hybrid environments, are the tried and true technologies good enough? Or should we look into the emergence of new processes for solving security for the new age? Steve Ginti talks about the process of starting from the outside and looking into these emerging systems of cloud computation and IoT devices to see where the security weaknesses lie. What do you think is the best approach to cybersecurity in the current age?
Visit our sponsors: