Cyber Crime Junkies

Top Cyber Risks in Higher Education

March 28, 2024 Cyber Crime Junkies-David Mauro Season 4 Episode 39
Top Cyber Risks in Higher Education
Cyber Crime Junkies
More Info
Cyber Crime Junkies
Top Cyber Risks in Higher Education
Mar 28, 2024 Season 4 Episode 39
Cyber Crime Junkies-David Mauro

NEW! Text Us Direct Here!

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges 
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks 
  • Education and awareness are key 
  • Collaboration and information sharing between organizations are essential 
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

 

Chapters


  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Informa

Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

Visit kiteworks.com to get started. 

We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

"Cyber Flash Points" – your go-to source for practical and concise summaries.

So, tune in and welcome to "Cyber Flash Points”

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

Follow Us:
πŸ”— Website: https://cybercrimejunkies.com
πŸ“± X/Twitter: https://x.com/CybercrimeJunky
πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Show Notes

NEW! Text Us Direct Here!

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges 
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks 
  • Education and awareness are key 
  • Collaboration and information sharing between organizations are essential 
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

 

Chapters


  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Informa

Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

Visit kiteworks.com to get started. 

We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

"Cyber Flash Points" – your go-to source for practical and concise summaries.

So, tune in and welcome to "Cyber Flash Points”

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

Follow Us:
πŸ”— Website: https://cybercrimejunkies.com
πŸ“± X/Twitter: https://x.com/CybercrimeJunky
πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!