Cyber Crime Junkies
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast
Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
Cyber Crime Junkies
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.
Takeaways
- Cybersecurity in higher education faces unique challenges
- Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
- Cyber resiliency and preparedness are crucial in mitigating cyber risks
- Education and awareness are key
- Collaboration and information sharing between organizations are essential
- Creating a student-run SOC can be a valuable initiative
Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.
Chapters
- 00:00 Introduction and Background
- 01:30 First Experience with Ethical Hacker
- 06:32 Transition to Cybersecurity at Clemson University
- 07:00 Cyber Risks in Higher Education
- 09:04 Cyber Resiliency and Preparedness
- 11:18 Cyber Risks Faced by College Students
- 15:06 Social Engineering and Cyber Education
- 19:48 Collaboration and Information Sharing in Cybersecurity
- 22:12 Challenges of Cybercrime and Law Enforcement
- 28:15 Top Cyber Threats in Higher Education
- 30:11 Threats and Vulnerabilities
- 34:25 Creating a Student-Run SOC
- 38:02 Breaking into Cybersecurity
- 46:03 The Broad Scope of Cybersecurity
- 50:47 Generative AI and its Impact
- 51:32 Upcoming Events and Podcast
News on Clemson University and their Cyber transformation
- https://news.clemson.edu/meet-a-tiger-john-hoyt-director-of-information-security-and-privacy/
- https://www.clemson.edu/cybersecurity-summit/
- https://news.clemson.edu/clemson-opens-cybersecurity-operations-center/
I wrote Moving Target because overconfidence is the enemy. Hardcover, paperback, Kindle, and audiobook. Amazon, Barnes and Noble, and more.
Season 9 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done. Join us! SUBSCRIBE
Roll out AI the right way. Contact NetGain today at 844-777-6278 or reach out at DMauro@NetGainIT.com or find more at www.NETGAINIT.com
I wrote the Moving Target Trilogy because overconfidence is the enemy. Hardcover, paperback, Kindle, and audiobook. Amazon, Barnes and Noble, and more.
New Exclusive Offers for our Listeners!
New non-fiction Book Series is out!
- Moving Target: The Art of Online Camouflage drops April 14.
- Moving Target: The Obedient Machine drops April 21.
- Book 3 -- Ghost and the Machine -- out soon!
🔥 4 years. 400+ interviews. Available on Amazon. We are all Stevie Parker.
Remove Your Data Online Today. Consider OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies
Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME
🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq
===========================================================
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.
Breaching the Boardroom
NetGain Technologies, LLC
Detrás de la pantalla
Dr. Sergio E. Sanchez, el Dr. Qubit.