just now

Using Zoom Securely

Important steps your can take to secure Zoom video conferencing

Listen to this episode

0:00 / 0:00

Summary

First published

04/22/2020

Genres

technology business

Tags

BrazilianPhilosophy WeeklyDebate CriticalThinkingPodcast SociologicalAnalysis CulturalCritique ConversationalPhilosophy LeftistPerspective

Duration

21 minutes

Parent Podcast

Cybersecurity Sense

View Podcast

Share this episode

Similar Episodes

  • Ep. 50 - [Clint Bodungen] Cybersecurity & Gamification to Industrial Cybersecurity.

    03/03/2022

    Vlad Romanov & Dave Griffith

    Guest BioClint is a world-renowned industrial cybersecurity expert, public speaker, published author, and cybersecurity gamification pioneer. He is the lead author of Hacking Exposed: Industrial Control Systems, and creator of the ThreatGEN® Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran, has been a cybersecurity professional for more than 25 years, and is an active part of the cybersecurity community, especially in ICS/OT (BEER-ISAC #046). Focusing exclusively on ICS/OT cybersecurity since 2003, he has helped many of the world's largest energy companies, worked for cybersecurity companies such as Symantec, Kaspersky Lab, and Industrial Defender, and has published multiple technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management. Clint hopes to revolutionize the industry approach to cybersecurity education and help usher in the next generation of cybersecurity professionals, using gamification. His flagship product, ThreatGEN® Red vs. Blue, is the world’s first online multiplayer cybersecurity computer game, designed to teach real-world cybersecurity.Main Discussion Points- Industrial Cybersecurity- Gamification of Cybersecurity Awareness- Building Knowledge in CybersecurityTheme: Industrial CybersecurityManufacturing Hub Episode 50.Special thanks to our sponsors Phoenix Contact for the support.The mGuard family from Phoenix Contact is designed to provide cybersecurity protection and network resilience in all rugged and industrial environments.  Combining features of a stateful-packet-inspection firewall, NAT Router, and an end-point security appliance, the mGuards were engineered to be both IT and OT friendly.  With features such as Firewall Assistant and Easy Protect mode, the mGuards are simple to configure securely while still providing unassailable protection for your critical assets. Relevant Ressources- DEF CON Groups | https://forum.defcon.org/social-groups- AWASP Foundation | https://owasp.org/- InfraGard | https://www.infragard.org/Recommended Materials- BEERISAC Podcast | https://podcasts.apple.com/us/podcast/beerisac-ot-ics-security-podcast-playlist/id1459741251- Industrial Cybersecurity: Efficiently secure critical infrastructure systems 1st Edition | https://amzn.to/3tv7Rcu- Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment, 2nd Edition | https://amzn.to/3hSxUFvConnect with UsClint Bodungen | https://www.linkedin.com/in/clintb/Vlad Romanov | https://www.linkedin.com/in/vladromanov/Dave Griffith | https://www.linkedin.com/in/davegriffith23/Manufacturing Hub | https://www.linkedin.com/company/manufacturing-hub-podcast/Let Us Know What You ThinkIf you enjoyed the show, it would mean the world to us if you could leave us a review: https://podcasts.apple.com/us/podcast/manufacturing-hub/id1546805573#manufacturing #automation #cybersecurity

    Clean
  • Cybersecurity Layoffs

    01/31/2023

    What's up, everyone?! In this episode, Ryan and Shannon discuss recent cybersecurity layoffs impacting some companies. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️  Thanks! Article: Dozens of Cybersecurity Companies Announced Layoffs in Past Year  https://www.securityweek.com/tens-of-cybersecurity-companies-announced-layoffs-in-past-year/?fbclid=IwAR3_8GU3EjgEcEEjt4PXnracW7Rpbr-nUK5vHRiSLEvdMuBIJz3kiGb0EAE#respond Socials:  Audio - https://anchor.fm/theothersideofthefirewall YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Ryan on Twitter, LinkedIn, and Clubhouse - @ryrysecurityguy   #cybersecurity #corporate #layoffs --- Support this podcast: https://podcasters.spotify.com/pod/show/theothersideofthefirewall/support

    Clean
  • 3. John Bandler on Cybersecurity

    06/01/2018

    Attorney John Bandler wrote Cybersecurity for the Home and Office to help lawyers and in fact anyone take charge of their cybersecurity. The book provides a solid understanding of cybercrime, privacy threats, cybersecurity and computer technology. He speaks here with WallStreetNorth's John Metaxas as part of the series Podcasting for Lawyers.

    Clean
  • Understanding Cybersecurity

    10/20/2022

    Why it's important for parents to advice their children on the importance of cybersecurity

    Clean

Similar Podcasts

  • Depression Detox Show | Daily Inspirational Talks

    08/12/2020

    Malikee Josephs (Muh Leek - Jo Seffs)

    Get UNSTUCK. Be inspired by the best motivational, inspirational, and brain health experts to live a happier and more purposeful life! Join host Malikee Josephs Monday through Friday for your dose of motivation. If you’re struggling with feelings of unhappiness, loneliness, emptiness, anxiety, sadness, grief & loss, or not having a sense of purpose, this show is for YOU! ——————If you are in need of medical care, please consult with a therapist or physician.If you are in a crisis or thinking of harming yourself, please call the National Suicide Prevention Lifeline 1-800-273-8255. Calls are private and confidential. CDC Mental Health recommendation pagehttps://www.cdc.gov/mentalhealth/tools-resources/index.htm

    Clean

Episode Description

Zoom is soaring in popularity as a large population of remote workers are using it for video conferencing. With it's surging popularity, the platform's loose security protocols made it an easy target for hackers to take advantage and disrupt calls. "Zoombombing" allowed anyone to login to unprotected links to intrude on the calls often sharing lewd photos and videos. Listen to our most recent podcast to hear what you can do to use Zoom securely. 

Discussion (0)

Be respectful and constructive in your comments