The Audit - Presented by IT Audit Labs-logo

The Audit - Presented by IT Audit Labs

Technology Podcasts

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.

Location:

United States

Description:

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.

Language:

English

Contact:

612-567-8626


Episodes
Ask host to enable sharing for playback control

Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats

12/2/2024
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts to streamlining incident response. With real-world insights and actionable tips, this episode is packed with must-know updates for IT professionals navigating today’s ever-evolving threat landscape. In this episode, we'll discuss: Thanks for tuning into The Audit. Subscribe on Spotify, Apple Podcasts, or YouTube to stay informed on the latest in cybersecurity. Don’t forget to follow us on social media and share with your network! #CybersecurityNews #2FA #BehavioralAnalytics #IncidentResponse #SEOPoisoning #ITSecurity #DataProtection

Duration:00:38:10

Ask host to enable sharing for playback control

Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024

11/19/2024
In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In This Episode We’ll Cover: Thanks for joining us for this glimpse into one of the year’s most unique cybersecurity events. Don’t forget to subscribe and share this episode with your team—we’ll see you at the next conference. #WWHackinFest #InfoSecConferences #Cybersecurity #AIThreats #IoTSecurity #SocialEngineering

Duration:00:54:03

Ask host to enable sharing for playback control

AI & Emerging Tech for a Better Future with Marsha Maxwell

11/4/2024
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss the impact of AI on knowledge, culture, and education and examine how to responsibly bridge gaps in tech access worldwide. In this episode we cover: Tune in for a compelling look at the intersection of technology, education, and culture. Don’t forget to like, subscribe, and share to stay updated with our latest episodes! #ArtificialIntelligence #EmergingTech #DigitalInclusion #CyberSecurity #DataProtection #AIinSecurity

Duration:00:59:10

Ask host to enable sharing for playback control

Building Resilient, Secure Software: Lessons from DevSecOps Experts

10/21/2024
Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face today and discuss the vital steps every company should take to secure their software development lifecycle. In this episode, we’ll cover: Whether you’re a developer, security pro, or IT decision-maker, this episode is packed with actionable insights to elevate your security strategy and ensure your software is built to withstand today’s evolving cyber threats. Don’t forget to hit that subscribe button and drop a comment below on your top takeaway! #CyberSecurity #DevSecOps #SoftwareSecurity #AICoding #IncidentResponse #ITSecurity #CloudSecurity #RiskManagement

Duration:00:47:32

Ask host to enable sharing for playback control

Real-World Cybersecurity: Need to Know Now Insights from a CISO

10/7/2024
In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal information security. Eric breaks down essential strategies for protecting your data, starting with freezing your credit, leveraging password managers, and implementing multi-factor authentication. He also dives into how these personal security measures directly tie into a broader corporate security posture. In this episode, we cover: Stay tuned as we dive into the details and explore how securing your personal data can help protect your organization from threats. Make sure to subscribe to The Audit on your preferred podcast platform to stay up to date on the latest insights from IT Audit Labs! #cybersecurity #datasecurity #personalinformationsecurity #informationsecurity

Duration:00:38:21

Ask host to enable sharing for playback control

Safety Science Meets Cybersecurity: Lessons for Risk Management

9/23/2024
Discover the vital intersection of safety science and cybersecurity, where human psychology meets technical innovation. In this episode of The Audit, special guest John Benninghoff shares his expertise in safety science and how its principles can improve cybersecurity. From applying safety protocols in the tech industry to enhancing security culture through proactive human behaviors, we dive into a range of topics. Plus, we discuss how risk quantification and ergonomics can drive better security outcomes. In this episode, we’ll cover: Join us as we explore key insights and practical tips on blending safety science with cybersecurity, and don't forget to subscribe to The Audit podcast for more insightful discussions covering the full spectrum of cybersecurity. #Cybersecurity #SafetyScience #RiskManagement #DataProtection

Duration:00:54:01

Ask host to enable sharing for playback control

Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes

9/9/2024
In this episode of The Audit, we’re joined by Mick Leach from Abnormal to discuss the evolving landscape of email security and how AI is transforming both the threats and defenses in this space. From QR code phishing to the rise of sophisticated AI-driven attacks, Mick shares insights on how organizations can stay ahead of these challenges, leveraging AI for good. We also touch on the latest trends in SaaS security and what the future of cybersecurity might look like. We'll cover: Stay ahead of emerging email threats and learn how AI can protect your organization by subscribing today! #CyberSecurity #EmailSecurity #EmailCybersecurity #AI #Phishing #Quishing

Duration:00:51:46

Ask host to enable sharing for playback control

Cybersecurity News – CrowdStrike, TikTok, and Ransomware Trends

8/26/2024
Stay informed with The Audit, your go-to podcast for the latest in cybersecurity insights, best practices, news and trends. In this month's news episode, we tackle the most significant developments shaping the industry today. We'll cover: The latest insights from CrowdStrike on evolving cybersecurity threatsThe impact of the Supreme Court ruling on cybersecurity regulationsThe massive 10 billion password leak and how to protect your organizationGuard Zoo malware targeting military personnel in the Middle EastHow AI is transforming proactive cybersecurity measuresBest practices for password management and multi-factor authenticationThe role of AI in optimizing and simplifying policy management in organizations New episodes air every 2 weeks -- Don't miss out on expert insights that will help fortify your defenses against emerging cyber threats. #Cybersecurity #AI #TechNews #ITSecurity #Malware

Duration:00:51:14

Ask host to enable sharing for playback control

Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends

8/12/2024
Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted by Eric Brown and Nick Mellem from IT Audit Labs, we sit down with Melisa Stivaletti, Chair at Epic and OSINT Director at GuideHouse. Melisa shares her remarkable journey from working at the Department of Commerce to the Department of the Army. We dive deep into the world of OSINT, discussing the nuances of open source research, tradecraft, and the transformative power of AI. Plus, Melisa shares valuable advice for those looking to break into the OSINT field and highlights the importance of lifelong learning. In this episode, we cover: ▪ The difference between open source research and OSINT ▪ The tradecraft involved in OSINT, including the use of sock puppets ▪ How AI is transforming OSINT and the guardrails needed to manage its use ▪ The critical role of data governance and compliance in OSINT ▪ The future of OSINT and the importance of lifelong learning in this field ▪ Personal stories and advice for those looking to enter the OSINT community Don’t miss out on Melisa's unique insights and experiences. Listen now and elevate your understanding of cybersecurity and OSINT. #Cybersecurity #OSINT #InformationSecurity #ITSecurity #SecurityInnovation

Duration:00:54:06

Ask host to enable sharing for playback control

Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked

7/29/2024
Join us for the July 2024, live news episode of 'The Audit', where we cover the latest cybersecurity threats, ransomware updates, and AI advancements. In this news episode, we tackle some of the most pressing cybersecurity issues of the month. Ever wondered how a ransomware attack could shut down a public library? We dive into the recent attack on the Seattle Public Library and explore a massive $37 million phishing scam that hit Coinbase Pro users. We also unravel the sophisticated gift card fraud by the Moroccan cybercrime group Storm 0539. But that's not all. We discuss the potential threat of DNS bomb DDoS attacks and the intriguing use of Flipper Zero devices to hijack event wristbands. And for those interested in the intersection of law and cybersecurity, we examine the implications of the Supreme Court's recent ruling on cybersecurity regulation. Amidst all the tech talk, we find time to ponder the existence of UFOs and share some personal stories about unexplained phenomena. In this episode we’ll cover: Stay ahead of cyber threats and AI innovations by watching the full episode. Don’t forget to like, subscribe, and share your thoughts in the comments! #Cybersecurity #Ransomware #AI #TechNews #Phishing #ITSecurity #CyberLaw

Duration:00:57:55

Ask host to enable sharing for playback control

Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications

7/1/2024
Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit. Hosts Eric Brown and Nick Mellum, joined by Cameron Birkeland, explore the tool's functionalities and features, offering practical insights and real-world applications. Discover how the HAC5 Pineapple can enhance your cybersecurity measures, with discussions on model comparisons, security implications, and best practices. In this episode we’ll cover Join us for an engaging discussion packed with valuable information for cybersecurity professionals and enthusiasts alike. Don’t miss out on our latest insights and tips! #Cybersecurity #HAC5Pineapple #PenTesting #EthicalHacking #WiFiSecurity #CyberThreats

Duration:00:33:37

Ask host to enable sharing for playback control

Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More

6/17/2024
Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity. In this live episode, we cover the recent ransomware attack on the Seattle Public Library, the $37 million theft from Coinbase Pro users, and the sophisticated gift card fraud by the Moroccan cybercrime group, Storm 0539. We share our insights on how these attacks happened, their impacts, and practical advice on how to protect yourself and your organization. We also explore a theoretical DNS bomb DDoS attack and the intriguing use of Flipper Zero devices to control wristbands at large events. Thanks for tuning in! Don't forget to like, subscribe, and share your thoughts in the comments. #CybersecurityNews #Cybersecurity #Ransomware #Phishing #ITSecurity #TechNews

Duration:00:51:45

Ask host to enable sharing for playback control

Quantum Computing's Impact on Cybersecurity with Bernie Leung

6/3/2024
Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down complex concepts like the Shor Algorithm and discusses practical steps for adapting to this new era of cybersecurity. In this episode, we dive into: This discussion is not just theoretical; it's a guide to understanding and preparing for the quantum leap in data protection. #QuantumComputing #FutureOfCybersecurity #Cybersecurity #InfoSec #PostQuantumCryptography

Duration:00:37:32

Ask host to enable sharing for playback control

Securing the Invisible Threats: Insights on IoT Security with Eric Johansen

5/8/2024
Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity with Eric Johansen from Phosphorus. Eric discusses the challenges and solutions for managing IoT devices at scale, the critical importance of asset inventory, and the significant risks posed by outdated technology. This episode is perfect for IT pros, cybersecurity experts, and business leaders looking to enhance their cybersecurity knowledge. In this episode, we'll cover: Eric Johansen's insights provide valuable knowledge for anyone involved in managing and securing connected devices. Don't miss this episode for practical advice and expert perspectives on tackling IoT security challenges. #IoT #Cybersecurity #TechTrends #OTSecurity #SmartDevices #IoTSecurity #TechInnovation

Duration:00:49:27

Ask host to enable sharing for playback control

Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson

4/19/2024
Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we talk cybersecurity, social engineering, and some wild stories that you won't want to miss. We’ll explore the role of tabletop exercises in shoring up a company's security and dive into the fascinating world of open-source intelligence. We’ll uncover what it takes to protect against cyber threats, why pen testing matters, and how social engineering tests can be a rollercoaster of nerves. Brian also shares his journey from being a Christmas caroler in "Jingle All the Way" to being a cybersecurity consultant and podcast host. This episode is packed with insights, laughs, and even some hairless cats. If you're interested in cybersecurity and want to hear some great stories from the industry, this episode has you covered. Enjoy the laughs and insights, and don't forget to like, share, and subscribe for more content from The Audit. #Cybersecurity #PenTesting #SocialEngineering #Skydiving

Duration:00:56:09

Ask host to enable sharing for playback control

Building the Future: AI and Cybersecurity in Construction

4/15/2024
In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Group. John shares his insights on integrating technology to enhance cybersecurity and operational efficiency within the construction sector. The discussion covers a range of topics from combatting sophisticated phishing attacks to the strategic use of AI tools like ChatGPT and Copilot. Delve into the challenges of AI-generated content, governance, intellectual property concerns, and the transformative impact of AI on traditional business models. In this episode we cover: Stay tuned for more insights into the future of IT technology and its transformative effects on the business landscape. #AIcybersecurity #Cybersecurity #Infosec #ConstructionTech #AIPolicies

Duration:00:51:39

Ask host to enable sharing for playback control

Cybersecurity News: Water Systems & IoT Devices Under Threat

4/1/2024
Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT security standards. In this episode, our team of cybersecurity experts, Eric Brown and Nick Mellum, dissect the Biden administration's recent warnings about cyber-attacks on U.S. water utilities and delve into the newly announced IoT device security specifications by The Cloud Security Alliance (CSA). From nation-state actors targeting essential infrastructure to the complexities of securing IoT devices in your home, this discussion offers invaluable insights into safeguarding our digital and physical worlds. What You'll Learn:

Duration:00:39:05

Ask host to enable sharing for playback control

Phishing: The Number 1 Social Engineering Tactic with James Arndt

3/18/2024
In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybersecurity. Join us as Jamie Arndt, a cybersecurity expert with extensive experience in reverse engineering and analyzing malicious emails, shares his insights and stories from the front lines. We’ll cover: • The rise of generative AI in crafting phishing emails that bypass traditional detection methods. • Real-world stories of phishing attacks, from impersonating school communications to exploiting professional relationships. • The psychological tactics used by attackers to exploit human nature and gain access to sensitive information. • Innovative defense strategies and tools that organizations can employ to protect themselves against phishing attempts. • Practical advice for individuals on recognizing phishing attempts and safeguarding personal information. This episode arms you with the knowledge of what to look for in phishing emails, emphasizing the importance of vigilance and education in the digital age.

Duration:00:49:09

Ask host to enable sharing for playback control

Printing the Future: Navigating Cybersecurity in 3D Printing

2/26/2024
How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themselves become targets for hackers? As 3D printing technology becomes more integrated into various industries, its cybersecurity implications cannot be ignored. This episode sheds light on the exciting world of 3D printing, focusing on its potential for innovation while addressing the significant cybersecurity challenges it faces. We'll explore: • The basics of 3D printing technology and its cybersecurity implications. • Protecting intellectual property in the realm of 3D printing. • The vulnerabilities of 3D printers to hacking and how to safeguard them. • Strategies for securing 3D printing operations against cyber threats. • Real-world examples of cybersecurity breaches in 3D printing. Whether you're a cybersecurity professional, a 3D printing enthusiast, or someone interested in the intersection of technology and security, this episode offers valuable insights into protecting your 3D printing projects.

Duration:00:46:30

Ask host to enable sharing for playback control

Are VPNs Secure? Insights on the Risks, and the Ivanti Breach

2/12/2024
How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackle these pressing questions head-on. As the cybersecurity landscape evolves, Virtual Private Networks (VPNs) are increasingly common among cybersecurity professionals and enthusiasts alike... but how secure are they? In this episode, we take you through the mechanics of VPNs, their role in safeguarding your data, and the vulnerabilities that can expose users to risk. We'll cover: • What are VPNs and how do they work? • How to choose the right VPN provider: Considerations and pitfalls. • The difference between corporate and personal VPN use and their unique challenges. • How to mitigate risks associated with VPN usage. • The recent Ivanti VPN breach If you care about your digital privacy, curious about how VPNs fit into your life, or pondering the real benefits and risks of using VPN services, then this episode is for you.

Duration:00:44:10