Share Data @ Rest
Share to email
Share to Facebook
Share to X
By UNC Chapel Hill's & UNC Fayetteville State's Information Security Offices
5
1919 ratings
The podcast currently has 47 episodes available.
Recorded in front of a live audience at UNC CAUSE in October, 2022!
The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are built on a philosophy of openness and enrichment of public understanding. How do we preserve the public's trust while securing our resources, and is there a philosophical discussion to have around doing so?
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted successfully by them, plus the importance of compassion and empathy in our field. There are also side discussions of Michael's history as an employee of COBRA. Remember, every career is a journey.
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the other. Charlie and Michael welcome Kim Stahl, Senior Policy and Process Lead for UNC Chapel Hill's Information Technology Services, to discuss privacy, policy, and privacy policies.
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communications team to discuss things to consider when we do outreach focusing on students and others on the cusp of their professional lives.
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology!
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review.
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Online and phone-based scams are everywhere. Do you keep getting phone calls about your car's extended warranty? Do you get text messages offering to buy your house? Or did a seller in an online store offer you a refund if you took down your one-star review Charlie and Michael dive deep into the murkier end of the pool!
Links:
Scam Alerts (Federal Trade Commission)
Romance Scams (FBI.gov)
Internet Crime Complaint Center (FBI site)
Cyber Civil Rights Initiative
Report Fraud (FTC.gov)
Opt Out of Junk Mail and Email Marketing
Opt Out of "Pre-Approved" Credit Marketing
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Links:
Election Security: Rumor vs. Reality (CISA.gov)
North Carolina State Board of Elections
Contact us:
[email protected]
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
The podcast currently has 47 episodes available.