Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.

Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures


Listen Later

Send us a text

What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber con artists and the ingenious way they laundered the stolen funds. Discover why you should never use your phone numbers for authentication and what you can do to protect yourself. 

As we journey further, we'll unravel the complex web of crypto regulations and vendor risk management. With the SEC guidelines causing confusion, we'll debate the need for a more regulated crypto environment. Learn about the critical process of vendor vetting in industries dealing with confidential data. We'll also reveal the SPRS scoring system for assessing vendor security and why you must be assertive with vendors that don't prioritize security. Remember, when it comes to securing your crypto assets, the mantra should be "don't trust, verify." So, gear up for an enlightening episode that will help you navigate the murky waters of cryptocurrency security.

This is Encrypted Ambition—a podcast about the builders rewriting the rules. Join Petronella Technology Group as we decode the ideas, challenges, and momentum behind tomorrow’s business, technology, and leadership breakthroughs. 

That’s a wrap on this episode of Encrypted Ambition. Subscribe wherever you listen, and if today’s guest inspired you—leave us a review or share the show with someone in your circle.

To learn more about how we support innovators with AI, cybersecurity, and compliance, head to PetronellaTech.com.

Thanks for listening—and remember, the future favors the bold.

Support the show

NO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.

Support the Show

Please visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at:

  • YouTube PetronellaTech
  • YouTube Craig Petronella
  • Podcasts
  • Compliance Armor
  • Blockchain Security
  • LinkedIn
  • Call 877-468-2721 or visit https://petronellatech.com
...more
View all episodesView all episodes
Download on the App Store

Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.By Craig Petronella

  • 4.3
  • 4.3
  • 4.3
  • 4.3
  • 4.3

4.3

3 ratings


More shows like Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,965 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

629 Listeners

Hacked by Hacked

Hacked

177 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,011 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

313 Listeners

Click Here by Recorded Future News

Click Here

386 Listeners

Malicious Life by Malicious Life

Malicious Life

925 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

164 Listeners

Hacking Humans by N2K Networks

Hacking Humans

311 Listeners

Cyber Work by Infosec

Cyber Work

101 Listeners

The Azure Security Podcast by Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

The Azure Security Podcast

23 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

119 Listeners

CISO Tradecraft® by CISO Tradecraft®

CISO Tradecraft®

48 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

158 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

26 Listeners