
Sign up to save your podcasts
Or
DJ Goldsworthy, Vice President of Security Operations and Threat Management at Aflac, joins the podcast for episode number 1. Brian and John dig into DJ’s background in cybersecurity research and development, and his current role at Aflac where he oversees 8 teams. He’s a leader, but he’s really hands-on, keeping his technical edge.
How do you make sure the right areas of a team this expansive get the right support? The right funding? They soon dig into the current threat-scape and trends in cybersecurity, particularly in terms of the increase in commoditized threats. These are no longer poorly written emails with a couple of links, but cybercrime as a service.
Cybercriminals are also selling access to xIoT devices, which includes IoT, OT, and Network devices, after having gained persistence in a network.
Let’s get into Things on the IoT Security Podcast!
Follow DJ on LinkedIn at https://www.linkedin.com/in/djgoldsworthy
Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.
Let’s connect about IoT Security!
Follow John Vecchi at https://www.linkedin.com/in/johnvecchi
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
5
55 ratings
DJ Goldsworthy, Vice President of Security Operations and Threat Management at Aflac, joins the podcast for episode number 1. Brian and John dig into DJ’s background in cybersecurity research and development, and his current role at Aflac where he oversees 8 teams. He’s a leader, but he’s really hands-on, keeping his technical edge.
How do you make sure the right areas of a team this expansive get the right support? The right funding? They soon dig into the current threat-scape and trends in cybersecurity, particularly in terms of the increase in commoditized threats. These are no longer poorly written emails with a couple of links, but cybercrime as a service.
Cybercriminals are also selling access to xIoT devices, which includes IoT, OT, and Network devices, after having gained persistence in a network.
Let’s get into Things on the IoT Security Podcast!
Follow DJ on LinkedIn at https://www.linkedin.com/in/djgoldsworthy
Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.
Let’s connect about IoT Security!
Follow John Vecchi at https://www.linkedin.com/in/johnvecchi
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
3,652 Listeners
2,316 Listeners
1,010 Listeners
401 Listeners
111,155 Listeners
387 Listeners
7,816 Listeners
15 Listeners
20 Listeners
76 Listeners
58 Listeners
118 Listeners
15,191 Listeners
2 Listeners