Episodi

  • In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.

    The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.

    As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.

    TIMESTAMPS:
    00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey
    04:17:00 - AI's Impact on Job Automation and Cybersecurity
    09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation
    17:29:00 - The Future of AI: Security, Ethics, and Human Impact
    28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes
    34:05:00 - The Future of Humanity and AI Integration

    SYMLINKS
    BarCode Security: https://barcodesecurity.com/
    BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/
    X Foundation: https://xfoundation.org/
    Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/
    ThreatLocker: https://www.threatlocker.com/
    Exploit Security: https://www.exploitsecurity.io/
    Ironwood Cyber: https://www.ironwoodcyber.com/
    Sevn-X: https://www.sevnx.com/
    The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
    TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs
    Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/
    OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing
    AI Trust Council: https://aitrustcouncil.org/
    VFX Los Angeles: https://vfxlosangeles.com/
    Inspira AI: https://inspira.ai/
    PsyberLabs: https://psyber-labs.com/

    DRINK INSTRUCTION
    Keep it 100
    1 oz Captain Morgan 100 proof
    1/2 oz Coffee Liqueur
    1/4 oz Simple Syrup
    1 ½ oz Espresso
    Add all ingredients to a shaker and shake. Strain into a coupe glass.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.

    We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.

    TIMESTAMPS:
    00:16:00 - Navigating the AI Paradox: Innovation and Danger
    07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate
    12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon
    19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development
    26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape
    31:36:00 - AI’s Impact on Jobs and Cybersecurity
    38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions
    41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in Vegas

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/
    ConnectCon: https://www.connectcon.world/
    C&C Generative AI Policy - <link>

    DRINK INSTRUCTION
    m.AI t.AI
    1 1/2 oz White Rum
    3/4 oz Orange Curacao
    3/4 oz Lime Juice
    1/2 oz Orgeat Syrup
    1/2 Dark Rum
    Add the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Episodi mancanti?

    Fai clic qui per aggiornare il feed.

  • Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust.

    The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, and the risks of rapid AI development. Chris explains the concept of Artificial General Intelligence (AGI) and its potential to reshape human existence, emphasizing the need for regulated and ethically aligned AI systems. He also highlights the AI Trust Council's mission to promote a pro-human future amidst technological advancements. This discussion provides listeners with a comprehensive, and often not heard, understanding of the challenges and opportunities in the AI landscape.

    TIMESTAMPS:
    00:00:00 - Chris Wright’s Mission to Combat AI Corruption
    00:04:39 - The Future of AI and Its Societal Implications
    00:14:12 - The Impending Impact of AI and the Singularity
    00:19:10 - Political Corruption and Corporate Influence in AI Legislation
    00:21:10 - The Psychological Impact of AI Relationships and Their Realism
    00:24:00 - The Impact of Chatbots on Mental Health and Society
    00:27:08 - Tech Engineers’ Fascination with AI’s Potential World-Ending Future
    00:28:25 - AI-Driven Drone Warfare and Its Rapid Evolution
    00:32:44 - Building Trust in AI Through a Pro Human Network
    00:40:41 - Exploring AI, Vegas Venues, and Cybersecurity-Themed Bars

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/christopherwrightaitc/
    AI Trust Council: https://www.theaitc.com/

    DRINK INSTRUCTION
    Fallen Angel
    2 oz Dry Gin
    1 oz Lemon Juice
    2 tsp Creme De Menthe
    2 tsp Simple Syrup
    2 dashes Aromatic Bitters
    Combine all ingredients in a shaker with ice. Shake well for 15-20 seconds for maximum chill, and then strain into a cocktail glass. Optionally, garnish with mint.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecurity, is widely recognized and respected. In addition to her corporate achievements, Dr. Barker has also recently been honored with an MBE (Member of the Order of the British Empire) for services to cybersecurity, cementing her status as a leading voice and advocate in the field.

    Our discussion focuses on the human element of security breaches and the importance of cultivating a culture of cybersecurity awareness within organizations. Dr. Barker shares her journey into the world of cybersecurity and discusses the evolving landscape of cyber threats, including the use of AI by cybercriminals for social engineering and deepfake technology. We highlight the significance of leadership commitment and values congruence in cultivating a robust cybersecurity culture. The effectiveness of gamification in training, a practical aspect, is also explored. The segment concludes with a personal touch, as Jessica shares her experience of receiving an MBE at Windsor Castle from Prince William. She then provides insights on her new book "Hacked: The Secrets Behind Cyberattacks".

    TIMESTAMPS:
    00:02:53 - From Civic Design to Cybersecurity: A Human-Centric Journey
    00:06:21 - AI's Escalating Role in Cybercrime and Social Engineering
    00:09:18 - Strategies for Enhancing Digital Critical Thinking
    00:13:00 - Cultivating Successful Cybersecurity Cultures in Organizations
    00:16:57 - Rethinking Security Culture and Training Effectiveness
    00:20:27 - Dreamlike Investiture: Receiving an MBE from Prince William
    00:22:15 - Royal Recognition for Cybersecurity Expertise
    00:25:40 - Demystifying Cybersecurity Through Engaging Stories and Practical Advice
    00:31:20 - Discovering Local Vegas Gems and Cybersecurity Bar Concepts

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/jessica-barker/
    Twitter (personal): https://twitter.com/drjessicabarker
    Twitter (organization): https://twitter.com/CygentaHQ
    Cygenta (company): https://www.cygenta.co.uk/
    Hacked: The Secrets Behind Cyber Attacks (book): https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703
    Las Vegas Arts District (location): https://dtlvarts.com/

    DRINK INSTRUCTION
    Purple Haze
    2 oz Gin
    1 oz Violet Liqueur
    1 oz Fresh Lemon Juice
    1/2 oz Honey Syrup
    1 Dash Orange Bitters
    Combine all ingredients in ashaker with ice. Shake well and straininto a chilled glass. Optionally, garnishwith a twist of lemon peel or a sprig of lavender.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE:WiCys Delaware Valley Career Fair
    RECORDED: 4/25/24
    VENUE: Chestnut Hill College - www.chc.ed
    LOCATION: Philadelphia, PA
    GUEST: Job Seekers, Hiring Organizations, and Recruiters
    SPONSOR: WiCys Delaware Valley - LinkedIn Page

    ABOUT WICYS AND GUESTS:​
    WiCys Delaware Valley - A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their knowledge and expertise to support one another in their career advancement and personal development. By cultivating strong relationships and creating a supportive environment, The organization aims to empower its members to achieve their professional goals and enhance their skills. The organization welcomes the participation of male allies who share the same vision of promoting diversity and inclusivity in the workplace.

    Pam King - A faculty member and director of the cybersecurity program at Chestnut Hill College, Pam King has played a pivotal role in establishing a robust cybersecurity and digital forensics education curriculum. With both undergraduate and graduate programs under her leadership, King has overseen the implementation of accelerated and online offerings to advance cybersecurity education.

    Alex Pickenich - A recent graduate with a double major in computer science and data science and a minor in cybersecurity, Alex Pickenich is actively pursuing a career where she can merge his passion for data science with the field of cybersecurity.

    Manasa Pisipati - As a second-year grad student at Penn State University Park and the president of the Women in Cybersecurity student chapter there, Manasa Pisipati leads efforts to create a supportive community for women in the cybersecurity field and to provide them with opportunities for professional development.

    Yvonne Brown - A professional seeking a transition into cybersecurity, Yvonne Brown has a background in project management and shares her interest in consulting within cybersecurity, emphasizing the need for mentorship and support in new roles.

    Jessica Sylvester - A risk and cybersecurity division lead for TekSystems, Jessica Sylvester has years of experience in tech staffing and professional services, and she provides insight into the recruitment process and the qualities that make candidates stand out.

    Emily Rose Nunez - Software Engineer at Leidos, designs, develops, and deploys scalable and secure software solutions for diverse clients, leveraging tools like Jenkins and Jira to automate processes and collaborating with cross-functional teams to deliver innovative, high-quality solutions that meet stakeholder and end-user requirements and expectations.

    Tyler Yeagor- IT Client Relations partner at Ark, leverages his strong background in technology services, client relations, and certifications in Sandler Foundation, Microsoft 365 Fundamentals, and AWS Cloud Practitioner to assist businesses with their IT obstacles, projects, and initiatives through consultative insight and timely execution, while passionately creating new and better experiences for customers and partners, and continuously learning and collaborati

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflows. Izzy shares his journey from early fascination with green screen magic to his pioneering role in adapting deepfake technology. He provides insights into how deepfakes are disrupting the film industry and ignites discussion on the consequences of this powerful technology, from ethical implications to its rapid integration into advertising and beyond, painting a thought-provoking picture of AI's burgeoning role in content creation.

    TIMESTAMPS:
    00:00:16 - Introduction to deepfakes and their impact on perception
    00:02:19 - Background in film and visual effects
    00:11:23 - Interest in AI and learning coding
    00:14:02 - Increase in deepfake inquiries and major deals
    00:16:53 - Responsibility of AI developers in shaping the ethical advancement of deepfake tools
    00:20:23 - Simplifying the deepfake production process
    00:24:30 - Concerns about AI's impact on the filmmaking process
    00:26:42 - Narrow application in AI leading to powerful outcomes
    00:31:28 - Lack of identity safeguards for actors in the entertainment industry
    00:35:03 - Potential benefits of actors adopting deepfake technology
    00:39:55 - Potential impact of deepfakes on politicians and lawmakers
    00:41:00 - Potential for real-time deepfakes and their applications in scams and fraud
    00:44:30 - Company focus on predicting behavior, implementing AI managers, and automating high leverage tasks
    00:50:23 - Benefits of a hybrid approach combining AI and human management
    00:51:53 - Utilizing AI for detecting user behavior anomalies and insider threat detection

    SYMLINKS
    VFX LA (company): https://vfxlosangeles.com/
    Sin City (movie): https://www.imdb.com/title/tt0401792/
    After Effects (software): https://www.adobe.com/products/aftereffects.html
    UCLA Extensions (educational institution): https://www.uclaextension.edu/
    Ender's Game (movie): https://www.imdb.com/title/tt1731141/
    University of Texas (educational institution): https://www.utexas.edu/
    SSRN Paper: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4739430#
    Inspira AI (website): https://www.inspira.ai/
    Han Barbecue (restaurant): https://www.yelp.com/biz/han-bbq-burbank
    Scum and Villainy Cantina (bar): https://scumandvillainycantina.com/
    Buena Vista Cigar Lounge (bar): https://www.yelp.com/biz/buena-vista-cigar-club-beverly-hills

    DRINK INSTRUCTION
    The Replicant
    1.5 oz Vodka
    3/4 oz Midori
    3/4 oz Lemon Juice
    1/2 oz Lemon Juice
    Combine all ingredients into a shaker with ice. Shake well and strain into a chilled cocktail glass.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understandable, and he continues to contribute actively to the field.

    TIMESTAMPS:
    00:02:27 - Introduction of Iceman, RFID hacker and contributor to the Proxmark project
    00:07:23 - Explanation of Proxmark device capabilities and the development of the Iceman fork
    00:14:13 - Formation of the RFID research group and transitioning from a hobby to a public figure
    00:17:49 - Introduction of new RFID tools, concepts, and weaponizing RFID readers for unauthorized access
    00:20:40 - Effectiveness of RFID wallets and the cat-and-mouse game with weaponized readers
    00:24:06 - Development of magic cards for RFID hacking and the potential impact of AI on RFID research
    00:28:29 - Participation in RFID hacking competitions, CTFs, and the importance of forums and Discord for knowledge sharing
    00:34:42 - Flipper Zero as a well-made tool with an ecosystem for extending functionality
    00:35:57 - The future of RFID hacking, including secure communications, advanced crypto, and chip implants by Dangerous Things
    00:39:38 - Iceman's experience with metal detectors, TSA, and the exciting future of RFID for hackers and end users
    00:42:52 - The need for vendors to allow legal copying of items and the importance of disrupting tracking and logistics systems
    00:45:07 - Iceman's recommendations for following his work and joining relevant Discord server

    SYMLINKS
    X: https://twitter.com/herrmann1001/
    YouTube: https://youtube.com/@iceman1001/
    Discord: https://discord.com/invite/QfPvGFRQxH/
    Proxmark3: https://proxmark.com/
    Iceman Fork: https://github.com/RfidResearchGroup/proxmark3/
    Dangerous Things: https://dangerousthings.com/
    Flipper Zero: https://flipperzero.one/
    IceDev: icedev.se

    DRINK INSTRUCTION
    Wildcard
    1 oz Cardamaro
    1 oz Genever
    1 oz Cynar
    Add all ingredients to a shaker filled with ice. Stir until chilled and properly diluted. Strain into a lowball glass filled with fresh ice. Optionally garnish with a sprig of rosemary or an orange peel.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Hutch, an expert in AI and cybersecurity, discusses his early interest in using AI for algorithmic trading and automating social engineering attacks with chatbots. He highlights two main cyber risks of advanced AI - the ability to manipulate people and autonomously execute attacks. Hutch and Chris explore issues like commercialization of AI versus proprietary chatbots, and tech companies' ethical duties to reduce AI risks through testing and responsible development. They delve into potential weaponization of AI in lethal autonomous weapons and "flash wars", as well as risks from intelligent humanoids. The need for global AI partnerships is discussed, but challenged by current geopolitics. Private sector researchers and companies have a key role in addressing AI safety and risks. However, adversaries likely have an edge in exploiting AI vulnerabilities, underscoring the importance of innovative defense strategies.

    TIMESTAMPS:
    00:02:14 - Introduction to Justin Hutchins (Hutch) and his background
    00:03:43 - Hutch's interest in AI and cybersecurity
    00:08:43 - Discussion on GPT-4 and its key risks
    00:15:21 - Comparison between different AI platforms
    00:20:28 - Viability of weaponizing emerging technologies
    00:25:10 - Viability of embedding AI into realistic form factors
    00:30:53 - Psychological effects of chatbots on humanity
    00:35:48 - The need for global partnerships to regulate AI
    00:40:36 - Adapting AI capabilities for weaponization
    00:47:30 - Adversarial threat actors and their adaptation to AI
    00:50:46 - AI systems circumventing security controls
    00:53:48 - The concept of singularity in AI

    SYMLINKS
    Linkedin: https://www.linkedin.com/in/justinhutchens/
    X: https://twitter.com/sociosploit/status/1546218889675259904
    The Language of Deception- Weaponizing Next Generation: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
    Socioploit: https://www.sociosploit.com/
    Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcast

    DRINK INSTRUCTION
    The Hallucination
    1 oz Elderflower Liqueur
    1 oz Absinthe
    1 oz Fresh Lemon Juice
    Guava Soda
    Add ice into a chilled cocktail glass. Add the Elderflower Liqueur, Absinthe, and lemon juice into a cocktail shaker without ice. Shake vigorously. Strain into the glass with ice. Top off with guava soda.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Wirefall is an Air Force veteran and cybersecurity expert. Wirefall shares his journey into hacking, from his early days of electronics tinkering to his career in security consulting. He also discusses the founding of the Dallas Hackers Association and the importance of community in the cybersecurity field. Wirefall explores the evolving cyber threat landscape and the potential impact of AI on hacking. Plus, he reveals how his newfound passion for improv has helped him overcome fear and become a better communicator.

    TIMESTAMPS:
    0:03:37 - Wirefall’s early exposure to technology and computers
    0:06:06 - How Wirefall started hacking and manipulating computer systems
    0:10:50 - Wirefall’s curiosity about the World Wide Web and exploration of the internet
    0:12:40 - Transitioning from a network technician to a security consultant during the dot-com boom
    0:14:23 - The need for security on the enterprise level and the awareness of professionals
    0:19:31 - The desire for a different format of talks at local cybersecurity groups
    0:23:11 - The meetup is held at encore family karaoke
    0:28:26 - The threat landscape has remained similar over the years
    0:30:22 - Wirefall’s transformation and interest in AI and machine learning
    0:35:19 - Wirefall’s experience with improv and its parallels to hacking
    0:41:33 - Improv helps with pivoting and redirecting
    0:47:46 - Finding Wirefall on social media

    SYMLINKS
    Twitter: @DHAhole
    LinkedIn Profile: https://www.linkedin.com/in/wirefall/
    Telesploit: https://www.telesploit.com/
    DHA (Dallas Hackers Association): https://www.meetup.com/dallas-hackers-association/
    DC214:https://www.meetup.com/dc214dfw/

    DRINK INSTRUCTION
    Lone Ranger
    1 1/2 oz Blanco Tequila
    3/4 oz Freah Lemon Juice
    1/2 oz Simple Syrup
    2 oz Sparkling Wine
    Lemon Twist
    Fill a shaker with ice. Add in tequila. lemon juice and simple syrup. Shake well and then strain into an ice filled glass. Top with sparkling wine. Optionally garnish with a lime twist.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Peter Schwacker is a cybersecurity thought leader with over 25 years of experience. Peter shares his unconventional journey in the industry, his passion for continuous learning, and his belief in the power of curiosity. He also discusses the importance of community building and the need for a deeper understanding of the roots of cybersecurity. With his unique perspective, Peter challenges the status quo and offers insights into the future of the industry.

    TIMESTAMPS:
    0:03:06 - Discussing Peter's background and journey to Mexico
    0:08:47 - Differences between US and Mexican cyber culture
    0:11:28 - The impact of niche knowledge in today's world
    0:13:15 - Peter's fascination with technology and the concept of magic
    0:14:51 - Peter's eclectic approach to security
    0:17:38 - The establishment of a Linux user group and practical activities
    0:20:19 - The size and structure of the community
    0:23:23 - The importance of hands-on experience and practical training
    0:25:36 - The significance of software development skills in cybersecurity
    0:27:08 - The need to understand the history and foundations of security
    0:30:07 - The essential characteristic of security: an intelligent, malicious adversary
    0:32:02 - The potential for security to learn from other industries
    0:35:03 - The power of the human mind and skepticism towards AI
    0:38:38 - Where to find Peter and connect with him onlineP

    SYMLINKS
    Peter Schwacker's LinkedIn
    Nearshore Cyber Website
    Books and Literature Mentioned:

    Communist ManifestoAnthony Trollope's workArthur C. Clark's worksPaolo Freire and Bell Hooks for education philosophy

    DRINK INSTRUCTION
    Paloma
    2 oz Blanco Tequila
    1/2 oz Fresh Lime Juice
    1/2 oz Simple Syrup
    1/4 cup Grapefruit Juice
    Sparkling water
    Ice
    Fill a glass with ice. Add in tequila,lime juice, simple syrup and grapefruitjuice. Top off with sparking water. Optionally garnish with a lime.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE: IBM X-FORCE
    RECORDED: 12/13/23
    VENUE: City Winery
    LOCATION: Philadelphia, PA
    GUEST: John Dwyer
    SPONSOR: IBM

    ABOUT THE GUEST:​
    John Dwyer - John Dwyer is the Head of Research for IBM Security X-Force. He has extensive experience in cybersecurity research, threat actor behavioral modeling, immersive incident response simulations, and integrated security technologies. John is a highly regarded speaker at industry events and has expertise in AI, threat hunting, and detection engineering.

    John Dwyer discusses the impact of artificial intelligence (AI) on the threat landscape and the changing role of AI in security tools. He emphasizes the importance of understanding the goals and objectives of attackers and how AI can be used to enhance security measures. John also highlights the need for proactive risk reduction strategies and the potential of AI in threat detection and response automation. He concludes by discussing the future possibilities of fully immersive deception and the importance of training and awareness in the face of evolving cyber risks.

    TIMESTAMPS:
    00:01:00 - Introduction and thanks to sponsor IBM
    00:02:28 - Introduction of guest, John Dwyer
    00:08:28 - Discussion on how AI is changing the threat landscape
    00:11:33 - AI’s impact on security tools and risks introduced
    00:13:48 - Commercial vs proprietary LLMs for organizations
    00:15:06 - Predicting attack surfaces in AI and importance of security fundamentals
    00:16:17 - Differentiating between credible threats and hype threats
    00:18:13 - Goals of financially motivated threat actors
    00:20:35 - Phishing attacks and the need for better defense strategies
    00:24:17 - Altering security awareness stance for employees
    00:26:09 - AI capabilities in threat detection, response automation, and vulnerability analysis
    00:29:11 - Need to invest in infrastructure and innovation to combat crime
    00:30:15 - Guidance for proactive risk reduction outside of AI
    00:33:57 - IBM Xforce Threat Intelligence index provides year in review
    00:37:08 - Closing remarks and thank yous

    EVENT PHOTOS
    <see episode page>

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE: LONE STAR CYBER CIRCUS
    RECORDED: 12/7/23
    VENUE: Hop and Sting
    LOCATION: Grapevine, TX
    GUESTS: Various
    SPONSOR: IBM

    ABOUT THE GUESTS:​
    Cyber Distortion - Security leaders Kevin Pentecost and Jason Popillion joined forced to create " Cyber Distortion", a leading security podcast which they describe as their own way of paying back an industry that has been so amazing to them over the past couple of decades. They believe that as cybersecurity experts, we all play a critical role in protecting businesses and individuals from cyber threats.
    Phillip Wylie - Phillip is an offensive security professional with over 25 years of passion and experience in information technology and cybersecurity specializing in penetration testing, assessments, application security, and threat and vulnerability management. An international speaker and author, Phillip shares his expertise by hosting The Hacker Factory Podcast and Phillip Wylie Show while also serving as a penetration tester, instructor, and founder of the DEFCON Group 940.
    Wirefall - As a military and law enforcement veteran, local security community advocate, and entrepreneur behind Telesploit, Wirefall has over 25 years of experience, including founding the Dallas Hackers Association while consulting on attack and penetration tests, having previously served on the boards of BSides DFW and TheLab.MS.
    Juneau Jones- Raised in the Alaskan wilderness where she developed her love of hacking through building and breaking things, Juneau later studied computer science and economics before moving to Dallas, Texas and finding her place in the local hacker community where she now works as an adversarial analyst while continuing her cybersecurity research.
    NEURAL PHANTOM- @hacknotcrime advocate/Marine Corps Veteran/CISO/Leader of @Hack_FtW/Mentor/Public Speaker/Hacker/Gamer/Meiklejohnian absolutist.
    Justin "Hutch" Hutchins - Industry leader in the fields of cybersecurity, artificial intelligence, and technical risk management. He is the creator of Sociosploit, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology. He is the host of Cyber Cognition, a podcast focused on trends and risks related to emerging artificial intelligence and machine learning technologies. And he is the author of "The Language of Deception: Weaponizing Next Generation AI." Hutch has also spoken at multiple conferences to include HouSecCon, Texas Cyber Summit, ISSA, ToorCon, DEFCON, and RSA Conference
    Quentin Rhoads-Herrera - Seasoned information security professional with over 15 years of experience leading security teams and safeguarding organizations. Expertise includes security analysis, risk assessments, penetration testing, and physical security implementations. Instrumental in building and maturing security programs for Fortune 500 companies, mitigating risks, and protecting critical assets.

    The Barcode podcast welcomes cybersecurity leaders and ethical hackers to the Lone Star Cyber Circus LIVE in Grapevine, TX. The guest panel, comprised of Texas-based cybersecurity professionals, discusses the growth of the hacker community in the DFW area and the impact of AI on the threat landscape. They highlight the potential for AI to be used in offensive and defensive cybersecurity strategies, but also cau

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Kevin Pentecost and Jason Poppillon, hosts of the Cyber Distortion podcast, stop by BarCode to share their experiences and insights in the field of cybersecurity. We discuss topics such as ransomware, social engineering, and the CISSP. Their podcast combines technical expertise with a fun and engaging approach, making it accessible to both technical and non-technical audiences. They also highlight the importance of networking and building relationships in the cybersecurity industry.

    TIMESTAMPS:
    0:00: Introductions and cybersecurity importance
    0:05: Hosts' backgrounds
    0:07: Ransomware attack experience
    0:09: Lessons learned
    0:11: Preparedness
    0:15: How hosts met
    0:24: CDP - Goals and approach
    0:29: Content delivery balancing
    0:31: Episode output
    0:34: Memorable guests
    0:42: Production workflow
    0:47: Process improvements
    0:50: Future topics
    0:55: CDP future plans
    1:08: Where to connect with CDP

    SYMLINKS
    CDP - YOUTUBE
    Kevin - Linkedin
    Jason - Linkedin

    DRINK INSTRUCTION
    Crooked Tree
    2 oz Bourbon
    3/4 oz Lemon Juice
    3/4 oz Honey Syrup
    Combine all ingredients into a shaker with ice. Shake it and then fine strain into a rocks glass.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Vivek Ramachandran is a cybersecurity professional and the founder of SquareX, a browser-based cybersecurity solution. He is known for his groundbreaking Wi-Fi attack discoveries, best-selling hacking books, and trainings for cybersecurity professionals worldwide. Vivek is also the creator of the hacker comic book series, "Hackers: Superheroes of the Digital Age."

    Vivek stops by the bar to to discuss his background in cybersecurity and his journey to becoming an entrepreneur. He shares how his curiosity and passion for technology led him to teach himself programming and eventually specialize in cybersecurity. He also talks about the inspiration behind VRN Comics, and the importance of demystifying hacking for the general public. Vivek then delves into the concept of SquareX, a deterministic cybersecurity solution that aims to provide productivity-first protection by isolating and disposing of potentially malicious files and websites. He explains how SquareX uses containerization and cloud-based technology to ensure that users can safely open documents and visit websites without the risk of infection. Vivek concludes by discussing the future of malware and the role of AI in cybersecurity, emphasizing the need for deterministic security solutions like SquareX to combat evolving threats.

    TIMESTAMPS:
    0:00:00: Introduction to Barcode and Elite consulting services
    0:01:20: Introduction to Vivek Ramachandran and his achievements
    0:02:56: Introduction to the Superhero Sipper cocktail
    0:03:34: Vivek's background and journey into cybersecurity
    0:08:54: Vivek's experience in college and internships
    0:12:37: Vivek's internship opportunity in wireless LAN security
    0:13:38: On-site internship at a university in Zurich
    0:14:24: WLAN security and lack of practical experience
    0:15:03: Early stages of WLAN security and network administration
    0:15:37: Learning WLAN and WLAN security quickly
    0:16:49: Joining Airtight Networks and getting a lucky break
    0:17:49: Getting the opportunity to speak at Defcon and Black Hat
    0:18:43: Transitioning from practitioner to entrepreneur
    0:19:38: Creating SecurityTube and initial discouragement
    0:21:08: Positive feedback and growing readership
    0:23:33: Quitting job to pursue research and training full-time
    0:26:05: Perseverance and hard work in cybersecurity
    0:27:03: Creating VRN comics to demystify hacking
    0:29:36: Changing the negative perception of hackers
    0:34:55: Identifying the need for a new cybersecurity solution
    0:36:21: Problems with existing endpoint security solutions
    0:37:50: Moving from probabilistic to deterministic security
    0:38:18: SquareX's productivity-first approach to endpoint security
    0:39:44: SquareX's seamless user experience and isolation solutions
    0:40:40: SquareX's freemium model for both consumers and enterprises
    0:43:29: AI's potential to supercharge malware and phishing attacks
    0:46:26: SquareX's deterministic security approach in the face of AI threats
    0:47:44: Vivek's love for meeting motivated individuals and exchanging ideas
    0:48:30: Vivek's unique experience at Black Hat Abu Dhabi
    0:50:55: Connect with Vivek and learn more about SquareX at sqrx.com

    SYMLINKS
    Vivek - Linkedin
    Vivek - X
    SquareX - Linkedin
    SquareX - X

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE: BELOW DECK
    RECORDED: 10/26/23
    VENUE: Rendezvous (Private Yacht)
    LOCATION: Philadelphia, PA
    GUEST: David Lingenfelter, Anahi Santiago and Tammy Klotz
    SPONSOR: N/A

    ABOUT THE GUESTS:​
    David Lingenfelter - VP of Information Security at Penn Entertainment, with a 30-year career in cybersecurity.
    Anahi Santiago - CISO at Christiana Care, the largest health system in Delaware, with a passion for healthcare cybersecurity.
    Tammy Klotz - CISO at Trinzio, with 7 years of experience in cybersecurity in the manufacturing industry.

    By way of an invation sent by VP of IT for Visit Philadelphia, Keith McMeniman, Chris hosts a live podcast on a yacht with three esteemed Philadelphia based security leaders: David Lingenfelter, Anahi Santiago, and Tammy Klotz. They discuss the current state of cybersecurity, the challenges they face in their respective industries, and the importance of educating and raising awareness among end users. They also touch on the potential of AI in cybersecurity and the need for collaboration between different stakeholders in the organization.

    TIMESTAMPS:
    0:00:06 - Introduction to the podcast and the guests
    0:04:18 - Priorities in different industries: manufacturing, healthcare, and gaming
    0:08:32 - Lessons learned from recent breaches and social engineering attacks
    0:13:18 - Importance of continuous cybersecurity training and awareness
    0:14:51 - Innovations on the horizon to combat cyber risks
    0:14:51 - Introduction to the topic of cyber risks and new technologies
    0:15:39 - Buzz around artificial intelligence and its potential
    0:17:28 - Recognition of innovative cybersecurity startups
    0:18:43 - Discussion on the adoption and governance of AI technologies
    0:21:22 - Importance of user awareness and education
    0:22:03 - AI's role in enabling end users to understand risks
    0:25:26 - Engaging with end users and understanding their needs
    0:27:08 - AI's impact on healthcare diagnosis and complex cases
    0:28:38 - Collaboration between cybersecurity and clinical experts
    0:30:20 - Conclusion on the need for collective decision making in AI implementation
    0:30:18 - Discussion about the need for a team to solve problems
    0:30:39 - Importance of involving stakeholders in conversations
    0:31:48 - Question about favorite bar in Philadelphia
    0:32:26 - David talks about his basement bar, the Underground Cantina
    0:32:55 - David's bourbon of choice
    0:33:17 - Anahi's preference for watching the Super Bowl in Las Vegas
    0:33:26 - Anahi's favorite bar, St. Stephen's Green
    0:33:47 - Tammy mentions she doesn't have a favorite Philly bar
    0:34:03 - Chris mentions Barcode Security and its advisory services

    EVENT PHOTOS
    <see episode page>

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Paul V. McEnroe is an award-winning engineer and former IBM executive who played a pivotal role in the development of the universal product code (UPC), also known as the barcode. With over two decades of experience at IBM, McEnroe led a team that created one of the most influential technologies of our generation. He is the author of the business memoir titled "The Barcode," which tells the story of his journey and the development of the barcode.

    McEnroe shares his background, from being adopted as a child to his education and career at IBM. He discusses how he became involved in the development of the barcode and the challenges he faced along the way. McEnroe also reflects on the unexpected uses and impact of the barcode, such as its role in Amazon's operations. He emphasizes the importance of teamwork and mentorship in achieving success and offers advice for structuring effective teams.

    TIMESTAMPS:
    0:01:27: Introduction to Paul V. McEnroe and his role in developing the barcode
    0:02:20: Paul's background and journey to IBM
    0:04:09: Paul's role in starting a new business at IBM
    0:06:21: Choosing the point of sale industry for barcode implementation
    0:08:43: The selection of IBM's barcode as the industry standard
    0:10:15: The complexity of developing the barcode system
    0:12:05: The technological challenges and innovations in barcode implementation
    0:14:32: The unexpected impact and innovative uses of the barcode
    0:14:51: Conclusion and final thoughts on the barcode's legacy
    0:15:23: Jeff Bezos made money on barcodes through Amazon automation
    0:16:39: Barcode technology wiped out traditional stores like Macy's.
    0:17:49: 18 states passed laws against barcodes, causing legal issues
    0:19:19: Paul had to become a lobbyist to explain barcode benefits
    0:20:59: Canadian woman found barcode system helpful for price comparison
    0:22:14: IBM lawyers worried about eye safety and laser suicide
    0:25:04: Paul became president of Trilogy after leaving IBM
    0:27:49: QR codes were a natural evolution of barcode technology
    0:29:10: QR codes offer more data but may not compete with barcodes
    0:30:06: Reading barcodes at high speeds was a challenge in development
    0:30:33: Paul recalls the CEO's skepticism about the barcode project
    0:31:11: The CEO tests the barcode's functionality and is amazed
    0:32:18: Barcodes are still relevant and have magnetic encoding for retail
    0:34:18: Paul shares his motivation for writing a memoir about the barcode
    0:37:18: Paul emphasizes the importance of teamwork in achieving goals
    0:39:14: Paul discusses the composition of his barcode development team
    0:41:11: Paul adds more engineers to his team to cover various expertise
    0:43:31: Communication and leadership are crucial for a successful team
    0:45:16: Problem with the code: it needed to be small
    0:46:03: X scan for the barcode
    0:48:10: Importance of teamwork in creating the barcode
    0:49:06: Mentorship played a pivotal role in Paul's success

    SYMLINKS
    ENTREPRENEUR.COM
    The Barcode: How a Team Created One of the World's Most Ubiquitous Technologies

    DRINK INSTRUCTION
    The U.P.C.
    1 oz Unaged Rum
    1 oz Peach Liquor
    1 oz Cranberry Juice
    Combine all ingredients in a glass with ice.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Ron Nissim, co-founder and CEO of Entitle IO, joins Chris at the bar to discuss identity and access management (IAM) in the cloud. They explore the differences between traditional IAM and cloud IAM, as well as the pain points organizations commonly face with access requests and approval processes. Ron shares a specific incident that sparked the idea for Entitle IO and explains how their platform has helped organizations improve their IAM efforts. He also discusses the future of IAM and upcoming features from Entitle IO.

    TIMESTAMPS:
    0:00:16 - Introduction to IAM and its importance in security
    0:01:49 - Differences between traditional IAM and cloud IAM
    0:05:33 - The need for cloud IAM due to common access management issues
    0:08:18 - Pain points in traditional access requests and approval processes
    0:11:49 - Success story of a company implementing Entitle IO
    0:12:45 - Rapid deployment of Entitle IO
    0:13:12 - Importance of cloud native approach and reducing administrative privileges
    0:14:59 - Difficulty of calculating ROI in security
    0:16:14 - Overcoming resistance to change in organizations
    0:19:07 - Strategies for organizations hesitant to transition to new methodologies
    0:22:19 - Features and differentiators of Entitle IO as an innovative solution
    0:26:17 - Change management policy and attribute-based model for access provisioning.
    0:27:20 - Automated governance and visibility into access and permissions.
    0:28:15 - Future of privileged access management (PAM) for cloud resources.
    0:29:03 - Evolving aspects of PAM: connectivity, authentication, authorization, and session recording.
    0:31:43 - Entitle IO's upcoming open source project for connectivity and authentication.
    0:33:12 - Importance of collaboration and feedback from industry professionals.
    0:33:54 - Contact information for Ron Nistam and Entitle IO.

    SYMLINKS
    Ron Nissim - Linkedin
    Entitle.io - Linkedin
    Entitle.io

    DRINK INSTRUCTION
    GOTHAM MARTINI
    2 oz Vodka
    1 splash Blackberry Schnapps
    1 splash Black Sambuca
    In a cocktail shaker filled with ice,combine all ingredients. Shakevigorously for 10-15 seconds.Strain into chilled glass.

    EPISODE SPONSOR
    Entitle.io

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • Mike Petrie, a pioneer in the fraud investigative industry, discusses his journey into the field and the evolution of investigative techniques. He emphasizes the importance of social media intelligence and the role it plays in uncovering fraud. Mike also highlights the need for education on protecting personal information and the integration of AI in fraud detection and prevention. He shares advice for aspiring investigators and discusses the concept of Webutation, a platform for protecting online reputations. Discover the hidden truths, covert operations, and the art of undercover work that define the intriguing realm of sub rosa AKA "Under The Rose" investigations.

    TIMESTAMPS:
    0:00:16 - The role of private investigators
    0:02:15 - Mike's background and interest in investigative work
    0:04:24 - Getting started in the private investigation industry
    0:06:12 - Opening a startup in the investigative field
    0:07:40 - Working on fraud cases in the insurance industry
    0:09:06 - The methodology used pre-internet for gathering evidence
    0:11:37 - Challenges and dangers faced during field surveillance
    0:13:11 - Pretexting and social engineering as methods of gathering information
    0:13:44 - Ensuring personal safety in dangerous situations
    0:13:36 - Gaining intel pre-OSINT and pre-social media
    0:14:06 - Ensuring personal safety through preparation and blending in
    0:15:56 - Transitioning to leverage OSINT as an intelligence tool
    0:20:45 - Educating individuals about the criticality of protecting personal data
    0:24:35 - Fraud techniques evolving and the need to inform others
    0:25:14 - The impact of removing metadata on investigators and using OSINT
    0:26:33 - The abundance of social network sites and their usefulness
    0:26:54 - Discussion on the deep web and illegal activities
    0:27:40 - Warning about dangerous chat room sites for kids
    0:29:15 - Integration of AI in fraud detection and prevention
    0:30:09 - Use of facial recognition software in investigations
    0:31:46 - Limitations of relying on Google for investigations
    0:32:53 - AI's role in analyzing images, videos, and data
    0:35:49 - Importance of human involvement in research
    0:36:32 - Advice for aspiring investigators and learning resources
    0:40:53 - Mike's expertise and public speaking engagements
    0:41:24 - Building and selling a search platform
    0:41:53 - Importance of online reputation and its impact on trust
    0:42:37 - Social media intelligence gathering for critical decision-making
    0:43:40 - Advocating for thorough gun purchase background checks
    0:44:39 - Webutation benefits both individuals and businesses
    0:45:08 - Webutation's URL: webutation.io
    0:46:03 - Special thanks to family, business partner, and mentors
    0:46:49 - Favorite bars in Philadelphia and outside of Philly
    0:48:06 - Recommended bar in Mumbai and recent favorites in Miami

    SYMLINKS
    LinkedIn
    Webutation

    DRINK INSTRUCTION
    THE SHADOW
    2 Oz Gin
    1 Oz Chilled Earl Gret Tea
    1/2 Oz Creme De Violette
    1/2 Oz Fresh Lemon Juice
    Lemon Twist (Optional)
    In a cocktail shaker, combine gin,chilled Earl Grey tea, Crème deViolette, and fresh lemon juice.Fill the shaker with ice, and shakevigorously. Strain into chilled glass.Optionally, garnish with a lemon twist.

    EPISODE SPONSOR
    N/A

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE: METAWAR
    RECORDED: 8/10/23
    VENUE: Virgil's Real BBQ
    LOCATION: Las Vegas, NV
    GUEST: Winn Schwartau

    TIMESTAMPS:
    0:02:30 - Introduction to the METAWAR Project and the challenge of reality distortion
    0:04:00 - Explanation of the six steps of the METAWAR thesis
    0:05:58 - Discussion on immersive experiences and reality distortion
    0:09:37 - Explanation of reality distortion and the difference between disinformation and misinformation
    0:15:38 - Discussion on the addictive nature of rewards in the metaverse
    0:18:02 - Exploration of the potential benefits of the metaverse
    0:20:50 - Conversation on the impact of the metaverse on mental and physical health
    0:26:48 - Discussion on the fluid nature of the metaverse and the potential for involuntary addiction
    0:28:49 - Explanation of compliance and the need for governance in the metaverse
    0:30:45 - Fun question about opening a metaverse-themed bar and signature drinks

    EVENT VIDEO
    <see episode page>

    EVENT PHOTOS
    <see episode page>

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

  • SESSION TITLE: How I Rob Banks
    RECORDED: 8/9/23
    VENUE: BAR CODE BURGER BAR
    LOCATION: Las Vegas, NV
    GUEST: FC (Freaky Clown)
    SPONSOR: Cyber Job Academy

    TIMESTAMPS:
    0:00:22 - Introduction and discussion about FC's book "I Rob Banks"
    0:01:12 - Reconnaissance and the importance of overplanning
    0:02:07 - Digital recon and the limitations of Google Maps
    0:03:36 - The value of extensive recon and avoiding people
    0:04:21 - Possibility of book adaptation into a feature film
    0:05:00 - Speculation on who would play the author in a movie
    0:06:04 - The author's best skill in social engineering: avoiding people
    0:06:34 - Successfully getting into secure areas without physical tools
    0:07:09 - Exploiting cultural tendencies in social engineering
    0:08:34 - The importance of the letter of authority in social engineering
    0:10:57 - A dangerous encounter with armed guards during an engagement
    0:12:42 - The shift in physical security assessments at Cygenta
    0:16:04 - The limitations of AI in recon and information gathering
    0:18:18 - Organizations' trust in AI as a potential vulnerability
    0:19:20 - Where to find the author online
    0:20:32 - The author's go-to beverage for decompressing
    0:21:20 - Discussion on opening a cybersecurity-themed bar
    0:22:57 - Filming a documentary and closing remarks

    EVENT VIDEO
    <see episode page>

    EVENT PHOTOS
    <see episode page>

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]