Episodi
-
ืืฉืืืืฉ ืืกืคืจืืืช ืงืื ืคืชืื ืืคื ืืคืจืงืืืงื ืืงืืืืช ืืืื ืคืืชืื ืชืืื ื, ืงืืฆืืจ ืืฉื ืืคืืชืื ืืื ืืฉืืขืืชื ืืื ืืืื ืืืืื ืกืืืื ืื ืขืืกืงืืื ืืกืืืื ื ืกืืืืจ ืืฉืืขืืชืื ืืืงืืืืช.
ืืืขืืจ ืฉื ืืขืืื ืืชืคืขืืื ืืืงืจืื ืืืืกืกื ืืขืจืืช ืืคืขืื ืกืื ืืจืืืช ืืชืืืืื ืืืืืืืื ืืืืื ืขืืืืืช ืืืืืชื ื ืฉืืื ืืืฉืฃ ืืช ืืกืืืื ืืชืคืขืืืืช ืืกืืืื ื ืกืืืืจ ืืืืจืื ืืกืืืืืช ืืืืฉืื ืืกืื ืืจืืืืช.
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืฆืืืงื ืจืื ื ืืืืกื ืฉืืชืฃ ืืืื ืื ืืืื ืืืืื ืืืืจืช ืคืืกืืืืจ, ืืืืื ืืชืืื ื ืืืื ืกืืืื ืื ืืงืื ืคืชืื ืืฉืืื ืขื ืืฉืืืืฉ ืืงืื ืคืชืื ืข"ื ืืืจืืช ืชืืื ื.
ืื ืืืฉืืขืืช ืฉื ืืจืืฉืื ืืฉืื ื ืืงืื ืคืชืื
ืืื ืืืืืืื ืฉืืงืื ืืคืชืื ืฉืืืื ืก ืข"ื ืืืคืชืืื "ื ืงื" ืืื ืืกืชืืจ ื ืืืงืืช ืฉืืคืชืื ืืืชืจ ืืืงืื
ืืืคื ืคืืืฉ ืืงืื ืืคืชืื ืืช ืืขืืื ืืชืคืขืืื ืืขืื
Open-source libraries have become an accepted practice in all software development. Shortening the duration of development is significant but carries significant business and cyber risks for customers.
The transition of the operational world to controllers based on a standard operating system and digital twins lowers costs. Still, it exposes the operational environment to known cyber risks from standard computing environments.
Nachshon Pincu hosts Zvika Ronan, Co-founder and chief technology officer at FOSSAware and an expert in open-source risk management, in a conversation about software companies' use of open source.
What does the different open-source licensing mean?
How do you ensure that the open code entered by the developers is "clean" and does not hide vulnerabilities that will be opened on the client's site?
Where does the open source meet the operational world?
and more
-
ืืืจืช ืืืืืืืื ืืืฆืืช ืืช ืขืฆืื ืืื ืขืืืื ืืคืจื ืกื ืงืืืขื ืจืืฆื ืืืืื ืก ืืืืืืง ืื ืืื ืชืืื ืืืจ ืื'ืื ืืืจ ืจืืฆื ืืืืืืฃ ืืงืื ืขืืืื ืืกืื ืืืจ ืจืืฆื ืืขืฉืืช ืฉืื ืื ืืืืื ืืงืจืืืจื ืฉืื ืกืืจืช ืืคืืืงืืกืืื ืืื ื ืืขืื ืขืืืจื
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืคื ื ืืจ-ืืื ืื ืืืช ืงืฉืจื ืืืืืง ืืงืจืื ืืืงืืืืช ืืื ื ืืื ืืืช ืืืืงืช ืืืืกืื ืืขืืจื. ืืชืคืงืืื ืื ืืืื ืืคื ื ืืกืืืขืช ืืกืืืื ืืื ืืืืืื ืืืฆืืืช ืขืืืื.
ืืคืืืืกื ืืืื ืกืืื ืืฆืืืช ืขืืืื, ืืื ืืืคืฉืื ืขืืืื ืืฆืืจื ืืงืืืืืช ืืืื ืขืืืจืื ืืช ืืืฉืืื ืืืฉืืขืืชืืช ืืจืืฉืื ื, ืืฉืืื (ืจืืืื) ืขื ืืืืืืก/ืช.
-
Episodi mancanti?
-
ืืืืืขืื ืืืืื ืกืืืืจ ืืื ืืฉืืืืช ืืงืจืืืืืช ืืืื ืช ืกืืืืจ. ืืืจืช ืืืืื ืฉืื, ืืื ืช ืืืจืืชืื ืืืืฆืืข ืืจืืฉ ืฉื ืืืืืื ืืชืืืืื ืืื ืขื ืืชืงืคื ืืฉืืขืืชืืช ืื ืืง ืืฉืืขืืชื ืืืจืืื. ืืชืืงืฃ ืชืืื ืืืคืฉ ืคืจืืฆื ืคืฉืืื ืืืงืื ืืืืื ืืื ืขื ืืชืงืคืืช ืืจืืืืช ืขื ืคืืื ืฆืืื ืืืืื ืืืื.
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืกืฃ ืืื, ืกืื ื"ื ืืื ืืืืืืืช ืฉื ืงืกืคืจืกืงื ืืฉืจืื ืืฆืืื ืืืืื ืกืืืืจ ืืืืข, ืืฉืืื ืขื ืืฉืืืืช ืืืืืขืื ืืืืื ืกืืืืจ, ืืืืืข ืฉืืื ืืกืคืง ืืืืจืืช ืืื ืืื ืืืจืฉืช ืืขืฆืืื ืฉืงืกืคืจืกืงื ืื ืชื ืืจืฉืช ืืืคืื ืืืฉื ืฉื ืื ืขื ืืกืคืจ ืขืฆืื ืฉื ืืืืฉื ืื
.Cyber threat intelligence is one of the most critical layers in cyber defense. Knowing your enemy, understanding his targets, and making the appropriate next moves will prevent disaster. The attacker will always look for a straightforward breach rather than wasting time on long attacks with a high potential for discovery.
Nachshon Pincu hosts Assaf Hazan, the CTO of Kaspersky Israel and a renowned Cyber Threat Hunter, in a conversation on the importance of Cyber Threat Intelligence. Assaf shares the information he provides to companies daily, and the extensive network Kaspersky has built in the dark net over the years, boasting a significant number of sensors.
-
ืืคืขืืื ืืฉืชื ืื ืืืื ืืกืื ืืืืืืฆืื ืืืขืจืืืช ืืืืฆืืจ ืขื ืื ืช ืืืืฉืืจ ืจืืืื ืืืื ืืื ืขืืืืืช ืืขืืืื ืืืืื ืืืืจื ืืืืืืื ืืช ืฉืืจืช ืืจืืื ืืืืชื ืืืฆืขื ืืืฆืืจ. ืื ืืืฉืืขืืืืช ืืืื ืื ืืฉืคืืข ืจืืืืืช ืืืื ืืืืืืื ืืชืืื ืืกืืืืจ.
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืจืืื ืืกืจื ืื ื"ื ืจืืงืืื ืืฉืจืื ืืฉืืื ืขื ืขืืจ, ืืืื ืืขืชืื ืืชืขืฉืืื ืืืื ืจืืงืืื ื ืื ืกื ืืขืืื ืืกืืืืจ.
ืืื ืืืืืช ืืชืขืฉืืื
ืืืฉืืขืืืืช ืฉื ืื ืืกืช ืืืืืืืฆืื ืืืขืจืืืช ืืืืฆืืจ
ืืื ืืฉืชืื ืืกืืืืจ ืืชืืื ื ืืืืืืช
Factories are changing and digitizing their production systems to remain relevant in the face of cheap labor costs in the East and increase the profit margin with the same means of production. What are the meanings, and how does it affect horizontally, especially in the cyber field?
Nachshon Pincu hosts Ariel Lasry, Israel's country Director of Rockwell Israel, in a conversation about the industry's past, present, and future and how Rockwell entered the cyber world.
Where is the industry going?
The implications of digitization entering production systems
How does cyber fit into the overall picture?
-
ืืื ืืืื ื "ื" ืืฉื ืืชืื ืืฆื"ื. ืืฉื ื ืืขืฉืืจืื ืืืืจืื ืื ืืื ืืืขืฅ ืืจืืื ืชืืืืืช ืืืืจืืขื ืืฉืืจ ืืฆื"ื ืืืืจืืื ื ืืืืืื ืืืืื ืืืจืื. ืืขืช, ืืื ืืืกื ืืช ืืืจืช ืงืจืืืืงื ืืืคืืงื ืื ืืืื ืืฉืืจืื
ืขื"ื ืืืก ืชืื ืื ืืืจืื ืื ืืฉืื ืคืื ืงื ืืืจืืื ืืช ืืืจืื ืืืจ ("ื") ืืฉืืื ืขื ื ืืืื ืืฉืืจืื ืืจืืช ืืืืื ื ืืืืจืืขื ืืฉืืจ ืกืืืืจ ืืกืืจืืื. ืฉืืืื ืืื ืช ืกืืืืจ-ืืื ืืช ืขื ืืื ื ืืขืืืงื ืฉื ืืื ืืขืื ืืื ืืฉืืื, ืืืชืจืื ืืช ืืืคืืืขืืืืช ืฉื ืืืจืื
He is known as "D" from his years in the IDF. For the past two decades, he has advised on and coordinated responses to crisis events within the IDF and other national security organizations.Now, he co-founded ๐๐ฅ๐๐ง๐๐๐๐ ๐๐ ๐ฃ๐๐๐ง crisis management firm.
Adv. Hadas Tamam Ben-Avraham and Nachshon Pincu host Doron Hadar ("D") in a conversation on crisis management at the country level and commercial cyber crisis events.
Combine cyber-technical defense with a thorough understanding of the adversary's human motivations, advantages, and vulnerabilities.
-
ืื.ืืื ืืื ื ืืืจ ืืืฉ ืืงืืื ืฉื ืื ืจืืืช ืชืืช ืฉืืืช ืฉืื ืื ืืืื ืจืฉืชืืช ื ืืืจืื ืื ืืืืืื. ืขืืื ืืืืืข ืขืืจ ืืืืื ืืืฉืจ ืืื ืืืื ืืืืื ืฆืื ืืืืืืืชืืช ืืคืื ืื ืืืช ืืืื ืืืื ืืฉื ืืฆืืืืจ ืืชืืืื ืขื ืฆ'ืื ื'ื.ืคื.ืื ืืืืืจืื ืืขืจืืืช ืจืืืช ื ืืกืคืืช.
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืืื ืงืืืืจืืืกืงื ืขืชืืื, ืืืงืจ ืืจื ืืื ืืื ืืืืืื ืืืจืฆื ืกืืืืจ ืืืงืืืืช ืืื ื ืืฉืืื ืขื ืืืฉืคืขืืช ืฉื ืื.ืื. ืืขืืื ืืกืืืืจ.
ืืื ืืจืื ืขืืื ืืื ืช ืืกืืืืจ ืืขืชืื ืืื ืจืืืง
ืืืฉืคืขืืช ืฉื ืืื.ืืื. ืขื ืืงืฆืืขืืช ืืกืืืืจ ืืืืฉืจืช ืืืืื ืกืืืืจ
ืืขืื
AI is not new and has existed for many years under different names, such as neural networks. The world of information went through a shake-up when artificial intelligence tools became the common domain and were initially made available to the public with Chat GPT, followed by many other systems.
Nachshon Pincu hosts Hillel Koborovsky, a futurist, researcher of technological trends, and cyber lecturer at Ono Academy, in a conversation about the effects of AI in the cyber world.
What will the world of cyber defense look like soon
The effects of AI on the cyber professions and the training of cyber experts
and more
-
ืืืคืื ืจืืื ืฉืืื ื ืืืืืื ืืืจืฉืืช ืืขืฆืื ืกืืกื ืืืฉืจื ืืืื ืคืื ืื ืืืืคืฆืื ืฉื ืกืืกื ืืก ืืกืจืืืืก.
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืื ื ืจืฉืฃ ืืกืืกื ืฉื ืืืงืืจื, ืืืืงื ืืจืืืกืืื ืืืืืืืื ืืื ืฉืืจ ืืืืจืื ืฉืืื ืขืืฉื ืืฉืืื ืขื ืืืฉืืขืืช ืฉื ืกืืกื ืืก ืืกืจืืืก, ืืืืื ืืื ืกืืกื ืืก ืืกืจืืืก ืืืขืืฅ ืกืืืืจ. ืืื ืืื ืื ืืช ืืชืคืงืื ืขื ืื ืช ืฉืืืื ืืคืงืืืื? ืืืฉืืืืช ืฉื ืกืงืจื ืกืืืืจ, ืชืืื ืืช ืขืืืื ืืืืืงืืช ืืืืจืืช ืืืจืืื. ืืื ืืืืืืช ืืืืจื ืฉื ืืกืืกื ืืืฉืจ ืืื ืืื ื ืืืง ืืื ืืืจืื ืืฉืืจืช ืื ืืืื
Many organizations that cannot afford a full-time CISO use the Ciso as a Service (CaaS) option.
Nachshon Pincu hosts Toni Reshef, serving as a contract Ciso for @Electra group, Medical EarlySign, and Uvision, among other things she does in a conversation about the meaning of CaaS, the difference between CaaS and cyber consulting.
How do you build the CaaS position to be effective?
What is the importance of cyber surveys, Cyber plans, and penetration tests (PT) for organizations?
What are the limits of the CaaS when it is not an integral part of the management avenue?
-
ืืืจืช ืืืืืืืื ืืืฆืืช ืืช ืขืฆืื ืืื ืขืืืื ืืคืจื ืกื ืงืืืขื
ืจืืฆื ืืืืื ืก ืืืืืืง ืื ืืื ืชืืื ืืืจ ืื'ืื ืืืจ
ืจืืฆื ืืืืืืฃ ืืงืื ืขืืืื ืืกืื ืืืจ
ืจืืฆื ืืขืฉืืช ืฉืื ืื ืืืืื ืืงืจืืืจื ืฉืื ืกืืจืช ืืคืืืงืืกืืื ืืื ื ืืขืื ืขืืืจื
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืคื ื ืืจ-ืืื ืื ืืืช ืงืฉืจื ืืืืืง ืืงืจืื ืืืงืืืืช ืืื ื ืืื ืืืช ืืืืงืช ืืืืกืื ืืขืืจื. ืืชืคืงืืื ืื ืืืื ืืคื ื ืืกืืืขืช ืืกืืืื ืืื ืืืืืื ืืืฆืืืช ืขืืืื. ืืคืืืืกื ืืืื ืกืืื ืืฆืืืช ืขืืืื, ืื ืืืช ืืกืืจืืืื ืืืฆืืืช ืขืืืื ืืืื ืืื ืื ื ืืื ืงืืจืืช ืืืื.
-
ืืื ืืขืืืื ืฉืืืฆืขืชื ืืืืงื ืืืืจืืช ืืชืืงื ืชื ืืืงืืืื ืืืืจืช ืฉืืชื ืืืื ืื? ืืื ืกืคืง ืฉืืชื ืืืชืจ ืืืื ืื ืืื ืฉืืืชื ืืคื ื, ืืื ื ืืจืฉ ืืขืจืื ืืช ืืืืงื ืืืืืจืืช ืืืืค ืืื ืืืืื ืฉืื ื ืคืชืื ืคืจืฆืืช ืืืฉืืช ืืื ืืืืืง ืืืืจืื
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืืฉืจ ืขืฉืืจ ืฉืืชืฃ ืืื ื"ื ืืืืืช ืืกืืืืจ ืืืืื ืืืืืื ืืืืจืืื ืืฉืจืื, ืืืช ืืฉืชืืื ืขืฉืจื ืืืจืืช ืจืืืืช ืืืฉืืื ืืืืืืืช ืืขืืื. ืืฉืืื ืขื ืืืืงื ืืืืจืืช, ืืืืื ืืื ืืืื ืืืืืืืื ืืืืืง ืื ืืฉื ืืขืื
Does the fact that you performed penetration tests and corrected defects mean that you are protected? You are undoubtedly more protected than before, but conducting the penetration tests in a loop is necessary to ensure that no new loopholes have opened since the last test.
Nachshon Pincu hosts Osher Asor, partner and CEO of Cyber Security & Tech Division @Auren Israel, one of the twelve largest accounting firms in the world. In a conversation about penetration tests, the difference between automated tools and human testing, and more.
-
ืชืืื ืืื ืช ืืกืืืืจ ืขื ืืขืจืืืช ืืืืืื (ืืขืจืืืช ืกืืืืจ ืคืืืืืช) ืขืืกืง ืืืื ื ืขื ืืขืจืืืช ืฉืืืจื ืืื ืืืืกืกืืช ืขื ืืขืจืืืช ืืคืขืื ืืชืืื ื ืืฉืืืืืช ืืคืืจืืืืจ ืืฆืืืฆื ืืื, ืืืืื ืืืืช ืืืืฉืืจืื ืืืคืืืจืื ืืขืืื ืืืืข ืืขืฉืจืืช ืืืฃ ืืืืช ืืืืืื ื ืืืืืืช. ืขืืืื ืื ืืฉืืฉืช ืชืืงืคืื ืืืฆืืจืช ืืชืงืคืืช ืืกืืืืืช ืขื ืืืจืืช ืข"ื ืฉืืืืฉ ืื ืืื ื ืืืืืืื ื ืืขืจืืืช ืืืืืื. ืืฆืืจื ืืื ืืืคืื ืืขืืจ ืืืจืืช ืืชืงืฉืืจืช ืืืืืืืช ืืืจื"ื ืื ืฉืืืื ืืื ืืืืืช ืืชื ืฉืืจืืชืืื ืืืงืืืืช ืื ืืชืืง ืืืืจืื ืฉืืืื ืืชืงืฉืืจืช
ืขื ืืชืจืืืืช ืืจืืืืฆืื ืืชืืื ืืืืจืืฉื ืืืฆืจื ืื ืืืืืืข ืืขืจืืืช ืืื ื ืืชืื ืืืืฆืจืื ื ืืฉื ืืื ืช ืืขืจืืืช ืกืืืืจ ืคืืืืืช ืชืืคืก ืชืืืฆื. ืืืจืช ืฆ'ืง ืคืืื ื ืืืืชื ืืืจืืฉืื ืืช ืืืืืช ืืช ืืฆืืจื ืืืชื ืืขื ื ืืืืฆืจื ืื.ืื.ืื ืืืจ ืืขืฉืืจ ืืงืืื
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืืจื ืืืคืืจ ืืืจืงืืืจืืช ืคืืชืื ืืฆ'ืง ืคืืื ื ืฉืืฆืืืชืื ืฉืื ืืกืืืขืื ืืืืจืืช ืืืืืฆืจืืช ืืขืจืืืช ืคืืืืืช ืืืืืื ืืช ืืืืืช ืืกืืืืจ ืืืืฆืจืืื, ืืฉืืื ืขื ืืฆืืจื, ืืืจืืฉื ืืืืืจืช ืฉื ืืจืืืืืืจืื ืืืื ืืช ืืฉืืขืืชืืืช ืืขื ืืื ืฉืื ื ืืืื ื ืืกืืืืจ ืคืืืืช ืืืขืืื ืืืืืจ ืฉื ืืื.ืื
Cyber protection for embedded and cyber-physical systems (CPS) revolves around securing systems that typically rely on operating systems and software integrated into limited firmware. On the other hand, the number of devices scattered worldwide reaches tens of millions and, in some cases, even hundreds of millions of units. Unfortunately, attackers exploit this vast network to orchestrate massive attacks on companies, simultaneously leveraging millions of compromised systems. In the past, such coordinated attacks have disrupted major communication companies in the US, leading to service outages for customers and disconnections in entire regions.
As regulations expand within this domain, manufacturers face increasing pressure to implement robust protection mechanisms in their products. The issue of safeguarding CPS has gained momentum, and companies like Check Point have been at the forefront. Check Point recognized the need for solutions tailored to IoT products as early as the previous decade.
Nachshon Pincu hosts Miri Ofir, Director of R&D at Check Point, who illuminates the urgency of robust protections. Her teams work closely with companies that produce physical systems, fortifying their products against cyber threats. This discussion delves into regulators' evolving demands, emphasizing the unique challenges of CPS protection compared to the familiar landscape of traditional IT security.
-
ืขืืื ืืกืืืืจ ืืืื ืืืชืจืื, ืืืชืจ ืืืืชืจ ืจืืืืฆืืืช ืื ืืฉืืื ืืื ื ืืจืฉืื ืื ืืืื ืืงืืช ืืืืืืช ืฉืืืื ืืื ืืฉืคืขืืช ืืืืื ืืจืื, ืืื ืืชืืืืืื ืืื ืฆืจืื ืืขืฉืืช ืขื ืื ืช ืืืืื ืฉื ื ืงืื ืืฆืขืืื ืื ืืื ืื?
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืขื"ื ืจืื ืชืื ืื'ืงื ืืืื ืืืืืื ืชืืื ืืช ืืชืืืจ ืฉื ื ืืกืืืืจ ืคืืจื ืืืงื ืืงืจืื ืืืงืืืืช ืืื ื, ืืฉืืื ืขื ืืฆืืจื ืืืืฉืืืืช ืฉื ืื ืืืื ืืืืื ืกืืืืจ ืื ืื ืื ืื ืืจืื ืขืืกืืงื.
The cyber-world is expanding, more and more regulations and issues require managers to make decisions that will have long-term effects. How do you cope, and what should be done to ensure that the proper steps have been taken?
Nachshon Pincu hosts attorney Rami Tamm and Jackie Altal, leaders of a master's degree program in cyber forensics at the Ono Academic College, in a conversation about the need and importance of managers to understand cyber even if it is not their focus.
-
ืขื"ื ืืืก ืชืื ืื-ืืืจืื ืจืืฉ ืืืืื ืืืืงืจ ืกืืืื ื ืกืืืืจ ืืืืื ืงืืืืจืืืกืงื ืืจืฆื ืกืืืืจ ืฉื ืืื ืืืืงืืืืช ืืื ื, ืืฉืืื ืขื ืืื"ื ืืืืฉ ืฉืคืืจืกื ืืืคืจืื 2024: ืืขืจืืช ืืขืืืช ืืืืืืืช ืืืื ืชืงืืคืืช ืกืืืืจ ืืืฉืจืื
Adv. Hadas Tamam Ben-Avraham, the Head of Cyber Risks Research Institute & Vice Dean at Ono Academic College, and Hillel Kobrovski, a Senior Lecturer for Cyber security at the College, in a conversation about The new report from April 2024 on the economic damage estimate from cyber attacks in Israel.
-
ืืืืื ืจ ืื ืืฉื ื ืืืื ืืฉืืจ ืืืืืจ ืืชืขืฉืืืชื ืืื ืืืืชื ืฉื ืืืื ื ืืื ืืืืจืช ืงืื ืืื ืืฉืชืชืคืื:
ืืืืช ืืืกืจ - ืื ื"ืืืช ืืืฉ ืค.ืง
ืืกืืื ืื ืืืฉ - ืื ืืืช ืกืืืื ื ืกืืืืจ ืขืืืื ืฉื ืืื ืืืืืื ืชืคืขืืืืช ืืืืฉื ืืช ืืื.ืกื.ืื ืืฉืขืืจ ืืืืืงืืื ืืืฉืจืื
ืืืกื ืฉืืื - ืจืืฉ ืืืืืช ืกืืืืจ ืืชืขืฉืืื ืืืฉืจื ืืืื ืช ืืกืืืื
ื ืืฉืื ืคืื ืงื - ืกืืืืจ ืืืื ืืืืกื ืืกืื ื"ื ืืืืจ ืืืขืืฅ ื ืืืืง ืกืืืืจ ืกืงืืืจืื ืืข"ื
-
ืคืจืง ืืืืื ืืฉืืชืืฃ ืขื ืืคืืืงืกื "ืืื ืกืืืืจ!?"
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืื ืืช ืืืืืืืฅ-ืฉืื ืืืืืกืืช ืฉื ืืืจืช ืืืคื ืืงืืจืืช ืืืืืืืืืช, ืืืืืืช ืืคืืืงืืกื ืืืฆืืืื "ืืื ืกืืืืจ!?". ืืฉืืื ืขื ืื ืืื ืคืืจื ืืืงื ืืืืืืืืช (ืื ืจืื ืื ืื ืฉืืฉืืชื), ืืื ืืืืืจ ืืืจืช ืืขื ื ืืืืจืืข ืกืืืืจ, ืืฉืืืืช ืืืืืืืื ืืืืืงืืช ืืืจื ืืืืืื ืืืืคื ืฉืืืฃ. ืืขืื
A special episode in collaboration with the podcast "Why Cyber!?"
Nachshon Pincu hosts Danit Leybovich-Shati, Alfa Forensics Digital Evidence's founder and the excellent "Why Cyber!?" podcast host. In a conversation about what digital forensics is (probably not what you thought), how to choose a response company for a cyber incident, and backup, backup, backup, and backup tests on an ongoing basis.
-
ืคืจืง ืืืืื ืืฉืืชืืฃ ืขื ืืคืืืงืกื ืืื ืกืืืืจ?! ืื ืืช ืืืืืืืฅ-ืฉืื ืื ืืฉืื ืคืื ืงื ืืืจืืื ืืช ืชืืืื ืฉืืืจืฅ ืืืืฉืืืจ, ืขืืืช ืืืืจื ืืืืื ืืืฉืจืืื ืืืืืงืจืืื ืืจืืฉ ืชืื ืืช ืืืืงืจืืื ืืขืืื ืืืืืข, ืืฉืืื ืขื ืขืืื ื"ืคืืืืืื" ืืืืฉ (ืคืืื ืคืืืก ืืืืืืื) ืืกืืืื ื ืืกืืืืจ ืฉืื. ืืืืข ืืฉืจืื ืขืืืืช ืืืืืจื ืืืื ืืช ืืืขืจื ืขื ืืืขืืจ ืจืืืืฆืืืช ืกืืืืจ ืืคืจืืืืช? ืืขืื
A special co-created episode with Why Cyber?! Podcast Danit Leybovich-Shati and Nachshon Pincu host Tehilla Shwartz Altshuler, a Senior Fellow at Israel Democracy Institute and head of the Democracy in the Information Age program, In a conversation about the new โPhygitalโ (physical plus digital) world and its cyber risks. Why is Israel behind the Western countries with a lack of cyber regulations? And More
-
ืืื ืก ืืฉื ืชื 2024 ืฉื ืงืืืฆืช ืืื ืื ืกืืื ืืืืื ืืืง ืืืง ืฉืืืฉื: ืจืืืืช
ืืืื ืืืจืืช ืืืืืืื ืืืืจื ืื ืืื ืฉื ืืกืืืืจ ืื ืืืื ืฉืืจื. ืืจืืืืช ืืืชื ื ืืฉืืืฃ ืืืืืืืช ืขืื ืืขืื
ืื ืื: ื ืืฉืื ืคืื ืงื - ืืืื ืืืืกื ืกืืืืจ ืกืื ื"ื ืืืืจ ืืืขืืฅ ืืฉืจืืชื ืืืืืื ืื ืืืืง ืกืืืืจ ืกืงืืืจืื ืืข"ื.
ืืฉืชืชืคืื: ืืืืืืช ืงืืืืจ: ืกืืกื ืืื.ืคื.ืื - ืืฉืจืืชื ืืจืืืืช ืืืืืช
ืืขืจื ืืืื: ืกืืกื โ ืืืืื ืืืจื ืืืืืื
ืืืืจ ืืจื: ืกืืกื - ืชื ืืื
ืขืจื ืคืื: ืืืจืงืืืจ ืืขืจืืืช ืืืืข ืืืืืื โ ื ื ื ืืืื ืฉื
ืจืื ื ืจืืืืื - ืืืืกื ืฉืืชืฃ ืืื ื"ื ืืื ืื ืกืืื ืืืืื
Intensity Global Group's 2024 Annual Conference Part Three: The Defender's View Despite the Iranian threats, cyberpeople have an ordinary routine: vigilance, waiting, and honing their skills repeatedly.
Moderator:
Nachshon Pincu - cyber evangelist, SVP @Niatech Cyber Security Participants:
Avivit Kotler: CISO & DPO at Clalit Health Services
Yaara Lavon: CISO at Ayalon insurance company
Amir Arad: CISO & Director of Cyber Security at Tnuva
Eran Peled: Global IT Director at Nano Dimension
Roni Roytman - Co-founder & CEO at Intensity Global
-
ืืื ืก ืืฉื ืชื 2024 ืฉื ืงืืืฆืช ืืื ืื ืกืืื ืืืืื ืืืง ืืืง ืฉื ื: ืจืืืืช ืืชืืงืฃ
ืื ืื: ื ืืฉืื ืคืื ืงื - ืืืื ืืืืกื ืกืืืืจ ืกืื ื"ื ืืืืจ ืืืขืืฅ ืืฉืจืืชื ืืืืืื ืื ืืืืง ืกืืืืจ ืกืงืืืจืื ืืข"ื.
ืืฉืชืชืคืื:
ืืืืจืื (ืืื) ืืกืื - ืกืื ื"ื CISO ื ICL Group
ืื ืืืจืื - CISO ืืืืจืช ืืฉืื ืืืฉืจืื
ื ืืจ ืฆ'ืจื ืื - ืืฉืขืืจ CISO ื 8200 ืืืืื ืคืจืก ืืืืื ืืฉืจืื
ืื ืืื ืกืืืืกื - ืืฉืขืืจ ืจืืฉ ืืืืจ ืืืื ืืืื ืืืืืืช ืืกืืืืจ
ืจืื ื ืจืืืืื - ืืืืกื ืฉืืชืฃ ืืื ื"ื ืืื ืื ืกืืื ืืืืื
Intensity Global Group's 2024 Annual Conference Part 2: The Cyber Attacker View
Moderator: Nachshon Pincu - cyber evangelist, SVP @Niatech Cyber Security
Participants:
Alberto (Deto) Hasson - VP CISO @ICL Group
Chen Girat - CISO @Israel Electricity Company (IEC)
Nir Chernov - former CISO @IDF 8200 and winner of the Israel Security Award
Daniel Suissa - former head of the Rad heat section @IDF cyber division
Roni Roytman - Co-founder and CEO of Intensity Global
-
ืืื ืก ืืฉื ืชื 2024 ืฉื ืงืืืฆืช ืืื ืื ืกืืื ืืืืื ืืืง ืจืืฉืื: ืืจืฆืื ืฉื ืืืืกื ืฉืืชืฃ ืืื ื"ื ืืืืจื ืจืื ื ืจืืืืื ืขื ืืขืืื ืืืื ืืืชืงืคืืช ืกืืืืจ ืขื ืืฉืจืื ืืื ืจืง, ืืชืืืืืืช, ื ืืืื ืืจืืข ืกืืืืจ ืืื ืืืจื ืื ืืื ื ืืืืืจ ืืืืคืขืื ืืืจืช IR
The 2024 annual conference of the Intensity Global Group, part one: a lecture by the company's co-founder and CEO Roni Roytman on the sharp increase in cyber attacks on Israel and not only. Dealing with it, managing a cyber event and what is the right way to choose and operate an IR company
-
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ืืืื ืงืจืืกืื ืื ื"ื ืืืจืช ืื .ืื.ืืก.ืื. (ืืกืืจืืืืืช ืื"ื) ืื ืฉืืชืืื ืืช ืืจืื ืื ืืฉื ืื ืืชื ืืฆืืืชื ืืืืดื ืืืืื ื ืฉื ืืฉืืช ืจืืฉ ืืืืฉืื ืจืืื ืืืืื ืืืืืจื ืื ืืื ืืืฉื ืืืชื ืืขืืื ืืืฉืืจื ืกืืืืจ ืืืคืชื ืชืืจืช ืืืฉื ืืืชื ืืชืืื ืืงืืืื, ืืฉืืื ืขื ื ืืืื ืื"ื ืืืฆืื ืืฉืืจ ืืืื ืืืฉืืจื ืกืืืืจ ืืคืจื. ืืื ืื ืืืื ืื"ื ืืืื ืืืืจ (ืืื ืฆืื) ืื ืืจืืืช (ืฉืคืช ืืืฃ) ืืช ืืฆื ืืฉื ื ืืขืืืื ืืืืื ืื ื ืืฆื ืืืื ืืื ืืคืฉืจ ืืืกืืง ืืืืืขืืช ืืืชื ืืืื
Nachshon Pincu hosts Moty Cristal, CEO of NEST (negotiation strategies), who started his career as a subject and giver in the Israeli prime minister's office. He is now one of the most senior negotiators in the world and a developer of negotiation theory in an academic field, talking about managing negotiations in crises in general and Cyber in particular. How do you negotiate without speaking (voice tuition) or watching (body language) the other side and still understand who is in front of you and what can be concluded from written messages only?
-
ื ืืฉืื ืคืื ืงื ืืืจื ืืช ื"ืจ ืฆ'ืง ืคืจืืืืื, ืืฉืขืืจ ืกืื ืจืืฉ ืืืืขืฆื ืืืืืืื ืืืืื ืืืืื ืืืงืจ ืืืืจ ืืืืื ืืืืงืจื ืืืืืื ืืืืื, ืืขืงืืืช ืคืจืกืื ืืืงืจื ืืืืจ 231 ืขื ืืืื ืืกืืืืจ ืืืืจื ื, ืืฉืืื ืขื ืืกืืจืืืืืช ืืกืืืืจ ืืืืจื ืืช ืืืื ืืขืืืืช ืืืืื ืืืืืื ืขื ืืืื ืช ืืฉืจืื ืืื ื-7 ืืืืงืืืืจ
Nachshon Pincu hosts Dr. Chuck Freilich, former deputy head of the Israeli National Security Council and currently a senior researcher at the Institute for National Security Studies (NISS), following the publication of his study Memo 231 on the Iranian cyber threat, in a conversation about the Iranian cyber strategy in general and the rise of the immediate danger to the State of Israel since October 7th
- Mostra di più