Who are Nation-State Threats | A Conversation With Brian Contos | Tech Done Different Podcast

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=5fAV9Pqa33s



Category:
Show
Duration: 41:07
14 views
0


Guest: Brian Contos, Board Advisor at Phosphorus [@phosphorus]

On Twitter | https://twitter.com/BrianContos

On LinkedIn | https://www.linkedin.com/in/briancontos/

________________________________

Hosts:

Ben Schmerler

On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ben-schmerler

Ted Harrington

On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

________________________________This Episode’s Sponsors



Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

________________________________

Episode Description

Ted and Ben talk with a Cyber Warfare Specialist, Brian Contos. Brian joins our hosts to discuss how cyber threats have change in his 25 year career and how they have learn to adapt with the times.

You’ll Learn:

- Who owns the security responsibility in a business

- Why xIoT needs to be included in a business' security plan

- What does a nation-state actor look like

- How do threats evolve so quickly

- What consumers can do to protect themselves from these threats

- What business can do to help protect consumers

________________________________For more podcast stories from Tech Done Different With Ted Harrington and Ben Schmerler: https://www.itspmagazine.com/tech-done-different-podcast

Watch the webcast version on-demand on YouTube:

📺 https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwi

ITSPMagazine YouTube Channel:

📺 https://www.youtube.com/@itspmagazine

Be sure to share and subscribe!




Other Videos By ITSPmagazine


2023-08-01Unleashing End-User Productivity Through Secure Browsing: What is the Enterprise Browser?
2023-08-01How to Navigate Compliance vs. Security Conundrum with Ian Hill | Secure Your Strategy Podcast
2023-07-31Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models with Fredrik Heiding
2023-07-27Embracing Diversity in Cybersecurity SquadCon Las Vegas '23 Redefines Inclusion in Infosec Industry
2023-07-26The Art of Building Security Products: Balancing Innovation and User-Friendly Design
2023-07-25Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast
2023-07-22To the Stars, the Algorithms, and Beyond A Human Journey of Self Discovery through Technology
2023-07-21How Artificial Intelligence is revolutionizing search engines & reshaping our access to information
2023-07-21Understand, Manage, Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
2023-07-19A Carbon, a Silicon, and a Cell, walk into a bar... | A Redefining Society Podcast Series
2023-07-19Who are Nation-State Threats | A Conversation With Brian Contos | Tech Done Different Podcast
2023-07-19How to Lead Security in the AI/ML Era with Paul Watts | Secure Your Strategy Podcast
2023-07-19The Art of Networking, Digital Junk & Avoiding The Motivational Trap | Conversation w/ Daniel Okoro
2023-07-18AI, Cyber Warfare, and Beyond: Understanding Cybersecurity's Future | Conversation With Steve Wylie
2023-07-15A day in the life of a Script Supervisor. What is it, what it does, and why it's so important
2023-07-13The Critical Role of Hypersonics for the Future Security of the United States
2023-07-12Implementing Meaningful Information Security Metrics | A Conversation w/ Allie Mellen & Jeff Pollard
2023-07-10Book | The Great Transition: The Personalization of Finance is Here | Guest: Author, Emmanuel Daniel
2023-07-07Introducing Getting Technology Right Podcast With Podcast Host Dr. Kevin Macnish, & Marco Ciappelli
2023-07-06A Conversation with Tom Sorell | Getting Technology Right Podcast With Dr. Kevin Macnish
2023-07-05The Rise of the Transformers | Cyber Cognition Podcast with Hutch