Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Peter Conti Podcasts

show episodes
 
Artwork

1
Ripple Effect

Knowledge at Wharton

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Every day, business scholars answer pressing questions in their research — but what do their insights mean for you? In this podcast, Wharton faculty dive into what inspired their studies and how their findings resonate with the world today. Learn how research insights translate into knowledge you can use, with host Dan Loney. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Real Estate 101

Peter Conti and Paul David Thompson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Meet Peter and Paul, the brains behind Real Estate 101. A former mechanic, Peter is the co-author of Commercial Real Estate Investing For Dummies and is now considered a premier expert in the country on helping every day achieve their commercial real estate dreams. Paul left his corporate director gig ten years ago to invest in real estate full-time and has never looked back. It did not take him long to realize that he could make a huge impact as a mentor and he has spent the last few years ...
  continue reading
 
Artwork

1
Accelerated Real Estate Investor

Accelerated Real Estate Investor Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the Accelerated Investor Podcast with Josh Cantwell. This podcast is the go-to destination for real estate investors both active and passive and multifamily apartment investors both new, intermediate and advanced. The Accelerated Investor Podcast is aimed at multifamily real estate investors looking to retire early and have forever passive income. In each podcast we strive to bring no hype real estate investing education, simple but proven strategies, syndication stories, self-dev ...
  continue reading
 
Artwork

1
Marketing Legends

Matt Leitz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tired of the same old marketing podcasts? Are you ready to learn from the best marketing minds on the planet while making a difference at the same time? Well, look no further, because Marketing Legends is the podcast for you! This ad-free program with host Matt Leitz presents a special opportunity to gain knowledge from the top marketers in the business. Each episode will feature an in-depth interview with a unique marketing legend as they do a deep dive into their own story—both good and ba ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
Peter Conti-Brown is a historian and legal scholar of the Federal Reserve System, and an associate professor at the Wharton School of Business at the University of Pennsylvania. Sean Vanatta is a senior lecturer in financial history and policy at the University of Glasgow. Peter and Sean join the show to discuss their new book titled: Private Finan…
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Sam Schulhofer-Wohl is a senior vice president and the senior advisor to President Lorie Logan of the Federal Reserve Bank of Dallas. Sam returns to the show to discuss recent macroeconomic conferences in the context of changes in the Treasury market and with central bank operating systems around the globe. Check out the transcript for this week’s …
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
A twisting, deeply engrossing investigation into the many lingering questions surrounding the sudden disappearance of the McStays, a family of four who vanished from their suburban San Diego home without a trace—until their skeletal remains were found in the Mojave Desert nearly four years later—from New York Times bestselling author Caitlin Rother…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Andy Levin is an advisor to many central banks around the world and professor of economics at Dartmouth College. Andy returns to the show for a special bonus episode to discuss his pervious appearance and accompanying policy brief where he calls for an independent inspector general at the Federal Reserve. Check out the transcript for this week’s ep…
  continue reading
 
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
FOLLOW-UP TO THE #1 NATIONAL BESTSELLER 22 MURDERS The truth about the deadliest criminal incident in Canadian history has remained untold—until now. Investigative journalist Paul Palango’s 22 Murders examined the April 2020 shooting spree committed by Gabriel Wortman that began in Portapique, Nova Scotia, and ended thirteen and a half hours later …
  continue reading
 
Sign up for the Bitcoin Policy Summit with our special Macro Musings Discount Code! Matthew Pines is the executive director of the Bitcoin Policy institute. Matthew returns to the show to discuss the future of Bitcoin as a strategic reserve, US stablecoin regulation, geopolitics under Trump, monetary policy at the Fed, and much more. Check out the …
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
The inside story of the CIA’s secret mind control project, MKULTRA, using never-before-seen testimony from the perpetrators themselves. Sidney Gottlieb was the CIA’s most cunning chemist. As head of the infamous MKULTRA project, he oversaw an assortment of dangerous―even deadly―experiments. Among them: dosing unwitting strangers with mind-bending d…
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Wharton management professors Harbir Singh and Mike Useem discuss their book Resolute Japan: The Leaders Forging a Corporate Resurgence, which explores how a new model of leadership has transformed Japan's top companies. This episode is part of the “Meet the Authors” series. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
George Selgin is a senior fellow and director emeritus at the Center for Monetary and Financial Alternatives at the Cato Institute, as well as the author of the new book titled False Dawn: The New Deal and the Promise of Recovery, 1933-1947. George returns to the show to discuss the complicated economic history of the Great Depression, how that his…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
On September 6, 1982, convicted murderer Leroy James Chasson made a daring break for freedom from the Massachusetts Correctional Institute-Walpole—one of the most infamous, escape-proof prisons in the country. But this wasn't just any prison break. It was a meticulously planned, five-year effort, made possible by an unlikely accomplice—Kathleen Mac…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play