Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
It Audit Labs Podcasts
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
1
SIM Swap Attacks: How Criminals Steal Your Phone Number
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22What if a criminal could steal your phone number and use it to break into every account you own? That's exactly what happens in a SIM swap attack—and it's more common than you think. In this episode of SipCyber, host Jen Lotze explains how attackers trick mobile carriers into transferring your phone number to their device, bypassing multi-factor au…
…
continue reading
1
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected every major AI model—plus field-tested tech that actually works. In this laid-back Field Notes episode, Joshua Schmidt, Eric Brown, and Nick Mellum return from Gartner's CIO Symposium with insights that'…
…
continue reading
1
Property Fraud: How to Stop Criminals from Stealing Your Home
2:40
2:40
Play later
Play later
Lists
Like
Liked
2:40What if someone could steal your house without ever stepping foot on your property? It happened to Graceland—and it could happen to you. In this episode of SipCyber, host Jen Lotze breaks down the growing threat of property fraud while sipping coffee at the vintage-inspired Maqua Coffee in Roseville, MN. Property fraud isn't just about stolen credi…
…
continue reading
1
Credit Cards vs Debit: Your First Line of Cyber Defense
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22What if your coffee habit could teach you one of the smartest cybersecurity moves for protecting your money? In this episode of SipCyber, host Jen Lotze takes us on a virtual trip to Nomad Coffee Bar in Enfield, Ireland—a dreamy, pink-hued sanctuary—to deliver a financial security tip that every traveler, parent, and online shopper needs to hear. J…
…
continue reading
1
Apple Vision Pro Meets AI: Why Your Company Needs Both
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert—joins hosts Joshua Schmidt and Nick Mellem to reveal how spatial computing and artificial intelligence are colliding to reshape how we work. From conducting million-dollar sales meetings in virtual rea…
…
continue reading
1
The Scary Truth About Default Privacy Settings
3:15
3:15
Play later
Play later
Lists
Like
Liked
3:15Enjoying coffee at a cozy booth in Greenbridge Coffee got me thinking: why don't our social media profiles feel as secure as this space? The uncomfortable truth is that most apps default to "public"—meaning strangers can see your posts, photos, and even your real-time location. In this episode of SipCyber, we're breaking down how to lock down your …
…
continue reading
1
Don't Get Hooked: Recognize Phishing Scams in Seconds
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39What if that urgent email from "Amazon" isn't from Amazon at all? Before you click that link, you need to know what to look for—because phishing scams have gotten scary good, and they're counting on you to act fast without thinking twice. In this episode of SipCyber, host Jen Lotze visits Waystone Coffee in River Falls, WI, to share a simple but po…
…
continue reading
1
Field Notes: Coffee, Gliders & Trademark Scams
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
…
continue reading
1
Keep Your Data Safe With this Public Wi-Fi Tip
3:11
3:11
Play later
Play later
Lists
Like
Liked
3:11Think public Wi-Fi is harmless? Think again. In this episode of SipCyber, host Jen Lotze breaks down exactly why connecting to that coffee shop network is like broadcasting your most sensitive information to everyone around you. Discover why your phone's 5G connection is actually safer than that "free" airport Wi-Fi, and learn the one simple habit …
…
continue reading
1
Perfect Lattes, Perfect Credit Scores, Perfect Targets
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19What happens when you combine the perfect latte with life-changing cybersecurity advice? Welcome to the very first episode of SipCyber! Jennifer Lotze kicks things off at Backstory Coffee Roasters in St. Paul, Minnesota—a hometown hero just three minutes from IT Audit Labs that's roasting beans and building community. But here's the kicker: while y…
…
continue reading
1
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurit…
…
continue reading
1
Welcome to SipCyber: A New Podcast from IT Audit Labs
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25We're thrilled to announce SipCyber, a new podcast presented by IT Audit Labs. Meet Jen Lotze, our newest team member who brings an incredible journey: special education teacher → school district tech leader → Minnesota Cybersecurity State Coordinator → IT Audit Labs. SipCyber is our newest addition to The Audit Podcast family, combining: Coffee sh…
…
continue reading
1
Field Notes: Why Cyber Attacks Are Accelerating
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S. From Nevada's complete state office shutdown to Maryland…
…
continue reading
1
Healthcare Ransomware: When Cyberattacks Turn Deadly
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
…
continue reading
1
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
…
continue reading
1
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI er…
…
continue reading
1
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this mas…
…
continue reading
1
Grassroots Cybersecurity: Protecting Communities Through Education
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey from Chicago to becoming a cybersecurity educator and community advocate. This isn't your typical career advice—it's about fortifying communities through practical security hygiene and hands-on learning.…
…
continue reading
1
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conv…
…
continue reading
1
The Invisible Threats: OT Meets IT in Modern Manufacturing
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
…
continue reading
1
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Traufler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
…
continue reading
1
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a crit…
…
continue reading
1
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
42:21
42:21
Play later
Play later
Lists
Like
Liked
42:21Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro ne…
…
continue reading
1
Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure
33:50
33:50
Play later
Play later
Lists
Like
Liked
33:50Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minnesota. InfraGard is a unique public-private partnership with the FBI designed to protect the 85% of America's essential systems owned by the private sector. From power grids to transportation, the vuln…
…
continue reading
1
The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes
36:42
36:42
Play later
Play later
Lists
Like
Liked
36:42Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of computation, while Quantum Key Distribution (QKD) is making encrypted communications nearly unbreakable. As multiple sectors race to integrate quantu…
…
continue reading
1
Eco-Security: The Intersection of Recycling and Technology
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54What Really Happens to Your Trash? Inside Modern Waste Management Is your trash really being recycled, or is it ending up in a landfill? In this episode of The Audit, we sit down with Trista Martinson, Executive Director at Ramsey Washington Recycling & Energy, to uncover the surprising technology and cybersecurity challenges behind modern waste ma…
…
continue reading
1
SOC Audits Decoded: What Your Business Needs to Know Now!
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit, we sit down with Adam Russell from Schellman to debunk common misconceptions about SOC audits and explore why they’re more than just a checkbox exercise—especially for startups. Adam joins the IT Audit Labs team for a deep dive …
…
continue reading
1
Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this episode of The Audit, we break down how Elon Musk’s unexpected access to FEMA’s sensitive data underscores the critical role of audits in organizational security. We reveal how regular audits and third-part…
…
continue reading
1
Social Engineering Tactics & Defense Strategies with Alethe Denis
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations? In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red team stra…
…
continue reading
1
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton’s global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their insights on us…
…
continue reading
1
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI’s evolving role in combating cyber threats, and the surprising insights data can unveil abou…
…
continue reading
1
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on a deserted island, …
…
continue reading
1
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
38:10
38:10
Play later
Play later
Lists
Like
Liked
38:10From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, fr…
…
continue reading
1
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
54:03
54:03
Play later
Play later
Lists
Like
Liked
54:03In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In This Ep…
…
continue reading
1
AI & Emerging Tech for a Better Future with Marsha Maxwell
59:10
59:10
Play later
Play later
Lists
Like
Liked
59:10In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss …
…
continue reading
1
Building Resilient, Secure Software: Lessons from DevSecOps Experts
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face t…
…
continue reading
1
Real-World Cybersecurity: Need to Know Now Insights from a CISO
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal information security. Eric breaks down essential strategies for protecting your data, starting with freezing your credit, leveraging password managers, and implementing multi-factor authentication. He also…
…
continue reading
1
Safety Science Meets Cybersecurity: Lessons for Risk Management
54:01
54:01
Play later
Play later
Lists
Like
Liked
54:01Discover the vital intersection of safety science and cybersecurity, where human psychology meets technical innovation. In this episode of The Audit, special guest John Benninghoff shares his expertise in safety science and how its principles can improve cybersecurity. From applying safety protocols in the tech industry to enhancing security cultur…
…
continue reading
1
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46In this episode of The Audit, we’re joined by Mick Leach from Abnormal to discuss the evolving landscape of email security and how AI is transforming both the threats and defenses in this space. From QR code phishing to the rise of sophisticated AI-driven attacks, Mick shares insights on how organizations can stay ahead of these challenges, leverag…
…
continue reading
1
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
51:14
51:14
Play later
Play later
Lists
Like
Liked
51:14Stay informed with The Audit, your go-to podcast for the latest in cybersecurity insights, best practices, news and trends. In this month's news episode, we tackle the most significant developments shaping the industry today. We'll cover: The latest insights from CrowdStrike on evolving cybersecurity threats The impact of the Supreme Court ruling o…
…
continue reading
1
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted by Eric Brown and Nick Mellem from IT Audit Labs, we sit down with Melisa Stivaletti, Chair at Epic and OSINT Director at GuideHouse. Melisa shares her remarkable journey from working at the Department …
…
continue reading
1
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
57:55
57:55
Play later
Play later
Lists
Like
Liked
57:55Join us for the July 2024, live news episode of 'The Audit', where we cover the latest cybersecurity threats, ransomware updates, and AI advancements. In this news episode, we tackle some of the most pressing cybersecurity issues of the month. Ever wondered how a ransomware attack could shut down a public library? We dive into the recent attack on …
…
continue reading
1
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit. Hosts Eric Brown and Nick Mellum, joined by Cameron Birkeland, explore the tool's functionalities and features, offering practical insights and real-world applications. Discover how the HAC5 Pineapple can enhance your cybersecurity measures, with discussions on…
…
continue reading
1
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity. In this live episode, we cover the recent ransomware attack on the Seattle Public Library, the $37 million theft from Coinbase Pro users, and the sophisticated gift card fraud by the Moroccan cybercrime group, Storm 0539. W…
…
continue reading
1
Quantum Computing's Impact on Cybersecurity with Bernie Leung
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down comp…
…
continue reading
1
Securing the Invisible Threats: Insights on IoT Security with Eric Johansen
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity with Eric Johansen from Phosphorus. Eric discusses the challenges and solutions for managing IoT devices at scale, the critical importance of asset inventory, and the significant risks posed by outdated…
…
continue reading
1
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
56:09
56:09
Play later
Play later
Lists
Like
Liked
56:09Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we talk cybersecurity, social engineering, and some wild stories that you won't want to miss. We’ll explore the role of tabletop exercises in shoring up a company's security and dive into the fascinating wor…
…
continue reading
1
Building the Future: AI and Cybersecurity in Construction
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Group. John shares his insights on integrating technology to enhance cybersecurity and operational efficiency within the construction sector. The discussion covers a range of topics from combatting sophis…
…
continue reading
1
Cybersecurity News: Water Systems & IoT Devices Under Threat
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT security standards. In this episode, our team of cybersecurity experts, Eric Brown and Nick Mellum, dissect the Biden administration's recent warnings about cyber-attacks on U.S. water utilities and delve into…
…
continue reading
1
Phishing: The Number 1 Social Engineering Tactic with James Arndt
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybersecurity. Join us as Jamie Arndt, a cybersecurity expert with extensive experience in reverse engineering and analyzing malicious emails, shares his insights and stories from the front lines. We’ll c…
…
continue reading