On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Brendon Marotta is a filmmaker, author, and speaker. He is best known for his feature-length documentary American Circumcision, which appeared on Netflix. He is the author of multiple books, the next of which explores the treatment of children as a social justice issue.
…
continue reading
INTERSECT is a radio interview program that showcases interviews with musicians who were once/or still are prominent Christian music artist, discussing how their encounter with Christ not only influenced the direction and intent of their music, but also the direction and intent of their individual lives. The shows will be interesting, entertaining and inspirational as we learn how these musicians started, their experiences along the way and where they are now as artist and people. Aaron “The ...
…
continue reading

1
Data Intelligence: Breaking Chaos with Kyle DuPont | Ohalo's Innovation in Unstructured Data
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22In this powerful episode, we sit down with Kyle DuPont, CEO and Co-Founder of Ohalo, the trailblazing company reshaping the way organizations understand and manage unstructured data. With deep experience in both finance and technology, including a background at Morgan Stanley, Kyle shares the origin story of Ohalo and how their flagship product, Da…
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
Cyber Battlefield Insights: Lessons in Incident Response and Dark Web Tour
1:03:48
1:03:48
Play later
Play later
Lists
Like
Liked
1:03:48Join host Joshua Nicholson, a seasoned cybersecurity veteran with over 24 years of frontline experience, as he dives deep into the high-stakes world of incident response and takes you on an exclusive dark web tour. In this power-packed episode, Joshua shares real-world lessons learned from handling hundreds of cyber incidents, breaking down the bes…
…
continue reading

1
Job Hunting in 2025: Top 10 Tips to Land Your Next Cybersecurity Role
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47🎙 Episode 34 - Job Hunting: Top 10 Tips to Land the Next One Looking for your next big career move? In this episode of Cyber Security America, we break down the Top 10 Tips to help you navigate the job market and secure your next role with confidence. Whether you're a seasoned cybersecurity professional or just starting out, we’ll cover essential s…
…
continue reading

1
Top 10 GRC Program Tooling for Success - (Build vs. Buy)
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06Top 10 GRC Program Tips – Build vs. Buy with an Amazon Leader! We’re back with another powerful episode featuring one of the top minds at Amazon. In this episode, we dive deep into Governance, Risk, and Compliance (GRC) and explore the Top 10 Tips for GRC Program Success. Should you build your own security governance tools or buy them off the shelf…
…
continue reading

1
Zero Trust in the Middle East: Navigating Cybersecurity Challenges & Opportunities
54:02
54:02
Play later
Play later
Lists
Like
Liked
54:02Welcome to Episode 32 of our podcast, where we explore the evolving landscape of cybersecurity in the Middle East. In this installment, we delve into the complexities of implementing Zero Trust in the region, focusing on the challenges and opportunities foreign companies face while adopting this vital framework. Zero Trust is more than a buzzword—i…
…
continue reading

1
Cyber Battlefield Insights: Identifying Critical Shifts & Errors Leading to Intrusions
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00Episode 31, Welcome to season two of the Cyber Security America podcast. In this episode, we explore the evolving landscape of cloud security, focusing on critical considerations for organizations migrating to Office 365 and Azure AD. Stay tuned as we unravel essential strategies and insights to bolster your security posture in the cloud. In tradit…
…
continue reading

1
Benjamin Gregg on Human Rights, Social Constructs, and Genetic Engineering (#44)
1:52:55
1:52:55
Play later
Play later
Lists
Like
Liked
1:52:55Send us a text Are human rights a social construct? Professor Benjamin Gregg, author of Human Rights as Social Construction and Creating Human Nature: The Political Challenges of Genetic Engineering, argues they are, but thinking of human rights as a social construct strengthens them. In this in-person discussion, we explore how political communiti…
…
continue reading

1
Attachment Parenting with Barbara Nicholson and Lysa Parker (#43)
1:23:00
1:23:00
Play later
Play later
Lists
Like
Liked
1:23:00Send us a text Attachment Parenting International (API) co-founders Barbara Nicholson and Lysa Parker discuss attachment parenting and their book Attached at the Heart: Eight Principles for Raising Connected and Compassionate Children. We talk about parenting multiple children at the same time, finding support as parents, and how to ensure your chi…
…
continue reading

1
Governor Pat McCory: Cyber Challenges in Government
1:03:53
1:03:53
Play later
Play later
Lists
Like
Liked
1:03:53Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local go…
…
continue reading

1
Joshua Lisec on Writing 92 Books, No-Nuance Persuasion, and Defeating Communism (#42)
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02Send us a text Joshua Lisec is the ghostwriter of over 92 books. Under his own name, he has written So Good They Call You a Fake and the upcoming book Unhumans. In this episode, Joshua shares bold critiques of the publishing industry, fitness and diet propaganda, and communist revolutions. We talk about the challenges of nuance in marketing, findin…
…
continue reading

1
Protect Hasidic Jewish Children with Yochanan Lowen (#41)
1:43:52
1:43:52
Play later
Play later
Lists
Like
Liked
1:43:52Send us a text After a Hasidic Jewish upbringing, Yochanan Lowen sued the Canadian government, arguing that his religious education failed to teach him basic information needed to succeed in the world. His story and lawsuit are profiled in the documentary I Want To Know. We talk about his journey, including the abuse he endured, the change he respo…
…
continue reading

1
Zero-Trust Paradigm: Secure Browsing Technology - Conceal.io
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:36Welcome to the Cyber Security America show, a platform for exploring the dynamic and ever-evolving world of cybersecurity and information technology. In episode 17, we delve deep into the topic of zero trust, a security model that assumes all users, devices, and applications are potentially hostile, and requires strict access controls and verificat…
…
continue reading

1
Artificial Intelligence: Cyber AI is the new Tesla of Security
57:42
57:42
Play later
Play later
Lists
Like
Liked
57:42Welcome to our podcast, where we explore the fascinating world of generative AI and its profound impact on various fields. Join us as we delve into the intricate details of different models designed for specific tasks, such as text generation, native speech processing, and image/video generation. We also address the pressing concerns surrounding pr…
…
continue reading

1
Cloud Security: AWS Essentials, Challenges, Best Practices
1:00:40
1:00:40
Play later
Play later
Lists
Like
Liked
1:00:40Welcome to another episode of Cyber Security America with your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/). In this episode, we delve into the world of cloud computing and its impact on cybersecurity. We explore the major cloud platforms such as AWS, Azure, and GCP, along with their deployment and service models. Discover …
…
continue reading

1
Cybersecurity Training: A 101st Airborne Veteran's Journey
55:22
55:22
Play later
Play later
Lists
Like
Liked
55:22In episode 29, host Joshua Nicholson welcomes Dennis Kraft, a Penn State graduate and former United States Army Captain who served with the 101st Airborne Division Air Assault in Afghanistan from 2010 to 2011. After his military service, Dennis transitioned to a career in cybersecurity, working for the Department of Veterans Affairs, the Department…
…
continue reading

1
Securing E-Learning in a New World: Spoilage & Deepfakes
1:01:13
1:01:13
Play later
Play later
Lists
Like
Liked
1:01:13Welcome to episode 28 of the Cyber Security America podcast with your host Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/). He is excited to welcome Dayle Alsbury (https://www.linkedin.com/in/daylealsbury/), a distinguished cybersecurity expert with over two decades of experience in information security. Dayle has led diverse glo…
…
continue reading

1
Measuring Cybersecurity Risks: The Relevance of GRC
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04Welcome to our latest podcast episode (Episode 27), where Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/) embarks on an insightful journey through the dynamic world of #cybersecurity. Our distinguished guest, Joshua Copeland, brings his battle-tested expertise and extensive experience to the forefront. As the Director of Cyber at…
…
continue reading

1
Operational Threat Intelligence: How does that work?
1:00:14
1:00:14
Play later
Play later
Lists
Like
Liked
1:00:14Welcome to the 26th episode of How do you managed an operational threat intelligence program? In this installment, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/) traverses the realms of business, technology, and those often-unnoticed opportunities that slip through the cracks. Today, our spotlight turns towards a paramount facet th…
…
continue reading

1
Cybersecurity in the Middle East: Operations Challenges & Threats
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09Welcome to Episode 25 of the podcast, where we dive deep into the intriguing world of cybersecurity in the Middle East. In this installment, we're exploring the unique operational challenges faced by foreign companies operating in the region. Join us as we uncover the threats, risks, and intricate dynamics of this operating environment. Building up…
…
continue reading

1
Protecting Your Child From CPS And Child Abuse Pediatricians With Beth Maloney (#40)
1:40:17
1:40:17
Play later
Play later
Lists
Like
Liked
1:40:17Send us a text Beth Maloney, author of Protecting Your Child from the Child Protection System, shows how innocent parents can handle wrongful accusations from the child protection system and reveals how a mere trip to the doctor can start a legal nightmare. In this episode, we discuss the alarming rise of child abuse pediatricians who can accuse pa…
…
continue reading

1
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities
59:53
59:53
Play later
Play later
Lists
Like
Liked
59:53Welcome to **Cyber Security America**, your ultimate hub for all things cybersecurity in the digital era. I'm your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/), and today we're delving deep into the realm of cutting-edge cyber security managed and consulting services. Get ready to uncover groundbreaking strategies that are …
…
continue reading

1
Building a Cybersecurity Career: The Journey to CISO, Part II
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50Welcome to Episode 23 of Cyber Security America, where we delve deeper into the world of cybersecurity careers in part 2 of our special series, Building a Cybersecurity Career: The Journey to CISO. In this episode, we are honored to host two remarkable guests who have risen to the prestigious position of Chief Information Security Officer (CISO) in…
…
continue reading

1
Ransomware Attacks: Best Practices for Defense & Response
58:13
58:13
Play later
Play later
Lists
Like
Liked
58:13In the 14th episode of Cyber Security America, we explore one of the most devastating threats that small and large business face today. Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. In recent years…
…
continue reading

1
Security Operations: Adapting SOC Delivery to Threat Actors
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19At the center of your cyber security universe is the Security Operations Center (SOC). This is supposed to be part of your 24/7 Managed Detection & Response (MDR) capability. But how do you know if your security operations team is running in a mature and highly capable manner. This is where the rubber meets the road when identifying and respond to …
…
continue reading

1
Gabriel Hannans on Parenting, Play, and Connecting With Your Children (#39)
1:08:30
1:08:30
Play later
Play later
Lists
Like
Liked
1:08:30Send us a text Drawing from his background in theatre and improv, Gabriel shares his insights into entering a child's world through play. We discuss the difference between different styles of parenting, including peaceful and authoritative parenting, how to connect with neurodivergent children, and what you can do to become a better parent. Timesta…
…
continue reading

1
Cyber Supply Risk Management: Defense Strategy Best Practices
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44In today's hyper-connected world, no organization can tackle computer threats alone using just their own people, processes, and technology. A successful Chief Information Security Officer (CISO) or Director of Security Operations needs to engage and leverage technology vendors, strategic integrators, and consulting partners to accomplish their miss…
…
continue reading

1
Thought Leadership: Bruce Schneier on "A Hacker's Mind"
55:12
55:12
Play later
Play later
Lists
Like
Liked
55:12Welcome to Cyber Security America, the podcast where we delve deep into the world of cybersecurity and provide insights on past trends, current challenges, and areas for improvement. Our goal is to help you stay informed and prepared for the next cyber threat. In this episode, we have a very special guest, Bruce Schneier, an internationally renowne…
…
continue reading

1
Anthony Blood on Foreskin Restoration, Social Media Activism, and Healing (#38)
2:16:50
2:16:50
Play later
Play later
Lists
Like
Liked
2:16:50Send us a text Anthony Blood is a social media activist using Tik Tok to share the good news about foreskin restoration. In this episode, we explore various platforms where intactivist communities exist, we discuss the potential of modern regenerative medicine to restore the foreskin, and explore the healing process, including useful tools for heal…
…
continue reading

1
Cybersecurity Solutions: Innovative cutting edge problem-solving
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55Welcome to today's episode! In contrast to our previous discussions on #artificialintelligence, #cloudsecurity, and #burnout, we are taking a different approach today. We have the pleasure of hosting two remarkable CEOs from cybersecurity technology companies. These individuals are at the forefront of driving innovative solutions to tackle the most…
…
continue reading

1
Artificial Intelligence: Automating SOC Workflows - Salem Cyber
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.com/learn/) Cyber Threat Intelligence (CTI) desk and the latest in cybersecurity innovation with Salem Cyber. Prepare for an informative and engaging discussion! #malware #information…
…
continue reading

1
Joe Speredon on Men's Circles and Living From Authentic Masculinity (#37)
1:13:51
1:13:51
Play later
Play later
Lists
Like
Liked
1:13:51Send us a text Joe Speredon speaks on the transformative power of men's circles, and shares how he responded to a personal crisis by joining Sacred Sons, participating in a real-life fight club, and letting go of the masks men wear to embrace his authentic self. We discuss the unique challenges men face, how to set children up for success, and how …
…
continue reading

1
Cybersecurity Burn-Out: How to sustain high performing teams?
57:40
57:40
Play later
Play later
Lists
Like
Liked
57:40There is no doubt that corporate America and our Nation is in desperate need of #cybersecurity analysts and engineers to protect critical infrastructure. For most of the shows on the #CyberSecurityAmerica podcast, we focus on tactical areas of knowledge in order upskill security practitioners in management and executive #leadership. In this episode…
…
continue reading
Send us a text Buy The Gods of AI here. From the creator of The Gods of AI comes a shocking prediction about the future of AI and art. In this episode, Brendon Marotta shares his interest in AI art, predicts how AI will change filmmaking, and explains why he spent two months making over twenty thousand images to tell a story about human consciousne…
…
continue reading

1
Cyber Security Governance: Big Shift at SEC & CISA
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37SEC cybersecurity risk governance rule and its impact on the market. Chris Hetner is the former Cyber Security Advisor to the Chair of the US Securities and Exchange Commission (SEC) and a former Senior Member of the US Department of Treasury Financial Banking Information Infrastructure Committee. He talks about the final process of approving the c…
…
continue reading

1
Lessons from Effective Altruism with Jordan Arel (#35)
1:15:39
1:15:39
Play later
Play later
Lists
Like
Liked
1:15:39Send us a text Jordan Arel discusses effective altruism, a movement that aims to do the most good for sentient beings using reason and evidence. Jordan and Brendon explore strategies EA uses to create social change such as recruiting from elite universities, earn to give, and a reason-based approach to action, and drawn lessons useful for any movem…
…
continue reading

1
Cyber Security Jobs: Demystifying the Various Roles
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Welcome to the Cyber Security America Show, where we dive into the sea of complex technologies and provide real-world context to the world of Cyber Security and Information Technology. In episode 16, we explore the various jobs and roles within the industry, including penetration testers, vulnerability managers, detection analysts, threat hunters, …
…
continue reading

1
Breaking Down CISO Communication Barriers Between CIO and Board
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15Don't forget to like, subscribe, and turn on notifications for future episodes. Welcome to the 13th episode of Cyber Security America, where we delve into the challenges and issues related to managing up and cultivating the complex relationship between the Chief Information Officer (CIO), Chief Information Security Officer (CISO), and the Board of …
…
continue reading

1
James Loewen on Documenting the Movement for Freedom from Medical Tyranny - Part 1 (#33)
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06Send us a text Photographer James Lowen discusses his journey documenting multiple social movements, including early gay rights and transgender activism, Intactivism, anti-lockdown protests, and the detrans movement. He shares insights into his process, the evolution of technology, and his personal growth as an artist. Timestamps: [02:22] How James…
…
continue reading

1
Security Operations: Hybrid SOC Delivery & Maturity
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Tune in to episode 12 of Cyber Security America, airing live on Tuesdays at Noon ET on VoiceAmerica. In this week's discussion, we will continue the conversation from the previous episode and delve deeper into the topic of Security Operations Center (SOC) delivery models. Join Josh and special guest, Mr. Paul Dwyer, as they explore the best practic…
…
continue reading

1
Diversity & Inclusion: Women in Cyber - New Path Forward
56:32
56:32
Play later
Play later
Lists
Like
Liked
56:32The Untold History of Women in Cyber Security. In this new episode, we hear from women who are leading cyber defense teams, developing cutting-edge technology, and driving innovation in the cyber security field. They will share their stories, the challenges they have faced, and how they met them head on. We also discuss how the cyber security indus…
…
continue reading

1
Cyber Risk Management: Identity & Access Mgt (IAM)
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13In the 10th episode of Cyber Security America, we delve into the crucial field of Identity & Access Management (IAM). We discuss how identities, access rights, and permissions all play a crucial role in providing secure access to data and applications across multiple ecosystems. Our guest Rakesh, a cybersecurity leader with over 18 years of experie…
…
continue reading

1
Building a Cybersecurity Career: The Journey to CISO
1:01:38
1:01:38
Play later
Play later
Lists
Like
Liked
1:01:38Join us for the 9th episode of Cyber Security America as we explore the journey of a cybersecurity professional who climbed the ranks from junior Cybersecurity consultant to the coveted position of Chief Information Security Officer (CISO). Our guest, Josh, shares his experience of working as a consultant at EY and ultimately leading the cybersecur…
…
continue reading

1
Cyber Control Testing: New Purple Teaming Revolution
59:15
59:15
Play later
Play later
Lists
Like
Liked
59:15The landscape of cyber security threats is evolving, and with it, so are the methods of penetration testing and control validation. Sophisticated organizations now use a continuous purple-teaming methodology that combines offensive testers (Red Teamers) with Cyber Defenders (Blue Teamers) to identify blind spots in their Detection & Response (D&R) …
…
continue reading

1
Threat Mitigation: Attack Surface Reduction (ASR) paradigm shift
55:00
55:00
Play later
Play later
Lists
Like
Liked
55:00Join us for an engaging and thought-provoking episode of Cyber Security America, as we delve into the crucial topic of The Confusion Between Attack Surface Reduction (ASR) and Vulnerability Management (VM). Our expert guest, Jason Nordquist and Ken Gonzales, share their insights on the current state of cybersecurity and the challenges faced by orga…
…
continue reading

1
Threat Detection & Analytics: Best Practices for Improved Visibility and Response
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Protecting what you don't know about is impossible, and detecting unseen threats is equally challenging. In this episode, we delve into Threat Detection & Analytics, discussing the best practices for structuring a program, utilizing effective tools and techniques, and improving an organization's visibility, threat detection, and response capabiliti…
…
continue reading

1
What Makes A Good Threat Intelligence Program In 2023?
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09In the world of Cyber Security, an essential component needed in the fight is a mature Threat Intelligence program tied to a strong Attack Surface Reduction (ASR) function. In this episode. We explore the world of Cyber Intelligence in the enterprise and in small business environments. We will learn from former military, intelligence, and NSA analy…
…
continue reading

1
2022 Cyber Threats: Security Vulnerabilities & Major Impacts
1:12:55
1:12:55
Play later
Play later
Lists
Like
Liked
1:12:55This year there has been a tsunami of security vulnerabilities and events that have caused major impact to governments and corporations around the world. We will focus on major security threats and how security programs adapted and responded. Real world accounts from cyber–Incident responders and threat analysts on what worked, what didn't, and les…
…
continue reading
Send us a text Recorded during the development of Children's Justice, in this episode I talk about the events that lead to Children's Justice, my reasons for the book, and the process of writing the book. Resources Children's Justice Children's Justice is out now. Get the book here: https://brendonmarotta.com/childrensjustice/ Subscribe and support…
…
continue reading
Send us a text The story of the bestseller that didn't exist. Plus, how to speak genius into reality through magick. Resources Video on I, Libertine: https://youtu.be/W7H5kFGEyUw Children's Justice The Intactivist Guidebook Subscribe and support the show directly: https://brendonmarotta.com/show/ Support the show…
…
continue reading