Artwork

コンテンツは Mary Baird によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Mary Baird またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal
Player FM -ポッドキャストアプリ
Player FMアプリでオフラインにしPlayer FMう!

356: How to be cybersecurity smart to AI threats - with Richard Hollis

50:17
 
シェア
 

Manage episode 436404066 series 2451791
コンテンツは Mary Baird によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Mary Baird またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

We’ve been talking a lot about AI (artificial intelligence) this season… And I feel now is an important time to talk about cybersecurity as it relates to AI. More specifically, do you know how hackers are using AI to infiltrate your business or compromise your private company, customer or employee data? It’s time to simplify it.

My special guest today is cybersecurity expert Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. No matter what department you work in (HR, sales & marketing, strategy and especially if you work in an non-IT or cybersecurity function), you need to be up to speed on why hackers do what they do and how to keep your company safe.

Here’s how.

My special guest today is Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. We tackle and simplify all aspects of it, including:
  • That “all hacking boils down to three objectives.” What they are and why they want that access inside your organization.

    • To change a config

    • Upload a program, or

    • Get physical access to change a config or upload a program

  • What the best advice is that he gives his clients to help them take cybersecurity seriously and put a crisis management plan in place.

  • What the 6 stages are that you need to consider when building a Cyber Incident Response Plan:

    • Preparation

    • Identification

    • Containment

    • Eradication

    • Recovery

    • Lessons Learned

      • NOTE: Build this plan *before* you get hacked.

  • The best practices and strategies that mid-size businesses are utilizing today to keep their business IT systems as well prepared as possible to fight against hackers, includes:

    • Conducting risk assessments

    • Build information security policies

    • Ensure all employees and contractors get regular cybersecurity training

  • …and ultimately, he shared his insights on how he anticipates cyber criminals to use AI to hack your systems in the coming months ahead and what you can do to prevent this.

Q: Are you ready to learn how to be cybersecurity smart to AI threats? If yes, this one is for you.

It’s time to #DoTheThing!

----

Show notes available with all links mentioned here:https://www.thesimplifiers.com/posts/356-how-to-be-cybersecurity-smart-to-ai-threats---with-richard-hollis

  continue reading

512 つのエピソード

Artwork
iconシェア
 
Manage episode 436404066 series 2451791
コンテンツは Mary Baird によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Mary Baird またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

We’ve been talking a lot about AI (artificial intelligence) this season… And I feel now is an important time to talk about cybersecurity as it relates to AI. More specifically, do you know how hackers are using AI to infiltrate your business or compromise your private company, customer or employee data? It’s time to simplify it.

My special guest today is cybersecurity expert Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. No matter what department you work in (HR, sales & marketing, strategy and especially if you work in an non-IT or cybersecurity function), you need to be up to speed on why hackers do what they do and how to keep your company safe.

Here’s how.

My special guest today is Richard Hollis and he’s simplifying how to be cybersecurity smart to AI threats. We tackle and simplify all aspects of it, including:
  • That “all hacking boils down to three objectives.” What they are and why they want that access inside your organization.

    • To change a config

    • Upload a program, or

    • Get physical access to change a config or upload a program

  • What the best advice is that he gives his clients to help them take cybersecurity seriously and put a crisis management plan in place.

  • What the 6 stages are that you need to consider when building a Cyber Incident Response Plan:

    • Preparation

    • Identification

    • Containment

    • Eradication

    • Recovery

    • Lessons Learned

      • NOTE: Build this plan *before* you get hacked.

  • The best practices and strategies that mid-size businesses are utilizing today to keep their business IT systems as well prepared as possible to fight against hackers, includes:

    • Conducting risk assessments

    • Build information security policies

    • Ensure all employees and contractors get regular cybersecurity training

  • …and ultimately, he shared his insights on how he anticipates cyber criminals to use AI to hack your systems in the coming months ahead and what you can do to prevent this.

Q: Are you ready to learn how to be cybersecurity smart to AI threats? If yes, this one is for you.

It’s time to #DoTheThing!

----

Show notes available with all links mentioned here:https://www.thesimplifiers.com/posts/356-how-to-be-cybersecurity-smart-to-ai-threats---with-richard-hollis

  continue reading

512 つのエピソード

すべてのエピソード

×
 
Loading …

プレーヤーFMへようこそ!

Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。

 

クイックリファレンスガイド