Artwork

Indhold leveret af Cyber Crime Junkies. Host David Mauro.. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Cyber Crime Junkies. Host David Mauro. eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Higher Education under Cyber Attack. Clemson CISO John Hoyt.

58:05
 
Del
 

Manage episode 456700285 series 3559123
Indhold leveret af Cyber Crime Junkies. Host David Mauro.. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Cyber Crime Junkies. Host David Mauro. eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks
  • Education and awareness are key
  • Collaboration and information sharing between organizations are essential
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

Chapters

  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Information Sharing in Cybersecurity
  • 22:12 Challenges of Cybercrime and Law Enforcement
  • 28:15 Top Cyber Threats in Higher Education

Send us a text

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

226 episoder

Artwork
iconDel
 
Manage episode 456700285 series 3559123
Indhold leveret af Cyber Crime Junkies. Host David Mauro.. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Cyber Crime Junkies. Host David Mauro. eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks
  • Education and awareness are key
  • Collaboration and information sharing between organizations are essential
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

Chapters

  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Information Sharing in Cybersecurity
  • 22:12 Challenges of Cybercrime and Law Enforcement
  • 28:15 Top Cyber Threats in Higher Education

Send us a text

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

226 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning