Podchaser Logo
Home
Chief of Cybersecurity

Dewayne Hart

Chief of Cybersecurity

A weekly Technology, Business and Education podcast
Good podcast? Give it some love!
Chief of Cybersecurity

Dewayne Hart

Chief of Cybersecurity

Episodes
Chief of Cybersecurity

Dewayne Hart

Chief of Cybersecurity

A weekly Technology, Business and Education podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Chief of Cybersecurity

Mark All
Search Episodes...
The new National Cyber Director, Harry Coker, stated that the White House intends "to reduce unnecessary barriers" federal contractors face in filling cybersecurity jobs, like requirements for four-year college degrees. The plan aims to build a
With technology rapidly advancing, hackers have adopted AI-driven tactics to carry out their cyber attacks with unprecedented sophistication. Join us on this captivating journey as we uncover the dark web of AI-powered hacking techniques and th
As AI continues to evolve and revolutionize traditional practices, it's crucial for entrepreneurs, corporate leaders, and decision-makers to understand its true implications. Through insightful analysis and thought-provoking examples, we unmask
In this informative video, we delve into the crucial role played by the Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding public health care. Join us as we explore how CISA employs its expertise to protect our invaluable h
The healthcare sector is particularly vulnerable to cybersecurity risks, and the stakes for patient care and safety are exceptionally high. Healthcare facilities are attractive targets for cybercriminals due to their size, technological depende
Cybersecurity modernization has several connectors and outcomes. The methodology requires the federal government to consider change, protection, and return on investment. Many agencies, such as the VA, CDC, and Department of Defense (DoD), have
Due to stored data and security classification, the federal government's IT systems are more critical and sensitive. Over the years, many agencies have been challenged to protect and ensure proper safeguards are implemented. Now, AI has surface
Many technical professionals have vast knowledge and desire to be heard. Some have resorted to podcasting, writing, or authoring publications. As someone who has done each, I believe they all provide the chance to market careers and business. B
Critical systems and applications must remain available as organizations digitally modernize and onboard technologies. Typical failures are supposed to withstand cyber stress and sustain availability – since proper planning, vulnerabilities, at
Every genre of business and public agencies strives for maturity. The core requires practical and fundamental approaches following a simple methodology: "Increase Protection and Lower Risk."As simple as it sounds, many have failed. These defic
Do you know what's on your network? That's a serious question that many cannot answer. When invoking "The Cybersecurity Mindset," the reader can relate cyber visibility as a threat reduction tool. Many enterprises have "blindspots," misconfigur
Many well-to-do professionals struggle to understand IT certifications and how to pass their examinations. Some have resorted to trial and error to pass. Others have studied and still have no success. Would there be a secret code for the examin
With all the changes and technologies surfacing, cybersecurity teams must become the best and gather valuable skill sets. The time had changed when we spoke of cybersecurity; now it's about the required skill sets. You can spend time, energy, a
As cyber criminals regularly launch more sophisticated attacks and with fewer barriers to entry, cybersecurity professionals are more in demand than ever before. Security engineers are becoming increasingly hard to find and expensive to hire. B
There has been a great discussion concerning strategies to break into cybersecurity. Many interested people have spent time wondering about the proper steps and requirements. They have also resorted to various platforms with broken promises. Th
Generative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale. And defenders are using the same technology to pro
"Water systems, like other public utility systems, are part of the nation's critical infrastructure and can be vulnerable targets when someone desires to affect public safety adversely. In California, where epic Sierra Nevada snowpack and "the
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for nearly five years. Toyota says the breach resulted from a subcontractor posting source code for Toyota’s “T-Connect”
Public safety has drawn a new wave of concern from many 2024 Olympics and government officials in France. AI can help bolster protection and rapidly determine threat actors and terrorists. Still, citizens worry about public safety and privacy.
Cybersecurity is now a must-have for any business, and it's no longer a matter of if but when a cyberattack will impact its operations. The emergence of cyberattacks and various exploits has changed our cybersecurity engagements. Often, when we
As cyberattacks become more prevalent, insurance companies are forced to raise the rates. This has serious consequences for the healthcare industry, struggling to stay afloat in the face of rising costs. Every citizen depends on healthcare – so
While many online scams have originated out of older schemes, scammers are always finding new ways to play them out. Scammers love to pose as legitimate organizations like banks, hoping to trick you into handing over details, but as we’ve becom
In the fast-paced, high-stakes world of risk management, keeping informed about recent developments and cutting-edge trends is beyond essential. There are various insights to address cyber security management challenges and to accelerate securi
Online Scams Target Veterans and Active Duty MembersThe U.S. has the most robust and powerful military in the world, and though its fighting men and women can win wars, they often appear defenseless against popular online scams. In the militar
With so many important concerns occupying the time of church leaders, issues related to church computers can quickly become vulnerable. Cyber threats pose significant challenges for churches and other organizations. Any church that uses compute
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features