• Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
    Feb 21 2025

    Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world.

    She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe.

    Chapters

    • 00:00 Introduction and Background
    • 00:30 Shawnee's Expertise in Cybersecurity and Counterintelligence
    • 02:21 The Influence of Shawnee's Family and Childhood
    • 04:01 Shawnee's Work with the Defense Intelligence Agency
    • 08:04 Stories from Shawnee's Government Service
    • 15:07 Difference Between Insider Risk and Insider Threat
    • 20:01 Mitigating Insider Risk and Threat
    • 24:28 Security Awareness and Training Programs
    • 32:12 Building a Security Culture
    • 41:27 Insider Threat Program at Uber
    • 46:12 Lessons Learned from Uber
    • 52:41 Upcoming Books on Insider Threat and Cybersecurity Education

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    56 mins
  • Secrets Revealed--How To Grow Business Not Get Hacked🔥
    Feb 19 2025

    🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses.

    The discussion highlights how to grow business not get hacked, Navigating the NOC and SOC Landscape, New Ways To Use Tech For Business And Not Get Breached, And How To Avoid Business Data Breaches. What Leaders Should Know.

    Chapters

    • · 00:00 How To Grow Business Not Get Hacked
    • · 05:11 Networks And Security. What Leaders Need To Know
    • · 10:08 Top Ways To Leverage Tech And Reduce Breaches
    • · 19:55. How To Avoid Business Data Breaches
    • · 30:13 What Small Business Needs To Know About Stopping Breaches

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    39 mins
  • Most Wanted Dark Web Hackers. Truth about Scattered Spider.
    Feb 15 2025

    🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers not get caught, hackers, undercover hackers, and When Hackers Get Caught.

    Chapters

    • · 00:00 Profiling The People Who Cause Ransomware Attacks
    • · 03:00 Inside the Comm: A Cybercrime Collective
    • · 05:51 Most Wanted Dark Web Hackers
    • · 09:11 The Fall of Scattered Spider's Kingpin
    • · 12:09 Truth About Scattered Spider
    • · 17:58 Exposed Secrets Of Cyber Crime Gangs
    • · 25:14 The MGM and Caesars Attacks: A Case Study
    • · 32:02 Cyber Crime Gangs Under Cover



    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    48 mins
  • Famous Hacker Reveals! True Ethical Hacking Stories.
    Feb 14 2025

    🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies!

    We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping, Google Maps, data brokers and privacy concerns, how data brokers operate without regulation, and How Hackers Breach Big Tech.

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    50 mins
  • When Gamers Start Swatting: Violence for Hire Online
    Feb 12 2025

    We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    53 mins
  • Future of AI in Cybersecurity. A Double-Edge Sword.
    Feb 9 2025

    🚀 AI is transforming cybersecurity! In this episode of Cyber Crime Junkies, host David Mauro interviews Arik Solomon, CEO of Cypago and former CTO of EY’s Cybersecurity Center, to explore the future of Governance, Risk, and Compliance (GRC) in cybersecurity.

    🔍 What You’ll Learn:
    ✅ The role of AI in cybersecurity automation
    ✅ Why GRC is essential for businesses of all sizes
    ✅ How AI and NLP reduce manual efforts in risk management
    ✅ Cyber threats & compliance challenges for CISOs and SMBs
    ✅ Best practices for cybersecurity governance and policies

    📌 Chapters:
    00:00 - AI in Cybersecurity & GRC
    03:15 - Arik Solomon’s Journey into Cybersecurity
    06:10 - GRC Automation in Cyber Risk Management
    08:43 - Why GRC is Critical for Small Businesses
    11:40 - Real-World Cybersecurity Compliance Examples
    16:34 - Cyber Governance: Risks & Opportunities
    21:50 - The Future of Cyber Governance

    📢 Subscribe to Cyber Crime Junkies for expert insights on cyber threats, AI in security, and risk management best practices. Don't forget to like & share! 🔥

    #Cybersecurity #GRC #AIinCybersecurity #RiskManagement #Compliance #CyberThreats #CyberRisk #SmallBusinessCybersecurity #CISO #Governance

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    30 mins
  • How Everyone Is Responsible For Cyber Security. Phantom CISO.
    Feb 9 2025

    Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security.

    https://www.phantomciso.com/

    https://www.operationprivacy.com/

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    1 hr
  • Safeguarding Your Privacy: How to Delete Your Data
    Feb 7 2025

    David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology.

    Send us a text

    Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com


    Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    59 mins