BarCode

Chris Glanden

Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who will greet and walk us through making an exceptional yet easy-to-make beverage right from the comfort of your own home. It's Cybersecurity straight up, no chaser.Winner of a 2021 People's Choice Podcast Award (Technology Category).

  • 44 minutes 57 seconds
    NeuroVector

    In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understanding cognitive attacks and their implications for both humans and AI systems. In this conversation, Chris Glanden and Matt Canham delve into the evolving landscape of cognitive security, emphasizing the need for security practitioners to adopt a systems-thinking approach. They discuss the implications of AI and direct neural interfaces on security practices, the role of DeepSeek in shaping AI interactions, and insights from the Cognitive Security Institute's meetings. The conversation also touches on emerging trends in cognitive warfare and concludes with a thematic drink inspired by the complexities of the field.


    TIMESTAMPS:
    00:00 Introduction to Deep Fakes and AI Technology
    02:28 Understanding Cognitive Security
    09:58 Differentiating Cognitive Security from Social Engineering
    19:05 Exploring the OSI Model and Cognitive Security Layers
    21:48 Bringing Security Back to Earth
    24:26 The Role of Cognitive Security in Modern Threats
    25:02 AI's Impact on Security Practices
    30:36 DeepSeek and Its Implications
    33:47 Insights from the Cognitive Security Institute
    41:28 Emerging Trends in Cognitive Warfare
    45:43 The Complexity Cocktail: A Thematic Conclusion


    SYMLINKS:
    Dr. Matthew Canham – Home
    https://www.canham.ai/
    The official website of Dr. Matthew Canham, showcasing his expertise in human–AI integration, cognitive security, and updates on his latest projects and research.

    Research https://www.canham.ai/research
    A dedicated section highlighting Dr. Canham’s research initiatives and academic contributions in the field of human–AI integration and cognitive security.

    LinkedIn https://www.linkedin.com/
    Dr. Canham’s professional networking profile where you can learn more about his career achievements, collaborations, and thought leadership.

    Cognitive Security: Exploring the Human Layer w/ Dr. Matthew Canham | CSI Talks #1 https://youtu.be/OGmvoj5Dj_A
    A YouTube video where Dr. Canham elaborates on cognitive security and human–AI integration, aligning closely with the conversation’s focus on evolving security threats.

    Cognitive Security – Army Cyber Institutehttps://cyber.army.mil/Research/Research-Labs/Cognitive-Security/
    An official U.S. Department of Defense page describing research into cognitive security—protecting decision-making under adversarial conditions. This resource underscores the growing institutional focus on the subject.

    Apple’s Mind-Blowing Invention: AirPods That Can Read Your Thoughtshttps://digialps.com/apples-mind-blowing-invention-airpods-that-can-read-your-thoughts/]
    An article that examines Apple’s patent for AirPods designed to detect brain signals, di

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    17 February 2025, 4:00 pm
  • 41 minutes 40 seconds
    Torque

    Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stanley’s 400-person Cyber Security Division, later holding executive roles at Bank of America and Goldman Sachs. Now a trusted advisor to C-suites and boards, Curt shares how the lessons of engineering, military strategy, and high-stakes cyber defense all come down to maintaining control under pressure.

    TIMESTAMPS:
    00:00 Curt Vincent's Journey to Cybersecurity
    14:40 Building Cybersecurity at Morgan Stanley
    28:39 Cultural Shifts in Cybersecurity Practices
    29:24 The Disconnect Between Cybersecurity and Business
    32:13 Accountability and Consequences in Cybersecurity
    35:12 Communication and Leadership in Cybersecurity
    38:40 Connecting with the Audience: The Role of Analogies
    39:14 Unique Experiences and Cultural Perspectives

    SYMLINKS:
    Curt Vincent's Website
    - https://curtvincent.com
    Curt Vincent’s speaker website where he shares insights on cybersecurity, leadership, and consulting.

    KnowBe4 - https://www.knowbe4.com
    A cybersecurity awareness training platform that specializes in phishing simulation and security education to help organizations mitigate human-related risks.

    Proofpoint - https://www.proofpoint.com
    A cybersecurity company providing threat intelligence, email security, and phishing prevention solutions to protect organizations from cyber threats.

    Morgan Stanley Cybersecurity - https://www.morganstanley.com/
    Morgan Stanley’s approach to cybersecurity includes best practices and risk management strategies for businesses and individuals.

    Widener University - https://www.widener.edu
    The university where Curt Vincent pursued his degree before re-entering the military and advancing in his cybersecurity career.


    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    11 February 2025, 1:00 pm
  • 1 hour 4 minutes
    Ghost Protocol

    In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking, raising questions about the intersection of technology and the paranormal. In this conversation,they discuss the fascinating intersection of psychic abilities and cybersecurity. They discuss a blackbox experiment designed to test psychic phenomena, revealing surprising results and implications for security. The conversation explores how psychics can inadvertently gather information, the potential dangers of psychic hacking, and the importance of imagination in cybersecurity. Scotch shares insights on developing psychic abilities, future research projects, and personal experiences with haunted locations, culminating in a creative discussion about a hypothetical cybersecurity-themed bar.

    TIMESTAMPS:
    00:00 - Introduction to Scotch Wichmann and His Journey
    09:52 - The Intersection of Cybersecurity and Paranormal Experiences
    19:33 - Exploring the U.S. Government's Stargate Program
    28:15 - Psychic Hacking: A New Frontier in Cybersecurity
    34:10 - The Black Box Experiment
    35:28 - Psychic Insights and Surprising Results
    39:53 - Collusion and Confidence in Psychic Abilities
    42:11 - Developing Psychic Abilities
    44:30 - The Dangers of Psychic Hacking
    46:14 - Cybersecurity Implications of Psychic Phenomena
    49:49 - Defending Against Psychic Attacks
    56:36 - Imagination in Cybersecurity
    59:53 - Future Research and Projects
    01:01:29 - Connecting with Scotch Witchman
    01:02:34 - Haunted Bars and Personal Experiences
    01:04:35 - Creating a Cybersecurity-Themed Bar

    SYMLINKS:
    Scotch Wichmann's Website
    - https://www.scotchwichmann.com
    A personal website featuring Scotch Wichmann’s work, including cybersecurity insights, performance art, and paranormal research.

    Psychic Hacking Experiment - https://www.psychicexperiment.org
    A website detailing Scotch Wichmann’s experiment on psychic hacking, including methodologies, results, and raw data for public review.

    Stargate Project - http://en.wikipedia.org/wiki/Stargate_Project_(U.S._Army_unit)
    Wikipeida page based on a secret U.S. Army unit established in 1977[1][2] at Fort Meade, Maryland, by the Defense Intelligence Agency (DIA) and SRI International (a California contractor) to investigate the potential for psychic phenomena in military and domestic intelligence applications.

    CIA Declassified Documents on Remote Viewing -https://www.cia.gov/readingroom/
    The CI

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    3 February 2025, 1:00 pm
  • 27 minutes 8 seconds
    OSXploit

    In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on security and offers advice for those looking to specialize in macOS security.

    TIMESTAMPS:
    00:00 Introduction to Cybersecurity and Slava's Journey
    07:03 Understanding macOS Security and Threat Landscape
    11:38 ThreatLocker’s Zero Trust Approach
    16:36 Evolving Threats and Social Engineering
    21:23 Advice for Aspiring macOS Security Professionals
    26:04 Closing Thoughts and Recommendations


    SYMLINKS:
    ThreatLocker Official Website
    - https://www.threatlocker.com
    The official site for ThreatLocker, a cybersecurity company specializing in zero-trust security solutions.

    Zero Trust World 2025 Conference - https://zerotrustworld.threatlocker.com/ 
    An immersive cybersecurity event scheduled for February 19-21, 2025, in Orlando, Florida, featuring hands-on hacking labs, expert sessions, and networking opportunities.

    Zero Trust World 2025 Agenda - https://ztw.com/agenda Detailed schedule of sessions, including keynotes, breakout sessions, and hands-on labs for the Zero Trust World 2025 conference.

    Zero Trust World 2025 FAQ - https://zerotrustworld.threatlocker.com/faq 
    Frequently asked questions providing information on event details, registration, and accommodations for the Zero Trust World 2025 conference.


    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    28 January 2025, 4:00 am
  • 55 minutes 25 seconds
    Syntax

    In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of navigating the job market today. In this engaging conversation, Chris Glanden and Syntax delve into various topics surrounding cybersecurity, innovative uses of technology, and the vibrant hacker community. They discuss the intricacies of Windows language packs and their implications for security, the creative use of Twitch as a command and control platform, and the importance of community-driven conferences. Syntax shares his experiences with unique venues and bars across the country, culminating in a humorous discussion about the concept of a cybersecurity-themed bar, complete with signature drinks that reflect hacker culture.

    TIMESTAMPS:
    00:00 - Introduction to Brandon Prince
    03:52 - Early Life and Hacking Beginnings
    06:33 - Navigating the Hacker Community
    08:59 - The DJ Journey and DefCon Experience
    11:22 - Incorporating Hacking into Music
    14:01 - Motorbike Racing Adventures
    16:35 - Current Job Market Insights
    19:14 - Unique Hacking Experiences
    26:46 - Resume Hacking
    29:35 - Exploring Windows Language Packs and Exploits
    31:39 - Innovative Use of Twitch as a C2
    37:25 - Upcoming Conferences and Events
    39:37 - Preference for Community-Based Conferences
    46:29 - Unique Venues and Bar Experiences
    51:29 - Conceptualizing a Cybersecurity-Themed Bar

    SYMLINKS:
    Syntax on Twitch - https://twitch.tv/Syntax976
    Syntax's official Twitch channel where he streams music, sim racing, and hacker-themed content.

    Syntax on SoundCloud - https://soundcloud.com/Syntax976
    SoundCloud profile featuring Syntax's original tracks, including contributions to Defcon soundtracks.

    DEF CON Media Server - https://media.defcon.org
    Official media server for DEF CON, hosting soundtracks, talks, and other resources.

    Meow Wolf Official Website - https://meowwolf.com
    Interactive and immersive art experiences, including Meow Wolf venues mentioned by Syntax.

    CactusCon Official Website - https://cactuscon.com
    Details about the CactusCon conference in Phoenix, Arizona, where Syntax may perform.




    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    21 January 2025, 9:00 am
  • 45 minutes 39 seconds
    Compliance Catalyst

    Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Security Weekly podcast. His efforts also extend to organizing BSides Delaware, further cementing his influence and dedication to the cybersecurity community.

    He shares his diverse career journey from law enforcement to tech support and finally into cybersecurity leadership. Listeners gain insight into his work with compliance frameworks like CMMC and SPDX, and his strategic approach at Cyturus, focusing on "dynamic risk monitoring" as a forward-thinking solution for mitigating risks. This episode also delves into the global regulatory landscape, comparing U.S. frameworks with those abroad and discussing AI regulation insights. As always, the conversation is enriched with amusing anecdotes and expert advice, making it not only educational but also engaging.

    TIMESTAMPS:
    0:00 - Exploring Security, Compliance, and Innovation
    3:05 - Reviving In-Person Tech Conferences Post-COVID Challenges
    11:58 - From Tech Support to Cybersecurity and Compliance
    19:12 - The Challenges and Importance of Software Bill of Materials
    24:25 - The Global Regulatory Landscape and Its Impact on AI Development
    28:37 - HIPAA Compliance Challenges for Lawyers and Medical Startups
    30:00 - Dynamic Risk Monitoring as a Compliance and Revenue Driver
    34:32 - The Impact of Podcasts on the Cybersecurity Community
    40:14 - Exploring Unique Bars and Crafting Cybersecurity-Themed Cocktails

    SYMLINKS
    Cyturus Website - https://cyturus.com
    Official website for Cyturus, a leader in compliance process products and solutions, focusing on dynamic risk monitoring and governance.

    Josh Marpet on LinkedIn - https://www.linkedin.com/in/joshuaviktor/
    Josh Marpet's professional LinkedIn profile for networking and insights.

    Paul’s Security Weekly - https://securityweekly.com
    One of the top cybersecurity podcasts, providing news, insights, and discussions on emerging threats and best practices in security.

    SPDX (Software Package Data Exchange) - https://spdx.dev
    Official resource for SPDX, an ISO-certified standard for managing Software Bill of Materials (SBOM).

    CycloneDX - https://cyclonedx.org
    A standard designed for the SBOM, with a focus on integration with CI/CD pipelines and automated systems.

    Executive Order 14028 - https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
    U.S. Executive Order mandating the use of Software Bill of Materials (SBOM) for federal software contracts to improve cybersecurity.

    Helen Oakley - https://www.linkedin.com/in/helen-oakley/
    Profile and resources related to Helen Oakley, a professional working on AI Bill of Materials.

    NIST AI RMF (Risk Management Framework) - https://nist.gov/ai/rmf
    U.S. Nation

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    10 January 2025, 1:00 pm
  • 17 minutes 40 seconds
    BONUS: BCP LIVE on Rendezvous Yacht II

    SESSION TITLE: BCP LIVE on Rendezvous Yacht II
    RECORDED: 9/26/24
    VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/
    LOCATION: Philadelphia, PA
    GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia
    SPONSOR: Philly Tech Council

    ABOUT GUESTS:​
    Damian Oravez
    is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previously served as the CISO for the Philadelphia International Airport for five years, where he honed his skills in monitoring and securing a vast array of technological systems in both the public sector and critical infrastructure.

    Jessica Hoffman plays a pivotal role in Philadelphia's cybersecurity landscape, working side by side with Damian Oreves. With experience in both private and public sectors, Jessica brings a comprehensive understanding of cybersecurity and is keenly focused on safeguarding citizens and workforce digital environments. Her expertise encompasses both tactical implementation and strategic oversight, demonstrating her dedication to making a difference in her community.

    Key Takeaways:
    Scrutinizing the broad scale of city-level cybersecurity necessitates efficient, automated asset inventory management.

    • The public sector is distinctly impacted by regulatory entities, and cybersecurity officers uphold a crucial role in maintaining not only digital safety but also public trust.
    • Engaging with city departments on cybersecurity imperatives fosters greater buy-in and alignment with defensive measures.
    • The team stresses balancing innovation with caution, especially in the realm of emerging technologies like AI, to maintain operational security.
    • There is inherent cultural importance in municipal service roles, reflecting a deeper connection to meaningful cybersecurity contributions.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    18 October 2024, 10:00 am
  • 49 minutes 23 seconds
    Leading Edge

    Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she shares her holistic approach to leadership. A distinguished speaker and thought leader in the Philadelphia cybersecurity community, Klotz actively engages with various initiatives and forums to inspire future leaders.

    Her book highlights 25 essential qualities for leaders across any industry. Focusing on traits like empathy, grace, and self-awareness, the book underscores the growing importance of these soft skills in building resilient, high-performing teams—crucial to modern leadership. The "TTIPPC" Framework emphasizes the need for transparency, inclusion, and consistency in fostering united and productive teams. Through engaging career stories, Klotz offers valuable insights into navigating professional challenges while balancing personal life with a compassionate and determined leadership approach.

    TIMESTAMPS:
    0:16 - Leading With Empathy and Building High-Performing Teams
    2:18 - Cybersecurity Leadership Across Industries and Unique Challenges
    7:15 - Balancing Leadership, Family, and Community Involvement
    17:02 - Empathy and Grace: Essential Leadership Qualities for Success
    25:03 - Building High-Performing Teams Through Positive Energy and Collaboration
    37:04 - Leading With Empathy and Grace Through the TTIPPC Framework
    45:25 - Cybersecurity Conversations and Creative Bar Concepts

    SYMLINKS
    Leading with Grace and Empathy - https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573
    URL where Tammy Klotz's book Leading with Empathy and Grace is available for purchase. 

    LinkedIn - https://www.linkedin.com/in/tammyklotz/
    Platform where Tammy Klotz is available for professional networking.

    Redstone Grill - https://redstonegrill.com
    Tammy's go-to restaurant in Plymouth Meeting,PA with a great atmosphere and outdoor patio. Frequently used for professional dinners and happy hours.

    Trinseo - https://www.trinseo.com
    Tammy’s current employer, where she is focused on improving the cybersecurity program with a particular emphasis on OT security.

    DRINK INSTRUCTION
    Empathy Elixer
    2 oz Bourbon
    1 oz Elderflower Liqueur
    1/2 oz Lemon Juice
    Dash of Bitters
    Optional: Lemon Twist
    Combine all ingredients in a shaker with ice. Shake thoroughly, then strain into a glass. Optionally, garnish with a lemon twist.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    17 October 2024, 1:00 am
  • 1 hour 9 minutes
    Cyborg

    Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era.

    Len shares his personal and professional evolution, describing the cutting-edge technologies that allow him to boost human abilities through cybernetics. He explores the future of biohacking, touching on the legal, ethical, and social questions raised by integrating tech into our bodies. From the potential security risks to the thrill of becoming a cyborg, Len offers a clear look at a future where technology and humanity are more closely connected than ever before.

    TIMESTAMPS:
    0:16 - Exploring Transhumanism and Cybersecurity with Len, the Transhumanist Hacker
    5:24 - A Gen Xer’s Journey Through the Evolution of Computers
    12:01 - From Outlaw to Cybersecurity: A Journey of Transformation
    19:05 - Exploring Transhumanism and Its Philosophical Divergence
    21:49 - Pioneering Biohacking and Implantable Technology Innovations
    35:53 - The Painful Process of Implant Procedures Without Anesthesia
    39:54 - Body Modification and the Search for a Skilled Mechanic
    42:43 - Advanced Implant Technology for Security and Cyber Attacks
    52:23 - The Future of Augmented Humans and Technological Integration
    1:06:10 - Unique Bars, Cybersecurity Themes, and Signature Drinks

    SYMLINKS
    Dangerous Things - https://dangerousthings.com
    Website where Len purchased implantable technology for biohacking.

    Grindhouse Wetware - https://en.wikipedia.org/wiki/Grindhouse_Wetware
    Historical reference to the pioneering group that developed consumer-grade implantable technology and led the biohacking movement.

    Pineapple Tangaroa (Body Mechanic) - https://www.austintattoo.com/pineapple-tangaroa.html
    Pineapple is Len's body mechanic based in Austin, TX, specializing in body modifications like RFID and NFC implants.

    Magnavox Odyssey 2 - https://en.wikipedia.org/wiki/Magnavox_Odyssey%C2%B2
    Len’s first gaming system, sparking his curiosity in technology.

    Newsweek Article (Tesla Key Implant) - https://www.newsweek.com/man-implants-chip-unlock-tesla-wave-1478879
    Newsweek published an article about Pineapple Tangaroa implanting a Tesla car key into a human.

    FM-2030 (Cryonics Pioneer) - https://en.wikipedia.org/wiki/FM-2030
    FM-2030 was a key figure in the cryonics movement and transhumanism.

    Rich Lee (DIY Cyborg) - https://golden.com/wiki/Rich_Lee_(Biohacker)
    Rich Lee is known for his biohacking experiments, including magnetic ear implants and the Lovetron 9000 device.

    RSA Conference - https://www.rsaconference.com
    One of the major cybersecurity conferences where Len has presented.

    DEF CON (Biohacking Village) -

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    7 October 2024, 10:00 am
  • 47 minutes 31 seconds
    BarCode @ Barcode 2 LIVE

    In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.

    The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.

    As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.

    TIMESTAMPS:
    00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey
    04:17:00 - AI's Impact on Job Automation and Cybersecurity
    09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation
    17:29:00 - The Future of AI: Security, Ethics, and Human Impact
    28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes
    34:05:00 - The Future of Humanity and AI Integration 

    SYMLINKS
    BarCode Security: https://barcodesecurity.com/
    BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/
    X Foundation: https://xfoundation.org/
    Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/
    ThreatLocker: https://www.threatlocker.com/
    Exploit Security: https://www.exploitsecurity.io/
    Ironwood Cyber: https://www.ironwoodcyber.com/
    Sevn-X: https://www.sevnx.com/
     The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
    TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs
    Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/
    OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing
    AI Trust Council: https://aitrustcouncil.org/
    VFX Los Angeles: https://vfxlosangeles.com/
    Inspira AI: https://inspira.ai/
    PsyberLabs: https://psyber-labs.com/

    DRINK INSTRUCTION
    Keep it 100
    1 oz Captain Morgan 100 proof
    1/2 oz Coffee Liqueur
    1/4 oz Simple Syrup
    1 ½ oz Espresso
    Add all ingredients to a shaker and shake. Strain into a coupe glass.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    16 August 2024, 2:00 pm
  • 44 minutes 11 seconds
    Paradox

    A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.

    We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.

    TIMESTAMPS:
    00:16:00 - Navigating the AI Paradox: Innovation and Danger 
    07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate 
    12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon 
    19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development 
    26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape 
    31:36:00 - AI’s Impact on Jobs and Cybersecurity 
    38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions 
    41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in Vegas

    SYMLINKS
    LinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/
    ConnectCon: https://www.connectcon.world/
    C&C Generative AI Policy - <link>

    DRINK INSTRUCTION
    m.AI t.AI
    1 1/2 oz White Rum
    3/4 oz Orange Curacao
    3/4 oz Lime Juice
    1/2 oz Orgeat Syrup
    1/2 Dark Rum
    Add the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at [email protected]

    7 August 2024, 2:00 am
  • More Episodes? Get the App