Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who will greet and walk us through making an exceptional yet easy-to-make beverage right from the comfort of your own home. It's Cybersecurity straight up, no chaser.Winner of a 2021 People's Choice Podcast Award (Technology Category).
SESSION TITLE: BCP LIVE on Rendezvous Yacht II
RECORDED: 9/26/24
VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/
LOCATION: Philadelphia, PA
GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia
SPONSOR: Philly Tech Council
ABOUT GUESTS:
Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previously served as the CISO for the Philadelphia International Airport for five years, where he honed his skills in monitoring and securing a vast array of technological systems in both the public sector and critical infrastructure.
Jessica Hoffman plays a pivotal role in Philadelphia's cybersecurity landscape, working side by side with Damian Oreves. With experience in both private and public sectors, Jessica brings a comprehensive understanding of cybersecurity and is keenly focused on safeguarding citizens and workforce digital environments. Her expertise encompasses both tactical implementation and strategic oversight, demonstrating her dedication to making a difference in her community.
Key Takeaways:
Scrutinizing the broad scale of city-level cybersecurity necessitates efficient, automated asset inventory management.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she shares her holistic approach to leadership. A distinguished speaker and thought leader in the Philadelphia cybersecurity community, Klotz actively engages with various initiatives and forums to inspire future leaders.
Her book highlights 25 essential qualities for leaders across any industry. Focusing on traits like empathy, grace, and self-awareness, the book underscores the growing importance of these soft skills in building resilient, high-performing teams—crucial to modern leadership. The "TTIPPC" Framework emphasizes the need for transparency, inclusion, and consistency in fostering united and productive teams. Through engaging career stories, Klotz offers valuable insights into navigating professional challenges while balancing personal life with a compassionate and determined leadership approach.
TIMESTAMPS:
0:16 - Leading With Empathy and Building High-Performing Teams
2:18 - Cybersecurity Leadership Across Industries and Unique Challenges
7:15 - Balancing Leadership, Family, and Community Involvement
17:02 - Empathy and Grace: Essential Leadership Qualities for Success
25:03 - Building High-Performing Teams Through Positive Energy and Collaboration
37:04 - Leading With Empathy and Grace Through the TTIPPC Framework
45:25 - Cybersecurity Conversations and Creative Bar Concepts
SYMLINKS
Leading with Grace and Empathy - https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573
URL where Tammy Klotz's book Leading with Empathy and Grace is available for purchase.
LinkedIn - https://www.linkedin.com/in/tammyklotz/
Platform where Tammy Klotz is available for professional networking.
Redstone Grill - https://redstonegrill.com
Tammy's go-to restaurant in Plymouth Meeting,PA with a great atmosphere and outdoor patio. Frequently used for professional dinners and happy hours.
Trinseo - https://www.trinseo.com
Tammy’s current employer, where she is focused on improving the cybersecurity program with a particular emphasis on OT security.
DRINK INSTRUCTION
Empathy Elixer
2 oz Bourbon
1 oz Elderflower Liqueur
1/2 oz Lemon Juice
Dash of Bitters
Optional: Lemon Twist
Combine all ingredients in a shaker with ice. Shake thoroughly, then strain into a glass. Optionally, garnish with a lemon twist.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era.
Len shares his personal and professional evolution, describing the cutting-edge technologies that allow him to boost human abilities through cybernetics. He explores the future of biohacking, touching on the legal, ethical, and social questions raised by integrating tech into our bodies. From the potential security risks to the thrill of becoming a cyborg, Len offers a clear look at a future where technology and humanity are more closely connected than ever before.
TIMESTAMPS:
0:16 - Exploring Transhumanism and Cybersecurity with Len, the Transhumanist Hacker
5:24 - A Gen Xer’s Journey Through the Evolution of Computers
12:01 - From Outlaw to Cybersecurity: A Journey of Transformation
19:05 - Exploring Transhumanism and Its Philosophical Divergence
21:49 - Pioneering Biohacking and Implantable Technology Innovations
35:53 - The Painful Process of Implant Procedures Without Anesthesia
39:54 - Body Modification and the Search for a Skilled Mechanic
42:43 - Advanced Implant Technology for Security and Cyber Attacks
52:23 - The Future of Augmented Humans and Technological Integration
1:06:10 - Unique Bars, Cybersecurity Themes, and Signature Drinks
SYMLINKS
Dangerous Things - https://dangerousthings.com
Website where Len purchased implantable technology for biohacking.
Grindhouse Wetware - https://en.wikipedia.org/wiki/Grindhouse_Wetware
Historical reference to the pioneering group that developed consumer-grade implantable technology and led the biohacking movement.
Pineapple Tangaroa (Body Mechanic) - https://www.austintattoo.com/pineapple-tangaroa.html
Pineapple is Len's body mechanic based in Austin, TX, specializing in body modifications like RFID and NFC implants.
Magnavox Odyssey 2 - https://en.wikipedia.org/wiki/Magnavox_Odyssey%C2%B2
Len’s first gaming system, sparking his curiosity in technology.
Newsweek Article (Tesla Key Implant) - https://www.newsweek.com/man-implants-chip-unlock-tesla-wave-1478879
Newsweek published an article about Pineapple Tangaroa implanting a Tesla car key into a human.
FM-2030 (Cryonics Pioneer) - https://en.wikipedia.org/wiki/FM-2030
FM-2030 was a key figure in the cryonics movement and transhumanism.
Rich Lee (DIY Cyborg) - https://golden.com/wiki/Rich_Lee_(Biohacker)
Rich Lee is known for his biohacking experiments, including magnetic ear implants and the Lovetron 9000 device.
RSA Conference - https://www.rsaconference.com
One of the major cybersecurity conferences where Len has presented.
DEF CON (Biohacking Village) -
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.
The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.
As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.
TIMESTAMPS:
00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey
04:17:00 - AI's Impact on Job Automation and Cybersecurity
09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation
17:29:00 - The Future of AI: Security, Ethics, and Human Impact
28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes
34:05:00 - The Future of Humanity and AI Integration
SYMLINKS
BarCode Security: https://barcodesecurity.com/
BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/
X Foundation: https://xfoundation.org/
Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/
ThreatLocker: https://www.threatlocker.com/
Exploit Security: https://www.exploitsecurity.io/
Ironwood Cyber: https://www.ironwoodcyber.com/
Sevn-X: https://www.sevnx.com/
The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs
Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/
OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing
AI Trust Council: https://aitrustcouncil.org/
VFX Los Angeles: https://vfxlosangeles.com/
Inspira AI: https://inspira.ai/
PsyberLabs: https://psyber-labs.com/
DRINK INSTRUCTION
Keep it 100
1 oz Captain Morgan 100 proof
1/2 oz Coffee Liqueur
1/4 oz Simple Syrup
1 ½ oz Espresso
Add all ingredients to a shaker and shake. Strain into a coupe glass.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.
We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.
TIMESTAMPS:
00:16:00 - Navigating the AI Paradox: Innovation and Danger
07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate
12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon
19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development
26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape
31:36:00 - AI’s Impact on Jobs and Cybersecurity
38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions
41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in Vegas
SYMLINKS
LinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/
ConnectCon: https://www.connectcon.world/
C&C Generative AI Policy - <link>
DRINK INSTRUCTION
m.AI t.AI
1 1/2 oz White Rum
3/4 oz Orange Curacao
3/4 oz Lime Juice
1/2 oz Orgeat Syrup
1/2 Dark Rum
Add the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust.
The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, and the risks of rapid AI development. Chris explains the concept of Artificial General Intelligence (AGI) and its potential to reshape human existence, emphasizing the need for regulated and ethically aligned AI systems. He also highlights the AI Trust Council's mission to promote a pro-human future amidst technological advancements. This discussion provides listeners with a comprehensive, and often not heard, understanding of the challenges and opportunities in the AI landscape.
TIMESTAMPS:
00:00:00 - Chris Wright’s Mission to Combat AI Corruption
00:04:39 - The Future of AI and Its Societal Implications
00:14:12 - The Impending Impact of AI and the Singularity
00:19:10 - Political Corruption and Corporate Influence in AI Legislation
00:21:10 - The Psychological Impact of AI Relationships and Their Realism
00:24:00 - The Impact of Chatbots on Mental Health and Society
00:27:08 - Tech Engineers’ Fascination with AI’s Potential World-Ending Future
00:28:25 - AI-Driven Drone Warfare and Its Rapid Evolution
00:32:44 - Building Trust in AI Through a Pro Human Network
00:40:41 - Exploring AI, Vegas Venues, and Cybersecurity-Themed Bars
SYMLINKS
LinkedIn (personal): https://www.linkedin.com/in/christopherwrightaitc/
AI Trust Council: https://www.theaitc.com/
DRINK INSTRUCTION
Fallen Angel
2 oz Dry Gin
1 oz Lemon Juice
2 tsp Creme De Menthe
2 tsp Simple Syrup
2 dashes Aromatic Bitters
Combine all ingredients in a shaker with ice. Shake well for 15-20 seconds for maximum chill, and then strain into a cocktail glass. Optionally, garnish with mint.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecurity, is widely recognized and respected. In addition to her corporate achievements, Dr. Barker has also recently been honored with an MBE (Member of the Order of the British Empire) for services to cybersecurity, cementing her status as a leading voice and advocate in the field.
Our discussion focuses on the human element of security breaches and the importance of cultivating a culture of cybersecurity awareness within organizations. Dr. Barker shares her journey into the world of cybersecurity and discusses the evolving landscape of cyber threats, including the use of AI by cybercriminals for social engineering and deepfake technology. We highlight the significance of leadership commitment and values congruence in cultivating a robust cybersecurity culture. The effectiveness of gamification in training, a practical aspect, is also explored. The segment concludes with a personal touch, as Jessica shares her experience of receiving an MBE at Windsor Castle from Prince William. She then provides insights on her new book "Hacked: The Secrets Behind Cyberattacks".
TIMESTAMPS:
00:02:53 - From Civic Design to Cybersecurity: A Human-Centric Journey
00:06:21 - AI's Escalating Role in Cybercrime and Social Engineering
00:09:18 - Strategies for Enhancing Digital Critical Thinking
00:13:00 - Cultivating Successful Cybersecurity Cultures in Organizations
00:16:57 - Rethinking Security Culture and Training Effectiveness
00:20:27 - Dreamlike Investiture: Receiving an MBE from Prince William
00:22:15 - Royal Recognition for Cybersecurity Expertise
00:25:40 - Demystifying Cybersecurity Through Engaging Stories and Practical Advice
00:31:20 - Discovering Local Vegas Gems and Cybersecurity Bar Concepts
SYMLINKS
LinkedIn (personal): https://www.linkedin.com/in/jessica-barker/
Twitter (personal): https://twitter.com/drjessicabarker
Twitter (organization): https://twitter.com/CygentaHQ
Cygenta (company): https://www.cygenta.co.uk/
Hacked: The Secrets Behind Cyber Attacks (book): https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703
Las Vegas Arts District (location): https://dtlvarts.com/
DRINK INSTRUCTION
Purple Haze
2 oz Gin
1 oz Violet Liqueur
1 oz Fresh Lemon Juice
1/2 oz Honey Syrup
1 Dash Orange Bitters
Combine all ingredients in ashaker with ice. Shake well and straininto a chilled glass. Optionally, garnishwith a twist of lemon peel or a sprig of lavender.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
SESSION TITLE:WiCys Delaware Valley Career Fair II
RECORDED: 4/25/24
VENUE: Chestnut Hill College - www.chc.ed
LOCATION: Philadelphia, PA
GUEST: Job Seekers, Hiring Organizations, and Recruiters
SPONSOR: WiCys Delaware Valley - LinkedIn Page
ABOUT WICYS AND GUESTS:
WiCys Delaware Valley - A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their knowledge and expertise to support one another in their career advancement and personal development. By cultivating strong relationships and creating a supportive environment, The organization aims to empower its members to achieve their professional goals and enhance their skills. The organization welcomes the participation of male allies who share the same vision of promoting diversity and inclusivity in the workplace.
Pam King - A faculty member and director of the cybersecurity program at Chestnut Hill College, Pam King has played a pivotal role in establishing a robust cybersecurity and digital forensics education curriculum. With both undergraduate and graduate programs under her leadership, King has overseen the implementation of accelerated and online offerings to advance cybersecurity education.
Alex Pickenich - A recent graduate with a double major in computer science and data science and a minor in cybersecurity, Alex Pickenich is actively pursuing a career where she can merge his passion for data science with the field of cybersecurity.
Manasa Pisipati - As a second-year grad student at Penn State University Park and the president of the Women in Cybersecurity student chapter there, Manasa Pisipati leads efforts to create a supportive community for women in the cybersecurity field and to provide them with opportunities for professional development.
Yvonne Brown - A professional seeking a transition into cybersecurity, Yvonne Brown has a background in project management and shares her interest in consulting within cybersecurity, emphasizing the need for mentorship and support in new roles.
Jessica Sylvester - A risk and cybersecurity division lead for TekSystems, Jessica Sylvester has years of experience in tech staffing and professional services, and she provides insight into the recruitment process and the qualities that make candidates stand out.
Emily Rose Nunez - Software Engineer at Leidos, designs, develops, and deploys scalable and secure software solutions for diverse clients, leveraging tools like Jenkins and Jira to automate processes and collaborating with cross-functional teams to deliver innovative, high-quality solutions that meet stakeholder and end-user requirements and expectations.
Tyler Yeagor- IT Client Relations partner at Ark, leverages his strong background in technology services, client relations, and certifications in Sandler Foundation, Microsoft 365 Fundamentals, and AWS Cloud Practitioner to assist businesses with their IT obstacles, projects, and initiatives through consultative insight and timely execution, while passionately creating new and better experiences for customers and partners, and continuously learning and collabor
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflows. Izzy shares his journey from early fascination with green screen magic to his pioneering role in adapting deepfake technology. He provides insights into how deepfakes are disrupting the film industry and ignites discussion on the consequences of this powerful technology, from ethical implications to its rapid integration into advertising and beyond, painting a thought-provoking picture of AI's burgeoning role in content creation.
TIMESTAMPS:
00:00:16 - Introduction to deepfakes and their impact on perception
00:02:19 - Background in film and visual effects
00:11:23 - Interest in AI and learning coding
00:14:02 - Increase in deepfake inquiries and major deals
00:16:53 - Responsibility of AI developers in shaping the ethical advancement of deepfake tools
00:20:23 - Simplifying the deepfake production process
00:24:30 - Concerns about AI's impact on the filmmaking process
00:26:42 - Narrow application in AI leading to powerful outcomes
00:31:28 - Lack of identity safeguards for actors in the entertainment industry
00:35:03 - Potential benefits of actors adopting deepfake technology
00:39:55 - Potential impact of deepfakes on politicians and lawmakers
00:41:00 - Potential for real-time deepfakes and their applications in scams and fraud
00:44:30 - Company focus on predicting behavior, implementing AI managers, and automating high leverage tasks
00:50:23 - Benefits of a hybrid approach combining AI and human management
00:51:53 - Utilizing AI for detecting user behavior anomalies and insider threat detection
SYMLINKS
VFX LA (company): https://vfxlosangeles.com/
Sin City (movie): https://www.imdb.com/title/tt0401792/
After Effects (software): https://www.adobe.com/products/aftereffects.html
UCLA Extensions (educational institution): https://www.uclaextension.edu/
Ender's Game (movie): https://www.imdb.com/title/tt1731141/
University of Texas (educational institution): https://www.utexas.edu/
SSRN Paper: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4739430#
Inspira AI (website): https://www.inspira.ai/
Han Barbecue (restaurant): https://www.yelp.com/biz/han-bbq-burbank
Scum and Villainy Cantina (bar): https://scumandvillainycantina.com/
Buena Vista Cigar Lounge (bar): https://www.yelp.com/biz/buena-vista-cigar-club-beverly-hills
DRINK INSTRUCTION
The Replicant
1.5 oz Vodka
3/4 oz Midori
3/4 oz Lemon Juice
1/2 oz Lemon Juice
Combine all ingredients into a shaker with ice. Shake well and strain into a chilled cocktail glass.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understandable, and he continues to contribute actively to the field.
TIMESTAMPS:
00:02:27 - Introduction of Iceman, RFID hacker and contributor to the Proxmark project
00:07:23 - Explanation of Proxmark device capabilities and the development of the Iceman fork
00:14:13 - Formation of the RFID research group and transitioning from a hobby to a public figure
00:17:49 - Introduction of new RFID tools, concepts, and weaponizing RFID readers for unauthorized access
00:20:40 - Effectiveness of RFID wallets and the cat-and-mouse game with weaponized readers
00:24:06 - Development of magic cards for RFID hacking and the potential impact of AI on RFID research
00:28:29 - Participation in RFID hacking competitions, CTFs, and the importance of forums and Discord for knowledge sharing
00:34:42 - Flipper Zero as a well-made tool with an ecosystem for extending functionality
00:35:57 - The future of RFID hacking, including secure communications, advanced crypto, and chip implants by Dangerous Things
00:39:38 - Iceman's experience with metal detectors, TSA, and the exciting future of RFID for hackers and end users
00:42:52 - The need for vendors to allow legal copying of items and the importance of disrupting tracking and logistics systems
00:45:07 - Iceman's recommendations for following his work and joining relevant Discord server
SYMLINKS
X: https://twitter.com/herrmann1001/
YouTube: https://youtube.com/@iceman1001/
Discord: https://discord.com/invite/QfPvGFRQxH/
Proxmark3: https://proxmark.com/
Iceman Fork: https://github.com/RfidResearchGroup/proxmark3/
Dangerous Things: https://dangerousthings.com/
Flipper Zero: https://flipperzero.one/
IceDev: icedev.se
DRINK INSTRUCTION
Wildcard
1 oz Cardamaro
1 oz Genever
1 oz Cynar
Add all ingredients to a shaker filled with ice. Stir until chilled and properly diluted. Strain into a lowball glass filled with fresh ice. Optionally garnish with a sprig of rosemary or an orange peel.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Hutch, an expert in AI and cybersecurity, discusses his early interest in using AI for algorithmic trading and automating social engineering attacks with chatbots. He highlights two main cyber risks of advanced AI - the ability to manipulate people and autonomously execute attacks. Hutch and Chris explore issues like commercialization of AI versus proprietary chatbots, and tech companies' ethical duties to reduce AI risks through testing and responsible development. They delve into potential weaponization of AI in lethal autonomous weapons and "flash wars", as well as risks from intelligent humanoids. The need for global AI partnerships is discussed, but challenged by current geopolitics. Private sector researchers and companies have a key role in addressing AI safety and risks. However, adversaries likely have an edge in exploiting AI vulnerabilities, underscoring the importance of innovative defense strategies.
TIMESTAMPS:
00:02:14 - Introduction to Justin Hutchins (Hutch) and his background
00:03:43 - Hutch's interest in AI and cybersecurity
00:08:43 - Discussion on GPT-4 and its key risks
00:15:21 - Comparison between different AI platforms
00:20:28 - Viability of weaponizing emerging technologies
00:25:10 - Viability of embedding AI into realistic form factors
00:30:53 - Psychological effects of chatbots on humanity
00:35:48 - The need for global partnerships to regulate AI
00:40:36 - Adapting AI capabilities for weaponization
00:47:30 - Adversarial threat actors and their adaptation to AI
00:50:46 - AI systems circumventing security controls
00:53:48 - The concept of singularity in AI
SYMLINKS
Linkedin: https://www.linkedin.com/in/justinhutchens/
X: https://twitter.com/sociosploit/status/1546218889675259904
The Language of Deception- Weaponizing Next Generation: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
Socioploit: https://www.sociosploit.com/
Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcast
DRINK INSTRUCTION
The Hallucination
1 oz Elderflower Liqueur
1 oz Absinthe
1 oz Fresh Lemon Juice
Guava Soda
Add ice into a chilled cocktail glass. Add the Elderflower Liqueur, Absinthe, and lemon juice into a cocktail shaker without ice. Shake vigorously. Strain into the glass with ice. Top off with guava soda.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Your feedback is valuable to us. Should you encounter any bugs, glitches, lack of functionality or other problems, please email us on [email protected] or join Moon.FM Telegram Group where you can talk directly to the dev team who are happy to answer any queries.