Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who will greet and walk us through making an exceptional yet easy-to-make beverage right from the comfort of your own home. It's Cybersecurity straight up, no chaser.Winner of a 2021 People's Choice Podcast Award (Technology Category).
In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understanding cognitive attacks and their implications for both humans and AI systems. In this conversation, Chris Glanden and Matt Canham delve into the evolving landscape of cognitive security, emphasizing the need for security practitioners to adopt a systems-thinking approach. They discuss the implications of AI and direct neural interfaces on security practices, the role of DeepSeek in shaping AI interactions, and insights from the Cognitive Security Institute's meetings. The conversation also touches on emerging trends in cognitive warfare and concludes with a thematic drink inspired by the complexities of the field.
TIMESTAMPS:
00:00 Introduction to Deep Fakes and AI Technology
02:28 Understanding Cognitive Security
09:58 Differentiating Cognitive Security from Social Engineering
19:05 Exploring the OSI Model and Cognitive Security Layers
21:48 Bringing Security Back to Earth
24:26 The Role of Cognitive Security in Modern Threats
25:02 AI's Impact on Security Practices
30:36 DeepSeek and Its Implications
33:47 Insights from the Cognitive Security Institute
41:28 Emerging Trends in Cognitive Warfare
45:43 The Complexity Cocktail: A Thematic Conclusion
SYMLINKS:
Dr. Matthew Canham – Home – https://www.canham.ai/
The official website of Dr. Matthew Canham, showcasing his expertise in human–AI integration, cognitive security, and updates on his latest projects and research.
Research – https://www.canham.ai/research
A dedicated section highlighting Dr. Canham’s research initiatives and academic contributions in the field of human–AI integration and cognitive security.
LinkedIn – https://www.linkedin.com/
Dr. Canham’s professional networking profile where you can learn more about his career achievements, collaborations, and thought leadership.
Cognitive Security: Exploring the Human Layer w/ Dr. Matthew Canham | CSI Talks #1 – https://youtu.be/OGmvoj5Dj_A
A YouTube video where Dr. Canham elaborates on cognitive security and human–AI integration, aligning closely with the conversation’s focus on evolving security threats.
Cognitive Security – Army Cyber Institute – https://cyber.army.mil/Research/Research-Labs/Cognitive-Security/
An official U.S. Department of Defense page describing research into cognitive security—protecting decision-making under adversarial conditions. This resource underscores the growing institutional focus on the subject.
Apple’s Mind-Blowing Invention: AirPods That Can Read Your Thoughts – https://digialps.com/apples-mind-blowing-invention-airpods-that-can-read-your-thoughts/]
An article that examines Apple’s patent for AirPods designed to detect brain signals, di
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stanley’s 400-person Cyber Security Division, later holding executive roles at Bank of America and Goldman Sachs. Now a trusted advisor to C-suites and boards, Curt shares how the lessons of engineering, military strategy, and high-stakes cyber defense all come down to maintaining control under pressure.
TIMESTAMPS:
00:00 Curt Vincent's Journey to Cybersecurity
14:40 Building Cybersecurity at Morgan Stanley
28:39 Cultural Shifts in Cybersecurity Practices
29:24 The Disconnect Between Cybersecurity and Business
32:13 Accountability and Consequences in Cybersecurity
35:12 Communication and Leadership in Cybersecurity
38:40 Connecting with the Audience: The Role of Analogies
39:14 Unique Experiences and Cultural Perspectives
SYMLINKS:
Curt Vincent's Website - https://curtvincent.com
Curt Vincent’s speaker website where he shares insights on cybersecurity, leadership, and consulting.
KnowBe4 - https://www.knowbe4.com
A cybersecurity awareness training platform that specializes in phishing simulation and security education to help organizations mitigate human-related risks.
Proofpoint - https://www.proofpoint.com
A cybersecurity company providing threat intelligence, email security, and phishing prevention solutions to protect organizations from cyber threats.
Morgan Stanley Cybersecurity - https://www.morganstanley.com/
Morgan Stanley’s approach to cybersecurity includes best practices and risk management strategies for businesses and individuals.
Widener University - https://www.widener.edu
The university where Curt Vincent pursued his degree before re-entering the military and advancing in his cybersecurity career.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking, raising questions about the intersection of technology and the paranormal. In this conversation,they discuss the fascinating intersection of psychic abilities and cybersecurity. They discuss a blackbox experiment designed to test psychic phenomena, revealing surprising results and implications for security. The conversation explores how psychics can inadvertently gather information, the potential dangers of psychic hacking, and the importance of imagination in cybersecurity. Scotch shares insights on developing psychic abilities, future research projects, and personal experiences with haunted locations, culminating in a creative discussion about a hypothetical cybersecurity-themed bar.
TIMESTAMPS:
00:00 - Introduction to Scotch Wichmann and His Journey
09:52 - The Intersection of Cybersecurity and Paranormal Experiences
19:33 - Exploring the U.S. Government's Stargate Program
28:15 - Psychic Hacking: A New Frontier in Cybersecurity
34:10 - The Black Box Experiment
35:28 - Psychic Insights and Surprising Results
39:53 - Collusion and Confidence in Psychic Abilities
42:11 - Developing Psychic Abilities
44:30 - The Dangers of Psychic Hacking
46:14 - Cybersecurity Implications of Psychic Phenomena
49:49 - Defending Against Psychic Attacks
56:36 - Imagination in Cybersecurity
59:53 - Future Research and Projects
01:01:29 - Connecting with Scotch Witchman
01:02:34 - Haunted Bars and Personal Experiences
01:04:35 - Creating a Cybersecurity-Themed Bar
SYMLINKS:
Scotch Wichmann's Website - https://www.scotchwichmann.com
A personal website featuring Scotch Wichmann’s work, including cybersecurity insights, performance art, and paranormal research.
Psychic Hacking Experiment - https://www.psychicexperiment.org
A website detailing Scotch Wichmann’s experiment on psychic hacking, including methodologies, results, and raw data for public review.
Stargate Project - http://en.wikipedia.org/wiki/Stargate_Project_(U.S._Army_unit)
Wikipeida page based on a secret U.S. Army unit established in 1977[1][2] at Fort Meade, Maryland, by the Defense Intelligence Agency (DIA) and SRI International (a California contractor) to investigate the potential for psychic phenomena in military and domestic intelligence applications.
CIA Declassified Documents on Remote Viewing -https://www.cia.gov/readingroom/
The CI
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on security and offers advice for those looking to specialize in macOS security.
TIMESTAMPS:
00:00 Introduction to Cybersecurity and Slava's Journey
07:03 Understanding macOS Security and Threat Landscape
11:38 ThreatLocker’s Zero Trust Approach
16:36 Evolving Threats and Social Engineering
21:23 Advice for Aspiring macOS Security Professionals
26:04 Closing Thoughts and Recommendations
SYMLINKS:
ThreatLocker Official Website - https://www.threatlocker.com
The official site for ThreatLocker, a cybersecurity company specializing in zero-trust security solutions.
Zero Trust World 2025 Conference - https://zerotrustworld.threatlocker.com/
An immersive cybersecurity event scheduled for February 19-21, 2025, in Orlando, Florida, featuring hands-on hacking labs, expert sessions, and networking opportunities.
Zero Trust World 2025 Agenda - https://ztw.com/agenda Detailed schedule of sessions, including keynotes, breakout sessions, and hands-on labs for the Zero Trust World 2025 conference.
Zero Trust World 2025 FAQ - https://zerotrustworld.threatlocker.com/faq
Frequently asked questions providing information on event details, registration, and accommodations for the Zero Trust World 2025 conference.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of navigating the job market today. In this engaging conversation, Chris Glanden and Syntax delve into various topics surrounding cybersecurity, innovative uses of technology, and the vibrant hacker community. They discuss the intricacies of Windows language packs and their implications for security, the creative use of Twitch as a command and control platform, and the importance of community-driven conferences. Syntax shares his experiences with unique venues and bars across the country, culminating in a humorous discussion about the concept of a cybersecurity-themed bar, complete with signature drinks that reflect hacker culture.
TIMESTAMPS:
00:00 - Introduction to Brandon Prince
03:52 - Early Life and Hacking Beginnings
06:33 - Navigating the Hacker Community
08:59 - The DJ Journey and DefCon Experience
11:22 - Incorporating Hacking into Music
14:01 - Motorbike Racing Adventures
16:35 - Current Job Market Insights
19:14 - Unique Hacking Experiences
26:46 - Resume Hacking
29:35 - Exploring Windows Language Packs and Exploits
31:39 - Innovative Use of Twitch as a C2
37:25 - Upcoming Conferences and Events
39:37 - Preference for Community-Based Conferences
46:29 - Unique Venues and Bar Experiences
51:29 - Conceptualizing a Cybersecurity-Themed Bar
SYMLINKS:
Syntax on Twitch - https://twitch.tv/Syntax976
Syntax's official Twitch channel where he streams music, sim racing, and hacker-themed content.
Syntax on SoundCloud - https://soundcloud.com/Syntax976
SoundCloud profile featuring Syntax's original tracks, including contributions to Defcon soundtracks.
DEF CON Media Server - https://media.defcon.org
Official media server for DEF CON, hosting soundtracks, talks, and other resources.
Meow Wolf Official Website - https://meowwolf.com
Interactive and immersive art experiences, including Meow Wolf venues mentioned by Syntax.
CactusCon Official Website - https://cactuscon.com
Details about the CactusCon conference in Phoenix, Arizona, where Syntax may perform.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Security Weekly podcast. His efforts also extend to organizing BSides Delaware, further cementing his influence and dedication to the cybersecurity community.
He shares his diverse career journey from law enforcement to tech support and finally into cybersecurity leadership. Listeners gain insight into his work with compliance frameworks like CMMC and SPDX, and his strategic approach at Cyturus, focusing on "dynamic risk monitoring" as a forward-thinking solution for mitigating risks. This episode also delves into the global regulatory landscape, comparing U.S. frameworks with those abroad and discussing AI regulation insights. As always, the conversation is enriched with amusing anecdotes and expert advice, making it not only educational but also engaging.
TIMESTAMPS:
0:00 - Exploring Security, Compliance, and Innovation
3:05 - Reviving In-Person Tech Conferences Post-COVID Challenges
11:58 - From Tech Support to Cybersecurity and Compliance
19:12 - The Challenges and Importance of Software Bill of Materials
24:25 - The Global Regulatory Landscape and Its Impact on AI Development
28:37 - HIPAA Compliance Challenges for Lawyers and Medical Startups
30:00 - Dynamic Risk Monitoring as a Compliance and Revenue Driver
34:32 - The Impact of Podcasts on the Cybersecurity Community
40:14 - Exploring Unique Bars and Crafting Cybersecurity-Themed Cocktails
SYMLINKS
Cyturus Website - https://cyturus.com
Official website for Cyturus, a leader in compliance process products and solutions, focusing on dynamic risk monitoring and governance.
Josh Marpet on LinkedIn - https://www.linkedin.com/in/joshuaviktor/
Josh Marpet's professional LinkedIn profile for networking and insights.
Paul’s Security Weekly - https://securityweekly.com
One of the top cybersecurity podcasts, providing news, insights, and discussions on emerging threats and best practices in security.
SPDX (Software Package Data Exchange) - https://spdx.dev
Official resource for SPDX, an ISO-certified standard for managing Software Bill of Materials (SBOM).
CycloneDX - https://cyclonedx.org
A standard designed for the SBOM, with a focus on integration with CI/CD pipelines and automated systems.
Executive Order 14028 - https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
U.S. Executive Order mandating the use of Software Bill of Materials (SBOM) for federal software contracts to improve cybersecurity.
Helen Oakley - https://www.linkedin.com/in/helen-oakley/
Profile and resources related to Helen Oakley, a professional working on AI Bill of Materials.
NIST AI RMF (Risk Management Framework) - https://nist.gov/ai/rmf
U.S. Nation
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
SESSION TITLE: BCP LIVE on Rendezvous Yacht II
RECORDED: 9/26/24
VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/
LOCATION: Philadelphia, PA
GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia
SPONSOR: Philly Tech Council
ABOUT GUESTS:
Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previously served as the CISO for the Philadelphia International Airport for five years, where he honed his skills in monitoring and securing a vast array of technological systems in both the public sector and critical infrastructure.
Jessica Hoffman plays a pivotal role in Philadelphia's cybersecurity landscape, working side by side with Damian Oreves. With experience in both private and public sectors, Jessica brings a comprehensive understanding of cybersecurity and is keenly focused on safeguarding citizens and workforce digital environments. Her expertise encompasses both tactical implementation and strategic oversight, demonstrating her dedication to making a difference in her community.
Key Takeaways:
Scrutinizing the broad scale of city-level cybersecurity necessitates efficient, automated asset inventory management.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she shares her holistic approach to leadership. A distinguished speaker and thought leader in the Philadelphia cybersecurity community, Klotz actively engages with various initiatives and forums to inspire future leaders.
Her book highlights 25 essential qualities for leaders across any industry. Focusing on traits like empathy, grace, and self-awareness, the book underscores the growing importance of these soft skills in building resilient, high-performing teams—crucial to modern leadership. The "TTIPPC" Framework emphasizes the need for transparency, inclusion, and consistency in fostering united and productive teams. Through engaging career stories, Klotz offers valuable insights into navigating professional challenges while balancing personal life with a compassionate and determined leadership approach.
TIMESTAMPS:
0:16 - Leading With Empathy and Building High-Performing Teams
2:18 - Cybersecurity Leadership Across Industries and Unique Challenges
7:15 - Balancing Leadership, Family, and Community Involvement
17:02 - Empathy and Grace: Essential Leadership Qualities for Success
25:03 - Building High-Performing Teams Through Positive Energy and Collaboration
37:04 - Leading With Empathy and Grace Through the TTIPPC Framework
45:25 - Cybersecurity Conversations and Creative Bar Concepts
SYMLINKS
Leading with Grace and Empathy - https://www.amazon.com/Leading-Empathy-Grace-Developing-Performing/dp/1950336573
URL where Tammy Klotz's book Leading with Empathy and Grace is available for purchase.
LinkedIn - https://www.linkedin.com/in/tammyklotz/
Platform where Tammy Klotz is available for professional networking.
Redstone Grill - https://redstonegrill.com
Tammy's go-to restaurant in Plymouth Meeting,PA with a great atmosphere and outdoor patio. Frequently used for professional dinners and happy hours.
Trinseo - https://www.trinseo.com
Tammy’s current employer, where she is focused on improving the cybersecurity program with a particular emphasis on OT security.
DRINK INSTRUCTION
Empathy Elixer
2 oz Bourbon
1 oz Elderflower Liqueur
1/2 oz Lemon Juice
Dash of Bitters
Optional: Lemon Twist
Combine all ingredients in a shaker with ice. Shake thoroughly, then strain into a glass. Optionally, garnish with a lemon twist.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era.
Len shares his personal and professional evolution, describing the cutting-edge technologies that allow him to boost human abilities through cybernetics. He explores the future of biohacking, touching on the legal, ethical, and social questions raised by integrating tech into our bodies. From the potential security risks to the thrill of becoming a cyborg, Len offers a clear look at a future where technology and humanity are more closely connected than ever before.
TIMESTAMPS:
0:16 - Exploring Transhumanism and Cybersecurity with Len, the Transhumanist Hacker
5:24 - A Gen Xer’s Journey Through the Evolution of Computers
12:01 - From Outlaw to Cybersecurity: A Journey of Transformation
19:05 - Exploring Transhumanism and Its Philosophical Divergence
21:49 - Pioneering Biohacking and Implantable Technology Innovations
35:53 - The Painful Process of Implant Procedures Without Anesthesia
39:54 - Body Modification and the Search for a Skilled Mechanic
42:43 - Advanced Implant Technology for Security and Cyber Attacks
52:23 - The Future of Augmented Humans and Technological Integration
1:06:10 - Unique Bars, Cybersecurity Themes, and Signature Drinks
SYMLINKS
Dangerous Things - https://dangerousthings.com
Website where Len purchased implantable technology for biohacking.
Grindhouse Wetware - https://en.wikipedia.org/wiki/Grindhouse_Wetware
Historical reference to the pioneering group that developed consumer-grade implantable technology and led the biohacking movement.
Pineapple Tangaroa (Body Mechanic) - https://www.austintattoo.com/pineapple-tangaroa.html
Pineapple is Len's body mechanic based in Austin, TX, specializing in body modifications like RFID and NFC implants.
Magnavox Odyssey 2 - https://en.wikipedia.org/wiki/Magnavox_Odyssey%C2%B2
Len’s first gaming system, sparking his curiosity in technology.
Newsweek Article (Tesla Key Implant) - https://www.newsweek.com/man-implants-chip-unlock-tesla-wave-1478879
Newsweek published an article about Pineapple Tangaroa implanting a Tesla car key into a human.
FM-2030 (Cryonics Pioneer) - https://en.wikipedia.org/wiki/FM-2030
FM-2030 was a key figure in the cryonics movement and transhumanism.
Rich Lee (DIY Cyborg) - https://golden.com/wiki/Rich_Lee_(Biohacker)
Rich Lee is known for his biohacking experiments, including magnetic ear implants and the Lovetron 9000 device.
RSA Conference - https://www.rsaconference.com
One of the major cybersecurity conferences where Len has presented.
DEF CON (Biohacking Village) -
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub.
The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From exploring the ethical dilemmas and security concerns to understanding the dangers of deepfake technology. Industry icon George Gerchow also opens up about the deeply personal story behind the X Foundation, highlighting the critical issue of fentanyl poisoning awareness.
As the conversation unfolds, the experts engage in a compelling exploration of AI's future, its societal impacts, and the evolving relationship between humans and technology. The episode highlights the importance of forward-thinking leadership in guiding us through this transformative shift.
TIMESTAMPS:
00:04:00 - From Bar Talk to Episode 100: A Podcast's Journey
04:17:00 - AI's Impact on Job Automation and Cybersecurity
09:41:00 - A Father's Heartbreaking Story and the Mission of the X Foundation
17:29:00 - The Future of AI: Security, Ethics, and Human Impact
28:43:00 - The Complexities and Ethics of Creating High-Quality Deepfakes
34:05:00 - The Future of Humanity and AI Integration
SYMLINKS
BarCode Security: https://barcodesecurity.com/
BarCode (LinkedIn): https://www.linkedin.com/company/barcodesecurity/
X Foundation: https://xfoundation.org/
Barcode Burger Bar (Las Vegas): https://www.barcodeburgerbar.com/
ThreatLocker: https://www.threatlocker.com/
Exploit Security: https://www.exploitsecurity.io/
Ironwood Cyber: https://www.ironwoodcyber.com/
Sevn-X: https://www.sevnx.com/
The Language of Deception: Weaponizing Next Generation AI: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/
TED Talk - Fentanyl Poisoning: https://www.youtube.com/watch?v=z651z4pfMZs
Time Magazine Article - Fentanyl Crisis: https://time.com/6277243/fentanyl-deaths-young-people-fake-pills/
OpenAI (Stargate Supercomputer Project): https://sidecarglobal.com/blog/an-overview-of-microsoft-and-openais-ambitious-vision-for-the-future-of-ai-supercomputing
AI Trust Council: https://aitrustcouncil.org/
VFX Los Angeles: https://vfxlosangeles.com/
Inspira AI: https://inspira.ai/
PsyberLabs: https://psyber-labs.com/
DRINK INSTRUCTION
Keep it 100
1 oz Captain Morgan 100 proof
1/2 oz Coffee Liqueur
1/4 oz Simple Syrup
1 ½ oz Espresso
Add all ingredients to a shaker and shake. Strain into a coupe glass.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]
A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements.
We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation.
TIMESTAMPS:
00:16:00 - Navigating the AI Paradox: Innovation and Danger
07:52:00 - From Tech Entrepreneur to Anti-Trafficking Advocate
12:17:00 - AI Agents Compete Against Human Social Engineers at Defcon
19:47:00 - Innovative Approaches to Cybersecurity Education and Workforce Development
26:51:00 - Combating Deepfake Misinformation in an Increasingly Sophisticated Landscape
31:36:00 - AI’s Impact on Jobs and Cybersecurity
38:16:00 - Connectcon: A Collaborative Cybersecurity Conference Focused on Human-Centered Solutions
41:18:00 - Exploring Unique Bars and Cybersecurity-Themed Drinks in Vegas
SYMLINKS
LinkedIn (personal): https://www.linkedin.com/in/lisaflynncatalyst/
ConnectCon: https://www.connectcon.world/
C&C Generative AI Policy - <link>
DRINK INSTRUCTION
m.AI t.AI
1 1/2 oz White Rum
3/4 oz Orange Curacao
3/4 oz Lime Juice
1/2 oz Orgeat Syrup
1/2 Dark Rum
Add the white rum, curacao, lime juice and orgeat into a shaker with crushed ice and shake lightly. Pour into a rocks glass. Float the dark rum over the top. Garnish with a lime wheel and mint sprig.
CONNECT WITH US
www.barcodesecurity.com
Become a Sponsor
Follow us on LinkedIn
Tweet us at @BarCodeSecurity
Email us at [email protected]