エピソード

  • Dr. Eric Cole | Leading CISO Coach: The Cold War of Cybersecurity EP 10
    2025/07/01

    In this episode of the Ransomware Rewind podcast, Mike and Joe interview renowned cybersecurity expert Eric Cole, also known as the Cyber Czar.

    The discussion delves into Eric's fascinating journey from being a CIA hacker in the 1980s to creating successful cybersecurity firms and becoming a thought leader in the industry. Read down to the bottom to get the link for Dr. Eric Cole's book for free!

    00:00 Welcome to Ransomware Rewind

    01:06 Eric's Journey to the CIA

    05:42 Early Cybersecurity Challenges

    10:31 Adventures with John McAfee

    15:44 The Butterfly Effect Philosophy

    24:52 The Importance of Business Acumen for CISOs

    28:53 The Power of Effective Communication

    29:14 The Butterfly Effect in Cybersecurity Training

    29:34 Sharing Knowledge for Greater Impact

    30:01 Challenges in Communicating Security Needs

    30:28 Humorous Take on ROI in Personal Life

    30:57 Avoiding Unwinnable Fights

    31:08 Debating the Role of Chinese Nationals in Tech

    32:24 Inconsistencies in Tech Regulations

    34:40 The Cold War of Cybersecurity

    37:21 The Backbone of the Internet

    39:23 The Future: Star Trek or Skynet?

    40:31 Ethical Dilemmas in Predictive Policing

    42:51 Final Thoughts and Future Plans

    Joe Erle, Cyber Group Practice Leader at C3 Insurance

    X / https://x.com/joe_erle

    Tiktok / https://www.tiktok.com/@itscyberjoe

    Insta / https://www.instagram.com/itscyberjoe/

    Meta / https://www.facebook.com/joeerle/

    LinkedIn / https://www.linkedin.com/in/joeerle/

    Questions about cyber insurance?

    Email joe@c3insurance.com

    Get the 14 Steps to protect your data here:

    https://c3insurance.com/secure-your-companys-data/

    Mike Dowdy

    LinkedIn / https://www.linkedin.com/in/mikedowdy/

    Special Guest:

    Dr. Eric Cole, Cybersecurity Expert

    Consulting Company / https://secure-anchor.com/about/

    LinkedIn / https://www.linkedin.com/in/ericcole1/

    Youtube / https://www.youtube.com/c/DrEricCole

    Bulletproof Cyber Podcast / https://www.youtube.com/channel/UCY8Ef086jcWMvx0wkArY-xA

    Instagram / https://www.instagram.com/drericcole/?hl=en

    X / https://x.com/drericcole

    Buy Eric's Book, Cyber Crisis on Amazon: https://a.co/d/bxH94tF

    Get Eric's newest book for free here: https://safe.secure-anchor.com/online-danger-free

    Thx for watching - Don't forget to like and subscribe.

    続きを読む 一部表示
    46 分
  • Cybersecurity CEO Reveals How Hackers Are Advancing | What Every Business Must Know | EP 9
    2025/05/28

    Dennis Underwood, a cybersecurity expert and CEO of Cyber Crucible, joins the show to discuss a variety of topics ranging from his experiences in Pittsburgh to the intricacies of cybersecurity. He delves deep into the technical aspects and importance of cybersecurity. He explains how Cyber Crucible's autonomous software works to prevent data breaches in real-time, even preventing hackers from executing malware.

    Our conversation also touches on the evolution of hacking tactics, the importance of multifactor authentication, the value of cyber insurance, and practical security tips for businesses.

    We discussed the increasingly professional structure of hacking organizations, compared various cybersecurity solutions, and explored some notable cyberattacks, including ransomware incidents. The episode wraps up with a focus on the human element in cybersecurity and the critical role of preparation and proper planning in preventing cyber threats.

    If you enjoyed this episode, don't forget to subscribe. Thank you for listening!

    00:00 Introduction

    01:01 Cyber Crucible Product Overview

    02:33 Explaining Cyber Crucible

    04:49 Comparing Cybersecurity Products

    06:26 Hacker Techniques and Evolution

    19:37 Influencers and Cybersecurity

    26:32 Exploring Insurance for Online Marketplaces

    27:13 Underwriting and Due Diligence in Insurance

    29:10 Cybersecurity Threats: NotPetya and Ransomware

    31:31 Ransomware Negotiations and Hacker Motivations

    35:01 Suspicious Ransom Payments and Company Involvement

    40:26 Targeted Hacks and Executive Protection

    46:31 Practical Security Tips for Businesses

    52:17 Connecting with Dennis Underwood and Crowdfunding

    Social Media: Connect to Joe, Mike, and David on social media platforms like LinkedIn, TikTok, and Instagram:

    Joe Erle, Cyber Group Practice Leader at C3 Insurance

    X / https://x.com/joe_erle

    Tiktok / https://www.tiktok.com/@itscyberjoe

    Insta / https://www.instagram.com/itscyberjoe/

    Meta / https://www.facebook.com/joeerle/

    LinkedIn / https://www.linkedin.com/in/joeerle/

    Questions about cyber insurance? Email joe@c3insurance.com

    Get the 14 Steps to protect your data here: https://c3insurance.com/secure-your-companys-data/

    Co-Host: Mike Dowdy, Cloud Solutions Consultant at RapidScale

    LinkedIn / https://www.linkedin.com/in/mikedowdy/

    Questions about cloud security? Email mike.dowdy@rapidscale.net

    www.rapidscale.net

    Special Guest: Dennis Underwood, CEO of Cyber Crucible

    LinkedIn / https://www.linkedin.com/in/dennis-underwood/

    Cyber Crucible / https://www.cybercrucible.com/

    See you next time. #cybersecurity #ransomware #ransomwarerewind

    続きを読む 一部表示
    56 分
  • The Real Cost of Trust : A Real-Life Fraud Story | Ransomware Rewind Podcast | David Fradin | EP 8
    2025/05/08

    Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud

    Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud David Fradin tells his harrowing story of a how he lost $1.7 million to a sophisticated online pig butchering scam.

    Learn key insights and practical tips to protect yourself from similar scams. Discover the complex tactics scammers use to build trust and exploit victims, and explore actionable solutions to help prevent these crimes.

    Tune in to become more aware and better equipped to safeguard your finances and personal information

    00:00 Introduction and Crypto Scam Experience

    00:32 Guest Introduction and Mission

    01:09 Keys to Product Success

    02:06 Podcast and Professional Background

    03:21 Detailed Scam Story

    08:18 Scam Aftermath and Financial Impact

    10:31 Government and Law Enforcement Involvement

    13:02 Global Scam Operations and Solutions

    14:00 Social Media's Role in Scams

    22:25 WhatsApp and Social Media Accountability

    24:08 Apple's Values and Final Thoughts

    25:05 From Political Campaigns to Product Management

    25:34 The Staggering Impact of Pig Butchering Scams

    25:50 Victim Blaming and Stigma

    26:23 Creative Solutions to Combat Scams

    26:42 Recognizing Scam Tactics

    29:19 The Role of AI in Scams

    32:09 Crypto and Financial Fraud

    34:16 Charity and GoFundMe Scams

    35:04 Bike Theft and Recovery

    40:11 Final Thoughts and Advice

    Social Media: Connect to Joe, Mike, and David on social media platforms like LinkedIn, TikTok, and Instagram

    Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance

    X/ joeerle

    Insta/ itscyberjoe

    Tiktok/ itscyberjoe

    Meta/ joeerle

    LinkedIn/ https://www.linkedin.com/in/joeerle/

    Questions about cyber insurance?

    Email joe@c3insurance.com

    Get the PDF - 14 Steps to Protect your Company's Data

    Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale

    LinkedIn/ https://www.linkedin.com/in/mikedowdy/

    Questions about cloud security?

    Email mike.dowdy@rapidscale.net

    www.rapidscale.net

    Special Guest David Fradin

    Operation Shamrock (helps people who've been victims of internet fraud and pig butchering): https://operationshamrock.org/

    David's LinkedIn: https://www.linkedin.com/in/davidfradin

    David's Consulting Company: www.spicecatalyst.com

    David's Book - Letters from my Hymie: https://a.co/d/4GnKUOW

    Don't forget to subscribe. Check out our other episodes & thank you for listening.

    続きを読む 一部表示
    45 分
  • How to get into Cybersecurity with Sam Romanov - EP 8
    2025/03/18
    Business owners and IT professionals: Learn how to kickstart a successful career in cybersecurity with expert insights from Cybersecurity Consultant and Content Creator, Sam Romanov. Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they explore the latest trends in cybersecurity. Discover practical tips on becoming a cybersecurity consultant and how to train yourself to be competitive in this cybersecurity job market. Key Takeaways: Breaking into Cybersecurity: Tips for beginners looking to start their careers.CISO Consulting: The role of a Chief Information Security Officer and how to become a successful consultant. Cybersecurity Trends: Understanding the latest threats and technologies shaping the industry.Career Advancement: Strategies for professionals looking to grow in their cybersecurity careers. Explore the world of cybersecurity with Sam Romanov, a renowned expert in the field. Learn about the latest trends, challenges, and opportunities in cybersecurity consulting. From breaking into the industry to becoming a successful CISO consultant, this episode provides actionable advice for both beginners and seasoned professionals. Chapters: Introduction and Guest Introductions (00:00 - 03:02)Getting Started in Cybersecurity (03:02 - 07:46)CISO Consulting: Challenges and Opportunities (07:46 - 14:44) Cybersecurity Trends and Threats (14:44 - 21:22) Practical Tips for Career Advancement (21:22 - 26:02) Navigating Cybersecurity Regulations (26:02 - 31:11)Closing Thoughts and Contact Information (31:11 - 40:45) This episode of the podcast features Sam Romanov, a cybersecurity expert with extensive experience in the field. The discussion focuses on how to enter the cybersecurity industry, the role of a CISO consultant, and the latest cybersecurity trends. Sam shares insights on overcoming common challenges and provides practical advice for advancing your career in cybersecurity. Recommended Certifications for Cybersecurity: CompTIA Network+: Essential for understanding networking fundamentals.CompTIA Security+: A foundational certification for security professionals. CISSP: Advanced certification for experienced security professionals. CISM: Focuses on risk management and information security governance. Social Media: Join our conversation on social media platforms like LinkedIn, TikTok, and Instagram, where we share insights, news, and tips on cybersecurity. Engage with our community to stay informed and network with fellow cybersecurity enthusiasts. Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance https://www.linkedin.com/in/joeerle https://www.instagram.com/itscyberjoe/ https://www.tiktok.com/@itscyberjoe Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale https://www.linkedin.com/in/mikedowdy/ Special Guest: Sam Romanov, Cybersecurity Expert at Cornerstone Technology Solutions https://www.linkedin.com/in/samuel-romanov-198a2916b/ https://www.instagram.com/cybersecurity.sam/ https://www.tiktok.com/@cybersecurity.sam Sam's Cybersecurity Growth Community https://www.skool.com/cybersecurity-growth-community Sam's Free Ebook: Starting your career in Cybersecurity https://tinyurl.com/3yc4m7ht #CyberSecurity #CareerAdvice #CISOConsulting #CyberInsurance #DataProtection #IncidentResponse #RiskManagement #cybersecurityjobs
    続きを読む 一部表示
    55 分
  • United Healthcare Hack Conspiracy - EP 7
    2025/03/06

    Business owners and IT professionals: Learn practical cybersecurity tips and be entertained at the same time. :)

    Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they bring you unique insights from top industry professionals (Cyber Lawyer & Pentester on this episode) on the latest threats and protection strategies.

    In this episode, we uncover the shocking details of the United Healthcare hack and its far-reaching implications. Don't let your business become the next victim – subscribe now to stay one step ahead of cybercriminals and protect your digital assets.

    Our expert panel discusses the far-reaching implications of the UHC breach, the importance of robust cyber insurance, and practical steps businesses can take to protect themselves. From insider trading suspicions to Nancy Pelosi connections, we uncover the intriguing details surrounding this major cyber incident.

    Was there a connection to the murder of UHC CEO, Brian Thompson? We put on our tin foil hats for a moment to discuss if Luigi Mangione worked alone or was part of a calculated conspiracy.

    Special guests: Ross Molina, Partner and Vice Chair of the Data Privacy & Cybersecurity Practice of Lewis Brisbois https://www.linkedin.com/in/ross-molina-20784111

    &

    Mathew Quammen, Pentester, Co-Founder, and President of Optimize Cyber https://www.linkedin.com/in/matthewquammen/

    Explore the United Healthcare ransomware attack with cybersecurity experts. Learn about the $22 million ransom, supply chain vulnerabilities, and the critical role of cyber insurance. Discover how multi-factor authentication, incident response plans, and proactive risk management can safeguard your business from devastating cyber threats.

    Chapters: Introduction and guest introductions (00:00 - 03:02)

    United Healthcare hack overview (03:02 - 07:46)

    Supply chain vulnerabilities and vendor management (07:46 - 14:44)

    Cyber insurance and its importance (14:44 - 21:22)

    Insider trading suspicions and Nancy Pelosi connection (21:22 - 26:02)

    Legal protections and incident response planning (26:02 - 31:11)

    Practical cybersecurity tips for businesses (31:11 - 37:02)

    Closing thoughts and contact information (37:02 - 40:45)

    Extended Summary: This episode of Ransomware Rewind features a panel of cybersecurity experts discussing the massive United Healthcare hack and its implications. The attack, carried out by Black Cat Alpha V, resulted in the theft of 6 terabytes of data affecting over 100 million records. United Healthcare paid a $22 million ransom but still faced significant challenges afterward.

    The conversation covers various aspects of cybersecurity, including:

    The importance of supply chain security and vendor management

    The critical role of cyber insurance in mitigating risks

    Legal protections and the need for incident response planning

    Practical cybersecurity measures like multi-factor authentication (MFA) and regular audits

    The potential insider trading and political connections surrounding the hack

    Experts emphasize the need for businesses of all sizes to take cybersecurity seriously, highlighting that many protective measures are more affordable and accessible than commonly believed. They stress the importance of having a comprehensive incident response plan, robust cyber insurance coverage, and proactive risk management strategies.

    The episode concludes with practical advice for businesses, including the use of MFA, regular IT provider audits, and the importance of understanding and managing supply chain risks. Listeners are encouraged to use their annual insurance reviews as an opportunity to assess and improve their overall cybersecurity posture.

    #CyberSecurity #RansomwareAttack #UnitedHealthcareHack #CyberInsurance #DataProtection #IncidentResponse #SupplyChainRisk #MFA #riskmanagement

    続きを読む 一部表示
    41 分
  • Inside the War on Ransomware: Ricoh Danielson's Guide to Crisis Response
    2025/02/10
    Enterprise Incident Response & Crisis Management with Combat Veteran, Ricoh Danielson In this exclusive interview, we speak with Ricoh Danielson, a U.S. Army Combat Veteran of Iraq and Afghanistan turned cybersecurity expert. Topics in This Interview (breakdown with timestamps below) How businesses can prepare for and respond to cyberattacksBest practices for personal security to safeguard your digital identitySafety measures after disasters and crisis management tipsThe rise of AI-driven ransomware and its impact on businessesRicoh’s military experiences and how they shaped his approach to cybersecurity Why Watch This Video? Learn from Ricoh’s expertise as a digital forensics powerhouse with experience handling high-profile hacks.Discover practical strategies to protect your business from ransomware and other cyber threats.Gain insights into effective communication during a breach or disaster. About Ricoh Danielson: Ricoh is a U.S. Army Combat Veteran with over 9 deployments across Iraq, Afghanistan, and Africa. As the founder of Fortitude Tech LLC and 1st Responder, he has worked on high-stakes cases involving hospitals, corporations, and state governments. Recently featured on NTD News discussing cyberattacks in New Orleans and Las Vegas, Ricoh is also an author and sought-after speaker in the cybersecurity space. Chapters: 0:00 Intro to Ricoh Danielson: Ricoh shares his journey from military service to becoming a leader in digital forensics and cybersecurity. Learn how his combat experience shaped his approach to crisis management. 2:15 How Businesses Can Prepare for Cyberattacks: Practical steps to defend against ransomware, phishing, and other threats using identity access management (IAM) and conditional access policies. 5:30 Personal Security Tips: Actionable advice on protecting your digital identity, recognizing phishing scams, and avoiding psychological tactics used by hackers.9:45 Crisis Management After Disasters: Insights into preparing for grid failures or natural disasters with go bags, alternative communication plans, and safety strategies.13:20 AI-Driven Ransomware Explained: A deep dive into polymorphic ransomware powered by AI—how it works and why businesses must stay ahead of these advanced threats.17:00 Lessons from Military Service Applied to Cybersecurity: How Ricoh’s military background prepared him to handle chaotic situations like ransomware attacks on hospitals and global corporations.20:00 The Role of CISOs and Board Communication: Challenges CISOs face when communicating risks to boards, securing equity in companies, and leveraging D&O insurance for protection.24:00 How to Break Into Cybersecurity: Advice for aspiring professionals on certifications like Network+ and Security+, as well as opportunities in governance, risk, compliance (GRC), IAM, and privilege access management (PAM).28:00 Quick Wins for Improving Cybersecurity Posture: Simple strategies like enabling conditional access policies in Microsoft 365 environments or conducting Business Email Compromise (BEC) assessments.31:00 Crisis Management & Incident Response Strategies: The importance of alternative communication plans during crises—Ricoh shares exercises involving burner phones and laptops for CEOs.34:00 Preparing for Grid Failures & Disaster: Tips on securing six months’ worth of food/water supplies, understanding ham radios for communication, and ensuring family safety during emergencies.37:00 Cybersecurity Books by Ricoh Danielson - Ricoh introduces his books, including No-Nonsense Cybersecurity (https://a.co/d/43Myc13) for practical advice, FM Field Manual (https://a.co/d/14qOL5K)as an art-focused coffee table book on cybersecurity, and Tactical Manual (https://a.co/d/iGfOBS6), a highly technical guide with step-by-step instructions. Subscribe for more interviews like this! Comment below what you found interesting in the podcast. 🔗 Follow Ricoh Danielson on Instagram @Ricoh_Danielson or LinkedIn www.linkedin.com/in/ricoh-danielson-736a0715 🔗 Learn more about Ricoh on his website: www.ricohd.us 🔗Breakfast with a CISO on Youtube: www.youtube.com/@dricoh22/videos 🔗 Find the host, Joe Erle, at: www.linkedin.com/in/joeerle @itscyberjoe on instagram and tiktok Get the 14 steps to protecting your data PDF here: www.c3insurance.com/cyber Or you can email Joe at joe@c3insrance.com for speaking inquiries or cyber insurance quotes. If you need cloud security solutions... our absent host, Mike Dowdy, can be found here: linkedin.com/in/mikedowdy Cybersecurity #IncidentResponse #DigitalForensics #BusinessSecurity #AIThreats #RansomwareResponse #CISORoleInsights #AIThreatMitigation #DigitalForensicsExpertise #IncidentResponseStrategies #CybersecurityLeadership #MilitaryToCybersecurity #CrisisManagementTips #ProtectYourBusinessOnline #AdvancedCyberThreats
    続きを読む 一部表示
    39 分
  • iPhone CyberSecurity, Meme Coins, & The Future of Cloud Security | Ransomware Rewind Ep. 5 feat. Dave Tuckman, CISM
    2025/01/29

    In this episode of Ransomware Rewind:

    iphone & BYOD best practices for businesses for cybersecurity, Crypto meme coin rug pulls, cloud security mistakes, legacy software vulnerabilities, and more.

    Dave Tuckman from Fr Secure joins us to discuss everything from digital currencies, including the infamous "Hawk Tuah Girl" meme coin, to the evolving landscape of cloud security. We also chat about some wild predictions—like the possibility of time travel using quantum computing...

    Tune in for fascinating insights, fun tangents, and expert analysis on cybersecurity and beyond. Topics Covered:

    • Smartphone and Cloud Security
    • The rise and fall of meme coins: "Hawk Tuah Girl"
    • How meme coins are impacting the crypto world
    • Predictions for the future of tech (including time travel!)

    Make sure to subscribe and never miss an episode of the Ransomware Rewind Podcast!

    Follow us on LinkedIn for daily tech and cybersecurity insights:

    Get a hold of Joe for Cybersecurity Insurance

    https://www.linkedin.com/in/joeerle/

    www.c3insurance.com/cyber

    Get a hold of Mike for Cloud Security and Management Solutions https://www.linkedin.com/in/mikedowdy/

    https://rapidscale.net/

    Dave Tuckman for IT consulting and strategy and IR services

    https://www.linkedin.com/in/davetuckman/

    Take advantage of FR Secure's free resources here:

    https://frsecure.com/resources/

    #cybersecuritytalks #cybersecurity #cybersecuritypodcast #businesspodcast #cloudsecurity

    続きを読む 一部表示
    1 時間 2 分
  • Spies, Data Centers, and Crypto: The New Battlegrounds of the Digital Age
    2024/11/22

    In this episode, Mike and Joe are joined by John Braggiotti. With over 20 years experience in the datacenter space working on data centers on multiple continents John knows the real reasons the likes of Microsoft, Amazon and Google are spending billions on data centers. We dive into the shadowy world of nation-state spying and how governments are leveraging cyber tools to gain an edge in the global arena. We explore the pivotal role of data centers as the backbone of the information economy, powering everything from streaming services to sensitive government operations. Finally, we decode the connection between cryptocurrency and geopolitics, uncovering how blockchain technology is influencing power dynamics worldwide. Tune in for an eye-opening discussion on the intersections of espionage, infrastructure, and innovation in the digital era.

    続きを読む 一部表示
    1 時間 18 分