Task Force 7 Cyber Security Radio
By George Rettas
To listen to an audio podcast, mouse over the title and click Play. Open iTunes to download and subscribe to podcasts.
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today. Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more about cyber security and new threats affecting the social, political, business, and economic concerns of our world. We explore a wide range of controversial issues that you won’t want to miss each week. Task Force 7 Radio is broadcast live every Monday at 8 PM Eastern Time, 5 PM Pacific Time, on the VoiceAmerica Business Channel.
||CleanNew News! Uber Wasn't Hacked?||Host George Rettas finishes his analysis of the Jacobs Uber Whistleblower which alleges Uber used illicit information obtained through alleged criminal activity tasked by an overreaching Cyber Security program to artificially inflated the companies valuation amid a huge $21 billion dollar dip in the companies estimated worth by investors. Rettas also analyzes a New York Times story where reporter Nicole Perlroth obtained internal Uber emails that memorialize the $100,000 payment made to a hacker was part of the companies bug bounty program and that the company was not paying hackers hush money to cover the now highly public breach to their systems. You're not going to want to miss this episode of Task Force 7 Radio, as drama at Uber reads more like a nation state spy novel than the security operations of a cab company.||1/15/2018||Free||View in iTunes|
||CleanDisclosure of Whistle Blower Letter Rocks Uber Again||The partial release of a 37 page redacted letter by former Uber employee Richard Jacobs outlining all kinds of questionable practices by the ride haling giant has rocked Uber and has now been introduced into both a DOJ Criminal Investigation into Uber and a Civil Case in which Uber is a defendant. The letter details some outrageous accusations, some of it shocking, and if it proves to be true, puts the entire Uber culture into question. Listen to host George Rettas as he provides details of the letter and gives you expert commentary that takes you through the wild ride one Uber employee had with a company that was seemingly out of control on this latest episode of Task Force 7 Radio.||1/8/2018||Free||View in iTunes|
||CleanThe Future of Decentralized Authentication Solutions||If you want to learn about the future of Biometric Authentication and how it can be modeled to help prevent large breaches, listen to this episode of Task Force 7 Radio where the CEO of HYPR, George Avetisov talks about how a decentralized authentication model greatly reduces the risk for enterprises of a mass data breach by eliminating the need to centrally store credentials. Host George Rettas also provides an update on the latest news on Kaspersky and their alleged cooperation with the Russian government in mining for U.S. Government classified information in their customer's computers.||12/18/2017||Free||View in iTunes|
||CleanDoes Every Company Need a CISO?||Special Guest Mark Clancy, one of the most well known Cyber Security professionals in the world, talks about the role of the CISO in every organization and the worldwide scramble for firms to find the talent they need to protect their networks, their data, and their intellectual property. Clancy defines the role of the CISO and discusses the genesis companies go through in hiring their first CISO. Why do companies look to replace existing security leaders? Where should the CISO sit in most organizations? How has the role of the CISO changed over the last few years? How do we define the success of the CISO? Clancy also describes the gaps that are being addressed in the pre-competitive Research and Development space as well as how the Internet of Things is changing the security landscape across the industry.||12/11/2017||Free||View in iTunes|
||CleanThe Cyber Security Talent Crisis: Fact or Fiction?||There are still some Cyber Security Professionals who claim that the Cyber Security Talent Crisis is a myth.||12/4/2017||Free||View in iTunes|
||CleanThe Cyber Security Talent Crisis: Where Are the Women?||With our special guest, Dr.||11/27/2017||Free||View in iTunes|
||CleanAre Insiders in U.S. Intelligence Agencies Damaging Our Mission?||We dedicate the entire episode to reviewing the damaging leaks of cyber weapons from the CIA and NSA over the last year and a half and how they are being used to attack western businesses and American interests across the globe.||11/20/2017||Free||View in iTunes|
||CleanThe Qatar Crisis and The Cyber Attack That Started the Crisis||I explore the Qatar crisis with Special Guest Khaled Fattal and discuss the the mundane cyber crime that has sparked the biggest diplomatic crisis ever between American allies in the Middle East.||11/13/2017||Free||View in iTunes|
||CleanEncryption vs. Privacy From an Israeli Perspective||As the Encryption debate starts to heat up again, law enforcement officers and privacy advocates are looking for a solution.||11/6/2017||Free||View in iTunes|
||CleanEncryption: Privacy Vs. Security||The debate over privacy and encryption is a very serious problem. US Federal law enforcement are demanding a solution that doesn't allow encryption to hinder criminal investigations and even national security.||10/30/2017||Free||View in iTunes|
||CleanIntelligence Agencies are Using Anti-Virus Software to Spy on You||Intelligence Agencies are Using AV Software to Spy on People Around the World.||10/23/2017||Free||View in iTunes|
||CleanAn Analysis of the Congressional Hearings into the Equifax Breach||George Rettas breaks down the Congressional Hearings into the Equifax Breach and special guest Jim Routh, the CSO of Aetna and Chair of the NH-ISAC gives his perspective of one of the largest breaches in history.||10/16/2017||Free||View in iTunes|
||CleanA Look at the Cyber Security Events of September 2017||September 2017 was a one of the most news worthy months in Cyber Security history, with multiple high profile breaches and figures in the news.||10/9/2017||Free||View in iTunes|
||CleanA Conversation About the Equifax Breach||In this episode we will discuss the facts surrounding the Equifax breach and analyze how the breach was handled through the entire cyber security ecosystem.||10/2/2017||Free||View in iTunes|
||CleanThe Proliferation of Nation State Attacks||This Pilot Episode of Task Force 7 Radio will introduce your host, George Rettas, and the opening segment will provide a preview of what listeners should expect to hear in the pilot series of one the most anticipated business radio shows in the world.||9/25/2017||Free||View in iTunes|
Top of the podcast list
Thoughtful discussions that will enlighten you, drop your jaw and horrify you, but delivered with some humor. Love this show!
All the right stuff!
The show has thought provoking, insightful, relevant discussion on current topics concerning Cyber Security with key leaders who have significant experience within the industry. Highly recommended material for anyone working in the Security field.
Right on 🤘🎧🤘