loader from loading.io

Technology Regulation is Outdated with Bruce Schneier

Easy Prey

Release Date: 09/18/2024

Technology Regulation is Outdated with Bruce Schneier show art Technology Regulation is Outdated with Bruce Schneier

Easy Prey

Regulators have to invest a considerable amount of time in keeping legislation and policy up to date regarding technology and AI, but it’s not easy. We need floor debates, not for sound bytes or for political gain, but to move policy forward. Today’s guest is Bruce Schneier. Bruce is an internationally renowned security technologist called The Security Guru by The Economist. He is the author of over a dozen books including his latest, A Hacker’s Mind. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is...

info_outline
Threat Emulation with Andrew Costis show art Threat Emulation with Andrew Costis

Easy Prey

Security risks are dynamic. Projects, employees, change, tools, and configurations are modified. Many companies utilize PEN testers on an annual basis, but as quickly as systems are revised, you may need to implement threat emulation for regular monitoring.  Today’s guest is Andrew Costis. Andrew is the Chapter Lead of the Adversary Research Team at Attack IQ. He has over 22 years of professional industry experience and previously worked in the Threat Analysis Unit Team at Firmware, Carbon Black, and Logrhythm Labs, performing security research, reverse engineering malware, and tracking...

info_outline
Ransomware: To Pay or Not To Pay? with Amitabh Sinha show art Ransomware: To Pay or Not To Pay? with Amitabh Sinha

Easy Prey

Ransomware may not be on your machines due to your negligence or mistakes. It could be there because of third-party software you are utilizing. Do you know what to do if this happens to you?  Today’s guest is Amitabh Sinha. Amitabh has a PhD in Computer Science and more than 20 years of experience in enterprise software, end-user computing, mobile, and database software. He co-founded Workspot in 2012. He was the General Manager of Enterprise Desktop and Applications at Citrix Systems. In his five years at Citrix, he was the VP of Product Management for XenDesktop and VP of Engineering...

info_outline
Firewalls Don’t Stop Dragons with Carey Parker show art Firewalls Don’t Stop Dragons with Carey Parker

Easy Prey

We all use technology. Things like internet browsers, search engines, instant messaging, and payment apps. But we aren’t always aware of the data being collected. This information can not only impact your privacy, but those around you as well. Today’s guest is Carey Parker. Carey is the author of , a step-by-step guide to computer security and privacy for non-techies. He also hosts a podcast by the same name. He recently retired from a career in software engineering to focus on teaching others how to defend their digital devices and protect their personal data. Show Notes: [0:53] -...

info_outline
Stopping Robocalls with Aaron Foss show art Stopping Robocalls with Aaron Foss

Easy Prey

Finding a solution to stop spam calls to you, your family, or your business isn’t easy. We may not win this war, but we don’t want the government making this decision for us. We can make it more manageable in the meantime. Today’s guest is Aaron Foss. After winning the FTC Robocall Challenge in 2013, Aaron started Nomorobo. Since then, Nomorobo has stopped billions and billions of unwanted robocalls and spam texts from reaching our phones, and it was acquired by Applause group in August 2023. Aaron has been featured in The New York Times, Wired, CNN, CNBC, Fox News, and countless other...

info_outline
Safety Can’t Be an Afterthought with Kris Burkhardt show art Safety Can’t Be an Afterthought with Kris Burkhardt

Easy Prey

Most businesses rely on some type of software, either for scheduling, payment, banking, customer lists, or something else. It’s important to know where this information is stored and what would happen if that software was hacked or you weren’t able to access it. Today’s guest is Kris Burkhardt. As Accenture’s Chief Information Security Officer, Kris leads a team of over 800 security experts charged with protecting company client and customer data.  Show Notes: [0:49] - Kris describes his role at Accenture and what Accenture is known for in the security industry. [2:26] - Part of...

info_outline
Child Safety Tips with Steve Lazarus show art Child Safety Tips with Steve Lazarus

Easy Prey

Is it right for parents to be the ones to have to put limits on their children’s screen time or to monitor the content they consume? Knowing the impact of social media and kids can influence the decisions that are made. Today’s guest is Steve Lazarus. Steve is a retired FBI agent, crime fiction author, and Instagram influencer specializing in personal and child safety topics. Show Notes: [0:42] - Steve shares his background and his career history in the FBI and the military. [4:02] - For a long time, Steve was anti-social media. However, since the publication of his book, he has garnered...

info_outline
Fraud: Not Going Away with Steve Lenderman show art Fraud: Not Going Away with Steve Lenderman

Easy Prey

Synthetic IDs can be used to open fake accounts, but without a person to file the fraud claim, how should companies deal with this type of deceit? There is no crime where someone doesn’t need to pay for the loss. Either way, the loss is passed on to the consumers in some way or another.  Today’s guest is Steve Lenderman. Steve is currently the Head of Fraud Solutions North America at Quantexa and has over 25 years of experience in financial crimes investigation. His previous roles include being the Senior Vice President of Fraud Prevention Investigations at Bank Mobile Technology, the...

info_outline
Phishing Attack Awareness and Training with Josh Bartolomie show art Phishing Attack Awareness and Training with Josh Bartolomie

Easy Prey

Criminals do their own recon to study how vendors craft their emails and how they can structure them to match. Scammers know employees are busy and that they want to act promptly on requests, but they also understand it takes time to verify the validity of the email. How do we train employees to know what is real and what isn’t? Today’s guest is Josh Bartolomie. After joining Cofense in 2018 as the Director of Research and Development, Josh currently serves as the Vice President of Global Threat Services. He has over 25 years of IT and cybersecurity experience. He designed, built, and...

info_outline
Consumer Education for Fraud Protection with Doug Shadel show art Consumer Education for Fraud Protection with Doug Shadel

Easy Prey

Some scammers love the challenge of deceiving those they target while others are forced to scam. Those that thrive off of destroying others try to heighten your emotions very quickly. Both excited and angry responses can get you into making irrational decisions.  Today’s guest is Doug Shadel. Doug is a former fraud investigator and special assistant to the Attorney General at the Washington State Attorney General’s office. He served as state director for AARP Washington and Strategy Director for AARP’s national anti-fraud efforts. Doug has collaborated on numerous educational videos...

info_outline
 
More Episodes

Regulators have to invest a considerable amount of time in keeping legislation and policy up to date regarding technology and AI, but it’s not easy. We need floor debates, not for sound bytes or for political gain, but to move policy forward.

Today’s guest is Bruce Schneier. Bruce is an internationally renowned security technologist called The Security Guru by The Economist. He is the author of over a dozen books including his latest, A Hacker’s Mind. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. He is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a lecturer in Public Policy at Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org.

Show Notes:

  • [1:40] - Bruce shares what he teaches at Harvard and the current interest in policy.
  • [4:27] - The notion that tech can’t be regulated has been very harmful.
  • [6:00] - Typically, the United States doesn’t regulate much in tech. Most regulation has come from Europe.
  • [7:52] - AI is a power magnification tool. Will the uses empower the already powerful or democratize power?
  • [9:16] - Bruce describes loopholes and how AI as a power magnification tool can mean something different in different situations.
  • [12:06] - It will be interesting to watch AI begin to do human cognitive tasks because they will do them differently.
  • [13:58] - Bruce explains how AI collaboration can be a real benefit.
  • [16:17] - Like every text writer, AI is going to become a collaborative tool. What does this mean for writing legislation?
  • [17:18] - AI can write more complex and detailed laws than humans can.
  • [21:27] - AI regulation will be skewed towards corporations. Bruce explains how public AI could work.
  • [23:46] - Will AI help the defender or the attacker more?
  • [26:19] - AI can be good against legacy, but we need some sort of infrastructure.
  • [29:27] - There’s going to be a need for proof of humanity.
  • [32:29] - It is hard to know what people can do to help move regulation along. Ultimately, it is a political issue.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources: