Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 The Final Flight of Captain Forrester | 1. The Mystery of Tiny 05 38:05
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
Manage episode 478730461 series 3559123
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.
Chapters
- 00:00 The Reality of Cybercrime
- 02:00 Introduction to Ransomware Negotiation
- 03:04 The Journey into Cybersecurity
- 06:13 Understanding Ransomware Attacks
- 09:00 The Art of Negotiation with Threat Actors
- 11:53 Case Studies in Ransomware Negotiation
- 16:00 The Role of Cyber Insurance
- 18:49 Incident Response Planning
- 21:57 How To Deal With Online Extortion
- 25:09 The Business of Ransomware
- 30:04 Secrets To Cyber Crime Discussions
- 33:19 Understanding Cybersecurity Threats
- 36:03 Understanding Ransomware Payments
- 39:09 Supply Chain Attacks and Data Exfiltration
- 43:28 Proactive Cyber Defense Strategies
- 47:05 The Importance of Threat Intelligence
- 51:52 Preparing for Cyber Incidents
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Chapters
1. The Reality of Cybercrime (00:00:00)
2. Introduction to Ransomware Negotiation (00:02:50)
3. The Journey into Cybersecurity (00:03:44)
4. Understanding Ransomware Attacks (00:05:41)
5. The Art of Negotiation with Threat Actors (00:09:01)
6. Case Studies in Ransomware Negotiation (00:11:57)
7. The Role of Cyber Insurance (00:16:54)
8. Incident Response Planning (00:19:35)
9. How To Deal With Online Extortion (00:22:16)
10. The Business of Ransomware (00:26:01)
11. Secrets To Cyber Crime Discussions (00:30:38)
12. Understanding Cybersecurity Threats (00:34:47)
13. Understanding Ransomware Payments (00:37:53)
14. Supply Chain Attacks and Data Exfiltration (00:40:54)
15. Proactive Cyber Defense Strategies (00:45:03)
16. The Importance of Threat Intelligence (00:49:02)
17. Preparing for Cyber Incidents (00:53:06)
253 episodes
Manage episode 478730461 series 3559123
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.
Chapters
- 00:00 The Reality of Cybercrime
- 02:00 Introduction to Ransomware Negotiation
- 03:04 The Journey into Cybersecurity
- 06:13 Understanding Ransomware Attacks
- 09:00 The Art of Negotiation with Threat Actors
- 11:53 Case Studies in Ransomware Negotiation
- 16:00 The Role of Cyber Insurance
- 18:49 Incident Response Planning
- 21:57 How To Deal With Online Extortion
- 25:09 The Business of Ransomware
- 30:04 Secrets To Cyber Crime Discussions
- 33:19 Understanding Cybersecurity Threats
- 36:03 Understanding Ransomware Payments
- 39:09 Supply Chain Attacks and Data Exfiltration
- 43:28 Proactive Cyber Defense Strategies
- 47:05 The Importance of Threat Intelligence
- 51:52 Preparing for Cyber Incidents
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Chapters
1. The Reality of Cybercrime (00:00:00)
2. Introduction to Ransomware Negotiation (00:02:50)
3. The Journey into Cybersecurity (00:03:44)
4. Understanding Ransomware Attacks (00:05:41)
5. The Art of Negotiation with Threat Actors (00:09:01)
6. Case Studies in Ransomware Negotiation (00:11:57)
7. The Role of Cyber Insurance (00:16:54)
8. Incident Response Planning (00:19:35)
9. How To Deal With Online Extortion (00:22:16)
10. The Business of Ransomware (00:26:01)
11. Secrets To Cyber Crime Discussions (00:30:38)
12. Understanding Cybersecurity Threats (00:34:47)
13. Understanding Ransomware Payments (00:37:53)
14. Supply Chain Attacks and Data Exfiltration (00:40:54)
15. Proactive Cyber Defense Strategies (00:45:03)
16. The Importance of Threat Intelligence (00:49:02)
17. Preparing for Cyber Incidents (00:53:06)
253 episodes
All episodes
×
1 Cybercrime vs Small Business. Insider View of Cyber Crime. 49:17

1 Cyber Traps at Home! How to Keep Your Family Safe Online.🔥 54:23

1 Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk 51:25

1 How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business 58:38

1 Are you at Risk? Personal Liability Cyber Breaches. 54:33

1 🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram? 1:47

1 Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure 1:36:41

1 New Alert 🚨 Beware of Your Next Google Search🚨 1:55

1 New Alert. 🚨 Don't Fall For The New Google Subpoena🚨 1:39

1 Zero Trust, SMB & National Security. INTEL CTO Exclusive. 1:01:40

1 Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed. 58:15

1 How start a career in cybersecurity today. Josh Mason 56:21

1 Zero Trust. Social Engineering. Ron Woerner. 44:18


1 Hunting Down Hackers. John Hammond Exclusive. 1:00:59

1 🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥 58:42

1 Mind Games: Exploring Brain Reactions in Social Engineering 52:29

1 CRIMINAL MINDS, Entitlement & Accountability. Godfather Brett Johnson. 51:15


1 The Undetected. Espionage and Spies.(Part 2) 30:23

1 The Undetected. Espionage and Spies.(Part 1) 31:08

1 PowerSchool Exposed-🔥-Children at Risk at School 28:48

1 The Shocking Rise and Fall of 23andMe. Exposed. 26:31

1 Start-Up Fraud Stories. How They Caught Elizabeth Holmes. 52:05

1 Spotting Fraud Before it's Too Late. Brett Johnson Exclusive. 47:36

1 The FRANK Scandal Exposed-- When A Lie Becomes Criminal 25:34

1 FBI Most Wanted. Ruja Ignatova. Story of OneCoin. 32:39

1 Sony Hack Decoded--Behind Scenes with A Real Hacker 51:19


1 How To Build A Security Culture. WIZER Security Founder. 34:05
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.