Mnemonic สาธารณะ
[search 0]
เพิ่มเติม
ดาวน์โหลดแอปเลย!
show episodes
 
Artwork

1
Trivia - The Mnemonic Tree Podcast

Peter Jans

Unsubscribe
Unsubscribe
รายสัปดาห์
 
To provide factual and interesting information on a range of subjects/topics, which is then formulated into a mnemonic to enable the user to retain large amounts of information and to be able to recite this information in a logical and ordered way. The podcast is augmented with Five Fun Facts, The Three Question Quiz, and finishes with Word of the Week.
  continue reading
 
Artwork

1
Mnemonic

Ryan J Tressel

Unsubscribe
Unsubscribe
รายเดือน
 
Father, teacher, storyteller. Eater of Oreos. A podcast about memory, about childhood and parenting, about the resonances of the past and the present banging into one another.
  continue reading
 
Loading …
show series
 
Data Brokers and Data Removal Services What does the process of removing your online presence look like? And how would you handle the data brokers that have collected your personal information with just a few clicks of the mouse to sell to other companies? To answer this, we’re joined by an expert in this field; Darius Belijevas, Head of Incogni, a…
  continue reading
 
Email Address: themnemonictree@gmail.com Website: https://www.themnemonictreepodcast.com/ Facebook: https://www.facebook.com/themnemonictreepodcast The Beach Boys - Original Band Members · Wikipedia · Mnemonic · Five Fun Facts · Three - Question Quiz · Word of the Week · Mutley Momentโดย Peter Jans
  continue reading
 
Email Address: themnemonictree@gmail.com Website: https://www.themnemonictreepodcast.com/ Facebook: https://www.facebook.com/themnemonictreepodcast Mahatma Gandhi - 6 Achievements · Wikipedia · Mnemonic · Five Fun Facts · Three - Question Quiz · Word of the Week · Mutley Momentโดย Peter Jans
  continue reading
 
For this episode, Robby is joined by Levi Gundert, Chief Security Officer at the cybersecurity company Recorded Future and author of the book The Risk Business – what leaders need to know about intelligence and risk-based security. Levi shares from his decades of experience in the threat and risk space – and Robby picks his brain about a broad set …
  continue reading
 
Email Address: themnemonictree@gmail.com Website: https://www.themnemonictreepodcast.com/ Facebook: https://www.facebook.com/themnemonictreepodcast The Brain - 6 Parts · Wikipedia · Mnemonic · Five Fun Facts · Three - Question Quiz · Word of the Week · Mutley Momentโดย Peter Jans
  continue reading
 
Email Address: themnemonictree@gmail.com Website: https://www.themnemonictreepodcast.com/ Facebook: https://www.facebook.com/themnemonictreepodcast Muhammad Ali - Top 5 Fights · Wikipedia · Mnemonic · Five Fun Facts · Three - Question Quiz · Word of the Week · Mutley Momentโดย Peter Jans
  continue reading
 
Ethical social engineering Even the best pentesters out there can be fooled by a social engineering attempt under the right circumstances. But how do we treat the ones that have been tested and failed? Ragnhild «Bridget» Sageng, Senior Security Advisor at Norwegian Customs, has several years of experience from the IT and cybersecurity industry, and…
  continue reading
 
How will AI impact the next generation of people working with computer science? This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help him navigate this question, Robby has invited two people with quite different backgrounds: Richard Stiennon, aut…
  continue reading
 
How does cybersecurity play a part in ensuring food security? As part of the ISACA series of the mnemonic security podcast, we’re welcoming Karianne Kjønås, Cyber & Privacy Associate at PwC Norway. Karianne recently won the ISACA master’s thesis award with her thesis on how cybersecurity incidents can affect Norwegian food production. During her co…
  continue reading
 
Conflictual coexistence Today’s guest, Raymond Andrè Hagen, holds over 20 years of experience in cybersecurity and information security, and is currently researching advanced persistent threats for his PhD in Computer and Information Systems Security. He also has experience as a Security Specialist at the Norwegian Digitalization Agency (Digdir), i…
  continue reading
 
To join Robby for this episode on Russian cybercrime and ransomware, we’re welcoming Sam Flockhart, Cyber Threat Intelligence Manager at Santander UK. Sam has a background in military intelligence from the British army, where he has spent a large part of his career looking at Russian influence in Eastern Europe. Including experience from the Britis…
  continue reading
 
Metaverses Have you been to the metaverse yet? And are you among the 78% that believe the metaverse will provide a significant value to their organisation in the future? To join Robby for this episode, we’re welcoming Julia Hermann, Senior Technology and Innovation Manager at Giesecke+Devrient, where she works on identifying opportunities in the me…
  continue reading
 
Defending EVE Online How does combatting botting, hacking, and fraud in a virtual game relate to fighting real cybercrime? To share his take on this, Maksym Gryshchenko joins us to share how he works as a Security analyst at CCP Games, a leading game developer based in Iceland, and the developers behind the sci-fi role-playing game EVE Online. EVE …
  continue reading
 
Last year, threat researchers all over the world got a sneak peek into the inner workings of the Russian defence contractor NTC Vulkan. The Vulkan files leak provided an interesting behind the scenes look at Russian cyber capabilities and scalability, and the ways state sponsored organisation work. Joe Slowik, managing threat intelligence at the cy…
  continue reading
 
Cryptology is fundamental for the way the internet works today. But what exactly is modern cryptology, and what are the most common areas in which it’s being used? To guide us through this complex area, Robby’s joined by Bor de Kock, PhD. in Cryptology and Assistant Professor at NTNU. They talk about some of the main challenges to cryptology these …
  continue reading
 
Physical penetration testing | ISACA series For this episode that is part of our ISACA series, we’re joined by Rob Shapland, Ethical Hacker/Head of Cyber Innovation at Falanx Cyber. Rob talks about what he’s learned from his 15 years of testing physical and cyber security for his clients, including more than 200 building intrusions assignments. He …
  continue reading
 
Artificial intelligence (AI) and machine learning (ML) models have already become incorporated into many facets of our lives. In this episode, we discuss what happens if these models are attacked. How can the models that AI and ML are built upon be attacked? And how can we defend them? Eoin Wickens, Senior Adversarial ML Researcher at HiddenLayer, …
  continue reading
 
What do you really know about your vendors? And about your vendors' vendors? To talk about supply chain attacks, and how to best mitigate and meet these risks, Robby is joined by a pair with a lot of experience on this topic: Roger Ison-Haug, CISO of StormGeo, and Martin Kofoed, CEO of Improsec. Martin and Roger discuss what a supply chain attack l…
  continue reading
 
How to succeed with bug bounties Responsible disclosure and vulnerability reporting have come a long way in recent years, and have gone from being feared and even something you took legal action against, to something that is appreciated for its value. Ioana Piroska, Bug Bounty Program Manager at Visma, joins Robby to share how Visma has succeeded w…
  continue reading
 
Influencing the board What are some of the most effective methods of gaining a board’s support, and how do you maintain this trust and improve it over time? Our guest today has worked with a lot of boards, and joins us to share his experiences providing boards with the tools to ask the right questions when it comes to cybersecurity, and conveying t…
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน