エピソード

  • The Real Cost of Trust : A Real-Life Fraud Story | Ransomware Rewind Podcast | David Fradin | EP 8
    2025/05/08

    Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud

    Surviving & Preventing Online Scams: Insights from a Victim of a $1.7M Fraud David Fradin tells his harrowing story of a how he lost $1.7 million to a sophisticated online pig butchering scam.

    Learn key insights and practical tips to protect yourself from similar scams. Discover the complex tactics scammers use to build trust and exploit victims, and explore actionable solutions to help prevent these crimes.

    Tune in to become more aware and better equipped to safeguard your finances and personal information

    00:00 Introduction and Crypto Scam Experience

    00:32 Guest Introduction and Mission

    01:09 Keys to Product Success

    02:06 Podcast and Professional Background

    03:21 Detailed Scam Story

    08:18 Scam Aftermath and Financial Impact

    10:31 Government and Law Enforcement Involvement

    13:02 Global Scam Operations and Solutions

    14:00 Social Media's Role in Scams

    22:25 WhatsApp and Social Media Accountability

    24:08 Apple's Values and Final Thoughts

    25:05 From Political Campaigns to Product Management

    25:34 The Staggering Impact of Pig Butchering Scams

    25:50 Victim Blaming and Stigma

    26:23 Creative Solutions to Combat Scams

    26:42 Recognizing Scam Tactics

    29:19 The Role of AI in Scams

    32:09 Crypto and Financial Fraud

    34:16 Charity and GoFundMe Scams

    35:04 Bike Theft and Recovery

    40:11 Final Thoughts and Advice

    Social Media: Connect to Joe, Mike, and David on social media platforms like LinkedIn, TikTok, and Instagram

    Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance

    X/ joeerle

    Insta/ itscyberjoe

    Tiktok/ itscyberjoe

    Meta/ joeerle

    LinkedIn/ https://www.linkedin.com/in/joeerle/

    Questions about cyber insurance?

    Email joe@c3insurance.com

    Get the PDF - 14 Steps to Protect your Company's Data

    Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale

    LinkedIn/ https://www.linkedin.com/in/mikedowdy/

    Questions about cloud security?

    Email mike.dowdy@rapidscale.net

    www.rapidscale.net

    Special Guest David Fradin

    Operation Shamrock (helps people who've been victims of internet fraud and pig butchering): https://operationshamrock.org/

    David's LinkedIn: https://www.linkedin.com/in/davidfradin

    David's Consulting Company: www.spicecatalyst.com

    David's Book - Letters from my Hymie: https://a.co/d/4GnKUOW

    Don't forget to subscribe. Check out our other episodes & thank you for listening.

    続きを読む 一部表示
    45 分
  • How to get into Cybersecurity with Sam Romanov - EP 8
    2025/03/18
    Business owners and IT professionals: Learn how to kickstart a successful career in cybersecurity with expert insights from Cybersecurity Consultant and Content Creator, Sam Romanov. Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they explore the latest trends in cybersecurity. Discover practical tips on becoming a cybersecurity consultant and how to train yourself to be competitive in this cybersecurity job market. Key Takeaways: Breaking into Cybersecurity: Tips for beginners looking to start their careers.CISO Consulting: The role of a Chief Information Security Officer and how to become a successful consultant. Cybersecurity Trends: Understanding the latest threats and technologies shaping the industry.Career Advancement: Strategies for professionals looking to grow in their cybersecurity careers. Explore the world of cybersecurity with Sam Romanov, a renowned expert in the field. Learn about the latest trends, challenges, and opportunities in cybersecurity consulting. From breaking into the industry to becoming a successful CISO consultant, this episode provides actionable advice for both beginners and seasoned professionals. Chapters: Introduction and Guest Introductions (00:00 - 03:02)Getting Started in Cybersecurity (03:02 - 07:46)CISO Consulting: Challenges and Opportunities (07:46 - 14:44) Cybersecurity Trends and Threats (14:44 - 21:22) Practical Tips for Career Advancement (21:22 - 26:02) Navigating Cybersecurity Regulations (26:02 - 31:11)Closing Thoughts and Contact Information (31:11 - 40:45) This episode of the podcast features Sam Romanov, a cybersecurity expert with extensive experience in the field. The discussion focuses on how to enter the cybersecurity industry, the role of a CISO consultant, and the latest cybersecurity trends. Sam shares insights on overcoming common challenges and provides practical advice for advancing your career in cybersecurity. Recommended Certifications for Cybersecurity: CompTIA Network+: Essential for understanding networking fundamentals.CompTIA Security+: A foundational certification for security professionals. CISSP: Advanced certification for experienced security professionals. CISM: Focuses on risk management and information security governance. Social Media: Join our conversation on social media platforms like LinkedIn, TikTok, and Instagram, where we share insights, news, and tips on cybersecurity. Engage with our community to stay informed and network with fellow cybersecurity enthusiasts. Co-Host: Joe Erle, Cyber Group Practice Leader at C3 Insurance https://www.linkedin.com/in/joeerle https://www.instagram.com/itscyberjoe/ https://www.tiktok.com/@itscyberjoe Co-Host Mike Dowdy, Cloud Solutions Consultant at RapidScale https://www.linkedin.com/in/mikedowdy/ Special Guest: Sam Romanov, Cybersecurity Expert at Cornerstone Technology Solutions https://www.linkedin.com/in/samuel-romanov-198a2916b/ https://www.instagram.com/cybersecurity.sam/ https://www.tiktok.com/@cybersecurity.sam Sam's Cybersecurity Growth Community https://www.skool.com/cybersecurity-growth-community Sam's Free Ebook: Starting your career in Cybersecurity https://tinyurl.com/3yc4m7ht #CyberSecurity #CareerAdvice #CISOConsulting #CyberInsurance #DataProtection #IncidentResponse #RiskManagement #cybersecurityjobs
    続きを読む 一部表示
    55 分
  • United Healthcare Hack Conspiracy - EP 7
    2025/03/06

    Business owners and IT professionals: Learn practical cybersecurity tips and be entertained at the same time. :)

    Join co-hosts Joe Erle, a seasoned cyber insurance expert, and Mike Dowdy, AI and cloud security expert, as they bring you unique insights from top industry professionals (Cyber Lawyer & Pentester on this episode) on the latest threats and protection strategies.

    In this episode, we uncover the shocking details of the United Healthcare hack and its far-reaching implications. Don't let your business become the next victim – subscribe now to stay one step ahead of cybercriminals and protect your digital assets.

    Our expert panel discusses the far-reaching implications of the UHC breach, the importance of robust cyber insurance, and practical steps businesses can take to protect themselves. From insider trading suspicions to Nancy Pelosi connections, we uncover the intriguing details surrounding this major cyber incident.

    Was there a connection to the murder of UHC CEO, Brian Thompson? We put on our tin foil hats for a moment to discuss if Luigi Mangione worked alone or was part of a calculated conspiracy.

    Special guests: Ross Molina, Partner and Vice Chair of the Data Privacy & Cybersecurity Practice of Lewis Brisbois https://www.linkedin.com/in/ross-molina-20784111

    &

    Mathew Quammen, Pentester, Co-Founder, and President of Optimize Cyber https://www.linkedin.com/in/matthewquammen/

    Explore the United Healthcare ransomware attack with cybersecurity experts. Learn about the $22 million ransom, supply chain vulnerabilities, and the critical role of cyber insurance. Discover how multi-factor authentication, incident response plans, and proactive risk management can safeguard your business from devastating cyber threats.

    Chapters: Introduction and guest introductions (00:00 - 03:02)

    United Healthcare hack overview (03:02 - 07:46)

    Supply chain vulnerabilities and vendor management (07:46 - 14:44)

    Cyber insurance and its importance (14:44 - 21:22)

    Insider trading suspicions and Nancy Pelosi connection (21:22 - 26:02)

    Legal protections and incident response planning (26:02 - 31:11)

    Practical cybersecurity tips for businesses (31:11 - 37:02)

    Closing thoughts and contact information (37:02 - 40:45)

    Extended Summary: This episode of Ransomware Rewind features a panel of cybersecurity experts discussing the massive United Healthcare hack and its implications. The attack, carried out by Black Cat Alpha V, resulted in the theft of 6 terabytes of data affecting over 100 million records. United Healthcare paid a $22 million ransom but still faced significant challenges afterward.

    The conversation covers various aspects of cybersecurity, including:

    The importance of supply chain security and vendor management

    The critical role of cyber insurance in mitigating risks

    Legal protections and the need for incident response planning

    Practical cybersecurity measures like multi-factor authentication (MFA) and regular audits

    The potential insider trading and political connections surrounding the hack

    Experts emphasize the need for businesses of all sizes to take cybersecurity seriously, highlighting that many protective measures are more affordable and accessible than commonly believed. They stress the importance of having a comprehensive incident response plan, robust cyber insurance coverage, and proactive risk management strategies.

    The episode concludes with practical advice for businesses, including the use of MFA, regular IT provider audits, and the importance of understanding and managing supply chain risks. Listeners are encouraged to use their annual insurance reviews as an opportunity to assess and improve their overall cybersecurity posture.

    #CyberSecurity #RansomwareAttack #UnitedHealthcareHack #CyberInsurance #DataProtection #IncidentResponse #SupplyChainRisk #MFA #riskmanagement

    続きを読む 一部表示
    41 分
  • Inside the War on Ransomware: Ricoh Danielson's Guide to Crisis Response
    2025/02/10
    Enterprise Incident Response & Crisis Management with Combat Veteran, Ricoh Danielson In this exclusive interview, we speak with Ricoh Danielson, a U.S. Army Combat Veteran of Iraq and Afghanistan turned cybersecurity expert. Topics in This Interview (breakdown with timestamps below) How businesses can prepare for and respond to cyberattacksBest practices for personal security to safeguard your digital identitySafety measures after disasters and crisis management tipsThe rise of AI-driven ransomware and its impact on businessesRicoh’s military experiences and how they shaped his approach to cybersecurity Why Watch This Video? Learn from Ricoh’s expertise as a digital forensics powerhouse with experience handling high-profile hacks.Discover practical strategies to protect your business from ransomware and other cyber threats.Gain insights into effective communication during a breach or disaster. About Ricoh Danielson: Ricoh is a U.S. Army Combat Veteran with over 9 deployments across Iraq, Afghanistan, and Africa. As the founder of Fortitude Tech LLC and 1st Responder, he has worked on high-stakes cases involving hospitals, corporations, and state governments. Recently featured on NTD News discussing cyberattacks in New Orleans and Las Vegas, Ricoh is also an author and sought-after speaker in the cybersecurity space. Chapters: 0:00 Intro to Ricoh Danielson: Ricoh shares his journey from military service to becoming a leader in digital forensics and cybersecurity. Learn how his combat experience shaped his approach to crisis management. 2:15 How Businesses Can Prepare for Cyberattacks: Practical steps to defend against ransomware, phishing, and other threats using identity access management (IAM) and conditional access policies. 5:30 Personal Security Tips: Actionable advice on protecting your digital identity, recognizing phishing scams, and avoiding psychological tactics used by hackers.9:45 Crisis Management After Disasters: Insights into preparing for grid failures or natural disasters with go bags, alternative communication plans, and safety strategies.13:20 AI-Driven Ransomware Explained: A deep dive into polymorphic ransomware powered by AI—how it works and why businesses must stay ahead of these advanced threats.17:00 Lessons from Military Service Applied to Cybersecurity: How Ricoh’s military background prepared him to handle chaotic situations like ransomware attacks on hospitals and global corporations.20:00 The Role of CISOs and Board Communication: Challenges CISOs face when communicating risks to boards, securing equity in companies, and leveraging D&O insurance for protection.24:00 How to Break Into Cybersecurity: Advice for aspiring professionals on certifications like Network+ and Security+, as well as opportunities in governance, risk, compliance (GRC), IAM, and privilege access management (PAM).28:00 Quick Wins for Improving Cybersecurity Posture: Simple strategies like enabling conditional access policies in Microsoft 365 environments or conducting Business Email Compromise (BEC) assessments.31:00 Crisis Management & Incident Response Strategies: The importance of alternative communication plans during crises—Ricoh shares exercises involving burner phones and laptops for CEOs.34:00 Preparing for Grid Failures & Disaster: Tips on securing six months’ worth of food/water supplies, understanding ham radios for communication, and ensuring family safety during emergencies.37:00 Cybersecurity Books by Ricoh Danielson - Ricoh introduces his books, including No-Nonsense Cybersecurity (https://a.co/d/43Myc13) for practical advice, FM Field Manual (https://a.co/d/14qOL5K)as an art-focused coffee table book on cybersecurity, and Tactical Manual (https://a.co/d/iGfOBS6), a highly technical guide with step-by-step instructions. Subscribe for more interviews like this! Comment below what you found interesting in the podcast. 🔗 Follow Ricoh Danielson on Instagram @Ricoh_Danielson or LinkedIn www.linkedin.com/in/ricoh-danielson-736a0715 🔗 Learn more about Ricoh on his website: www.ricohd.us 🔗Breakfast with a CISO on Youtube: www.youtube.com/@dricoh22/videos 🔗 Find the host, Joe Erle, at: www.linkedin.com/in/joeerle @itscyberjoe on instagram and tiktok Get the 14 steps to protecting your data PDF here: www.c3insurance.com/cyber Or you can email Joe at joe@c3insrance.com for speaking inquiries or cyber insurance quotes. If you need cloud security solutions... our absent host, Mike Dowdy, can be found here: linkedin.com/in/mikedowdy Cybersecurity #IncidentResponse #DigitalForensics #BusinessSecurity #AIThreats #RansomwareResponse #CISORoleInsights #AIThreatMitigation #DigitalForensicsExpertise #IncidentResponseStrategies #CybersecurityLeadership #MilitaryToCybersecurity #CrisisManagementTips #ProtectYourBusinessOnline #AdvancedCyberThreats
    続きを読む 一部表示
    39 分
  • iPhone CyberSecurity, Meme Coins, & The Future of Cloud Security | Ransomware Rewind Ep. 5 feat. Dave Tuckman, CISM
    2025/01/29

    In this episode of Ransomware Rewind:

    iphone & BYOD best practices for businesses for cybersecurity, Crypto meme coin rug pulls, cloud security mistakes, legacy software vulnerabilities, and more.

    Dave Tuckman from Fr Secure joins us to discuss everything from digital currencies, including the infamous "Hawk Tuah Girl" meme coin, to the evolving landscape of cloud security. We also chat about some wild predictions—like the possibility of time travel using quantum computing...

    Tune in for fascinating insights, fun tangents, and expert analysis on cybersecurity and beyond. Topics Covered:

    • Smartphone and Cloud Security
    • The rise and fall of meme coins: "Hawk Tuah Girl"
    • How meme coins are impacting the crypto world
    • Predictions for the future of tech (including time travel!)

    Make sure to subscribe and never miss an episode of the Ransomware Rewind Podcast!

    Follow us on LinkedIn for daily tech and cybersecurity insights:

    Get a hold of Joe for Cybersecurity Insurance

    https://www.linkedin.com/in/joeerle/

    www.c3insurance.com/cyber

    Get a hold of Mike for Cloud Security and Management Solutions https://www.linkedin.com/in/mikedowdy/

    https://rapidscale.net/

    Dave Tuckman for IT consulting and strategy and IR services

    https://www.linkedin.com/in/davetuckman/

    Take advantage of FR Secure's free resources here:

    https://frsecure.com/resources/

    #cybersecuritytalks #cybersecurity #cybersecuritypodcast #businesspodcast #cloudsecurity

    続きを読む 一部表示
    1 時間 2 分
  • Spies, Data Centers, and Crypto: The New Battlegrounds of the Digital Age
    2024/11/22

    In this episode, Mike and Joe are joined by John Braggiotti. With over 20 years experience in the datacenter space working on data centers on multiple continents John knows the real reasons the likes of Microsoft, Amazon and Google are spending billions on data centers. We dive into the shadowy world of nation-state spying and how governments are leveraging cyber tools to gain an edge in the global arena. We explore the pivotal role of data centers as the backbone of the information economy, powering everything from streaming services to sensitive government operations. Finally, we decode the connection between cryptocurrency and geopolitics, uncovering how blockchain technology is influencing power dynamics worldwide. Tune in for an eye-opening discussion on the intersections of espionage, infrastructure, and innovation in the digital era.

    続きを読む 一部表示
    1 時間 18 分
  • How Scammers are making millions with RaaS (Ransomware As A Service)
    2024/09/17

    In this episode of Ransomware Rewind, hosts Joe Erle, a cyber insurance expert, and Mike Dowdy, a cloud technology veteran, dive into the dark world of Ransomware as a Service (RaaS). RaaS is a business model that allows cybercriminals with little technical expertise to deploy ransomware attacks by purchasing services from expert developers on the dark web.

    Joe and Mike break down how RaaS works, its rise in popularity, and the impact it has on businesses across the globe. They discuss the chilling trend of ransomware kits being sold like software subscriptions and the far-reaching consequences this has on industries and governments a like.

    Tune in to learn about the evolving landscape of cyber threats, how companies can protect themselves, and what role both insurance and cloud solutions play in mitigating the risks of falling victim to these attacks.

    Whether you're an IT professional, business owner, or simply interested in cybersecurity, this episode offers valuable insights into one of the most dangerous threats in today’s digital world.

    続きを読む 一部表示
    42 分
  • Unmasking Deep Fakes: The New Frontier of Cyber Crime
    2024/08/21

    Imagine receiving a desperate call from a loved one, their voice pleading for help, while a criminal demands money in the background. Deep fakes have brought this nightmare scenario closer to reality, with AI-generated voices and videos that mimic anyone, even your own family. In this episode, we dive into the chilling world of deep fakes, exploring their potential for exploitation, from high-profile scams involving top executives to everyday fraud that could happen to anyone. How can we protect ourselves in a world where nothing is as it seems? Join us as we uncover the human vulnerability at the heart of this emerging threat and discuss practical strategies to stay one step ahead of the cybercriminals. Stay tuned as we delve into the case of the Ferrari CFO, the chilling implications for our personal and professional lives, and why being 'more human' might be the key to fighting back.

    続きを読む 一部表示
    41 分