Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

58:15
 
Share
 

Manage episode 478730461 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.

Chapters

  • 00:00 The Reality of Cybercrime
  • 02:00 Introduction to Ransomware Negotiation
  • 03:04 The Journey into Cybersecurity
  • 06:13 Understanding Ransomware Attacks
  • 09:00 The Art of Negotiation with Threat Actors
  • 11:53 Case Studies in Ransomware Negotiation
  • 16:00 The Role of Cyber Insurance
  • 18:49 Incident Response Planning
  • 21:57 How To Deal With Online Extortion
  • 25:09 The Business of Ransomware
  • 30:04 Secrets To Cyber Crime Discussions
  • 33:19 Understanding Cybersecurity Threats
  • 36:03 Understanding Ransomware Payments
  • 39:09 Supply Chain Attacks and Data Exfiltration
  • 43:28 Proactive Cyber Defense Strategies
  • 47:05 The Importance of Threat Intelligence
  • 51:52 Preparing for Cyber Incidents

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. The Reality of Cybercrime (00:00:00)

2. Introduction to Ransomware Negotiation (00:02:50)

3. The Journey into Cybersecurity (00:03:44)

4. Understanding Ransomware Attacks (00:05:41)

5. The Art of Negotiation with Threat Actors (00:09:01)

6. Case Studies in Ransomware Negotiation (00:11:57)

7. The Role of Cyber Insurance (00:16:54)

8. Incident Response Planning (00:19:35)

9. How To Deal With Online Extortion (00:22:16)

10. The Business of Ransomware (00:26:01)

11. Secrets To Cyber Crime Discussions (00:30:38)

12. Understanding Cybersecurity Threats (00:34:47)

13. Understanding Ransomware Payments (00:37:53)

14. Supply Chain Attacks and Data Exfiltration (00:40:54)

15. Proactive Cyber Defense Strategies (00:45:03)

16. The Importance of Threat Intelligence (00:49:02)

17. Preparing for Cyber Incidents (00:53:06)

245 episodes

Artwork
iconShare
 
Manage episode 478730461 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know.

Chapters

  • 00:00 The Reality of Cybercrime
  • 02:00 Introduction to Ransomware Negotiation
  • 03:04 The Journey into Cybersecurity
  • 06:13 Understanding Ransomware Attacks
  • 09:00 The Art of Negotiation with Threat Actors
  • 11:53 Case Studies in Ransomware Negotiation
  • 16:00 The Role of Cyber Insurance
  • 18:49 Incident Response Planning
  • 21:57 How To Deal With Online Extortion
  • 25:09 The Business of Ransomware
  • 30:04 Secrets To Cyber Crime Discussions
  • 33:19 Understanding Cybersecurity Threats
  • 36:03 Understanding Ransomware Payments
  • 39:09 Supply Chain Attacks and Data Exfiltration
  • 43:28 Proactive Cyber Defense Strategies
  • 47:05 The Importance of Threat Intelligence
  • 51:52 Preparing for Cyber Incidents

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. The Reality of Cybercrime (00:00:00)

2. Introduction to Ransomware Negotiation (00:02:50)

3. The Journey into Cybersecurity (00:03:44)

4. Understanding Ransomware Attacks (00:05:41)

5. The Art of Negotiation with Threat Actors (00:09:01)

6. Case Studies in Ransomware Negotiation (00:11:57)

7. The Role of Cyber Insurance (00:16:54)

8. Incident Response Planning (00:19:35)

9. How To Deal With Online Extortion (00:22:16)

10. The Business of Ransomware (00:26:01)

11. Secrets To Cyber Crime Discussions (00:30:38)

12. Understanding Cybersecurity Threats (00:34:47)

13. Understanding Ransomware Payments (00:37:53)

14. Supply Chain Attacks and Data Exfiltration (00:40:54)

15. Proactive Cyber Defense Strategies (00:45:03)

16. The Importance of Threat Intelligence (00:49:02)

17. Preparing for Cyber Incidents (00:53:06)

245 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play