The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S.From Nevada's complete state office shutdown to Maryland's Metro Transit paralysis, the hosts explore why organizations still "clam up" during breaches instead of sharing crucial threat intelligence. Drawing from their firsthand experience with the St. Paul incident and military-grade preparedness principles, they reveal the uncomfortable truth: you're not building higher walls anymore—you're planning for someone who's already inside.Key Topics Covered:Recent state-level cyberattacks in Nevada and MarylandWhy threat intelligence sharing fails when we need it mostThe human cost of breach response chaos and endless meetingsHow AI is being weaponized in sophisticated supply chain attacksMilitary mindset for cybersecurity: "Semper Gumby, always flexible"Don't wait for the next headline. Subscribe for more unfiltered cybersecurity discussions that bridge the gap between technical reality and human preparation.#cybersecurity #infosec #breach #threatintelligence #fieldnotes #livecast #CISO #cybersecuritynews
--------
26:04
--------
26:04
Healthcare Ransomware: When Cyberattacks Turn Deadly
When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he believes could be the next wave of coordinated attacks across multiple critical infrastructures. Plus, why Microsoft's approach to AI integration is making cybersecurity professionals lose sleep. Key Topics Covered: Why ransomware attacks on hospitals increase patient mortality rates The research behind healthcare cybersecurity's deadly consequences How the healthcare industry's digital transformation created new vulnerabilities Microsoft's problematic approach to forced AI integration The evolution from individual hackers to organized cybercrime syndicates Why Ed's "Spidey senses" are warning of coordinated infrastructure attacks Don't wait until your organization becomes the next healthcare headline. Subscribe for more critical cybersecurity insights that could save more than just your data. #healthcarecybersecurity #ransomware #patientsafety #cybersecurity #infosec #healthcare
--------
32:08
--------
32:08
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this conversation exposes the security crisis hiding in plain sight. Key Topics Covered: North Korean operatives stealing US salaries to fund nuclear programs How Figma had to re-verify their entire workforce after infiltration Live demonstrations of deepfake technology (Pickle AI, DeepLiveCam) Why 80-90% of engineers believe interview cheating is rampant Validia's "Truly" tool vs. Cluely's AI interview assistance The future of identity verification in remote work Why behavioral biometrics might be our last defense This isn't just about hiring fraud—it's about the fundamental breakdown of digital trust in an AI-first world. Whether you're a CISO, talent leader, or anyone involved in remote hiring, this episode reveals threats you didn't know existed and solutions you need to implement today. Don't let your next hire be your biggest security breach. Subscribe for more cutting-edge cybersecurity insights that you won't find anywhere else. #deepfakes #cybersecurity #hiring #AI #infosec #northkorea #fraud #identity #remote #validia
--------
41:24
--------
41:24
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI era. Whether you're a CISO looking to revolutionize your hiring process, a security professional wanting to level up your skills, or just curious about what happens when cybersecurity meets escape room logic, this episode delivers actionable insights you can implement immediately. Key Topics Covered: How Meta CTF's Jeopardy-style competitions work and why they're addictive Real examples of CTF challenges that test critical thinking over pure technical knowledge The shocking rise of AI-assisted interview cheating (and how to spot it) Why "CTF culture" is becoming the new hiring differentiator for top security teams Practical tips for using competitions to build team camaraderie and retention How smaller companies can compete with Big Tech for cybersecurity talent Don't let your next hire fool you with AI-generated answers. Learn how CTF competitions reveal the real problem-solvers from the pretenders. Like, share, and subscribe for more cybersecurity hiring secrets that actually work! #MetaCTF #CybersecurityHiring #CTF #InfoSec #CyberSecurity #AIInterviews #TechRecruiting
--------
30:10
--------
30:10
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this massive financial fraud and reveal why help desk vulnerabilities are becoming cybercriminals' favorite attack vector. From Scattered Spider's multi-industry campaigns to the unexpected cybersecurity challenges facing Formula 1 racing, this episode covers the evolving threats that no security professional can afford to ignore. 🎯 Key Topics Covered: How banking impersonation scams work and red flags to watch for Why Scattered Spider targets help desks and how to defend against it The surprising cybersecurity risks in high-speed Formula 1 racing Practical steps to protect yourself from social engineering attacks Why MFA fatigue is becoming a serious security vulnerability Don't let social engineering catch you off guard. The tactics that fooled a professional athlete could easily target your organization next. #cybersecurity #socialengineering #scatteredspider #financialfraud #infosec
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs.We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.