Welcome to the New Cyber Frontier: Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics. Hear about developments which impact and affect both the local Colorado efforts and the entire virtual world.
Episodes View By Title
NCF-359 Dr. Shawn Murray and Dr. Gorog
NCF-358 Tim Montgomery and Dr. Gorog
NCF-357 Tim Montgomery and Dr. Gorog
NCF-IEEE13 Dejan Milojicic Chair of IEEE Future Directions Industry Advisory Board.
NCF-356 Dan Mapes Founder and President of VERSES AI
NCF-355 Dominic Paulo
NCF-354 Dr. Subhash Paluru, the Chief Executive Officer of Freedom Motors, Inc.
NCF-353 Peter Daneyko Co-Founder of KoreChain,
NCF-352 Slade Griffin President at Contextual Security Solutions
NCF-351 Dominic Paulo
NCF-350 Mike Bowers Chief Architect
NCF-349 Dr. Gorog and Andy Merritt Managing Director and Chief Strategy Officer at One Funds
NCF-348 Dr. Gorog and Sagi Brody Co-founder and Chief Technology & Product Officer at Webair
NCF-346 Dr. Gorog and Cory O Daniel C.E.O. and co-founder at MassDriver
NCF-345 Tim Montgomery and Chris Gorog
NCF-344 Tim Montgomery and Chris Gorog
NCF-343 Tim Montgomery and Chris Gorog
NCF-342 Shawn Murray, Tim Montgomery and Chris Gorog
NCF-341 Tim Montgomery and Chris Gorog
NCF-340 Tim Montgomery and Chris Gorog
NCF-339 Tim Montgomery and Chris Gorog
NCF-338 Tim Montgomery and Chris Gorog
NCF-337 Tim Montgomery and Chris Gorog
NCF-336 Dave Singh, Confidential computing business development manager at Intel
NCF-335 Dennis Kater and Nate Moser
NCF-334 Andrew Ginter
NCF-333 Chris Gorog
NCF-332 Aviv Grafi CTO and founder of Votiro
NCF-331 James Fair SVP and Tim Montgomery
NCF-330 Samual Hill, Leader at Cyolo Security/Healthcare and Tim Montgomery
NCF-329 Patrick Clawson CEO at Resurface Labs and Tim Montgomery
NCF-328 Fausto Lendeborg Co-Founder and CEO of Secberus and Tim Montgomery
NCF-327 Kohei Kurihara Chief Executive Officer at Privacy by Design Lab
NCF-326 Amit Serper Director of Security Research at Sternum and Tim Mongomery
NCF-325 Justin Beals CEO & Co-Founder at Strike Graph
NCF-324 Scott Schober CEO at Berkeley Varitronics Systems | Cybersecurity Expert
NCF-323 Chris Gorog and Tim Montgomery
NCF-322 Chris Gorog and Tim Montgomery
NCF-321 Chris Gorog
NCF-320 Chris Gorog, Dr.Shawn Murray and Tim Montgomery.
NCF-319 Dr. Brian Smith PhD in Computer Science and Professor at Cornell University
NCF-IEEE12 Dr. Stefano Zenero, a Cybersecurity Professor and Chris Gorog
NCF-318 Chris Gorog and Tim Montgomery
NCF-317 Chris Gorog and Tim Montgomery.
NCF-316 Chris Gorog and Tim Montgomery.
NCF-315 Chris Gorog, Dr.Shawn Murray and Tim Montgomery.
NCF-314 Chris Gorog and Dr.Shawn Murray
NCF-313 Chris Gorog and Dr.Shawn Murray
NCF-IEEE11 Tamara Hughes Principal at TMH Ventures, LLC, and Umit Cali Associate Professor of Energy Informatics ( AI & Blockchain) at NTNU
NCF-IEEE10 Orlando Lopez, Ph.D.
NCF-312 Ryan Johnson, intern at Murray Security Services
NCF-311 Jason Hicks, Field CISO at Coalfire
NCF-IEEE8 Sri Nikhil Gourisetti, Ph.D. Engineering Science and Dr. James Kempf Ph.D. in Systems engineering and Senior Consultant at Kempf and Associates
NCF-309 Christian Dalton, agent in Counterintelligence for the Department Of Defense
NCF-308 Tobi Akanbi, UCCS Ph.D. Graduate 2020
NCF-IEEE7 Jim Kyung-Soo Liew, Professor at John Hopkins University
NCF-IEEE6 Nicolae Goga, Christian Taslitchi, and Iuliana Marin
NCF-303 Larry Karisny, writer at Quantum Ready Cybersecurity Systems
NCF-IEEE5, Claudio Lima, Co-Founder BEC-Blockchain Engineering Council
NCF-302, Sachin Shah, Chief Technology Officer at Armis
NCF-301 Mohammed Al-Ani, Contracts Officer at UNICEF
NCF-IEEE4 Diego Kaminker, HL7 International Deputy Standards Chief Implementation Officer
NCF-300 Tony Muiccio, Principal Cybersecurity Engineer at Black Tower Security
NCF-299 Holger Spohn, CIS Security Supervisor at NATO
NCF-298 Robert Wood, CISO and Servant Leader
NCF-297 Katie Adams, associated with USDOL
NCF-296 Eric Kant, Disaster Technology Consultant at SPIN Global
NCF-295 Taylor Merry, Director of security Operations at Flexport
NCF-294 Tom Alrich, Supply chain cybersecurity consultant and blogger
NCF-293 David Kruger, Co-Inventor of Software-defined Distributed Key Cryptography
NCF-292 Blake Marvin, Chief Executive OfficerChief Executive Officer AVAJEN
NCF-IEEE2 Gora Datta, (founding) co-Chair HL7 Mobile Health
NCF-291 Bill Alderson, Chief Technology Officer & Founder HOPZERO
NCF-290 Amichi Shulman, Co-Founder, CTOCo-Founder, CTO AirEye
NCF-289 Pamela Fusco, Chief Information Security Officer (CISO) at Splunk
NCF-288 Michael Villar, Director – Network Architecture and Engineering at UBS
NCF-287 David A. Lacek, University of Colorado Boulder – Leeds School of Business
NCF-286 Michael Tillman, CISM, Department Manager at Northrop Grumman Mission Systems
NCF-IEEE1 Farrokh Rahimi, Senior Vice President at Open Access Technology International
NCF-285 Ed Gibbs, Director of Advanced Threat Research at Whois API
NCF-284 Doug Britton, from Haystack
NCF-283 Ted Harrington, Author of “Hackable”
NCF-SR17 Looking Forward to 2022 – Christopher Gorog, Shawn Murray, Tim Montgomery, Martha Laughman
NCF-SR16 2021 Year in Review – Christopher Gorog, Shawn Murray, Tim Montgomery, Martha Laughman
NCF-282 Bob Zinga, Information Warfare Officer for the USN Reserve.
NCF-281 Joe Weiss, managing partner at Applied Control Solutions
NCF-280 Marcell Lee, a key founder of Women’s Society of Cyberjutsu
NCF-279 Jason Shockey, Chief Information Security Officer at Cenlar FSB
NCF-278 Chloe Messdhagi, VP of Strategy Point 3 Security
NCF-277 Kerry Matre, Director of Services and Solutions Marketing at Mandiant
NCF-276 Dylan Gilbert, Privacy Policy Advisor at NIST
NCF-SR15 Rick McElroy, Principal Cyber Security Strategist at VMware Carbon Black
NCF-SR14 Tim Weil, Founder at SecurityFeeds
NCF-275 Harry Marshall, Security Operations Manager at DataRobot
NCF-274 Subhash Paluru, Chief Executive Officer at Freedom Motors
NCF-273 Chad Boeckmann, CEO at TrustMAPP
NCF-DC08 Tasha Cornish, Executive Directior of CAMI Cyber Securty Association of Maryland Inc.
NCF-272 Samantha Janko, Managing Director at ASU Laboratory for Energy and Power Solutions, and James Nelson, Director of Technology and Innovation at ASU Laboratory for Energy And Power Solutions.
NCF-271 John Greaves ,Director, Global Standards, Architecture, Conformity and Propagation at ConsenSys Health
NCF-270 Alfred Ortiz, Chief Executive Officer at CSD Cyber, and Jim Lacey, Chief Operating Officer at CSD Cyber
NCF-269 Joseph Cheung, Chief Information Security Officer at Atomyze
NCF 268 Martha Laughman, Director Of Workforce Development at Smoothstack
NCF-267 Dennis Kater and Nate Moser, The Smalls Colorado Podcast
NCF-266 Jim Mullahey, CISSP, at Cyber Inspired LLC
NCF-CO20 Reggie Ash, Chief Defense Development Officer at Colorado Springs Chamber
NCF-265 David Vaughn, Head of Global Cyber Threat Intelligence at Equinix
NCF-264 Tim Montgomery, Information Systems Security Manager (ISSM) at Transportation Security Administration
NCF-263 Esther Schagen-van Luit, CISO Deloitte Netherlands
NCF-262 Tanya Janca, Founder & CEO at We Hack Purple Academy
NCF-261 Magda Chelly, Ph.D, Head of Cyber Risk Consulting, Asia at Marsh Asia
NCF-260 Garret Grajek, Chief Executive Officer at YouAttest
NCF-259 Emmy Lebert, Search Marketing Manager at Equestrian
NCF-258 E.J. Hilbert, Former FBI Special Agent in Cyber and Counterterror
NCF-257 Dennis Underwood, CEO at Cyber Crucible
NCF-256 Alexander Hubert, US Army Director, Cybersecurity Division, 2d Theater Signal Brigade
NCF-255 Deidre Diamond, Founder & CEO of CyberSN
NCF-254 Wayne Lonstein, Subject Matter Expert Social Media
NCF-253 Jason Rupe, Managing Editor IEEE Transactions on Reliability
NCF-252 Theresa Payton, author of “Manipulated: Inside the Cyberwar to Hijack Elections
NCF-251 Kent Lambert: former legislator in the U.S. state of Colorado
NCF-250 Roselle Safran, CEO & Founder at KeyCaliber
NCF-249 Jonathan Veteto, Executive Director at Colorado PTAC
NCF-248 Amber Schroader, President and CEO at Paraben
NCF-247 Bryce Austin, CIO, TCE Strategy
NCF-246 Trevor Dierdorff Founder and CEO of Ammnet, Making Experts Marketable
NCF-245 Kathie Miley, AffirmLogic, Pandemic Cyber Issues
NCF-244 Alexandre Blanc, Adaware, Security of The Cloud?
NCF-243 Dan Ehrenreich, Industrial Cyber Security
NCF-242 Karen Andersen, Optiv Inc, Post Crisis Investigation
NCF-241 Ben Johnson, Dr. Richard Klodnicki, Kent Lambert, Dr. Jason Rupe, 2021 Horizon
NCF-240 Ben Johnson, Dr. Richard Klodnicki, and Kent Lambert, 2020 Review
NCF-CO19 Ernest Campos, L3Harris Technologies, Adjust For Home Workforce
NCF-239 Ed Amoroso, TAG Cyber, Academia and Practitioners
NCF-238 Kathleen Smith, CyberSecJobs, Employee in Cyber
NCF-237 Victoria Beckman, Souq, Cybersecurity Law in Latin America
NCF-236 Kavya Pearlman, Cybersecurity to Safety
NCF-235 Isaac James & Steve Beaty, Devil Dog Security, Maturity Model Certification
NCF-234 Jerry Chappee, Murray Security, Air Force Satellite Control Network, Military Operations
NCF-233 Gretchen Bliss, University of Colorado at Colorado Springs, Campus Cybersecurity
NCF-232 Tim Weil, SecurityFeeds, Risk The Four Letter Word
NCF-231 Michael Echols, Max Cybersecurity, Pikes Peak Development Center, Force Multiplier
NCF-230 Martha Laughman, Smootstack, New Skilled Labor
NCF-CO18 Aikta Marcoulier, Telexicom, Small Business, Cyber Support
NCF-229 Nina DiFrancisco, Kevin Peuhkurinen, SailPoint, Tools for Industry Professionals
NCF-228 Jim Hideman, SailPoint, Technology Spawned from Pandemic
NCF-227 Jerod Brennen, Sailpoint, Understand Identity
NCF-226 John Akkara, Smoothstack, New Concepts
NCF-225 Christopher Hadnagy, Social-Engineer LLC, Human-Based Attacks
NCF-224 Bryan Hurd, Microsoft’s Cybercrime Center, Enabling Clientele
NCF-223 Anthony Carter, Cyber Security Concierge, Concierge Cybersecurity
NCF-222 John Jaisaree, Revolutionary Security, IT and OT Security
NCF-221 Noel Matchett, Information Security Incorporated, Insider Threat Responds
NCF-220 Ambareen Siraj, Cyber Research, Academic Institutions
NCF-219 Scott Schober, Berkeley Varitronics Systems, A Paranoid Skillset
NCF-218 Jim Hideman, Telexicom, Digital Age, Economics of Pricing
NCF-217 Robert Heriford, Solutions4Less, Transforming Data
NCF-216 Juliet Okafor, RevolutionCyber, Coronavirus in Cyber
NCF-215 Hitoshi Kokumai, Mnemonic Security Inc, Tech and Relating Devices
NCF-NCC03 Eric Hoffman, Joe Bonnell, National Cybersecurity Center’s (NCC)
NCF-214 Richard Greenberg, Cybersecurity Collective, Open Source Security
NCF-213 Mari Galloway, Cyberjutsu, Casino Security
NCF-212 Doc Klodnicki, AERETI Inc, Balancing The Risk
NCF-211 Bryan Hurd, NCIS, Don’t Dumb Down Cyber
NCF-210 Dr. Rebecca Decker, Bluestaq LLC, Business Culture Security
NCF-209 Al Ortiz, Cyber Software Distributors, Securing IOT
NCF-CO17 Thomas Russell, National Cybersecurity Center (NCC), Cyber Education
NCF-208 Don Brown, Springs Hosting and Frontier IT, Managed Resources
NCF-CO16 Shawn Murray, Information Systems Security Association (ISSA), President
NCF-207 Zack Schuler, NINJIO, Importance of Awareness
NCF-DC07 Chuck Brooks, Brooks Consulting International, DC Update
NCF-206 Scott Carlson, Kudeslki Security, Ecosystem Cybersecurity
NCF-205 Nate Moser, OASIS Systems, Engineering & Cybersecurity
NCF-204 Bharat Rawal, Gannon University, Computing Pioneer
NCF-203 Tim Weil, Denver IEEE Communication Society, Blockchain and IEEE
NCF-CO15 Erin Miller, National Cybersecurity Center (NCC), Women in Cyber: Role of ISAC
NCF-202 Umesh Verma, Blue Lance, Cyber Hygiene
NCF-201 Tom Dewar, University of Colorado at Colorado Springs, Innovation in Cyber
NCF-200 Ron Sivonda, ScaleSec, Operating in the Cloud
NCF-199 Jason Lawrence, AT&T, Objective Identifying of an Adversary
NCF-198 Kevin Johnson, Security Ideas, Cyber Education: Skills
NCF-197 Mike Riggs, Perch Security, Choosing An MSP
NCF-196 John Carpenter, Global Blockchain Summit, Blockchain Evolution
NCF-195 Marketta Wright, BlueCross BlueShield, Military IT Training
NCF-194 Joe Mullally, Discover Goodwill LIFT, Thriving in IT
NCF-193 Chris Gibson, Director of FIRST, Global Coordination
NCF-192 Jennifer Kurtz, Manufacturer’s Edge, Perplexed and Paralyzed
NCF-191 Ken Klispie, Marca Global LLC, Controlling the Narrative
NCF-190 LTC Cythnia Brothers, Air Force Cyberworks, Human Centered Design
NCF-189 Griffin Weaver, Jason Edwards, Hallmark University, Aspects of Cybersecurity
NCF-188 Deb Peinart, ISSA International, Compliance vs. Security
NCF-187 Mike Loginov, Control Risk, Implementing Cybersecurity
NCF-186 DV Subramanyam Dronamraju, InfoSecEnforcer, CCPA Informing Cyber Security
NCF-185 Jim Wiggins, Federal IT Security Institute (FITSI), Federal Cyber Workforce
NCF-184 Craig Meyers, Nimbus Secure, Importance of Cloud Security
NCF-183 Adriel Desautels, Penetration Testing Company Netragard Inc, Testing and Threats
NCF-182 Keyaan Williams, Cyber Leadership and Security Solutions (CLASS), Executive Cyber
NCF-181 Trevor Dierdorff, Amnet, The Security Landscape
NCF-180 Emilio Iasiello, Author “Kids, Predators, Cyber Security”
NCF-179 Peter Yauch, International Association of Privacy Professionals (IAPP),
NCF-CO14 Thomas Russell, National Cybersecurity Center (NCC), Marginalized Groups
NCF-178 Steve Winterfeld, Akamai Technologies, Privacy Winter
NCF-177 Pawan Jain, University of Wyoming, Cyber Trade Regulation
NCF-176 Andrew Scully, Shelde, Cyber Performance Anxiety
NCF-175 Ralf Schwoerer, Cyber Increasingly Smart Home
NCF-174 Jon Waldman, SBS Cybersecurity, Risk Management in Financial
NCF-173 Aladdin Dandis, Souq, Online Shopping and Cyber Security
NCF-SR13 David Sonheim, Army National Guard, Homeland Security
NCF-172 Saurabh Gupta, Gyan-i, MSSPs
NCF-171 Gary Whitsett, SecureSet, Job Market Disparity
NCF-170 Nathan Lesser, Cypient Black, Cyber Executive Protection
NCF-169 Joe O’Brien, Economic Development Corp, Documentation, and ID Protection
NCF-168 – Chani Sims, SHe CISO, Women in Cyber – Interpersonal Skills
NCF-167 – Carl Wright, AttackIQ, Organizations Security, Does It Works
NCF-166 Mark Montgomery, KYield, Artificial Intelligence
NCF-165 Dan Blum, Security Architect Partners, Rational Cyber Security
NCF-164 Art Cooper, NewArts, The BYOD and IOT Nightmare
NCF-163 Karen Evans, Energy Security and Emergency Response
NCF-162 John Grigg, Basics and Civil Discourse
NCF-161 Eric Sifford, Threat Identification and Prevention
NCF-160 Andy Piazza, Cyber Intelligence, Management & Information Sharing
NCF-159 Stephen Trainer, Chris Depa, Cyber Security Personnel
NCF-158 Emad Rahim, Evolution of Education in Cyber
NCF-157 Julia O’Toole, Rodrigo Martinel, MyCena, Cyber Security Startup
NCF- 156 Martin Haak, Infinite Edge, Behaviors in Cyber
NCF-155 Amber Williamson, Individual Accountability and Ethics
NCF-154 Scott Frisch, Audacity Systems Consulting, System Engineering
NCF-153 Ben Johnson, Insider Threats- Find them
NCF-152 Sheree Ip, Startups and Blockchain Technology
NCF-151 Ed Odenwalder, Layton Holcombe, Cyber Executives, Cyber Executives
NCF-150 Erik Lund, Securovix, Insider Threats, Connections
NCF-149 Samuel Elliot, Amnet, Calamity Monitoring, IT and Security
NCF-148 Daniel Lewkovitz, Hollywood & Sneakers Teams
NCF-147 Pam Fusco, Information Counter Exploitation Second Gen, Homefront Technologies
NCF-CO13 Legislative Roundtable, Privacy Security and Blockchain
NCF-146 Joseph Davis, Microsoft’s Chief Security Advisor, Multi-factor Identification
NCF-145 Liz Croddy, Zonta Club of The Pikes Peak, Women & STEM
NCF-144 Blockchain, Emil Stoyanov, Where Is It Going
NCF-143 Tony Robinson, Pioneer Technology, Proactive Security
NCF-142 Joel Neidig, SIMBA Chain, Standards and Information
NCF-141 Keyaan Williams, The Class LLC Organization, Cyber Business Strategies
NCF-CO12 Hoffman, SecureSet, Privacy For The People
NCF-140 Jerry Yoffa, Compliance In Modern Era
NCF-139 Roop Singh, Intuit Factory, Blockchain Development
NCF-138 Gary Asp, Riverbed Technology, Change in Cyber Industry
NCF-137 Dave Schoenberger, Krypti, Blockchain Protecting Personal Data
NCF-136 Terry Boult, University of Colorado at Colorado Springs, Technology Clashes
NCF-135 Gitanjali GulveSehgal (Gigi), Zonta Club of The Pikes Peak
NCF-134 Peter Leibert, OhmPye, Motto of Cyber
NCF-133 Chris McDaniels, Cyber Tactics Training & Technology (CTQ), Magic Bullet
NCF-132 Hank Bond, U.S. Navy, Civilian Corporate Protector
NCF-131 Crystal Bolda, Critical Infrastructure, Women in Cyber
NCF-130 New Host Dr. Wanda Cousar Introduction
NCF-129 Rick Ross, CISSP Cyber professional, Pacing One’s Self
NCF-128 Jim Eglin, StatusCast, Cyber Intrusion Mitigation Marketing
NCF-CO11 Vinnie Persichetti, Colorado Springs Chamber, EcoSystem in Colorado Springs
NCF-127 Malcolm Harkins, Intel, Chief Security and Privacy Officer vs Chief Information’s Officer
NCF-126 Richard White, UCCS Cyber Security Programs, The Concept of DHS
NCF-125 Tim Mongomery, Schriever Air Force Base, Federal Cybersecurity
NCF-124 Amanda Windle, Pikes Peak College, Women in Cyber Security
NCF-123 James Schollard, Securing The Cloud Data
NCF-122 Bob Gemignani, School District 49, High School Special Security Program
NCF-121 Chuck Broerman, El Paso County Clerk, Election Security
NCF-CO10 Vincent Persichetti, Cybersecurity Programs, Cyber Security Ecosystem Models
NCF-120 Mansur Hasib, University of Maryland’s, Cyber Security Integrating Into The Workforce
NCF-119 Michael Parker, Armis Security, Regulating Cyber Security on Business Devices
NCF-118 Gary Asp, Riverbend Technologies, Cyber Security For Companies
NCF-117 Dr. Shawn Murray Introduction
NCF-116 Jeff Tibbet, Persuasive Communication Expert, Social Engineering
NCF-115 Willie Pee, DevOpps, Ways to Look at Security Practices
NCF-114 Dan Lohrmann, Government Security Magazine, State Government
NCF-113 Gary Berman, Cyberhero Adventures Comic, Millionaire to Comic Creator
NCF-112 Heath Renfrow, LEO Cyber Security Services, Role of a CISO
NCF-111 Albert Whale, IT Security Solutions, Keep Your Org Safe From Hackers
NCF-110 Ben Johnson, Obsidian Security, High Energy for Cyber Startups
NCF-109 General Scott Bethel, Integrity ISR, Mentorship in Cyber Domain
NCF-108 Shawn Murray, Murray Security Services, Convergence of IoT With AI
NCF-107 Dr. Eric Huffman, SecureSet, Psychology of Cyber Security
NCF-SR12 Chris Gorog, BlockFameInc, BlockChain Development Community
NCF-106 Art Coviello, RSA Data Security, “We Must All Hang Together”
NCF-105 John Johnson, United States Air Force Academy, Cyber Officers Needed
NCF-104 Ed Skoudis, SANS Penetration Testing Curriculum, Promise
NCF-103 Erfan Ibrahim, National Renewable Energy Laboratory (NREL)
NCF-102 Travis Barlow, GoSecure, Cyber Security
NCF-101 John Bradshaw, Cyber Forensics and Cyber Warfare
NCF-CO09 Dirk Draper, Vinnie Persichetti, Economic Development Chamber (EDC)
NCF-100 Mark Heinrich, ISC2, CISSP Domain Review Team
NCF-99 Alex Wood, Robb Reck, Information Systems Security Association (ISSA), Colorado = Cyber Security
NCF-98 Charles White, Fornetix, Powerful Defensive Cyber Weapons
NCF-97 Dr. Andy Heo, National Cyber Exchange ISAO, Biology of a Cyber Attack
NCF-96 Bill Blatchley, CyberPatriot- Building Excitement With Youth
NCF-95 Paul Parker, SolarWinds, Cyber Security Stalemate, Shake Up Business Protection
NCF 94 Babak Pasdar, Acreto, Technology Landscape Cloud or Edge Devices
NCF-93 Matthew Gardner, Mimecast, Company Switching to Cloud
NCF-92 Robert Schwertner, Blockchain With Companies
NCF-91 Jane Ginn, Doug DePeppe, Cyber Resilience Institute (CRI), Information Sharing Analysis
NCF-90 Andrew Mailen, Buzz on Blockchain
NCF-89 Bailey Speaks, United States Department of Justice, Cyber Privacy and National Security
NCF-88 Andre Hinton, Application Security, Risk Management Framework (RMF)
NCF-87 Yotam Gutman, Securthings, IOT – New Security Problems
NCF-86 Helen Tse, Cyber Laws, Business Protection
NCF-85 Nick Shook, Amazon Web Services, Tracking Cannabis Using Blockchain
NCF-84 Mathew Erickson, Spideroak, Protecting Data on Internet
NCF-83 Chris Gorog, BlockFrameInc, Blockchain Community -Developers Needed
NCF-82 Darla Lindt, Cyber Insurance For Businesses
NCF-81 Cameron Williams, OverWatchID, Protection Against Targeted Cyber-Attacks
NCF-80 Tom Ponville, Mobius Consulting, LLC, Security Certificates in Industry
NCF-79 Dana Liedholm, Kevin Lancaster, IDAgent, DarkWeb Monitoring Internet
NCF-78 Walter Fee, Progressive, Cyber Insurance and Financial
NCF-77 Dr. Mary Graft, National Cybersecurity Center, Cyber Security Education
NCF-76 Jason Gould, Arbor Networks, Protect From DDOS
NCF-75 John Falese, Military, Military Community and Cyber Security
NCF-CO8 Trace Ridpath, Colorado Governor’s Office of Information Technology, Blockchain
NCF-74 Jon Clay, Trend Micro, Business and Cyber Security
NCF-73 Craig Sproule, Crowd Machine, AI Software The Future
NCF-72 Ed Rios, Cyberspace Ops, Airline Cyber Security
NCF-SR11 William Blake, K&L Gates, History of Communications Security Part II
NCF-SR10 William Blake, K&L Gates, History of Communications Security Part I
NCF-71 Eric Bailey, Patch Plus Consulting, Cyber Security For Business
NCF-70 Jason Bovee, Istonish, Guests Cyber Security Management Services
NCF-69 Elon Kaplan, Cytegic, Cyber Security Business and Financial
NCF-68 Gene Sanchez, Apozy, Hispanic Community Leaders
NCF-67 Molly Kocialski, US Patents and Trademarks Office (USPTO)
NCF-66 Joshua Davis, Circadence, Cyber security build
NCF-65 Paul Brager, General Electric, Securing Oil & Gas
NCF-64 David Kruger, Absio, European Union Changes For Privacy
NCF-63 Abel Sussman, Coalfire’s Cyber risk, Cyber Risk Director
NCF-62 Abe Thompson, Co-Hosting New Cyber Frontier, SecureSet Academy
NCF-61 Nick Anderson, Center For International Maritime Security (CIMSEC)
NCF-60 Joe Bonnell, Company Alchemy Security, Security Information
NCF-59 Josh Stinson, Jeramie Crabtree, BlackNight Cyber, High-Priced Tester
NCF-58 Rick Deacon, Apozy Anti-Phishing & Anti Malware
NCF-57 Bernard Harguindeguy, Elastic Beam, Application, Firewalls
NCF-56 Tim Hoffman, Tim Hoffman Associate, Medical Records
NCF-SR9 Kent Lambert, Colorado Joint Budget Committee, Block Chain
NCF-55 Terry Bradley, Plex-LLC, Penetration Test
NCF-CO7 Gretchen Bliss, Pikes Peak Community College, Cyber Security – DOD
NCF-54 Dean Hullings, ForeScout, Internet of Things
NCF-53 Rob Cross, Pro Services Corporation (PSC), Developing Security
NCF-52 Eric Kant, Blog Trustedops, Cyber Incidents
NCF-CO06 2017 Jen Furda, National Cybersecurity Center, Cyber Symposium
NCF-51 Doug Cameron, FSO Source, Government Security Clearance
NCF-50 Author Paul Nielsen, Tejon Tech, Security for Databases
NCF-49 Harley Rinerson, Department of Homeland Security, Infrastructure
NCF-SR8 B. Lee Jones, Silicon Valley, Common Myths
NCF-48 Andrew Howard, Kudelski Security, Cyber Physical Systems
NCF-47 Eric Hoffenbach, Jacob Eichicreme, QUAD Innovation, Universities
NCF-CO5 Vance Brown, National Cybersecurity Center
NCF-46 Charles Reynolds, Cyber Ranges, Network Cyber Operation Training
NCF-SR7 Phil Bond, David Powell, CyberUSA, USA Reaches Cyber
NCF-45 Don Kidd, Southern Colorado Technology Alliance, Cyber Companies
NCF-44 Menny Barzilay, Research Center at The University of Tel Aviv
NCF-43 Mayor Herb Atchison, Westminster Colorado, Politicians
NCF-SR6 George Nazarey, Fireeye, Cyber Security Industry
NCF-42 Joseph Cheung, Toggle Industries, Small Business
NCF-DC06 Chuck Brooks, Brooks Consulting International, Cyber Update
NCF-41 Erin Miller, Christine Shorts, C-TRAC, Air Force Research Cyber
NCF-40 Ryan Roberts, Deloitte’s Government, Capture the Flag
NCF-39 Michael Tanji, WaPack Labs, Cyber Threat Intelligence
NCF-38 Jeff Beauprez, Colorado Networks, Protection Business Model
NCF-SR5 Quinn Kuzmich, Michael Enger, SANS NetWars Event, Winning Hack Team
NCF-37 James Krainock, Root9B, Protect Business
NCF-36 Christopher Murphy, Cyber Safety Harbor, Protect Privacy
NCF-CO4 Ed Rios, National Cybersecurity Center (NCC), CTU Regional
NCF-SR4 Frank Gearhart, ISSA Chapter President, Executive Directive
NCF-35 Frank Gearhart, ISSA Chapter President
NCF-34 Eric Adkins, PriorityOne Bank, Cyber Security Solutions
NCF-DC05 Chuck Brooks, Brooks Consulting International, Cyber Update
NCF-33 Andre Hinton, United States Air Force
NCF-SR3 Mike Schmidt, Office of Economic Development and International Trade
NCF-32 Mike Schmidt, Ensemble Ventures, Medical Record Privacy
NCF-31 Dawn Lindell, Western Area Power Administration (WAPA)
NCF-30 Craig Smith, Private Investigators Adopt Cyber Hunting Techniques
NCF-29 Dr. Walt Cooper Cheyenne Mountain District 12
NCF-28 Steven Luber, Mercyhurst University, Young Cyber Talent’s
NCF-27 Rebecca Chopp, JB Holston, Existential Question of Our Age, Cyber Security
NCF-26 Jane Ginn, Cyber Threat Intelligence Network (CTIN)
NCF-DC04 Chuck Brooks, Brooks Consulting International, Cyber News
NCF-25 Justin Searle, UtilSec Cyber Issues
NCF-24 Michael Willis, Colorado National Guard, First Hand Response
NCF-23 Holly Rollins, Booz Allen Hamilton
NCF-SR2 Bob Wright, AFCEA Colorado Springs Chapter Cyberspace Symposium
NCF-22 Kyle Hybl, El Pomar Foundation’s & Cyber Institutes Link
NCF-SR1 Mark Luciw, ARC Advisory Group, Industrial Control
NCF-21 Mark Luciw, Chancellor of University of Colorado at Colorado Springs
NCF-DC03 Chuck Brooks, Brooks Consulting International
NCF-20 Cindy Thornburg, Information System Security Association (ISSA)
NCF-19 Bruce Parkman, MainNerve, Candid Talks
NCF-18 John Suthers, Colorado Springs Mayor
NCF-17 David Powell, Cyber Resilience Institute (CRI)
NCF-DC2 Chuck Brooks, Brooks Consulting International, Cyber Update
NCF-CO3 Joe Bonnell, National Cybersecurity Center (NCC)
NCF-16 Mike Semmons, Western Cyber Exchange (WCX), Cyber Awareness
NCF-15 Randy Ramos, Cyber Resilience Institute
NCF-14 Gib Sorebo, Leidos, Colorado Draws Big Cyber Firms
NCF-13 Jeff Bardin, Treadstone 71, rising danger virtual world
NCF-12 Jay Lindell, Office of Economic Development and International Trade (OEDIT)
NCF-CO2 Ed Rios, National Cybersecurity Center (NCC) Update
NCF-11 Brian Spiess, Financial Cyber Security, Financial
NCF-10 Colorado Governor John Hickenlooper, Cyber Economic Growth
NCF-CO1 Kyle Hybl, National Cybersecurity Center (NCC)
NCF-DC1 Chuck Brooks, Brooks Consulting International, Cyber News
NCF-09 Roger Hill, Siemens Corporation, Tech Giants
NCF-08 Kathy Boe, Boecore, Private Sector Support
NCF-07 Douglas Depeppe, Cyber Resilience Institute (CRI)
NCF-06 Wallace Pond, Colorado Technical University, Identity Theft
NCF-05 General Ed Anderson, Colorado National Cybersecurity Center (NCC)
NCF-04 Andy Merritt, Colorado Springs Regional Business Alliance
NCF-03 Erfan Ibrahim, National Renewable Energy Laboratory (NREL) Government Cyber Security
NCF-02 The Entire First Season Guest provide clips about what is in store
NCF-01 Guest Tim Wacker and Host Chris Gorog introduce the show topics
Annual Sponsorship packages, get your message out on New Cyber Frontier: Sponsor Packages
If you are looking for Leadership and Self-help with actionable advice check out Chris’s Book “Inner Logic Engineering Your Life“
Thanks for stopping by to listen to the New Cyber Frontier Podcast here at Logic Central Online. Leave us some thoughts about the podcast you listened to. We are always looking for topics to explore, so also send in your ideas for guests to interview or topics to cover.
Comments:
Leave us some thoughts about the podcast series. Are we asking the right questions? What else would you like to hear addressed?
Give us some more details about your areas of expertise. We are always looking for areas to explore, tell us your ideas for guests or topics.