Welcome to the New Cyber Frontier: Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics. Hear about developments which impact and affect both the local Colorado efforts and the entire virtual world.
Episodes View By Guest
NCF-359 Unfolding Evolution of Artificial Intelligence
NCF-358 Post Digital Transformation Cybersecurity
NCF-357 AI Friend or Foe
NCF-IEEE13 Megatrends Driving the Future of Technology
NCF-356 Spatial Web = 3D internet
NCF-355 I’m an Average User – What does security do for me?
NCF-354 Branding to Attract Investment
NCF-353 Preparing Cyber Startups for Investor Engagement
NCF-352 Renewable Energy Effects on Critical Infrastructure
NCF-351 Contrasting Consumer Security Needs
NCF-350 Modernizing for the Future: Navigating Legacy System Upgrades
NCF-349 Colorado Cyber-Tech Startup Capital
NCF-348 Cybersecurity Takes flight
NCF-347 Cyber Physical Security
NCF-346 Escalating Effectual DevOps
NCF-345 Sustainability of Cybersecurity in the AI Era
NCF-344 Protecting your Data Wealth
NCF-343 Post Digital Transformation Philosophy
NCF-342 On the 2024 Cyber Frontier
NCF-341 Exploring New Methods of Distributed Trust
NCF-340 It Takes a Community to Build Next-Gen Cyber
NCF-339 New Frontier of Individual Empowerment
NCF-338 Disrupting Markets by Cybersecurity Economics
NCF-337 Entering a New Year and New Phase for Cybersecurity
NCF-336 Confidential Computing Explained
NCF-335 Small Business Balances Cybersecurity Cost vs Value
NCF-334 Security Engineering for Industrial Systems
NCF-333 EDGE Symposium Presentation
NCF-332 Weaponized Documents and Content
NCF-331 Small Business Security Measures
NCF-330 High-risk is a Reality
NCF-329 API Marketplace and Business Opportunities
NCF-328 How fast is the Cloud Migration Moving
NCF-327 Privacy Talk with Christopher Gorog
NCF-326 Cybersecurity Research
NCF-325 Security as a Business Value Proposition
NCF-324 Cybersecurity for Everyone
NCF-323 Psychology of Trust Digitally
NCF-322 Critical infrastructure of Zero Trust
NCF-321 Zero Trust Part 2
NCF-320 Zero Trust
NCF-319 Cloud Security with Kubernetes
NCF-IEEE12 Global Efforts in Digital Privacy
NCF-318 Security Orchestration Automation and Response
NCF-317 Cybersecurity Buzz words
NCF-316 Recapping What We heard from our Guest in 2022
NCF-315 FAA Grounding Incident
NCF-314 Status of Cybersecurity for Critical Infrastructure
NCF-313 The Future of Cybersecurity
NCF-IEEE11 Applying Smart Contracts to the Energy Space.
NCF-IEEE10 Advancments of Health Technology and Cybersecurity
NCF-312 Understanding Those Starting in Cybersecurity
NCF-IEEE9 Blockchain Security and Energy Transition
NCF-311 Business Strategies with CISO
NCF-310 Security Of Digital Footprints
NCF-IEEE8 Fielded Blockchain Energy Demonstrations
NCF-309 Department Of Defense Agent Conveys Security is Essential
NCF-308 UCCS Ph.D. Graduate describes his Mastery of CyberSecurity
NCF-IEEE7 University Blockchain Program Engages Students
NCF-IEEE6 Healthcare Infrastructure to Support Privacy
NCF-305 Determining the Best Cybersecurity Principles
NCF-304 Improved Security on The War Front
NCF-303 Where do you stand? : The Future of Quantum
NCF-IEEE5 Driving Forward to Standardize Blockchain
NCF-302 Industrial IoT Digital Transformation
NCF-301 Creating Opportunities Through Workplace Education
NCF-IEEE4 Securing Hospital Networks
NCF-300 Potential Cyber Threats with Machine Learning
NCF-299 Cybersecurity Needs After the Pandemic
NCF-298 Embracing Empathy For The User Community
NCF-297 How To – Funding for Cybersecurity Workforce
NCF-IEEE3 Privacy of Critical Health Predictive Data
NCF-296 Cybersecurity of Firefighting and Paramedics
NCF-295 The Cybersecurity of Transport Logistics
NCF-294 Imaginary vs. Real Threats to The Electric Grid
NCF-293 Rethinking Cybersecurity Designs
NCF-292 Internal I.T. With The Customer First Mindset
NCF-IEEE2 Using Emerging Technology to Problem-Solve Healthcare
NCF-291 Unpacking the SolarWinds hack
NCF-290 Adapting to Today’s Cybersecurity Landscape
NCF-289 Dedication to Information Security
NCF-288 New Techniques in Network Security
NCF-287 New Defined Future with Blockchain
NCF-286 Building “We” and “Us” Cyber Teams
NCF-IEEE1 The Emerging Participatory Grid
NCF-285 Hardening to Limit Exposure Caused by Business Services
NCF-284 Assessing to Predict Career Success
NCF-283 Hacking to make Secure software
NCF-SR17 Looking Forward – Cybersecurity Trends in 2022
NCF-SR16 2021 Year in Review – Securing Critical Infrastructure
NCF-282 Cybersecurity Communication and Leadership
NCF-281 Miniature Sensors Control Cybersecurity
NCF-280 Setting up Diversity in Cyber Security
NCF-279 Is your Personality the best fit for your chosen Career?
NCF-278 Making Cybersecurity More Inclusive
NCF-277 Marketing Of Cyber Security Products
NCF-276 What you need to know about NIST Privacy Framework
NCF-SR15 Convergence of Health care and Cybersecurity
NCF-SR14 Cyber Security Professional Specializing in Audit and Training
NCF-275 Incident handling and response for Fortune 100 Companies
NCF-274 Securing Next-Gen Renewable Energy Systems
NCF-273 Security Performance Management
NCF-DC08 Cybersecurity Workforce Trends
NCF-272 Securing an Ageing Electric Grid layered with New IIoT
NCF-271 Global Trends in Blockchain
NCF-270 An Integrated Future: Securing Exponential IIoT Growth
NCF-269 Transitioning from Technical to a Leadership Role
NCF-268 Introducing NCF Host Martha Laughman
NCF-267 Small Business Contractors Struggle with CMMC Expectations
NCF-266 Reduced Business Cost by Sharing a CISO
NCF-CO20 Economic Development And Military Programs
NCF-265 Predicting Future Malicious Activity On The Dark Web
NCF-264 Introducing New Host Tim Montgomery
NCF-263 Levels of Required Security Architecture for Businesses
NCF-262 Problem solving and Application Security
NCF-261 Becoming a Leader for Cybersecurity
NCF-260 How to Find The Next Big Cyber Product
NCF-259 Marketing Cybersecurity and Asking The Right Questions
NCF-258 FBI and Cybercrime Prevention
NCF-257 Not Enough People: Cyber Operations Need To Automate
NCF-256 Us Army Reaches out for Industry Partnerships
NCF-255 Where Are The Jobs And Money People?
NCF-254 Who owns your Content On Social Media?
NCF-253 Blockchain’s Future in Cybersecurity
NCF-252 Cyberwar to Stop Election Hijacks and Misinformation
NCF-251 Blockchain Technology and The Future of Cybersecurity
NCF-250 Becoming An Entrepreneur In Cybersecurity
NCF-249 How Important is Industrial Cybersecurity?
NCF-248 Data Forensics and Cyber Education
NCF-247 Are We Secure Enough?
NCF-246 How to Sell Cybersecurity as an Expert
NCF-245 CISOs Solve Unique Pandemic Cyber Issues
NCF-244 Should We Question the Security of the Cloud?
NCF-243 A Coordinated Approach Toward Stronger Industrial Cyber Security
NCF-242 eDiscovery: Navigating a Post Crisis Investigation
NCF-241 2021 What’s on the Horizon
NCF-240 2020 Year In Review
NCF-CO19 ISSA Stepping up to Adjust for at Home Workforce
NCF-239 Bridging the Gaps Between Academia and Practitioners in Cyber Security
NCF-238 Supporting Employee Retention in Cyber Workforces
NCF-237 Cybersecurity Law and Legislation in Latin America
NCF-236 Shift the Narrative from Cybersecurity to Safety
NCF-235 Cybersecurity Maturity Model Certification
NCF-234 Cybersecurity Operations in the Military
NCF-233 Campuswide Cybersecurity
NCF-232 Risk is a Four Letter Word
NCF-231 Building a Cybersecurity Force Multiplier
NCF-230 Why Cyber is the New Skilled Labor
NCF-CO18 Small Business Development Centers Support Cyber
NCF-229 Tools and Strategies for Industry Professionals
NCF-228 New Technology Spawned from the Pandemic
NCF-227 Understand Identity
NCF-226 New Concepts in Cyber Workforce Development
NCF-225 Human-Based Attacks
NCF-224 Level It Up pt. 2: Enabling Clientele
NCF-223 Concierge Cybersecurity
NCF-222 The Difference Between IT and OT Security
NCF-221 Responding to Insider Threats
NCF-220 Cyber Research in Academic Institutions
NCF-219 Creating a Paranoid Skillset
NCF-218 The Economics of Pricing in the Digital Age
NCF-217 Transforming Data into Action
NCF-216 Intersection of the Coronavirus and Cyber
NCF-215 Revisualizing Security with Mnemonic Devices
NCF-NCC03 Electronic Voting: How NCC is convening leaders through Secure the Vote
NCF-214 Giving Back with Open Source Security
NCF-213 Eye in the Sky: Casino Security
NCF-212 Balancing the Risk
NCF-211 Level It Up: Don’t Dumb Down Cyber
NCF-210 Security Baked into the Business Culture
NCF-209 Securing the IOT
NCF-CO17 Cyber Education: How NCC is Taking on the Cyber Gap
NCF-208 What Managed Services Will I Need as My Company Grows?
NCF-CO16 Murray for ISSA President
NCF-207 The Importance of Awareness
NCF-DC07 COVID-19 Impact on Cybersecurity – DC Update
NCF-206 Ecosystem Cybersecurity
NCF-205 Systems Engineering and Cybersecurity
NCF-204 Speed Computing Pioneer
NCF-203 Blockchain and IEEE
NCF-CO15 Women in Cybersecurity: Scope and Role of ISAC
NCF-202 Cyber Hygiene by the Numbers
NCF-201 A New Workforce — Connecting Innovation to Cybersecurity
NCF-200 Operating within the Cloud
NCF-199 Identifying the Objective of an Adversary
NCF-198 Cybersecurity Education and Skills Development
NCF-197 How to Choose an MSP
NCF-196 Blockchain Evolution
NCF-195 Women in Cybersecurity: IT Training for Military Personnel
NCF-194 Learning and Thriving in IT Professions
NCF-193 Global Coordination
NCF-192 Women in Cybersecurity: Perplexed and Paralyzed Clients
NCF-191 Controlling the Narrative
NCF-190 Human Centered Design
NCF-189 Aspects of Cybersecurity
NCF-188 Compliance vs. Security
NCF-187 Advancement and Implementation of Cybersecurity
NCF-186 CCPA Compliance and Data Breach Prevention
NCF-185 Training the Federal Cyber Workforce
NCF-184 The Importance of Cloud Security
NCF-183 Penetration Testing and Potential Threats
NCF-182 Executive Level Cybersecurity
NCF-181 The Evolution of IT and the Security Landscape
NCF-180 Kids, Predators, and Cyber Security for Their Future
NCF-179 Privacy Regulations and Legislation
NCF-CO14 The Importance of STEM Education for Marginalized Groups
NCF-178 Privacy Winter
NCF-177 Cyber Trade Regulation
NCF-176 Cyber Performance Anxiety
NCF-175 Cyber Security for the Increasingly Smart Home
NCF-174 Risk Management in Financial Institutions
NCF-173 Online Shopping and Cyber Security in Jordan
NCF-SR13 Department of Homeland Security and CISA
NCF-172 MSSPs and Their Alignments to Nonprofits
NCF-171 Cyber Security Education and Job Market Disparity
NCF-170 Cyber Executive Protection of High Net Worth Individuals
NCF-169 Pueblo Economic Development Corp, Document Destruction, and ID Protection
NCF-168 – Women in Cyber Security: The Importance of Interpersonal Skills
NCF-167 – How Do Organizations Know Whether the Security They Pay for Works?
NCF-166 Our Sci-Fi Reality – Artificial Intelligence
NCF-165 Rational Cyber Security for the Business
NCF-164 The BYOD and IOT Nightmare
NCF-163 Cybersecurity Energy Security and Emergency Response
NCF-162 Back to the Basics and Civil Discourse in Cyber
NCF-161 Threat Identification and Prevention
NCF-160 Cyber Intelligence Collection Management & Information Sharing
NCF-159 Headhunting for Cyber Security Personnel
NCF-158 The Current Evolution of Education in Cyber Security
NCF-157 Ups and Downs of a Cyber Security Startup
NCF- 156 The Behaviors in Cyber – Shame, Fear, Ignorance, Oh My!
NCF-155 The Importance of Individual Accountability and Ethics
NCF-154 System Engineering, The Foundation of Cyber Security
NCF-153 Insider Threats and Where to Find Them
NCF-152 Startups and Blockchain Technology
NCF-151 CyberSecurity Executives – How to Find the Right One
NCF-150 Sims, The Cloud, Insider Threats, and Connections
NCF-149 The Importance of Understanding Your IT and Security Infrastructure
NCF-148 Hollywood & Sneakers Teams – Clean Your Room Before You Play with Toys
NCF-147 Disruptive Technologies to the Cybersecurity Homefront
NCF-CO13 Privacy Security and Blockchain Legislative Roundtable
NCF-146 Zero Trust and Multi-factor Identification
NCF-145 Women & STEM – A Strength for Cyber Security
NCF-144 What is Blockchain and Where is it Going
NCF-143 Proactive Security – A Requirement, Not a Fad
NCF-142 Centralization of Standards and Information
NCF-141Cyber Security Business Strategies
NCF-CO12 Privacy for the People
NCF-140 PCl Compliance In The Modern Era
NCF-139 What is Blockchain and Why is it Being Developed
NCF-138 How to Bring Positive Change to the CyberSecurity Industry
NCF-137 The New World Order – How Blockchain Can Protect Personal Data on the Internet
NCF-136 Technology Clashes with Privacy
NCF-135 Women in Cyber – Entrepreneurial Minded Women in Charge
NCF-134 Always Curious and Learning the Motto of Cyber
NCF-133 There’s No Magic Bullet Cybersecurity
NCF-132 Cyber Warrior to Civilian Corporate Protector
NCF-131 Women in Cyber – Don’t Be Afraid to Fail
NCF-130 Introducing New Host Dr. Wanda Cousar
NCF-129 Pacing One’s Self to be Ready for Cyber Security
NCF-128 Cyber Security Intrusion Mitigation Marketing – What To Do After A Cyber Attack
NCF-CO11-Cyber Security EcoSystem in Colorado Springs
NCF-127 Difference Between Chief Security and Privacy Officer vs Chief Informations Officer
NCF-126 Cyber Security & Department of HomeLand Security – The Concept of DHS
NCF- 125 What it takes to be successful working in cybersecurity for the Federal Government
NCF- 124 Women in Cyber-Security: What it Takes To Be Successful
NCF-123 Securing “The Cloud” – Is Cloud Really Secure?
NCF-122 High School Pioneers Special Security Program
NCF-121 Breaking Down the 3 Major Keys of Election Security and the Safety of your Vote
NCF-CO10 Building a Model Cybersecurity Ecosystem
NCF-120 Seamlessly Integrating New Cyber Security Talent into the Workforce
NCF-119 Managing your “Bring Your Own Device” (BYOD) Work Environment
NCF-118 Turning Cyber Security into an Enabler for your Company
NCF-117 New Host Dr. Shawn Murray Introduction
NCF-116 Social Engineering and The Art of Making People Say Yes
NCF-115 What is DevOpps? New ways to look at Security Practices
NCF-114 Cybersecurity in State Government With Dan Lohrmann
NCF-113 From Millionaire to Comic Creator
NCF-112 Role of a CISO
NCF-111 Tips on How to Keep Your Org Safe from Hackers
NCF-110 A High Energy How To for Cyber Startups
NCF-109 Mentorship in the Cyber Domain
NCF-108 The Convergence of IoT with AI
NCF-107 The Psychology of Cyber Security
NCF-SR12 BlockChain Development Community
NCF-106 “We Must All Hang Together”
NCF-105 Cyber Officers Needed
NCF-104 The SANS Promise
NCF-103 Redesigning Cyber Security The Sky is Not Falling
NCF-102 Evolution of Cyber Security in Atlantic Canada
NCF-101 Cybersecurity Forensics and Cyber Warfare
NCF-CO09 Economic Incentives to Grow Cybersecurity Industry
NCF-100 CISSP Domain Review Team to Revolutionize the Cyber Industry
NCF-99 Colorado A Haven for Cyber Security with Guest from Colorado=Security
NCF-98 Powerful Defensive Cyber Weapons
NCF-97 The Biology of a Cyber Attack with Dr. Andy Heo
NCF-96 CyberPatriot- Building Excitement in Cyber Security with Our Youth
NCF-95 Cyber Security Stalemate? hear how to shake up your business protection.
NCF 94 Securing IOT in the Technology Landscape where everything is either Cloud or Edge Devices
NCF-93 Is Your Company moving to the Cloud?, Hear how to make sure it is Secure.
NCF-92 Is BlockChain the Answer to your companies needs?
NCF-91 Information Sharing Analysis Organizations ISAO – Identify cyber-attacks before they infect you.
NCF-90 The Buzz on Blockchain – where does it go from here?
NCF-89 US DOJ – Leonard Bailey Speaks on Cyber Crime Privacy and National Security
NCF-88 Application of Security Risk using Risk Management Framework (RMF)
NCF-87 IOT – Creating entirely new Security Problems
NCF-86 Cyber Laws For Business Protection
NCF-85 Efforts to track Cannabis using BlockChain
NCF-84 Protecting your data on the internet
NCF-83 Exciting Blockchain Community Efforts-Developers Needed
NCF-82 Importance of Cyber insurance for businesses
NCF-81 Protection Against Targeted Cyber-Attacks
NCF-80 Security Certificates and their Importance in the Industry
NCF-79 What is the DarkWeb? Monitoring for internet criminal activity with IDAgent
NCF-78 Cyber Security for Insurance and Financial with Progressive Ins.
NCF-77 K-12 Cyber Security Education with Dr. Mary Graft
NCF-76 Game Changing New Models to Protect from DDOS
NCF-75 Military Community and Cyber Security Innovation
NCF-CO8 Colorado Passes Law to use Blockchain for Governance…
NCF-74 Business and Cyber Security With Jon Clay
NCF-73 Using AI to Develop Software Applications is The Future
NCF-72 Airline Cyber Security – Is our Air Travel Safe?
NCF-SR11 History of Communications Security Part II
NCF-SR10 History of Communications Security Part I
NCF-71 Operational Cyber Security for your Business
NCF-70 Cyber Security Managed Services the New trend with Guest from Istonish
NCF-69 Cyber Security for Business and Financial Management
NCF-68 Hispanic Community Leaders in Cyber Security
NCF-67 The basics on Patents, Trademarks, and copyrights with the USPTO
NCF-66 Building Excitement in future of Cyber Security with Circadence
NCF-65 Securing Oil & Gas Infrastructure with BHGE
NCF-64 (GDPR)European Union Changes the Game For Privacy
NCF-63 FedRAMP Demystified With Coalfire’s Cyber Risk Director
NCF-62 SecureSet Academy and Our New Host
NCF-61 Cyber Security for Ships on the Ocean with CIMSEC
NCF-60 Security Information and Event Monitoring 101
NCF-59 Things to do – Before Calling that High Priced Penetration Tester
NCF-58 Apozy Anti-Phishing & Anti Malware
NCF-57 Business Application Firewalls the Next Generation of Data Analytics
NCF-56 Security and Privacy for Our Medical Records
NCF-SR9 Legislator Focuses on Using BlockChain for Cutting Edge Governance Programs
NCF-55 Penetration Testing Hear from the NSA Certified Experts at Plex
NCF-CO7 Exploring Cyber Security Across the Community – DOD Office of Economic…
NCF-54 Securing the Internet of Things
NCF-53 Proactively Developing New Software with Security Built In
NCF-52 Responding to Cyber Incidents
NCF-CO06 National Cybersecurity Center: The Way Forward and the 2017 Cyber Symposium
NCF-51 Guide to Obtaining a Government Security Clearance
NCF-50 Security for Databases with Author Paul Nielsen
NCF-49 DHS On Critical Infrastructure Security
NCF-SR8 Common Myths About Cyber Security
NCF-48 Security for Cyber Physical Systems
NCF-47 Colorado Universities Work Together to Create Innovation Community Program
NCF-CO5 Introduction to Vance Brown, Interim CEO of the National Cybersecurity Center
NCF-46 Using Cyber Ranges to Train on Network Cyber Operations
NCF-SR7 CyberUSA Reaches Cyber Communities in 19 States With More in Talks
NCF-45 Bringing Cyber Technology Companies Together
NCF-44 A Culture Supporting Cyber Security Startups – Menny Barzilay
NCF-43 What Do Politicians Need to Know About Cyber Security
NCF-SR6 Cyber Security Industry Hacking Report with Fireeye
NCF-42 Zero to One in Cyber Security for your Small Business
NCF-DC06 Trump Appointments, Ransomware, Cyber in C-Suite – DC Cyber Update
NCF-41 CTRAC Connecting Air Force Advanced Cyber Research to Industry
NCF-40 Cyber Community Anchor Deloitte Gives Back with Capture the Flag
NCF-39 Cyber Threat Intelligence Explained
NCF-38 Creating A Ground-Up Business Model with Cyber Security Protection
NCF-SR5 NetWars winning hacker team, how to Hack, latest trends in Cyber, WannaCry
NCF-37 Cyber Intelligence as a Preemptive Measure To Protect Your Business
NCF-36 How to Protect Privacy Of Clients Data
NCF-CO4 National Cybersecurity Center Partners with Colorado Technical University
NCF-SR4 Break Down of President Trumps Cyber Security Executive Directive
NCF-35 Join Top Professional Organizations Supporting Cyber
NCF-34 Cyber Security Solutions for Small Business
NCF-DC05 New Leadership At DHS Goes Public On Cyber – DC Update
NCF-33 IT is Obsolete, Lead with Cyber Or Go Out of Business
NCF-SR3 Dream Big is Making STEM Exciting for High School Students
NCF-32 Handling Health Care Medical Record Privacy
NCF-31 Securing Critical Infrastructure, Dawn Lindell CIO WAPA
NCF-30 Private Investigators Adopt Cyber Hunting Techniques
NCF-29 Engaging High School Students In Cyber, Dr. Walt Cooper Superintendent
NCF-28 Understanding the Concerns and Interest of Our Young Cyber Talent
NCF-27 Answering the Existential Question of the Our Age, Cyber Security
NCF-26 Threat Intelligence and Information Sharing and Analysis Organizations
NCF-DC04 Trump Begins Strong for Cybersecurity- DC Cyber with Chuck Brooks
NCF-25 Exploring Cyber Topics That Peak the interest of Young People
NCF-24 Responding to Cyber Threats, Hear First Hand From the Colorado National Guard
NCF-23 Small Businesses growth is the focus a Large Company… Huh?
NCF-SR2 AFCEA Rocky Mountain Cyberspace Symposium
NCF-22 Cyber Institutes connection to El Pomar Foundation …
NCF-SR1 Industrial Controls Cyber Security with Mark Luciw from ARC…
NCF-21 Bringing The Colorado Effort Together, Amazing Efforts at University of Colorado, Colorado Springs
NCF-DC03 Trump Chooses Top Experts, Tom Bossert Heads DHS- DC Cyber…
NCF-20 Cyber Professional Join Together, ISSA Focuses on Engaging Young…
NCF-19 Getting Real On Cyber, Candid Talks on What works and What doesn’t
NCF-18 Elected Officials Make Cyber Security TOP Priority, John Suthers…
NCF-17 Learn How Other States Organize Cyber Communities, Candid Talks…
NCF-DC2 DC Cyber Update with Chuck Brooks
NCF-CO3 Debrief of the NCC Inaugural Kickoff Event
NCF-16 Western Cyber Exchange, Leading the Way In Community…
NCF-15 Younger Generations are Eager to Get Into Cyber…
NCF-14 Attracting Large Cyber Companies to Colorado…
NCF-13 The Growing Threat in the Virtual World…
NCF-12 Is Local Government Ready to Spend What it Takes to…
NCF-CO2 National Cybersecurity Center Update with Ed Rios…
NCF-11 We Need the Financial Backing to Spur Cyber Startup…
NCF-10 Colorado Governor John Hickenlooper, Founding Cyber…
NCF-CO1 Colorado News Update, New CEO Selected for the NCC…
NCF-DC1 Washington DC Cyber News Update With Chuck Brooks
NCF-09 Learn About The Next Tech Giants Solving…
NCF-08 The Government Is Reaching Out For Private…
NCF-07 The Place of Public Private Partnerships In Cyber…
NCF-06 Living the Nightmare of Identity theft, A First…
NCF-05 Inside the Colorado Economic Development effort…
NCF-04 The Colorado Springs Regional Business alliance…
NCF-03 Erfan Ibrahim, National Renewable Energy…
NCF-02 Introducing the First Season of New Cyber…
NCF-01 What is The New Cyber Frontier All About…
Annual Sponsorship packages, get your message out on New Cyber Frontier: Sponsor Packages
If you are looking for Leadership and Self-help with actionable advice check out Chris’s Book “Inner Logic Engineering Your Life“
Thanks for stopping by to listen to the New Cyber Frontier Podcast here at Logic Central Online. Leave us some thoughts about the podcast you listened to. We are always looking for topics to explore, so also send in your ideas for guests to interview or topics to cover.
Comments:
Leave us some thoughts about the podcast series. Are we asking the right questions? What else would you like to hear addressed?
Give us some more details about your areas of expertise. We are always looking for areas to explore, tell us your ideas for guests or topics.