Episodes

  • Healthcare Ransomware: When Cyberattacks Turn Deadly
    Sep 8 2025

    When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care.

    But Ed's biggest concern? The eerie quiet before what he believes could be the next wave of coordinated attacks across multiple critical infrastructures. Plus, why Microsoft's approach to AI integration is making cybersecurity professionals lose sleep.

    • Key Topics Covered:
    • Why ransomware attacks on hospitals increase patient mortality rates
    • The research behind healthcare cybersecurity's deadly consequences
    • How the healthcare industry's digital transformation created new vulnerabilities
    • Microsoft's problematic approach to forced AI integration
    • The evolution from individual hackers to organized cybercrime syndicates
    • Why Ed's "Spidey senses" are warning of coordinated infrastructure attacks

    Don't wait until your organization becomes the next healthcare headline. Subscribe for more critical cybersecurity insights that could save more than just your data.

    #healthcarecybersecurity #ransomware #patientsafety #cybersecurity #infosec #healthcare

    Show More Show Less
    32 mins
  • The Deepfake Hiring Crisis: AI Fraud in Job Interviews
    Aug 25 2025

    What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this conversation exposes the security crisis hiding in plain sight.

    Key Topics Covered:

    • North Korean operatives stealing US salaries to fund nuclear programs
    • How Figma had to re-verify their entire workforce after infiltration
    • Live demonstrations of deepfake technology (Pickle AI, DeepLiveCam)
    • Why 80-90% of engineers believe interview cheating is rampant
    • Validia's "Truly" tool vs. Cluely's AI interview assistance
    • The future of identity verification in remote work
    • Why behavioral biometrics might be our last defense

    This isn't just about hiring fraud—it's about the fundamental breakdown of digital trust in an AI-first world. Whether you're a CISO, talent leader, or anyone involved in remote hiring, this episode reveals threats you didn't know existed and solutions you need to implement today.

    Don't let your next hire be your biggest security breach. Subscribe for more cutting-edge cybersecurity insights that you won't find anywhere else.

    #deepfakes #cybersecurity #hiring #AI #infosec #northkorea #fraud #identity #remote #validia

    Show More Show Less
    41 mins
  • How CTF Culture Gamifies Your Way to Unbreakable Security Teams
    Aug 11 2025

    Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI era.

    Whether you're a CISO looking to revolutionize your hiring process, a security professional wanting to level up your skills, or just curious about what happens when cybersecurity meets escape room logic, this episode delivers actionable insights you can implement immediately.

    Key Topics Covered:

    • How Meta CTF's Jeopardy-style competitions work and why they're addictive
    • Real examples of CTF challenges that test critical thinking over pure technical knowledge
    • The shocking rise of AI-assisted interview cheating (and how to spot it)
    • Why "CTF culture" is becoming the new hiring differentiator for top security teams
    • Practical tips for using competitions to build team camaraderie and retention
    • How smaller companies can compete with Big Tech for cybersecurity talent

    Don't let your next hire fool you with AI-generated answers. Learn how CTF competitions reveal the real problem-solvers from the pretenders. Like, share, and subscribe for more cybersecurity hiring secrets that actually work!

    #MetaCTF #CybersecurityHiring #CTF #InfoSec #CyberSecurity #AIInterviews #TechRecruiting

    Show More Show Less
    30 mins
  • Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
    Jul 28 2025

    Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us?

    In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this massive financial fraud and reveal why help desk vulnerabilities are becoming cybercriminals' favorite attack vector. From Scattered Spider's multi-industry campaigns to the unexpected cybersecurity challenges facing Formula 1 racing, this episode covers the evolving threats that no security professional can afford to ignore.

    • 🎯 Key Topics Covered:
    • How banking impersonation scams work and red flags to watch for
    • Why Scattered Spider targets help desks and how to defend against it
    • The surprising cybersecurity risks in high-speed Formula 1 racing
    • Practical steps to protect yourself from social engineering attacks
    • Why MFA fatigue is becoming a serious security vulnerability

    Don't let social engineering catch you off guard. The tactics that fooled a professional athlete could easily target your organization next.

    #cybersecurity #socialengineering #scatteredspider #financialfraud #infosec

    Show More Show Less
    22 mins
  • Grassroots Cybersecurity: Protecting Communities Through Education
    Jul 14 2025

    What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey from Chicago to becoming a cybersecurity educator and community advocate. This isn't your typical career advice—it's about fortifying communities through practical security hygiene and hands-on learning.

    Co-hosts Joshua J Schmidt, Eric Brown, and Nick Mellum dive deep with Rasheed on his mission to teach cybersecurity fundamentals where they're needed most. From TryHackMe demonstrations to real-world privacy protection, this conversation reveals how grassroots education can transform both individuals and entire communities.

    Key Topics Covered:

    • Building cybersecurity skills in underserved communities • Practical privacy protection for families and neighborhoods
    • Career development through hands-on learning platforms
    • The critical importance of in-person networking in tech
    • Why protecting your digital identity protects your community

    Don't wait to start building your cybersecurity career—your community needs you. Like, share, and subscribe for more real-world security insights that matter!

    #cybersecurity #infosec #careerdevelopment #networking #community #privacy #tryhackme


    Show More Show Less
    33 mins
  • Tabletop Exercises 2.0: How OpsBook Is Changing the Game
    Jun 30 2025

    What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conversation exposes the gaps that could leave your organization bleeding when the real attack comes.

    Key Topics Covered:

    • Why "tribal knowledge" is your organization's biggest security risk
    • The insider threat scenario that makes every tabletop exercise go sideways
    • How AI is revolutionizing incident response preparation through OpsBook's ontology
    • Why your playbooks are useless if hackers have them too
    • The "Derek Jeter approach" to cybersecurity preparedness
    • From real estate to tech: spotting warning signs before the industry shift

    The crew shares fresh insights from a recent school district tabletop that exposed critical single points of failure, while Cody demonstrates how modern organizations are turning decision-making into muscle memory, not just memos. This isn't theory—it's the frontlines of organizational resilience where one overlooked vulnerability could trigger catastrophic failure.

    Like, share, and subscribe for more in-depth security discussions that prepare you for tomorrow's threats, not just today's compliance checkboxes!

    #tabletopexercise #incidentresponse #cybersecurity #infosec #AI #opsbook

    Show More Show Less
    39 mins
  • The Invisible Threats: OT Meets IT in Modern Manufacturing
    Jun 16 2025

    Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor.

    Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a sprawling landscape of vendors, protocols, and operational rules that laugh in the face of standardization. From Siemens to Rockwell to Honeywell, Dino draws sharp parallels to hospital systems juggling specialized third-party contractors—because in the world of OT, consistency is a luxury and adaptability is survival.

    🔧 Key Topics Covered:
    • Why OT environments resist IT standardization efforts
    • Managing thousands of industrial assets from multiple vendors
    • The hospital analogy: treating OT specialists like medical contractors
    • Building effective partnerships between OT and IT teams • Real-world challenges of securing industrial control systems

    #OTSecurity #ITConvergence #IndustrialCybersecurity #SCADA #PLC #CriticalInfrastructure

    Show More Show Less
    40 mins
  • Pwnagotchi: The AI Pet That Hunts Your Network Credentials
    Jun 2 2025

    What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Traufler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from any network in range, autonomously gather handshakes, share intelligence with other Pwnagotchis, and operate completely under the radar from conference floors to airplane cabins in ways that might surprise you.

    • Key Topics Covered:
    • How the Pwnagotchi captures Wi-Fi handshakes through deauthentication attacks
    • Why WPA3 networks are immune (and why most networks still aren't using it)
    • Building your own Pwnagotchi vs buying a Flipper Zero with Wi-Fi dev board
    • Real defense strategies beyond "just turn off your Wi-Fi"
    • The legal gray areas of passive Wi-Fi monitoring
    • Conference horror stories and the 600-handshake airplane incident

    Whether you're a security professional looking to understand emerging threats or someone curious about DIY hacking tools, this episode delivers practical insights you can use to protect your networks today. The Pwnagotchi proves that the most dangerous attacks often come in the most innocent packages.

    Don't let your organization become the next victim of passive Wi-Fi attacks. Like, share, and subscribe for more hands-on cybersecurity content that keeps you ahead of emerging threats!

    #Pwnagotchi #cybersecurity #wifihacking #ethicalhacking #infosec #flipper zero


    Relevant Links:

    Jayden Traufler

    • LinkedIn
    Show More Show Less
    35 mins