chat:CYBR cover art

chat:CYBR

chat:CYBR

By: Jordan Deiuliis James Jacobs
Listen for free

About this listen

A podcast that explores cyber policy and its impact on our future.chat:CYBR 2024 Political Science Politics & Government
Episodes
  • General Frank McKenzie — chat:CYBR - Episode 13
    Jul 1 2025

    Keywords

    Iran, history, asymmetric warfare, proxy groups, cyber capabilities, U.S. defense, critical infrastructure, General McKenzie, military strategy, regional power

    Summary

    In this episode, General Frank McKenzie discusses the historical context of Iran, its strategies in asymmetric warfare and proxy groups, and the implications of its cyber capabilities. He emphasizes the importance of understanding Iran's long-standing cultural identity and its current regime's focus on survival. The conversation also covers U.S. strategies to mitigate cyber threats and protect critical infrastructure, particularly in Florida.

    Takeaways

    Iran's relationship with the U.S. dates back to the 1950s.

    Iran sees itself as a regional hegemon despite internal challenges.

    The Iranian regime prioritizes survival and exporting its ideology.

    Asymmetric warfare is a key component of Iran's military strategy.

    Iran's ballistic missile capabilities have significantly improved.

    Cyber capabilities are a growing concern for U.S. infrastructure.

    The U.S. is vulnerable to cyber attacks due to its open systems.

    Florida has taken proactive steps to assess cyber vulnerabilities.

    Training and resources are available for critical infrastructure protection.

    Collaboration between state and local entities is essential for cybersecurity.

    Titles

    Decoding Iran: History and Modern Implications

    Asymmetric Warfare: Iran's Strategy Explained

    Sound bites

    "Iran is a factor we should respect."

    "We offer a cyber range for training."

    "I always enjoy talking to y'all."

    Chapters

    00:00 Understanding Iran's Historical Context

    03:01 Iran's Asymmetric Warfare and Proxy Strategies

    06:04 Iran's Cyber Capabilities and Threats

    09:04 Mitigating Cyber Threats and Infrastructure Protection

    Show More Show Less
    18 mins
  • James Welsh - chat:CYBR – Episode 12
    Jun 3 2025

    Keywords

    Dr. Welsh, FCIT, Cyber Florida, Operation K-12, Cybersecurity Education, CyberLaunch, Teacher Support, Workforce Development, K-12 Education, USF

    Summary

    In this conversation, Dr. Welch discusses the Florida Center for Instructional Technology (FCIT) and its evolution, emphasizing its outward-focused approach to education and collaboration with Cyber Florida. The discussion highlights the importance of cybersecurity education, the challenges faced in K-12 settings, and the initiatives like Operation K-12 and CyberLaunch that aim to enhance cybersecurity awareness and workforce development. Dr. Welch also underscores the need for good policy to support educational outcomes and the exciting future of cybersecurity education at the University of South Florida.

    Takeaways

    • The Florida Center for Instructional Technology was established in the early 1980s.
    • FCIT's success is attributed to its outward-focused approach and problem-solving mindset.
    • Collaboration with Cyber Florida has led to the creation of Operation K-12.
    • CyberLaunch is the largest high school cybersecurity competition in the nation.
    • Support for teachers is crucial in implementing cybersecurity education.
    • Cybersecurity education is primarily focused on high school courses.
    • Removing barriers for school districts to participate in events is essential.
    • Cybersecurity awareness needs to be integrated across all subject areas.
    • The advent of AI presents new challenges for cybersecurity education.
    • Good policy is foundational for achieving positive educational outcomes.

    Titles

    • Empowering Cybersecurity Education with Dr. Welch
    • The Evolution of FCIT and Its Impact

    Sound Bites

    • "We are the K-12 piece of Cyber Florida."
    • "We need a workforce ready to adapt."
    • "We pay for all the food and transportation."
    • "Cybersecurity is getting more important."

    Chapters

    00:00 Introduction to Dr. Welch and FCIT

    02:51 The Evolution of FCIT and Its Mission

    06:01 Collaboration with Cyber Florida and Operation K-12

    09:13 Supporting Teachers in Cybersecurity Education

    12:00 CyberLaunch: A Major Cybersecurity Competition

    15:07 Barriers to Participation and Engagement

    18:13 The Need for Broader Cybersecurity Awareness

    21:14 The Future of Cybersecurity Education at USF

    Show More Show Less
    26 mins
  • Tad Schnaufer - chat:CYBR – Episode 11
    Apr 29 2025

    Keywords

    Ukrainian conflict, cyber operations, military strategy, cyber attacks, critical infrastructure, Russia, Ukraine, NATO, cybersecurity, hybrid warfare

    Summary

    In this conversation, James Jacobs and Tad discuss the ongoing conflict in Ukraine, focusing on the historical context, the role of cyber operations, and the integration of cyber capabilities with military strategies. They explore the evolution of Russian cyber attacks, the defensive measures taken by Ukraine, and the implications for critical infrastructure in places like Florida. The discussion emphasizes the importance of education and preparedness in the face of cyber threats.

    Takeaways

    • The Ukrainian conflict has roots dating back to 2014 with the annexation of Crimea.
    • Cyber operations have been a key component of Russia's strategy in Ukraine.
    • Russia has conducted numerous cyber attacks targeting critical infrastructure in Ukraine.
    • The integration of cyber capabilities into military operations is crucial in modern warfare.
    • Ukraine has developed significant cyber defense capabilities since 2014.
    • Education and awareness are vital for defending against cyber attacks.
    • Private partnerships can enhance a nation's cyber defense.
    • Chaos and misinformation are tactics used in cyber warfare.
    • Redundant systems are essential for maintaining operations during cyber attacks.
    • Lessons from Ukraine can inform cybersecurity strategies in other regions.

    Titles

    Understanding the Ukrainian Conflict

    Sound Bites

    • "Russian aggression in Ukraine."
    • "Ukrainians were able to respond."
    • "Thank you so much for joining us."

    Chapters

    00:00 Overview of the Ukrainian Conflict

    03:48 Cyber Operations and Attacks

    10:13 Integration of Cyber and Military Operations

    16:00 Preparing for Cyber Attacks in Florida

    Show More Show Less
    22 mins

What listeners say about chat:CYBR

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.