Date
Summary
Chris Lehman Appears on Cheddar News To Discuss Twitter Whistleblower and Cybersecurity
Subjects
Source
Cheddar TV

Name: Cheddar TV
URL: https://cheddar.com/
Show
Cheddar News

Name: Cheddar News
URL: https://cheddar.com/
Persons
Chris Lehman
Name: Chris Lehman
Event
–
Event location
–
Link
–
Uploaded
08/23/2022 02:21 pm
Owner
Type
Video
Format
MP4 (1280x720)
Use clipper to adjust file type
Duration
0:06:12
Views
3
Purchases
0
Transcript
RUSH TRANSCRIPT Sacco was ░░░░░░░░ in corey for quote ░░░░░░░░ performance and quote joining ░░░░░░░░ now is Chris lehmann ░░░░░░░░ of safeguard cyber the ░░░░░░░░ that monitors over 30 ░░░░░░░░ communications platforms including Twitter ░░░░░░░░ I m Chris it ░░░░░░░░ really good to have ░░░░░░░░ on the show today ░░░░░░░░ s start by breaking ░░░░░░░░ the serious allegations what ░░░░░░░░ they to your understanding ░░░░░░░░ would it mean if ░░░░░░░░ or more of them ░░░░░░░░ actually true Kristin and ░░░░░░░░ starters the really the ░░░░░░░░ serious allegation That s ░░░░░░░░ made is that right ░░░░░░░░ That more than are ░░░░░░░░ to half of all ░░░░░░░░ employees have act excess ░░░░░░░░ use your account information ░░░░░░░░ that user account information ░░░░░░░░ oftentimes be confidential It ░░░░░░░░ be something like a ░░░░░░░░ number for example or ░░░░░░░░ could user id and ░░░░░░░░ information and That is ░░░░░░░░ very serious allegation and ░░░░░░░░ point to a problem ░░░░░░░░ exist at Twitter about ░░░░░░░░ controls in general and ░░░░░░░░ problem with insufficient security ░░░░░░░░ when it comes to ░░░░░░░░ id information or personal ░░░░░░░░ is that it could ░░░░░░░░ in a situation where ░░░░░░░░ employees become insider threats ░░░░░░░░ insider threats is a ░░░░░░░░ common type of threat ░░░░░░░░ in the cybersecurity industry ░░░░░░░░ insider threats can lead ░░░░░░░░ a number of different ░░░░░░░░ could have cyber criminals ░░░░░░░░ would target an insider ░░░░░░░░ gain access to personal ░░░░░░░░ twitters users and that ░░░░░░░░ information could ultimately be ░░░░░░░░ to enable things like ░░░░░░░░ and theft Insider there ░░░░░░░░ been situations where insiders ░░░░░░░░ partnered with nation states ░░░░░░░░ access to information that ░░░░░░░░ be used to help ░░░░░░░░ something like a misinformation ░░░░░░░░ and insider reps for ░░░░░░░░ and leverage by cyber ░░░░░░░░ have the goal of ░░░░░░░░ disrupting a business those ░░░░░░░░ of situations destruction of ░░░░░░░░ can cause massive financial ░░░░░░░░ and to work You ░░░░░░░░ reputation will damage the ░░░░░░░░ Pretty alarming and I ░░░░░░░░ for users out there ░░░░░░░░ might be freaked out ░░░░░░░░ about this on if ░░░░░░░░ is the first time ░░░░░░░░ they re learning of ░░░░░░░░ in Twitter s case ░░░░░░░░ instance for an everyday ░░░░░░░░ or are there steps ░░░░░░░░ they can take to ░░░░░░░░ selves and what should ░░░░░░░░ know simply about using ░░░░░░░░ platform amid these allegations ░░░░░░░░ so there s a ░░░░░░░░ of things I mean ░░░░░░░░ one when it comes ░░░░░░░░ ensure your own personal ░░░░░░░░ should always take the ░░░░░░░░ steps of regularly up ░░░░░░░░ your user id and ░░░░░░░░ oftentimes in its cybersecurity ░░░░░░░░ we say that hackers ░░░░░░░░ longer break and a ░░░░░░░░ in and the reason ░░░░░░░░ the way that they ░░░░░░░░ that is that credential ░░░░░░░░ is very very common ░░░░░░░░ it s something users ░░░░░░░░ everyday applications like Twitter ░░░░░░░░ to be mindful of ░░░░░░░░ the best thing that ░░░░░░░░ can to take control ░░░░░░░░ and help protect themselves ░░░░░░░░ to constantly update there ░░░░░░░░ id and in terms ░░░░░░░░ they need to be ░░░░░░░░ of and really what ░░░░░░░░ need to demand is ░░░░░░░░ the way we communicate ░░░░░░░░ has changed actually over ░░░░░░░░ last decade we no ░░░░░░░░ just communicate via the ░░░░░░░░ via e mail there ░░░░░░░░ all kinds of new ░░░░░░░░ and methods for us ░░░░░░░░ communicate in our personal ░░░░░░░░ and in business It ░░░░░░░░ be in social channels ░░░░░░░░ applications like Twitter Facebook ░░░░░░░░ in the business world ░░░░░░░░ recently use collaboration application ░░░░░░░░ have messaging applications that ░░░░░░░░ use are our phones ░░░░░░░░ a lot of these ░░░░░░░░ ways to communicate have ░░░░░░░░ driven by the popularity ░░░░░░░░ smartphone and the applications ░░░░░░░░ come along with that ░░░░░░░░ the challenge is that ░░░░░░░░ and large corporations have ░░░░░░░░ put the same level ░░░░░░░░ security controls on those ░░░░░░░░ modern communication channels that ░░░░░░░░ put on traditional channels ░░░░░░░░ email and as consumer ░░░░░░░░ of those applications whether ░░░░░░░░ s at your place ░░░░░░░░ work or it s ░░░░░░░░ your personal life you ░░░░░░░░ expect and demand that ░░░░░░░░ applications but proper controls ░░░░░░░░ place to protect your ░░░░░░░░ so craig and or ░░░░░░░░ your place of business ░░░░░░░░ know you re you ░░░░░░░░ you re businesses information ░░░░░░░░ I think at the ░░░░░░░░ Users feel protected I ░░░░░░░░ assume the more confident ░░░░░░░░ would feel actually using ░░░░░░░░ of these class forms ░░░░░░░░ someone who works at ░░░░░░░░ company you re the ░░░░░░░░ of safeguard you monitor ░░░░░░░░ than 30 digital communication ░░░░░░░░ platforms Twitter included do ░░░░░░░░ find that this is ░░░░░░░░ norm that the allegations ░░░░░░░░ Twitter are the norm ░░░░░░░░ other social media platforms ░░░░░░░░ know it s businesses ░░░░░░░░ truck constantly trying to ░░░░░░░░ catch up There s ░░░░░░░░ spectrum certainly some corporations ░░░░░░░░ done a good job ░░░░░░░░ putting controls in place ░░░░░░░░ when we talk about ░░░░░░░░ theirs Process controls there ░░░░░░░░ people controls and there ░░░░░░░░ technology controls and many ░░░░░░░░ are doing their best ░░░░░░░░ keep up but it ░░░░░░░░ what we call an ░░░░░░░░ battle in the cybersecurity ░░░░░░░░ and what we mean ░░░░░░░░ that is that the ░░░░░░░░ act there s only ░░░░░░░░ to be successful once ░░░░░░░░ the business or the ░░░░░░░░ needs to be right ░░░░░░░░ the time and that ░░░░░░░░ a daunting challenge So ░░░░░░░░ need to think about ░░░░░░░░ are proper tuna tease ░░░░░░░░ hackers and bad actors ░░░░░░░░ break in and one ░░░░░░░░ the most common ways ░░░░░░░░ they break in today ░░░░░░░░ these new communication channels ░░░░░░░░ users are constantly and ░░░░░░░░ personal or company confidential ░░░░░░░░ into All right at ░░░░░░░░ lehmann giving us the ░░░░░░░░ that we need to ░░░░░░░░ Chris Thank you so ░░░░░░░░ Chris is the CEO ░░░░░░░░ cyber Coming at bed ░░░░░░░░ and beyond shareholders just ░░░░░░░░ some more bad news ░░░░░░░░ a
To view this clip's transcript, log into your Grabien account.