The Julia La Roche Show

#009 CrowdStrike's Adam Meyers On The Biggest Cyber Threats

Aug 31, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 4min
2
How to Be a Successful Computer Programmer
03:34 • 2min
3
The History of Computer Programming
05:24 • 4min
4
The Evolution of the Hacker Wars
09:14 • 4min
5
The Evolution of the Hacking Scene
13:13 • 2min
6
The Economic Espionage of China
15:03 • 4min
7
The Progress of China's Chips Act
19:06 • 2min
8
The Importance of a Smart Strategy for the United States
20:42 • 3min
9
The Threat Landscape in the US
23:40 • 4min
10
The Cost of Data Weaponization
27:12 • 2min
11
The Potential Revenue of Ransomware Data Extraction
29:33 • 2min
12
The US Is the Primary Target for Data Weaponization
31:03 • 3min
13
The Pain of Data Leaks
34:03 • 2min
14
The Double-Edged Sword: Avoiding Breach
36:04 • 3min
15
How to Stop a Breach With Machine Learning
39:17 • 4min
16
The Power of Zero Days in Cybersecurity
43:32 • 5min
17
The Russia-Ukraine Situation Playing Out
48:49 • 5min
18
The Role of Cyber in Geopolitics
53:53 • 2min
19
The Threat of Disinformation Misinformation in the US Election
55:37 • 4min
20
The Rise of Deep Fakes on Social Media
59:13 • 2min
21
How to Discern if a File Is Not Real
01:01:23 • 2min
22
The Problem With Social Media Trolls
01:03:09 • 3min
23
The Scariest Cyber Related Attack That Was Prevented
01:06:31 • 2min
24
The 2016 Hacks
01:08:50 • 4min
25
The Russians and the US Election
01:13:17 • 2min
26
The Threat of Bias
01:14:59 • 2min
27
Fancy Bear, Cozy Bear: A Crypto Name System
01:16:43 • 2min
28
The Importance of Understanding the Origin of Threats
01:19:02 • 5min
29
The Importance of Threat Hunting
01:23:46 • 2min