Podcast Episode Details

Back to Podcast Episodes
Higher Education under Cyber Attack. Clemson CISO John Hoyt.

Higher Education under Cyber Attack. Clemson CISO John Hoyt.


Season 5 Episode 67


John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber liability, how intelligence gathering is critical to security, Importance of visibility into operational risk, most common hacking tactics and a new approach to build a security culture.

Takeaways

  • Cybersecurity in higher education faces unique challenges 
  • Social engineering, particularly through job scams and impersonation, is a significant threat in higher education.
  • Cyber resiliency and preparedness are crucial in mitigating cyber risks 
  • Education and awareness are key 
  • Collaboration and information sharing between organizations are essential 
  • Creating a student-run SOC can be a valuable initiative

Breaking into cybersecurity requires passion, interest, and a willingness to continuously learn and adapt.

 

Chapters


  • 00:00 Introduction and Background
  • 01:30 First Experience with Ethical Hacker
  • 06:32 Transition to Cybersecurity at Clemson University
  • 07:00 Cyber Risks in Higher Education
  • 09:04 Cyber Resiliency and Preparedness
  • 11:18 Cyber Risks Faced by College Students
  • 15:06 Social Engineering and Cyber Education
  • 19:48 Collaboration and Information Sharing in Cybersecurity
  • 22:12 Challenges of Cybercrime and Law Enforcement
  • 28:15 Top Cyber Threats in Higher Education
  • 30:11 Threats and Vulnerabilities
  • 34:25 Creating a Student-Run SOC
  • 38:02 Breaking into Cybersecurity
  • 46:03 The Broad Scope of Cybersecurity
  • 50:47 Generative AI

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com  
 

Support the show

🔥New Special Offers! 🔥

  1. Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more.
    🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies
  2. 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!

Dive Deeper:
🔗 Website: https://cybercrimejunkies.com

Engage with us on Socials:

✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/


Published on 9 hours ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate