
Presented by IT Audit Labs, where cybersecurity experts and guest speakers dive into security threats, attacker techniques and key industry issues. We give organizations access to a tailored network of partners and specialists.
Our team evaluates security risk and compliance, then implements administrative and technical controls to strengthen data protection. Through threat and control assessments, we pinpoint vulnerabilities, gauge impact and benchmark maturity to guide your next steps.
Recent Episodes
1
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
2
The Invisible Threats: OT Meets IT in Modern Manufacturing
3
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
4
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
5
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
6
Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure
7
The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes
8
Eco-Security: The Intersection of Recycling and Technology
9
SOC Audits Decoded: What Your Business Needs to Know Now!
10
Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats
11
Social Engineering Tactics & Defense Strategies with Alethe Denis
12
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
13
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
14
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
15
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
16
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
17
AI & Emerging Tech for a Better Future with Marsha Maxwell
18
Building Resilient, Secure Software: Lessons from DevSecOps Experts
19
Real-World Cybersecurity: Need to Know Now Insights from a CISO
20
Safety Science Meets Cybersecurity: Lessons for Risk Management
21
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
22
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
23
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
24
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
25
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
26
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
27
Quantum Computing's Impact on Cybersecurity with Bernie Leung
28
Securing the Invisible Threats: Insights on IoT Security with Eric Johansen
29
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
30
Building the Future: AI and Cybersecurity in Construction
31
Cybersecurity News: Water Systems & IoT Devices Under Threat
32
Phishing: The Number 1 Social Engineering Tactic with James Arndt
33
Printing the Future: Navigating Cybersecurity in 3D Printing
34
Are VPNs Secure? Insights on the Risks, and the Ivanti Breach
35
A Veteran’s Journey into Cybersecurity with Clifton Robinson
36
Email and Mobile Security Tips with Dean Morstad
37
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI
38
Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean
39
Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools
40
Understanding Cryptocurrency and Wallet Security with Matt Starland
41
Stories from the Dark Side of Cyber Forensics with Andre Champagne
42
eCommerce and Surviving the Black Friday Frenzy with Jeff White
43
The Future of Digital Storage: From Hard Drives to DNA
44
A Comprehensive Guide to Quantum Computing
45
The Next Era of Computing and Processor Technology
46
Unmasking the Complex World of Cybersecurity and Software Updates
47
The Dark Side of Cyberspace: Data Breaches and the Price of Information
48
The New Toolkit: AI-Powered Presentations
49
The Future of Passwords and Personal Security
50
Certified Vulnerable: How Certificates Can Be Exploited
51
So, you wanna be a CISO?
52
Hacking Hardware Hobbies with Dennis Pelton
53
Security in the News: Cloud Policies and Data Breach Prevention
54
Cyber Safe Travel: Tips for Secure Adventures
55
So, You Want to Be in Cybersecurity?
56
What is the Dark Web?
57
Security in the News: Architects, APIs, and Alaska
58
It’s a Pwnagotchi Party!
59
Wireless Attack Kill Chain for n00bs with Dennis Pelton
60
Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors
61
DC30 Vishing Competition Black Badge winners Team Spilt Beans
62
Phishing, Smishing and Other Cybersecurity Threats
63
Unquoted Service Paths: A Windows Vulnerability
64
Personal Information Security Protection in a Modern Era, Part IV
65
Personal Information Security Protection in a Modern Era, Part III
66
Personal Information Security Protection in a Modern Era, Part II
67
Personal Information Security Protection in a Modern Era, Part I
68
Introduction to The Audit
June 30, 2025
00:00
1X
Sorry, no results.
Please try another keyword
- What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conversation exposes the gaps[...]
- Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial[...]
- What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Traufler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials[...]
- Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a[...]
- Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro[...]
- Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minnesota. InfraGard is a unique public-private partnership with the FBI designed to protect the 85% of America's essential systems owned by the private sector. From power grids to transportation, the vulnerabilities[...]
- Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of computation, while Quantum Key Distribution (QKD) is making encrypted communications nearly unbreakable. As multiple sectors race to integrate quantum and AI, cybersecurity experts are[...]
- What Really Happens to Your Trash? Inside Modern Waste ManagementIs your trash really being recycled, or is it ending up in a landfill? In this episode of The Audit, we sit down with Trista Martinson, Executive Director at Ramsey Washington Recycling & Energy, to uncover the surprising technology and cybersecurity challenges behind[...]
- Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit, we sit down with Adam Russell from Schellman to debunk common misconceptions about SOC audits and explore why they’re more than just a checkbox exercise—especially for startups. Adam joins the IT Audit Labs[...]
- Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this episode of The Audit, we break down how Elon Musk’s unexpected access to FEMA’s sensitive data underscores the critical role of audits in organizational security. We reveal how regular audits and third-party[...]
- You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations? In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red[...]
- Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton’s global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their[...]
- Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI’s evolving role in combating cyber threats, and the surprising insights data can unveil[...]
- Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on[...]
- From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts[...]
- In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In[...]
- In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We[...]
- Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the[...]
- In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal information security. Eric breaks down essential strategies for protecting your data, starting with freezing your credit, leveraging password managers, and implementing multi-factor authentication. He also[...]
- Discover the vital intersection of safety science and cybersecurity, where human psychology meets technical innovation. In this episode of The Audit, special guest John Benninghoff shares his expertise in safety science and how its principles can improve cybersecurity. From applying safety protocols in the tech industry to enhancing security culture through proactive human[...]
- In this episode of The Audit, we’re joined by Mick Leach from Abnormal to discuss the evolving landscape of email security and how AI is transforming both the threats and defenses in this space. From QR code phishing to the rise of sophisticated AI-driven attacks, Mick shares insights on how organizations can[...]
- Stay informed with The Audit, your go-to podcast for the latest in cybersecurity insights, best practices, news and trends. In this month's news episode, we tackle the most significant developments shaping the industry today. We'll cover: The latest insights from CrowdStrike on evolving cybersecurity threats The impact of the Supreme Court ruling on cybersecurity[...]
- Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted by Eric Brown and Nick Mellem from IT Audit Labs, we sit down with Melisa Stivaletti, Chair at Epic and OSINT Director at GuideHouse. Melisa shares her remarkable journey from working[...]
- Join us for the July 2024, live news episode of 'The Audit', where we cover the latest cybersecurity threats, ransomware updates, and AI advancements. In this news episode, we tackle some of the most pressing cybersecurity issues of the month. Ever wondered how a ransomware attack could shut down a public library? We[...]
- Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit. Hosts Eric Brown and Nick Mellum, joined by Cameron Birkeland, explore the tool's functionalities and features, offering practical insights and real-world applications. Discover how the HAC5 Pineapple can enhance your cybersecurity measures, with discussions on model comparisons,[...]
- Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity. In this live episode, we cover the recent ransomware attack on the Seattle Public Library, the $37 million theft from Coinbase Pro users, and the sophisticated gift card fraud by the Moroccan[...]
- Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down complex concepts like the Shor[...]
- Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity with Eric Johansen from Phosphorus. Eric discusses the challenges and solutions for managing IoT devices at scale, the critical importance of asset inventory, and the significant risks posed by outdated technology.[...]
- Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we talk cybersecurity, social engineering, and some wild stories that you won't want to miss. We’ll explore the role of tabletop exercises in shoring up a company's security and[...]
- In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Group. John shares his insights on integrating technology to enhance cybersecurity and operational efficiency within the construction sector. The discussion covers a range of topics from combatting sophisticated phishing attacks to[...]
- Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT security standards. In this episode, our team of cybersecurity experts, Eric Brown and Nick Mellum, dissect the Biden administration's recent warnings about cyber-attacks on U.S. water utilities and[...]
- In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybersecurity. Join us as Jamie Arndt, a cybersecurity expert with extensive experience in reverse engineering and analyzing malicious emails, shares his insights and stories from the[...]
- How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themselves become targets for hackers? As 3D printing technology becomes more integrated into various industries, its cybersecurity implications cannot be ignored. This episode sheds light on the exciting[...]
- How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackle these pressing questions head-on. As the cybersecurity landscape evolves, Virtual Private Networks (VPNs) are increasingly common among cybersecurity professionals and enthusiasts alike... but[...]
- It should come as no surprise that building a team can be challenging for cybersecurity professionals. However, we've found that individuals who have served in the military often possess a unique focus and drive, setting them apart in the cyber world. Clifton Robinson, a former Army logistician and healthcare market analyst, joins our[...]
- Is your digital footprint secure? In our latest episode we unravel the complexities of email and mobile security. Join Dean Morstad, a seasoned cybersecurity expert, as he shares invaluable insights and practical tips to enhance your digital safety. The conversation includes: - Why and how are most of us viewed as a “product”? -[...]
- This episode offers more than just insights; it's a chance to meet the minds who have been combatting cyber threats for decades. We explore topics like ransomware, effective data breach responses, and the integration of AI in cybersecurity. Discover strategies and insights from industry leaders and learn how to fortify your digital[...]
- In this episode of The Audit, Leah McLean shares her insights from over 10 years in cybersecurity and IT with companies like Cisco, and now Mastercard. We’ll cover: How to get a job in cybersecurity Navigating the ethical challenges of AI in Cybersecurity Work-life balance in cybersecurity jobs Perspectives on success for cybersecurity leadership Emerging infosec technologies Mental[...]
- The Audit - Episode 30 - Join us as we speak with cybersecurity expert and hacking hardware enthusiast Cameron Birkland, who introduces us to the world of the Flipper Zero. The brainchild of a successful Kickstarter campaign in 2020, the Flipper Zero might look cute with its dolphin avatar, but it's a potent[...]
- The Audit - Episode 29 - Ready to uncover the world of crypto? Join us in our latest episode as we dive into the realm of cryptocurrency with Matt Starland. Let's embark on a journey from the origins of Bitcoin to the frenzy of meme stocks making headlines. Tune in to understand[...]
- The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre’s journey, from the Anoka County Sheriff's Office, through the Illinois Attorney General's Office, to the state of Minnesota, provides fascinating insights into a career in[...]
- The Audit - Episode 27 - Imagine managing over a million orders per minute during a high-stakes sales event like Black Friday! That's the reality Jeff White from Cockroach faced during his time at Best Buy. We sit down with him in a lively discussion, unpacking the intricacies of running a successful[...]
- The Audit - Episode 26 - Ready to decode the future of data storage technology? We guarantee that you'll be fascinated by our in-depth exploration into this rapidly evolving landscape. Together with our esteemed guest, Bill Harris, we probe into the intricacies of current storage mediums, such as hard disk drives, flash[...]
- In Part 2 of the Tech Lessons Series by Bill Harris, get ready to unravel the mystery of quantum computing? Brace yourselves as we, your hosts, and our esteemed guest, Bill Harris, take you on a whirlwind tour of this fascinating technology that's set to redefine the future. Possessing the potential to[...]
- The Audit - Episode 24In Part 1 of the Tech Lessons Series by Bill Harris, prepare to be transported into the future of computing resources, with our fascinating guest, Bill Harris from IT Audit Labs. We're opening up the world of processor design and specialized workloads, discussing the intricacies of chip fabrication,[...]
- Wouldn't it be great if you could navigate the treacherous landscape of software vulnerabilities like a pro? That's exactly what we're serving up in our latest podcast episode. Together with our dedicated team, we dissect the upsurge of these vulnerabilities, the recent discovery of a toolkit targeting Apple, Mac OS, and stolen[...]
- The Audit - Episode 22Want to understand the dark underbelly of cyberspace? Join us as we take a deep dive into recent data breaches at T-Mobile, discussing why fewer customers were impacted this time around compared to the January API attack. Get insights on how negligence in security could lead to government[...]
- For this episdoe we are joined by Eric Pesik, the Deputy General Counsel at Seagate Technology. Eric, walks us through how he has been using generative AI tools, including ChatGPT, AI image generators and AI voice overs to speed up his workflow when creating presentations for his colleagues. The crew also discusses[...]
- A conversation between Nick Mellem, Eric Palms, and Matt Starland about the future of passwords through the lens of IT. The team notes a general lag time behind current threats and the technology already available to upgrade security protocols and the lack of large-scale adoption and upgrades. Passwords may eventually have to[...]
- A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely[...]
- An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITAL’s own Eric Brown and Gretchen discuss topics including the day-to-day grind of advocating for funding and implementing security protocols, how to prioritize security needs and access risk on a budget, reporting structure,[...]
- This week, we are speaking with Dennis Pelton about his expertise in hardware. He makes badges for all the major security conferences and loves to share his knowledge in this space. #security #hacking #wifi #rubberducky #hardware #defcon #schmoo #defcon #bsides
- Continue the conversation with guest, Matt Starland, as we dive further into security in the news. How do these breaches happen and how can they be prevented? Find out today on The Audit. #Breaches #ThreatActors #CyberSecurity #TheAudit
- Traveling for Spring Break, vacation, or work? Join The Audit and guest ethical hacker, Matthew Wold, to hear best practices for keeping your journey cyber-secure.
- In this episode, The Audit discusses day-to-day operations in the industry with cybersecurity expert, Nate Ristine. From creating and hunting down phishing emails, to the emotional aspect of social engineering, find out what tools Nate uses to make it all happen.
- Hardware hacking transforms from mysterious craft to accessible art form in this captivating conversation with Dennis Pelton, whose electronic creations blend security education with playful innovation. At the center of our discussion is Dennis's remarkable business card—a seemingly ordinary rectangle concealing a microchip with his encrypted resume, challenging potential employers to demonstrate[...]
- Digital security breaches continue to dominate headlines, with T-Mobile's recent API vulnerability exposing personal data from 37 million customer accounts marking their eighth major security incident in just five years. What's behind this alarming pattern, and what does it tell us about the state of cybersecurity today?In this thought-provoking discussion, we're joined[...]
- Join the IT Audit Labs crew to talk about Pwnagotchi’s! We will review how a pwnagotchi collects keys/wpa/wpa2 information from 4-way wifi handshakes, and how to crack those keys/how the key exchange functions. It’s a pwnagotchi party!
- Did you know that your Wi-fi is even vulnerable to attacks? Tune in to hear our guest, Dennis, talk about kill chain, DOS attacks, Wi-Fi reconnaissance, and more. For more information about relevant attacks and ways to protect your network, listen to The Audit today! #wifi #cybersecurity #itauditlabs #theaudit Follow our guest Dennis[...]
- Breaches, phishing, attacker programming, and more, in this week of The Audit. Tales from the Trenches will talk about several scenarios our hosts have experienced with fraudulent situations, as well as ways these hackers implement their tactics. Tune in to The Audit today to hear more! #cybersecurity #protection #itauditlabs #theaudit
- Vishing is happening constantly. Understanding what vishing is and being able to spot these tactics will help protect your information. The Audit presents three guests that won the DEFCON30 Vishing black badge. These guests are here to discuss their experience at DEFCON, as well as their knowledge on vishing. Join us to[...]
- Every click matters in the digital world, especially when cybercriminals are crafting increasingly sophisticated traps. Our latest deep dive into the murky waters of phishing, smishing, and digital deception reveals just how creative scammers have become—and how easily anyone can fall victim.<br><br>The team shares recent encounters with text message scams promising everything[...]
- Missing quotation marks might seem trivial, but in Windows service paths, they create serious security vulnerabilities that hackers actively exploit. This episode takes you through the mechanics of unquoted service path vulnerabilities - a Windows-specific issue that continues to plague even sophisticated security products.<br><br>We start by breaking down exactly what these vulnerabilities[...]
- Digital threats lurk around every corner, but your strongest defense might be simpler than you think. We dive into the critical strategies for protecting your personal information in an age where data breaches have become almost routine.<br><br>Your cell phone number serves as a gateway to your identity. By treating it as sensitive[...]
- Digital privacy isn't just about hiding what you do online—it's about control. When every click, keystroke, and scroll becomes a data point feeding algorithms designed to predict and influence your behavior, understanding what happens behind the scenes becomes essential.<br><br>Our team dives deep into the hidden world of web privacy, revealing the uncomfortable[...]
- Digital security goes far beyond just having a strong password. What happens after you hit "send" on that email or text message could expose your most sensitive information to prying eyes, marketers, and even hackers. In this eye-opening episode, we dive deep into the hidden truths about personal communication security.<br><br>Most people are[...]
- The digital breadcrumbs we leave behind create a startlingly accurate profile of who we are—one that corporations, governments, and malicious actors can exploit. In this eye-opening conversation, the team at IT Audit Labs unpacks the complex and sometimes unsettling reality of personal information security in today's connected world.<br><br>Kyle breaks down the concept[...]
- Ever experienced the frustration of multiple security audits that yield the same findings with no real path forward? You're not alone. Security audit fatigue is a widespread challenge facing organizations today, and it's exactly why we created IT Audit Labs.<br><br>Welcome to the premier episode of "The Audit," where we introduce our team[...]
Available now on: