We are a community of believers, birthed out of the Toronto revival who are hungry for a living experience of God, His love, and His presence. We are actively pursuing personal and corporate revival that brings transformation to our lives, families, spheres of influence, and ultimately our city and region. For more info, visit: www.ctfraleigh.com
…
continue reading
Welcome to the "Know Your Compliance" podcast, hosted by Greg Dent, founder of Really Trusted. Over the past six years, Greg has immersed himself in the world of anti-money laundering (AML) and counter-terrorist financing (CTF), gaining insights from hundreds of compliance officers in Canadian real estate. In each episode, Greg shares key takeaways from his work, hosts expert guests for deep dives into financial crime, or discusses trending issues with the ReallyTrusted team. Whether you’re ...
…
continue reading
The Children’s Trust Fund (CTF) is Missouri’s foundation for child abuse prevention. CTF was created by the Missouri General Assembly in 1983 as a 501c(3) non-profit organization whose purpose is to prevent and/or alleviate child abuse and neglect. Through awareness campaigns and distribution of funding to child abuse and neglect prevention programs, CTF works to build Strong Families, Safe Kids in Missouri.
…
continue reading
Health. Self Development. Travel. Motivation. Love. Independence. Career. Goals. Fitness. Business. Mindfulness. Family. Life. Inspiration. Self Love. Work. Spirituality. Purpose. Self Care. We cover it all here at the CTF podcast! The goal here at the CTF podcast is to speak to everyday women, transgender and LGBTIQ+ people from all over the world about their experiences, journeys, highs, lows, adventures and lessons learnt along the way. Hear about every day heroes taking their own life in ...
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
CTF Winnipeg Weekly Sermon.
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Welcome to Smarter Lawcast, the official podcast of Hall & Wilcox, a leading independent Australian law firm. We pride ourselves on our Smarter Law approach, where we work with our clients to creatively solve their legal and business challenges. Tune in to be educated and entertained by our experts’ take on topical legal issues. LinkedIn:@Hall & Wilcox Facebook:@HallandWilcox Instagram:@hallwilcox https://hallandwilcox.com.au/
…
continue reading
Exploring the leading edge of computing technology with a focus on Networking
…
continue reading
GoR: DIY or die. The podcast for the curious Maker. OSHW, FOSS, ethical hacking, STEAM, citizen science, digital citizenship, and more.
…
continue reading
The Politics, Religion, and Everything Else You Shouldn't Talk About Podcast, or The P & R Podcast for short, is a podcast that discusses various topics, current events, or features special guests. You can expect about one episode per week at a runtime no shorter than 15 minutes. Enjoy the podcast and let us know what you think! Team PandR 🐼 Support this podcast: https://podcasters.spotify.com/pod/show/thepandrpodcast/support
…
continue reading

1
Navigating AML/CTF: Risks and common failures of AML/CTF programs
17:10
17:10
Spill senere
Spill senere
Lister
Lik
Likt
17:10
Langton Clarke and Andrew Ong discuss how to deal with high-risk customers, especially politically exposed persons (PEPs), whether or not a business should choose to onboard a high-risk customer and why an AML/CTF program should be specifically tailored to a business and its risk appetite.
…
continue reading

1
The ECM Exchange – Cyberattacks and continuous disclosure: what ASX-listed entities need to know
26:58
26:58
Spill senere
Spill senere
Lister
Lik
Likt
26:58
John Hutchinson is joined by Eden Winokur and Michelle Eastwell to discuss the critical issue of continuous disclosure in the face of cyber incidents. With several high-profile cyber-attacks impacting ASX-listed companies, they unpack the updated Guidance Note 8, the challenges of disclosure and the requirements for listed entities during a cyber b…
…
continue reading

1
The Fight Against Crime While Balancing Law Enforcement Powers and Civil Liberties
33:52
33:52
Spill senere
Spill senere
Lister
Lik
Likt
33:52
In this episode, host Greg Dent sits down with Chris Thompson, a former lawyer who now works in the provincial government's financial crimes capacity. They dive into the topic of Unexplained Wealth Orders (UWOs), a powerful tool in the fight against financial crime that has recently been introduced in Canada, starting with British Columbia. Chris p…
…
continue reading

1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
Spill senere
Spill senere
Lister
Lik
Likt
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading

1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
Spill senere
Spill senere
Lister
Lik
Likt
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading

1
An Unholy Matrimony with Duplicity | Aaron Ninaber
52:26
52:26
Spill senere
Spill senere
Lister
Lik
Likt
52:26
This week, we explored the Parable of the Unforgiving Servant from Matthew 18:21-35. Through this parable, we were reminded of the vastness of God’s mercy, the requirement of forgiveness and the unholy matrimony with duplicity. We see in this story a king who forgave an astronomical debt, but the forgiven servant who fails to extend that same grace…
…
continue reading

1
The ECM Exchange: Navigating shareholder approvals and capital raising essentials
20:18
20:18
Spill senere
Spill senere
Lister
Lik
Likt
20:18
Join John Hutchinson, Deborah Chew and Chris Wright as they dive into the complexities of the critical decisions listed companies face around capital raising when the company needs to obtain shareholder approval to issue equity securities. They explore when shareholder approval is necessary, key approaches to raising capital and the legal considera…
…
continue reading

1
Interview with Alan Delahunty, his role as Vice President/Commercial Lines Agent
32:22
32:22
Spill senere
Spill senere
Lister
Lik
Likt
32:22
Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and learn why multi-factor authentication and other security measures are now industry standards. We promise yo…
…
continue reading
This week Justin Rife unpacked the Parable of the Prodigal Son, revealing a powerful picture of reconciliation and community. Both sons-one who squandered his inheritance and the other who tried to earn the father’s love-were declared beloved sons by the father. God’s heart is for reconciliation and unity, and as believers that should be reflected …
…
continue reading

1
Navigating AML/CTF: Outsourcing obligations under AML/CTF rules
17:52
17:52
Spill senere
Spill senere
Lister
Lik
Likt
17:52
Langton Clarke and Elliott Stumm discuss outsourcing AML/CTF obligations, why a business might choose to outsource, who is legally liable if there is a breach of the obligations, and how to manage risks, quality assurance and record keeping.
…
continue reading

1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
42:00
42:00
Spill senere
Spill senere
Lister
Lik
Likt
42:00
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Show Notes: https://securityweekly.com/asw-303
…
continue reading

1
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
23:20
23:20
Spill senere
Spill senere
Lister
Lik
Likt
23:20
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
…
continue reading

1
Tax Records – Essential tax considerations for clients on the move
31:13
31:13
Spill senere
Spill senere
Lister
Lik
Likt
31:13
Todd Bromwich and Frank Hinoporos discuss current tax issues facing globally mobile clients and their advisors. They offer practical guidance on navigating complex cross-border tax scenarios and avoiding costly mistakes, including for tax residency, managing offshore assets and structures and bringing money into Australia. Want to know more about S…
…
continue reading

1
Navigating eCARs: A Compliance Opportunity
24:00
24:00
Spill senere
Spill senere
Lister
Lik
Likt
24:00
In this episode of The KYC Podcast, host Greg Dent is joined by Zahra Sunderani and Catagay from the Really Trusted team to discuss the intricacies of the Electronic Compliance Assessment Report (eCAR) - a crucial tool used by FinTRAC to assess compliance with anti-money laundering and counter-terrorist financing regulations. The conversation delve…
…
continue reading

1
RCE from Iconv + PHP, Fuzzing a Codec, Fuzzing LLMs, Revisiting Recall - ASW #302
37:03
37:03
Spill senere
Spill senere
Lister
Lik
Likt
37:03
The many lessons to take away from a 24-year old flaw in glibc and the mastery in crafting an exploit in PHP, changing a fuzzer's configuration to find more flaws, fuzzing LLMs for prompt injection and jailbreaks, security hardening of baseband code, revisiting the threat models in Microsoft's Recall, and more! Show Notes: https://securityweekly.co…
…
continue reading

1
Navigating AML/CTF – AML/CTF: Knowing your client
15:50
15:50
Spill senere
Spill senere
Lister
Lik
Likt
15:50
Langton Clarke and Taylor Green discuss KYC, or knowing your client, under AML/CTF legislation, and the importance of identifying, verifying and authenticating your client by building a client profile. They outline all you need to know about KYC, including how to deal with trust deeds, why a KYC refresh can help avoid exploitation by bad actors, an…
…
continue reading

1
Money is Not Your Security | Jonathan Schunker
48:55
48:55
Spill senere
Spill senere
Lister
Lik
Likt
48:55
In this week's message, Jonathan Schunker kicked off our new series on Parables with a powerful word from Luke 12:13-34. He unpacked the anatomy of greed, showing how it disguises itself as wisdom and causes us to focus on ourselves instead of seeking God's guidance. Greed traps us in a cycle of anxiety and fear, living in the future rather than th…
…
continue reading

1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
35:34
35:34
Spill senere
Spill senere
Lister
Lik
Likt
35:34
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading

1
Tax Records – Navigating wage and superannuation underpayments: avoiding costly pitfalls
27:06
27:06
Spill senere
Spill senere
Lister
Lik
Likt
27:06
Anthony Bradica and Todd Bromwich delve into the intricacies of setting up payroll arrangements correctly. They discuss how to avoid common pitfalls, the costs and processes involved in rectifying wage and superannuation underpayments and provide guidance on navigating these issues. Learn about your obligations and discover proactive steps to ensur…
…
continue reading

1
Navigating AML/CTF – AML/CTF: latest reforms and developments
16:40
16:40
Spill senere
Spill senere
Lister
Lik
Likt
16:40
Langton Clarke and Peter Jones discuss the latest reforms and developments in anti-money laundering and counter-terrorism financing (AML/CTF). With a new Bill recently tabled in Parliament, they outline the impact of the proposed reforms, including that 90,000 ‘tranche two’ entities are expected to become subject to regulation. Learn more about HW …
…
continue reading

1
The Refining Fire of God | Jess Ninaber
50:43
50:43
Spill senere
Spill senere
Lister
Lik
Likt
50:43
Jess Ninaber preached this week on The Refining Fire of God, emphasizing the importance of repentance in maintaining the fire of God within us. God is a consuming fire, refining us until He sees His reflection in us. Holiness is not a legalistic checklist but a transformative process of surrendering to God's goodness and mercy. As we present oursel…
…
continue reading

1
More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - ASW #301
45:57
45:57
Spill senere
Spill senere
Lister
Lik
Likt
45:57
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Show Notes: https://securityweekly.com/asw-301
…
continue reading

1
Tax Records – New Administrative Review Tribunal: what changes will it introduce?
22:15
22:15
Spill senere
Spill senere
Lister
Lik
Likt
22:15
Frank Hinoporos and Jacqueline McGrath discuss the new Administrative Review Tribunal, which replaces the Commonwealth Administrative Appeals Tribunal from 14 October 2024, and highlight the key changes practitioners need to be aware of.
…
continue reading

1
The Importance of Suspicious Transaction Reporting in Criminal Investigations PART 2
28:47
28:47
Spill senere
Spill senere
Lister
Lik
Likt
28:47
Part 2 of "The Importance of Suspicious Transaction Reporting in Criminal Investigations": retired RCMP officer Stephen Scott shares a detailed case study that demonstrates how a single suspicious transaction report (STR) filed by a financial institution was crucial in unraveling a complex money laundering and organized crime investigation. The dis…
…
continue reading

1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Spill senere
Spill senere
Lister
Lik
Likt
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading

1
Becoming a Philanthropist: The joy of collective giving
20:47
20:47
Spill senere
Spill senere
Lister
Lik
Likt
20:47
Emma Woolley and guest Carly Severino, Director of Community at Australian Communities Foundation, discuss the power and joy of collective giving, why community foundations are a model for giving across the world, the benefits of structured giving and how to democratise structured giving to make it as accessible as possible across Australia. Austra…
…
continue reading

1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Spill senere
Spill senere
Lister
Lik
Likt
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading

1
Interview with Bill McInnis from Nucleus Security
35:30
35:30
Spill senere
Spill senere
Lister
Lik
Likt
35:30
Unlock the secrets to revolutionizing your cybersecurity strategy with insights from Bill McInnis of Nucleus Security. Journey through Bill’s extensive career, spanning over two decades and multiple sectors including email security and threat intelligence, and learn how he spearheaded groundbreaking changes since joining Nucleus in 2021. Discover t…
…
continue reading
This week, Aaron preached from a place of vulnerability and passion urging us as the Temple of God to tend to the Altar Fire of our hearts. Jesus is calling out to His bride, inviting them to return to their first love as His beloved. This message was a significant r, challenging us to rekindle our love for Christ and live as living sacrifices, con…
…
continue reading

1
Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson
1:08:33
1:08:33
Spill senere
Spill senere
Lister
Lik
Likt
1:08:33
Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
…
continue reading

1
The Importance of Suspicious Transaction Reporting in Criminal Investigations
21:03
21:03
Spill senere
Spill senere
Lister
Lik
Likt
21:03
In this episode host Greg is joined by Stephan Scott, a retired RCMP officer with 31 years of experience in organized crime and money laundering investigations. Stephan provides a powerful perspective on the importance of suspicious transaction reporting, explaining how the information gathered by reporting entities like real estate professionals c…
…
continue reading

1
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
29:16
29:16
Spill senere
Spill senere
Lister
Lik
Likt
29:16
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading

1
Becoming a philanthropist – Having a philanthropic impact in life and beyond
31:34
31:34
Spill senere
Spill senere
Lister
Lik
Likt
31:34
Emma Woolley and guest Peter Winneke, a generosity and life legacy adviser, discuss how Australia’s philanthropic sector has grown over the past 20 years, the importance of philanthropic role models in developing a strong ‘giving culture’, why families should discuss ‘how much is enough’, ‘how much to leave the kids’ and how family foundations can …
…
continue reading

1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
33:10
33:10
Spill senere
Spill senere
Lister
Lik
Likt
33:10
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading

1
Ephesians: Clothe Yourself in Christ | Jess Ninaber
49:28
49:28
Spill senere
Spill senere
Lister
Lik
Likt
49:28
Jess Ninaber closed out our Ephesians sermon series with an unforgettable message on the armor of God. Our true battle is not against one another but against the spiritual forces of darkness that oppose God's plan. Drawing on Isaiah 59, Paul calls us to stand firm against those powers by putting on the armor of God. As we engage in prayer and inter…
…
continue reading

1
Becoming a philanthropist – What is a Private Ancillary Fund (PAF) and should I set one up?
16:19
16:19
Spill senere
Spill senere
Lister
Lik
Likt
16:19
Juliet O’Brien and Todd Bromwich discuss charitable trusts and private ancillary funds, their key features and tax benefits, and why clients choose these funds to establish a long-term charitable legacy.
…
continue reading

1
Paying Down Tech Debt, Rust in Firmware, EUCLEAK, Deploying SSO - ASW #298
56:25
56:25
Spill senere
Spill senere
Lister
Lik
Likt
56:25
Considerations in paying down tech debt, make Rust work on bare metal, ECDSA side-channel in Yubikeys, trade-offs in deploying SSO quickly, and more! Show Notes: https://securityweekly.com/asw-298
…
continue reading

1
Ephesians: New Creation Realities | Aaron Ninaber
39:42
39:42
Spill senere
Spill senere
Lister
Lik
Likt
39:42
This week, Aaron Ninaber continued our Ephesians series with a powerful message on the new creation reality we can live by because of Christ! In Ephesians 5 + 6, Paul calls us to a higher standard of living that reflects the light and love of Christ. As followers of Jesus, we are invited to step out of old ways and into a new kingdom reality, marke…
…
continue reading

1
Ephesians: Unto the Full Stature of Christ | Duncan Smith
32:37
32:37
Spill senere
Spill senere
Lister
Lik
Likt
32:37
Duncan Smith continued in our Ephesians sermon series this week, diving into Ephesians 4 and exploring the five-fold ministry (Apostle, Prophet, Evangelist, Pastor, and Teacher) as Christ's gifts to His body. These roles are designed to equip the saints, ensuring the healthy building up of the church under the Lordship of Jesus. The ultimate goal i…
…
continue reading