Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Attendance Bias is a podcast for fans to tell a story about an especially meaningful Phish show.
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Two Phish kids ended up in the same Tibetan Buddhist three- year retreat. Now lamas, they discuss common lessons from the meditation cushion to summer tour.
Inside Wall Street with Morris Sachs. Your trip is short. Recommended viewing: The Sting Trading Places Groundhog Day YouTube: Charlie DiFrancesca Full Length Speech 1989 Recommended Reading: 1.Modern Times - Paul Johnson 2. Atlas Shrugged- Ayn Rand 3. *redacted* 4. Reminiscences of a Stock Operator- Edwin Lefevre 5. Lessons of History - Will Durant Daily Reading : 13D, Grant’s, GaveKal, Macro Tourist, Daily Shot, Anthony Peters, David Zervos, John Authors, FT, WSJ, NYT, SCMP, Chicago Tribun ...
Celebrating the music of Max Creek, including reviews of live shows, conversations with fans and discussions about the history and impact of this legendary jam band.
A podcast to celebrate the music.
Uniting Humanity Against Phishing with Weekly Phishing Threat Intelligence
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
Podcast by PHish
Welcome to the Ivanti Security Insights podcast: Where best-practice cybersecurity meets real-world workplaces and roadblocks. Join Chris Goettl, Amanda Wittern, Daniel Spicer and Ashley Stryker as they review the security news, research and tactics that truly matter to the infosec and security teams protecting organizations and businesses like yours. Returning January 19!
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
I
Inappropriate Happiness w/ Karina Rykman & Isaac Slone


1
Inappropriate Happiness w/ Karina Rykman & Isaac Slone
Osiris Media
Hosts Karina Rykman and Isaac Slone run down the music news of the week and lots of other music musings. Hosted on Acast. See acast.com/privacy for more information.
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
New episodes on Monday, Wednesday, and Friday! Sign up for Osiris Premium on Apple for ad-free episodes released a day early! Phish’s Fall 1997 tour is one of the most celebrated in Phish history. To mark the tour’s 25th anniversary, Undermine will look at every show of the Fall 1997 tour, and 25 key shows of the 1990s that led up to this legendary tour. Hosted by Tom Marshall, each episode will focus on one Phish show, and will feature an interview with a notable guest from the Phish commun ...
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. New episodes of The Sound Podcast are available Wednesday and Friday (and more if we can). The Wednesday episode is exclusively a live music playlist called LIVEFIVE powered by nugs.net. H ...
Chris and Tim will provide their commentary about songs that weren’t hits. Each episode examines just one studio album, and they’ll give you their top 3 non hits from that album. Chris has been a huge Rush fan for most of his life, and Tim could say the same about Phish. They’re both motivated to learn more about bands/artists by listening more closely to deeper cuts from albums they’ve either overlooked or are familiar with but dismissed for whatever reason. “This evolved from a music club ...
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
In an increasingly complex and hostile climate the battlefield has been set around cyber security. Cyber Security Uncut brings you the key influencers, their stories, and the emerging technology that’s contributing to Australia’s resilience, security and growth. Discover how business, government and our defence force are combating the rising threat of cyber attacks as Australia drives forward in its transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national secu ...
A
After Midnight: Phish's Big Cypress Festival


1
After Midnight: Phish's Big Cypress Festival
Osiris Media
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
Original music streamed live online.
Highlights from the latest Phish show. Reactions and reviews. Call-in with couch tour tales and donut reviews.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
explorations in atonal phish Hosted on Acast. See acast.com/privacy for more information.
Mag ball phish birthday bash and arrest
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
Step into the mind of Gonzo Musicologist Eli Schwab as he takes you to the outer reaches of Comic Books, Music, Films, Art, and beyond
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
In the year 2420, the United Planets of America has only one hope against the forces of evil...
Chronicles from the 3rd Lyfe
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
Live music from The Jed Luckless Band!
The Daily Soundcheck brings you every Phish Soundcheck where audio circulates. Episodes run Monday-Friday with commentary, history and interviews. Hosted by Myke "LawnMemo" Menio Hosted on Acast. See acast.com/privacy for more information.
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: Google’s search results have become a malware-riddled sh*tshow Ransomware payment values dropped by 40% YoY in 2022 Kraken takes over Solaris the old school way Grand Theft Auto RCE is wreaking havoc ManageEngine customers are all getting owned So you kno…
C
Cyber Security Headlines


1
Week in Review: NortonLifeLock password breach, Ransomware revenue falls, ChatGPT goes phishing
21:26
21:26
Play later
Play later
Lists
Like
Liked
21:26
Link to Blog Post This week’s Cyber Security Headlines - Week in Review, January 16-20, is hosted by Rich Stroffolino with our guest, George Finney, CISO, Southern Methodist University Thanks to our show sponsor, Cerby Did you know that over 60% of the cloud applications used by your company don’t support identity standards like single sign-on? And…
C
CyberWire Daily


1
Ransomware in Costa Rica. Cyberespionage against unpatched FortiOS instances. Credential stuffing PayPal, breaching T-Mobile. Utility business systems hit. Hackathons and phishing in Russia.
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04
Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injec…
By Daniel Thomas
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: A look at the Hive takedown UK’s Royal Mail still struggling GitHub’s code signing certificates stolen TSA misses the point on no-fly list theft Much, much more This week’s show is brought to you by Remediant, which is now a part of Netwrix. Tim Keeler is…
C
CyberWire Daily


1
The cybercriminal labor market and the campaigns it’s supporting. Russia’s Killnet is running DDoS attacks against US hospitals, but Russia says, hey, it’s the real victim here.
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who…
We're going to Goddard College today for 10/31/86! Please consider subscribing to Osiris Premium on Memberful, or to Osiris Premium on Apple Podcasts. Thanks for your support. The Helping Friendly Podcast is hosted and produced by Jonathan Hart, Brian Brinkman, RJ Bee, and Megan Glionna. Brought to you by Osiris Media. Hosted on Acast. See acast.co…
C
CyberWire Daily


1
Criminal evolutions, disgruntled insiders, and gangsta wannabes. New wiper attacks hit Ukrainian targets, with less effect than the first rounds early last year. And support your local hacktivist?
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15
Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Ric…
C
Cyber Work

1
Inside the Pentagon's new zero-trust policy | Guest Steve Judd
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08
Venafi solutions architect Steve Judd talks about the recent directive from the Pentagon that a zero-trust policy be implemented at the Department of Defense in the next four years. Is this a workable deadline? What are the hurdles to be jumped? Judd also tells me what a solutions architect does and why he thinks it’s the most fun job in cybersecur…
Over the years, I’ve mentioned the Mother Hips several times on this podcast and we’ve had both principle songwriters Tim Bluhm and Greg Loaicono on this show. The band, who have roots in Northern California, have been at their craft for some 30 years now, and When We Disappear marks their 12th album to date. While the Mother Hips aren’t a typical …
C
Cybersecurity Today


1
Cyber Security Today, Jan, 30, 2023 - A new data wiper discovered, patches for Lexmark printers and BIND are issued and more
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33
This episode reports on the need to protect Active Directory, a patching strategy for ICS devices, a warning to VMware admins and moreBy ITWC
C
Cyber Security Headlines


1
Charter Communications breach, Sandworm hacks Ukraine, VMware exploit release
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05
Charter Communications says vendor breach exposed some customer data Russia’s Sandworm hackers blamed in fresh Ukraine malware attack Experts plans to release VMware vRealize log RCE exploit this week Thanks to this week's episode sponsor, Hunters Hunters is a complete SOC platform, built for your security team. By providing unlimited ingestion and…
T
The Social-Engineer Podcast


1
Ep. 196 - SE Etc Series - The Role Of Empathy In Social Engineering with Patrick and Chris
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social …
H
Hooked on Creek


1
Psilly Way-Out Willy talks about Max Creek
55:45
55:45
Play later
Play later
Lists
Like
Liked
55:45
In episode 44 of Hooked on Creek, Korre Johnson talks with Willy Ackerman (Psilly Way-Out Willy) about his appreciation for Max Creek. Willy is a huge fan of Max Creek and has been part of the Creek scene for 30 years. In this episode, Willy talks about his favorite memories seeing Max Creek over the years and his love of the Creek family that supp…
C
CyberWire Daily


1
Charlie Moore: Pilot to head honcho in cyber. [Cyber Command] [Career Notes[
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49
Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for …
C
CyberWire Daily


1
Interview with the AI, part one. [Special Editions]
27:27
27:27
Play later
Play later
Lists
Like
Liked
27:27
Cybersecurity interview with ChatGPT. In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community. ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GP…
By insidebaseballcast
By Daniel Thomas
C
CyberWire Daily


1
Flagging firmware vulnerabilities. [Research Saturday]
17:54
17:54
Play later
Play later
Lists
Like
Liked
17:54
Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X. The research states "By abusing…
Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X. The research states "By abusing…
C
Cyber Security Headlines


1
Week in Review: FBI seizes Hive, PayPal accounts breached, ODIN Intelligence hack
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, January 23-27, is hosted by David Spark with our guest, Kathleen Mullin, CISO, Cancer Treatment Centers of America Thanks to our show sponsor, SafeBase If a prospective customer asked about your trust program or security policies, where would you send them? Chances are, you’d …
C
CyberWire Daily


1
An update on the Hive ransomware takedown. More DDoS from Killnet. Advisories from CISA, and an addition to the Known Exploited Vulnerabilties Catalog.
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50
An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike’s Adam Meyers. If you say you’re going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, …
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for Friday, January 27, 2023
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14
This episode features a discussion on Data Privacy Week, hacks involving GoTo and Zendesk and a report that some IT departments aren't even aware of certain vulnerabilities and patchesBy ITWC
Karina details her opening slots with the Disco Biscuits, her and Isaac discuss upcoming tours from Dave Matthews Band and Beck with Phoenix, hash out the star-studded lineup for Willie Nelson's 90th birthday party, and more. Hosted on Acast. See acast.com/privacy for more information.
C
Cybersecurity Today


1
Cyber Security Today, Jan. 27, 2023 - Over 800,000 victims in a hack, Dutch hacker allegedly pedalled data of everyone in Austria and more
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57
This episode reports on DDoS attacks in Germany, 61,000 open source Python projects patched on GitHub, Porsche problem with NFTs, facial recognition being allegedly used against lawyers and moreBy ITWC
C
Cyber Security Headlines


1
FBI seizes Hive, Layoffs at IBM, Microsoft outage over
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39
FBI seizes Hive ransomware group infrastructure after lurking in servers for months Layoffs come to IBM - Kyndryl, Watson and Russia to blame Microsoft says services have recovered after widespread outage Thanks to this week's episode sponsor, SafeBase If a prospective customer asked about your trust program or security policies, where would you se…
T
The Social-Engineer Podcast


1
Ep. 195 - Security Awareness Series - Social Engineering Forecast for 2023
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I will have a special discussion of the 2023 security landscape. [Jan 27, 2023] 00:00 – Intro 00:27 – Intro Links: Social-Engineer.com- http://www.social-engineer.com/ Managed Voice Phishing- https://www.social-engineer.com/services/vishing-service/ Managed Email Phishing…
C
CyberWire Daily


1
Remote monitoring and management tools abused. Russian and Iranian cyberespionage reported. The world according to the CIO. And if volume is your secret, maybe look for a better secret.
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42
Joint advisory warns of remote monitoring and management software abuse. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs. Carole Theriault ponders health versus privacy with former BBC guru Rory Cellan Jones. Kyle…
C
CyberWire Daily


1
CISA Alert AA23-025A – Protecting against malicious use of remote monitoring and management software
2:41
2:41
Play later
Play later
Lists
Like
Liked
2:41
CISA, NSA, and the MS-ISAC are releasing this alert to warn network defenders about malicious use of legitimate remote monitoring and management software. AA23-025A Alert, Technical Details, and Mitigations For a downloadable copy of IOCs, see AA23-025.stix Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfe…
P
Putting the AP in hAPpy


1
Episode 222: Didn’t Get a Chance to Clean Your VMF? Do These 3 Steps Before Distributing and Filing 1099-MISC/NECs to Avoid IRS Penalties
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40
You didn’t get a chance to clean your vendor master file quarter – or maybe last year. Now it’s January that’s filled with preparation for distributing 1099s to your payees and the related 1099 filing with the IRS and some states. But you still have time to do the minimum to avoid fines and penalties…and you also have time to get help. Keep listeni…
C
Cyber Security Headlines


1
North Korean crypto tactics, Russian DDoS record, China tech exports
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07
A look at North Korean crypto stealing tactics Russia saw record DDoS attacks China leads in facial recognition tech exports Thanks to this week's episode sponsor, SafeBase These days, customer trust can be an organization’s strongest competitive advantage. But how can you develop and maintain customer trust over the long term? The answer is SafeBa…
T
The New Dad Rock


1
EP 32B. Going to Red Rocks (Night 1, Set 2)
1:28:14
1:28:14
Play later
Play later
Lists
Like
Liked
1:28:14
King Gizzard and the Lizard Wizard Live at Red Rocks October 10, 2022 A concert nearly three years in the making, featuring a microtonal mini-set, The Lord of Lightning vs. Balrog suite and Keith's favorite song of 2022: Ice V. Set Two: 1) Rattlesnake 2) Automation 3) Honey 4) Sleepdrifter 5) Ataraxia 6) Evil Death Roll 7) Ice V 8) The Reticent Rac…
T
The New Dad Rock


1
EP 32A. Going to Red Rocks (Night 1, Set 1)
1:27:40
1:27:40
Play later
Play later
Lists
Like
Liked
1:27:40
King Gizzard and the Lizard Wizard Live at Red Rocks October 10, 2022 A concert nearly three years in the making, featuring an epic 20-minute version of The River. Set One: 1) Mars for the Rich 2) Hell 3) Magenta Mountain 4) Inner Cell 5) Loyalty 6) Horology 7) O.N.E. 8) Nuclear Fusion 9) All Is Known 10) Straws in the Wind 11) Garden Goblin 12) Th…
C
CyberWire Daily


1
TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40
How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovat…
T
The Social-Engineer Podcast


1
Ep. 194 - Human Element Series - RUSE: Corporate Spies as a Service with Robert Kerbeck
39:00
39:00
Play later
Play later
Lists
Like
Liked
39:00
Today we are joined by Robert Kerbeck. Robert is the founder of the Malibu Writers Circle, a lifetime member of the Actors Studio, and a graduate of the University of Pennsylvania. His true crime memoir about his secret career as a corporate spy, RUSE: Lying the American Dream from Hollywood to Wall Street, has received praise from Frank Abagnale a…
Millions have been impacted by data breaches. Many of us know how fraudsters work and how they utilize this information. But our parents and children become victims because of their fear or urgency inflicted by the scammers. Today’s guest is Mike Cook. Mike is an entrepreneur with over 30 years of experience working and serving in the financial ser…