Going back through the archives of "Mornings with Mark" has been quite the experience. I've been both fascinated and a little horrified (the hair, the look, the production…yikes) re-watching some of those nearly 200 episodes.
It's interesting to remember that back then (2018—2019), a regular, dedicated vlog focused on cybersecurity and privacy on social media was pretty rare.
"Mornings with Mark" was really a space for me to explore my thoughts on these crucial topics and share some of what I was learning while traveling and teaching cybersecurity. It was also a bit of an experiment with social media and video platforms.
I ended up regularly multi-streaming to LinkedIn (where I was part of the streaming beta program), Twitter, and YouTube. Social media was very different in 2018 and the consistency of the vlog helped grow the audience over time.
Over its run, the show averaged 250 live viewers and then another 1,000 on-demand within that week. Those numbers may seem modest, but to have that type of reach for such a simple and raw vlog was really touching.
It’s nice to know that I was able to help that many people understand security and privacy just a little bit better.
Sample episodes
All episodes
Feb/2018—12 episodes
- 12-Feb-2018 Perspectives
- 13-Feb-2018 Pyeongchang 2018 Olympic Games Hack
- 14-Feb-2018 Risk Assessments & The Risk Of No Data
- 15-Feb-2018 Blockchain For Identities
- 16-Feb-2018 Apple iOS Messenger App Crash
- 20-Feb-2018 Voice Interfaces
- 21-Feb-2018 DevOps Overload
- 22-Feb-2018 Workflow, Passwords, and More
- 23-Feb-2018 Passwords, Educating Users, and the Communal Good
- 26-Feb-2018 Cybersecurity In & Of Canada
- 27-Feb-2018 Apple iOS 11 Security
- 28-Feb-2018 New Website
Mar/2018—15 episodes
- 01-Mar-2018 Secure Systems Thinking
- 02-Mar-2018 DDoS Attacks & Community Responsibility
- 13-Mar-2018 SXSW Audience Level
- 15-Mar-2018 Nervous For SXSW
- 15-Mar-2018 Rizenfall And Needless Hype
- 16-Mar-2018 CPUs, ICOs, and Blockchains
- 19-Mar-2018 Facebook Data Misuse And Social Network Responsibility
- 20-Mar-2018 Organizational Design and OT Risk
- 22-Mar-2018 Privacy At Scale
- 23-Mar-2018 One Billion Attacks Per Day
- 26-Mar-2018 Facebook Data Downloads
- 27-Mar-2018 Working With Data
- 28-Mar-2018 Changing Perspectives & The Unraveling Of Online Tracking
- 28-Mar-2018 Facebook Data Mining & The Long Weekend Round-up
- 29-Mar-2018 Ubiquitous Digital Tracking
Apr/2018—13 episodes
- 05-Apr-2018 AWS San Francisco Summit 2018 Recap
- 06-Apr-2018 Video Streaming Options
- 11-Apr-2018 Privacy And Security vs. Usability
- 12-Apr-2018 Splitting Hairs With Facebook Testimony
- 13-Apr-2018 iOS Graykey And Going Dark
- 16-Apr-2018 Fear Uncertainty And Doubt
- 18-Apr-2018 Blocking IP Addresses
- 20-Apr-2018 The Security Team's Role In Your Org
- 23-Apr-2018 The Canadian Criminal Code on Hacking
- 24-Apr-2018 Live Streaming and Needless Complexity
- 25-Apr-2018 Poor Naming Choice For Gmail Redesign
- 26-Apr-2018 Your Role as a Security Educator
- 27-Apr-2018 The Hallway Track
May/2018—18 episodes
- 01-May-2018 F8 & The Future Of Facebook
- 03-May-2018 The F8 Fallout
- 04-May-2018 F**king Passwords
- 07-May-2018 Getting Started In Cybersecurity In A Positive Direction
- 08-May-2018 A.I.'s Security & Privacy Impact
- 09-May-2018 A.I. Amok
- 10-May-2018 What You Need To Get Started In Cybersecurity
- 11-May-2018 Making A Break To Start Your Cybersecurity Career
- 15-May-2018 Ethics In Technology & Security
- 18-May-2018 Being Transparent With User Data
- 18-May-2018 Listening To Customers
- 22-May-2018 3, 2, 1, GDPR
- 23-May-2018 Encryption Law Enforcement And Transparency
- 25-May-2018 🇪🇺 GDPR Day!
- 26-May-2018 Data Management & GDPR
- 28-May-2018 OpSec, Soft Skills, And People
- 28-May-2018 University for Cybersecurity
- 30-May-2018 Information Security vs. Cybersecurity
Jun/2018—17 episodes
- 01-Jun-2018 What's In A Name?
- 01-Jun-2018 Why Can't Security Play Nice With Others?
- 04-Jun-2018 Transparency & Backpedaling
- 05-Jun-2018 Developer Workflow 101
- 07-Jun-2018 Apple, WWDC, and Your Privacy
- 11-Jun-2018 Net Neutrality
- 12-Jun-2018 Cryptocurrency & High Value Targets
- 13-Jun-2018 Google In Schools
- 14-Jun-2018 Apple, Graylock, And Context
- 15-Jun-2018 Getting Started In Cybersecurity & Perspective
- 18-Jun-2018 Ethics In Technology And Cybersecurity
- 19-Jun-2018 Ethics And Action In Technology
- 21-Jun-2018 Culture Change Is Hard
- 25-Jun-2018 Tanacon, Security, and Lack of a Threat Model
- 26-Jun-2018 Don't Trust The Network
- 27-Jun-2018 Security Thinking Is Service Design Thinking
- 28-Jun-2018 Working Together To Improve Security
Jul/2018—14 episodes
- 09-Jul-2018 Fortnite, UI Patterns, and Desired Behaviours
- 10-Jul-2018 🧠 A.I. In Context
- 11-Jul-2018 Cybersecurity: Getting Past HR
- 12-Jul-2018 Document, Automate, Repeat
- 16-Jul-2018 Ignorance & Risk
- 19-Jul-2018 Balance & Burnout
- 20-Jul-2018 Remote Work, Cubes, & Everything In Between
- 23-Jul-2018 Getting Started In Security: Post Certification
- 24-Jul-2018 Assumptions & Outdated Mental Models
- 25-Jul-2018 Constant Negative Pressure
- 26-Jul-2018 Security Keys, UX, & Reasonable Choices
- 27-Jul-2018 HR Challenges & Getting Your First Security Role
- 30-Jul-2018 Discussions At Scale
- 31-Jul-2018 Toxicity & Security's Responsibility
Aug/2018—11 episodes
- 01-Aug-2018 Learning From Failure
- 02-Aug-2018 Easy To Use Tools
- 08-Aug-2018 Operational Security
- 10-Aug-2018 The Basics
- 20-Aug-2018 Recharged, Reset, & Rocking
- 21-Aug-2018 Cybersecurity Basics #1 - The Goal
- 22-Aug-2018 Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats
- 23-Aug-2018 Cybersecurity Basics #3 - Passwords
- 27-Aug-2018 Cybersecurity Basics #4 - Perspective
- 28-Aug-2018 Cybersecurity Basics #5 - Encryption
- 29-Aug-2018 Cybersecurity Basics #6 - Malware
Sep/2018—13 episodes
- 04-Sep-2018 Cybersecurity Basics #7 - Hackers & Cybercriminals
- 05-Sep-2018 Cybersecurity Basics #8 - Authentication, Authorization, & Need To Know
- 06-Sep-2018 Cybersecurity Basics #9 - Attack Attribution
- 07-Sep-2018 Cybersecurity Basics #10 - Personally Identifiable Information
- 12-Sep-2018 Cybersecurity Basics #11 - Risk Assessments & Pen Tests
- 13-Sep-2018 Cybersecurity Basics #11a - Risk Assessments Redux
- 14-Sep-2018 Cybersecurity Basics #12 - Bolt-on vs Built-in
- 17-Sep-2018 The Basic Basics
- 18-Sep-2018 Security Is A Quality Issue
- 21-Sep-2018 What Do You Look To Get Out Of Conferences?
- 26-Sep-2018 Amazon Alexa Everywhere
- 27-Sep-2018 End-to-end Encryption & WhatsApp
- 28-Sep-2018 Facebook, Shadow Profiles, & Data Brokers
Oct/2018—19 episodes
- 01-Oct-2018 50 Million Facebook Accounts Hacked?!?
- 02-Oct-2018 National Cybersecurity Awareness Month
- 03-Oct-2018 How To Deliver Tough News
- 04-Oct-2018 Following Up On Tough News
- 05-Oct-2018 Bloomberg, Supermicro, and Hardware Supply Chain Attacks
- 09-Oct-2018 Evidence, Accusations, and Motivation
- 11-Oct-2018 Google+ & Infrastructure Monitoring
- 12-Oct-2018 Facebook...ugh...%$&#ing, Facebook
- 15-Oct-2018 Communicating FOR Your Audience
- 16-Oct-2018 Virtual Experiences & Content Delivery
- 17-Oct-2018 DRUGS!!! and IT Risk and Graphs
- 18-Oct-2018 Being An Educated Social Media User
- 19-Oct-2018 The War Room
- 22-Oct-2018 User Experience Is Critical
- 23-Oct-2018 Keep Decisions Up To Date
- 25-Oct-2018 Building On Fragile Layers
- 26-Oct-2018 Building On Trust
- 30-Oct-2018 Refreshing Your Perspective
- 31-Oct-2018 Automating Your Job
Nov/2018—9 episodes
- 01-Nov-2018 Know Your Audience
- 02-Nov-2018 Master Your Tools
- 05-Nov-2018 Politics & Attack Attribution
- 06-Nov-2018 The Internet Is Forever
- 07-Nov-2018 Optimize Your Tools
- 08-Nov-2018 You Can't Blame 'Em
- 09-Nov-2018 Signals And The Data Explosion
- 19-Nov-2018 Preparation Is Key
- 20-Nov-2018 Communication At Scale
Dec/2018—8 episodes
- 05-Dec-2018 Delivering Information With Context
- 06-Dec-2018 Australia, Huawei, Apple, and the Government of Canada
- 07-Dec-2018 Fortnite, A Service Delivery Example
- 10-Dec-2018 Security Metrics 🗑🔥
- 11-Dec-2018 Law and The Internet
- 14-Dec-2018 Unexpected Lessons
- 17-Dec-2018 On The Importance Of Names
- 19-Dec-2018 Squad Goals
Jan/2019—8 episodes
- 08-Jan-2019 Setting Up 2019
- 10-Jan-2019 Tracking Smartphone Data
- 15-Jan-2019 Konmari Your Data
- 17-Jan-2019 773M Credentials
- 22-Jan-2019 Zero vs. Lean Trust
- 24-Jan-2019 Facebook's 10 Year Challenge
- 29-Jan-2019 GDPR Intentions
- 31-Jan-2019 Facebook & The Value of Privacy
Feb/2019—8 episodes
- 05-Feb-2019 Cryptocurrencies & Cybercrime
- 07-Feb-2019 Cybersecurity Research Consequences
- 12-Feb-2019 Canadian Election Cybersecurity
- 14-Feb-2019 Terms of Service
- 19-Feb-2019 DNS Hijacking
- 21-Feb-2019 Your Child's Digital Identity
- 26-Feb-2019 Secret App Telemetry
- 28-Feb-2019 Warrant Canaries
Mar/2019—5 episodes
- 07-Mar-2019 The Cybersecurity Industry
- 12-Mar-2019 Services & Privacy Perceptions
- 14-Mar-2019 Cloud Costs & Security
- 19-Mar-2019 Cybersecurity Needs Coders
- 21-Mar-2019 Stadia & Secure Access Design
Apr/2019—9 episodes
- 02-Apr-2019 Exposing Secrets In Code
- 04-Apr-2019 Cybersecurity & Technical Debt
- 09-Apr-2019 Serverless Is An Ops Model
- 11-Apr-2019 Perfectionism In Tech
- 16-Apr-2019 Metadata Trails
- 18-Apr-2019 Facebook's Security Fail
- 23-Apr-2019 Facial Recognition Consent
- 26-Apr-2019 Cybersecurity Time Crunch
- 30-Apr-2019 James Harden & Cybersecurity Policy
May/2019—6 episodes
- 01-May-2019 Facebook's F8 & Information Management
- 07-May-2019 Borders & Cybersecurity
- 09-May-2019 Porn & Digital Identity
- 21-May-2019 Huawei, Android, and Cybersecurity
- 23-May-2019 Nest, IoT, and Your Privacy
- 28-May-2019 Web Browser Privacy
Jun–Oct/2019—15 episodes
- 04-Jun-2019 Apple WWDC Privacy Update
- 05-Jun-2019 Cybersecurity Motivations
- 08-Jul-2019 Update On Mornings With Mark
- 09-Jul-2019 NBA Free Agency vs Security Policies
- 11-Jul-2019 Zoom.us & The Real Cybersecurity Problem
- 16-Jul-2019 10x Engineers
- 19-Jul-2019 FaceApp: Relax You're Just Old (Now)
- 12-Aug-2019 AppSec Is Dead
- 16-Aug-2019 NULL & Input Validation
- 21-Aug-2019 Privacy Expectations
- 26-Aug-2019 Business Email Compromise
- 05-Sep-2019 Cybersecurity Patching in Context
- 11-Sep-2019 Retargeting In Online Politics
- 26-Sep-2019 E-transfer Security
- 18-Oct-2019 Biometrics and Bugs