Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Overwhelmed by CMMC? It doesn't have to be an expensive nightmare. Learn about assessments, timelines, and practical steps to achieve compliance without the jargon.
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Manufacturing is challenging, but if you are connected to a community of leaders, you can elevate your skills, solve your problems and grow your business! MakingChips was launched in 2014 to equip and inspire the metalworking nation. Hundreds of episodes and a million downloads later, it’s an industry-leading source of information, inspiration, and entertainment for manufacturing leaders of all types. It’s hosted by Nick Goellner, Mike Payne, and Paul Van Metre. They’re joined by a rotating ...
…
continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Cyber risk isn’t just an IT issue—it’s your financial risk, brand risk, and growth risk. Hosted by Mike Fitzpatrick, CEO of NCX Group with 22+ years in the field, this weekly show delivers straight-to-the-point insights for CEOs, CFOs, and business leaders. From real-world breaches to practical steps that protect your bottom line, we break it all down—no fluff, just clarity. Lead with confidence, close the cyber knowledge gap, and turn risk into revenue.
…
continue reading
Learn about U.S. Exporting Trends and Regulation Changes that impact the U.S. Commercial Manufacturing Industry as well as the Defense Industrial Base. ITAR & EAR changes as well as Periodic Interviews with People of Industry. Hosted by Nicolette Reed
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
…
continue reading
Join hosts Frank Leonard and Greg Perez for episodes featuring the latest trends in emerging and disruptive technology.
…
continue reading
A podcast that marries business and technology to help businesses and individuals leverage technology to accelerate growth. Brought to you biweekly by Eric Clark and Shane Kroening at SWICKtech.
…
continue reading
Each week Ari interviews a thriving manufacturing leader and discovers the secrets to their success. He uncovers each guests' 'manufacturing story' - their path into and through the industry, Ari digs into successes and best practices of each company and leader, as well as challenges and discoveries, to help listeners and guests learn from each other. Discover the strategies these great leaders have used to start, develop, and grow their business - workforce development, leadership, sales/ma ...
…
continue reading
Looking to grow your business through referral networking? Come visit the Long Island Professional Network at lipn.org and see if we are the right fit for you.
…
continue reading
E-N Computers is a Virginia-based managed IT services provider.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading

1
CMMC Compliance Insights with Swimlane's Head of GRC, Jack Rumsey
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57Send us a text In this episode of the Reckless Compliance podcast, Max is joined by Jack Rumsey, Head of GRC at Swimlane. Jack shares his journey of navigating the world of compliance as Swimlane grows its presence in the federal market. The discussion covers Swimlane’s move toward CMMC Level 1, the challenges of balancing federal compliance with c…
…
continue reading

1
How to Improve Your SPRS Score Before It Costs You Contracts
9:12
9:12
Play later
Play later
Lists
Like
Liked
9:12Submit any questions you would like answered on the podcast! Is your SPRS score putting your DoD contracts at risk? In this episode of the CMMC Compliance Guide, we break down exactly what the SPRS score is, why it matters, and how to improve it fast—before you lose out on federal work. Whether you're stuck at -72 or hovering at 80, we’ll walk you …
…
continue reading

1
Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
…
continue reading

1
The FASTEST Way to CMMC Compliance - CUI Enclaves
58:20
58:20
Play later
Play later
Lists
Like
Liked
58:20CMMC rolls out in a few months and there are STILL companies who are JUST getting started! In this episode I’m joined by Daniel Akridge of Summit 7 to talk about the real challenges facing the Defense Industrial Base - and the FASTEST path to CMMC certification. To CUI Enclave, or not to CUI enclave - that is the question! 👉 Here are some of the hi…
…
continue reading

1
Scott Edwards on CMMC, national security, and the role of MSPs
1:56:17
1:56:17
Play later
Play later
Lists
Like
Liked
1:56:17In this episode of The Watchers, host Andy Sauer sits down with Scott Edwards, CEO of Summit 7 Systems, to discuss the critical role cybersecurity plays in national security. From the challenges of securing the defense industrial base to the rise of AI as the next frontier in cyber warfare, Scott shares his journey, leadership lessons, and insights…
…
continue reading

1
Cracking the Code: Angela Young on Cyber Compliance, CMMC & Building Trust in Tech
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24In this episode of the CyberGov Podcast, we sit down with Angela Young, Technology Evangelist at TechTrend, to dive into the often misunderstood world of cybersecurity compliance and governance. Angela shares her unique journey from hands-on cybersecurity work to becoming a leading voice in CMMC (Cybersecurity Maturity Model Certification) and comp…
…
continue reading

1
The Essentials of Cyber Incident Reporting for Defense Contractors
22:50
22:50
Play later
Play later
Lists
Like
Liked
22:50Send us a text Hello LinkedIn community! 🌐 As we delve deeper into the cybersecurity requirements for Department of Defense (DOD) contracts, understanding DFARS Clause 252.204-7012 is crucial. It outlines safeguarding covered defense information (CDI) and protocols for cyber incident reporting. Here are three key takeaways for businesses and contra…
…
continue reading

1
The Quiet Cut That's Loudly Threatening Small Manufacturing
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Most small manufacturers don’t realize they’re being quietly supported by one of the most impactful public-private partnerships in the country. The Manufacturing Extension Partnership (MEP) has long been the hidden backbone behind training programs, grant facilitation, process improvements, and critical tech upgrades for shops across the U.S. But r…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading

1
Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks' Top 11 Data Breaches in 2024 Report. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method pr…
…
continue reading

1
Unsecurity Episode 237: HERoic Hacks Recap w/ Melissa Kjendle
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by Melissa Kjendle, Assessor Manager at FRSecure, to recap our recent HERoic Hacks event. Melissa spoke at the event, highlighting the significance of inclusive and diverse perspectives in cybersecurity—particularly focusing on the growing role of women in the f…
…
continue reading

1
From Burning Servers to Enterprise Resilience: The Evolution of Internet Security With Akamai
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-…
…
continue reading

1
Ep 11 - Southeast Cyber Summit 2025 Part 1
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10In this episode of the Tactical Cyber Podcast, Darren and Paul are joined by Justin Headly and Sherry Barnes at the 2025 SouthEast Cyber Summit in Birmingham. Thank you to Warren Averett for giving up their space for the podcast interviews. This is the first of 3 episodes recorded at the conference. Feel free to email thoughts, comments, or questio…
…
continue reading

1
From Checklists to Cyber Strategy: Milica Lijeskic on Fixing Federal Compliance
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35What’s the difference between checking a box and making a real impact in cybersecurity? In this episode of the CyberGov Podcast, we sit down with Milica Lijeskic — Founder of KyberStorm and a powerhouse in regulatory compliance — to dive into the world of FISMA, FedRAMP, and CMMC like you’ve never heard before. Milica shares: Her journey from gover…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading

1
Compliance vs. Security – Why “Checking the Boxes” Won’t Save Your Business
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57In this episode of Bite Size Security, Mike Fitzpatrick—CEO of NCX Group and 25-year cyber risk veteran—dives into one of the most common and costly misconceptions in business today: the belief that compliance equals security. We explore: Why simply passing audits or meeting regulatory checklists leaves your business vulnerable Real-world stories o…
…
continue reading
Welcome Back to Bite Size Security I hope you are all Healthy and well as we End 2020. It’s been a Difficult year for everyone. Especially for Small businesses everywhere in this changing world of growing risks, and now forced into a remote workforce and having to adjust on the fly. In this episode I layout the plan and focus for this podcast going…
…
continue reading

1
The Legal + Financial Stuff No One Warns You About When Starting a Machine Shop, 459
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Most people who dream of launching a manufacturing business obsess over machines, processes, and parts. But here’s the thing: that dream can die before a single spindle turns—if you miss a few less-glamorous (but absolutely critical) steps on the front end. Legal structure? Tax setup? Insurance? Naming your shop? These early decisions carry more we…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading

1
"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital fi…
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading

1
Back to Basics! Understanding Your Digital Crown Jewels with Evgeniy Kharam | Part 1
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Send us a text In this episode of the Cyber Savvy Podcast, host Mike Shelah interviews cybersecurity expert Evgeniy Kharam about the fundamentals of effective cybersecurity. Evgeniy shares insights from his journey from firewall engineer to security leader, emphasizing that the biggest challenge in cybersecurity isn't technical knowledge but commun…
…
continue reading

1
Shop Formation 101: Entity Types, Tax Traps, and Long-Term Strategy, 458
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51In this episode of the Machine Shop MBA series, we go beyond vision boards and get into the meat and potatoes of launching your shop legally—with the right entity type and structure to support your short and long-term goals. Whether you’re looking to stay solo, bring on partners, or position for future investment or acquisition, your business forma…
…
continue reading

1
Dominic Bowen: Geopolitical Risk Planning & Management
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24This insightful Kitecast episode features Dominic Bowen, Partner and Head of Strategic Advisory at 2Secure in Stockholm, Sweden. With over 20 years of experience supporting business leaders, boards, and executives, Dominic brings valuable perspective from his work across cybersecurity, generative AI, risk management, and crisis response. His backgr…
…
continue reading

1
The E.A.S.Y Framework That Makes CMMC Actually Doable
13:15
13:15
Play later
Play later
Lists
Like
Liked
13:15Submit any questions you would like answered on the podcast! If someone tells you CMMC compliance can't be easy… they’re not necessarily wrong — but they’re also missing the point. In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke from Justice IT Consulting break down one of the biggest myths in the compliance space: that achi…
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick sh…
…
continue reading

1
Hijacking AI Memory: Inside Johann Rehberger's ChatGPT Security Breakthrough
46:29
46:29
Play later
Play later
Lists
Like
Liked
46:29In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWA…
…
continue reading

1
13 - Cybercrime – Credential Theft – Part 2/4
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24Nothing introduces more complexity to an organization than access control as with access comes privileges. Privileges are needed for many activities within an organization. Couple the need for privileges with the complexity organizational structures and the usual personnel churn and an already complex problem becomes nearly unmanageable. Attackers …
…
continue reading

1
account takeover prevention (noun) [Word Notes]
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-preventionBy N2K Networks
…
continue reading

1
Hello? Is it malware you’re looking for? [OMITB]
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading

1
Special Edition: How I got into IT and avoided murder and jail
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06I quietly celebrated an anniversary recently… Every February 15th is a reminder. Protect ya neck! Story time of How I go into IT! I have my ex-girlfriend, a recruiter, a police officer and God to thank for pulling me out of a few, not just one crazy situation that include: Possible murder Handcuffs Air Force Recruiter Special Edition on How I got i…
…
continue reading

1
Breaking Boundaries: Building the Entrepreneurial Mindset, 457
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46In this episode of MakingChips, we dive into the entrepreneurial mindset, drawing inspiration from three of the most influential figures in modern business: Titan Gilroy, Elon Musk, and Steve Jobs. Through clips from these legendary leaders, we explore the grit, vision, and resilience required to launch and grow a business in the challenging world …
…
continue reading

1
CMMC Compliance Consulting vs. DIY Compliance: Which Is the Smarter, More Cost-Effective Choice?
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17Submit any questions you would like answered on the podcast! In this episode of The CMMC Compliance Guide Podcast, Brooke and Austin dive into a key question many DoD contractors face: Should you handle CMMC compliance yourself or hire a consultant? We break down the risks, costs, and benefits to help you make the best decision for your business. D…
…
continue reading

1
EIB EXPORT NEWS - PODCAST 28 - INTERVIEW w/ Dawn Wivell of Firebrand International & Former Dir. of NH Trade Resource Center
39:45
39:45
Play later
Play later
Lists
Like
Liked
39:45EIB EXPORT NEWS - PODCAST 28 - INTERVIEW w/ Dawn Wivell of Firebrand International & Former Dir. of NH Trade Resource Center LEARN ABOUT: The History of the New Hampshire Trade Resource Center and the NH Dept. of Commerce - how it all got started! New Hampshire Trade Missions to Poland and Brazil - The Industries & Markets Firebrand International &…
…
continue reading

1
Threat Hunting: What Should Keep All of Us Up at Night
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed licens…
…
continue reading

1
Navigating DFARS Clause and Cybersecurity Assessments for DOD Contracts
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14Send us a text 🔍 Want to stay ahead in the world of government contracts and cybersecurity? Dive into our latest CMMC News episode where we explore the NIST SP 800-171 DoD Assessment Requirements. It's all about breaking through the wall of acronyms and jargon to ensure you know exactly what the Department of Defense expects when it comes to protec…
…
continue reading

1
SPRS and You: Managing DOD Cybersecurity Expectations
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37Send us a text We just dived deep into the Department of Defense's NIST SP 800-171 assessment requirements. This is crucial for any contractor involved with DoD contracts, especially when it comes to cybersecurity. Here are three key takeaways: Assessment Frequency: If you're implementing NIST SP 800-171, make sure you have a recent assessment cond…
…
continue reading

1
The Role of Cyber Insurance in Your Business with Steve Heller | Part 2
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43Send us a text This podcast episode of "Cyber Savvy Podcast" features host Mike Shelah continuing a conversation with insurance expert Steven Heller about cybersecurity insurance. They discuss how the cybersecurity insurance landscape has evolved significantly, particularly after COVID-19, with insurers now requiring more rigorous standards and det…
…
continue reading

1
Predicting Data Breach Risk: How Mathematical Privacy Is Revolutionizing Data Sharing with Simson Garfinkel
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39What if there was a way to precisely predict the risk of a major data breach when sharing information? In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the A…
…
continue reading

1
CMMC Will BREAK Your MSP - Axiom's CMMC Level 2 Journey
1:32:14
1:32:14
Play later
Play later
Lists
Like
Liked
1:32:14“We built a second company from scratch…” Is that what it takes for MSPs to get CMMC'd!?! 👀 In this episode I’m joined by Bobby Guerra and Kaleigh Floyd from Axiom, an IT Managed Service Provider (MSP). They explain exactly what it took to achieve CMMC level 2 certification - after 4 years of effort. Most MSPs aren’t ready for CMMC. Many believe it…
…
continue reading
Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting Audio reference link: “My ‘Aha!" Moment - Methods, Tips, & Less…
…
continue reading

1
Machine Shop MBA: How to Become a Top Shop with Brent Donaldson, 456
47:20
47:20
Play later
Play later
Lists
Like
Liked
47:20What if you could measure your shop's success against the industry’s best—and discover exactly where you can improve? In this episode, we’re launching a groundbreaking new series with Modern Machine Shop to help you do just that. We’re joined by Brent Donaldson, who walks us through the powerful Top Shops program—a game-changing benchmarking tool t…
…
continue reading

1
Your IT Provider: The Keystone to Passing CMMC – or the Hidden Risk That Could Cost You Everything
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Submit any questions you would like answered on the podcast! In this episode of The CMMC Compliance Guide Podcast, Brooke and Stacey reveal a critical factor that could make or break your compliance journey: your IT provider. ✅ Discover why your IT provider plays a crucial role in your CMMC assessment. ✅ Learn the risks of working with an unqualifi…
…
continue reading

1
Kat Wang on supply chain, AI, and the mad science of cybersecurity
1:23:19
1:23:19
Play later
Play later
Lists
Like
Liked
1:23:19Kat Wang is a visionary at the forefront of cybersecurity and quantum innovation. With her background at Google and expertise in securing critical infrastructure, Kat dives into the challenges of supply chain threats, the role of AI in addressing workforce shortages, and the urgent need for public-private collaboration in the fight against cybercri…
…
continue reading
On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing m…
…
continue reading

1
The Future of CMMC: Surviving the new Federal Security Landscape with Former NRMC Director Bob Kolasky
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04How do you secure a nation? Hint: look for the risks to the most critical infrastructure. In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sw…
…
continue reading

1
Navigating Cybersecurity & Government Contracting with Dr. Gavriel
38:31
38:31
Play later
Play later
Lists
Like
Liked
38:31In this episode of CyberGov, we sit down with Dr. Gavriel, CEO of VisioneerIT and a seasoned expert with decades of experience in both federal service and private industry. Dr. Gavriel shares insights on the evolving landscape of cybersecurity, government technology, and the challenges shaping the future of digital defense. Tune in for an engaging …
…
continue reading

1
vulnerability management (noun) [Word Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, You…
…
continue reading

1
Can a Cybersecurity Parametric Cost Model be Developed?
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
…
continue reading