show episodes
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at 38northsocial@gmail.com.
  continue reading
 
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
  continue reading
 
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
  continue reading
 
Artwork

1
Cybberssecurity Podcast

Nathanael Dick and Andrew Nuxoll

Unsubscribe
Unsubscribe
Monthly
 
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
  continue reading
 
Artwork

1
Kitecast

Tim Freestone and Patrick Spencer

Unsubscribe
Unsubscribe
Monthly
 
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
  continue reading
 
Artwork

1
Compliance Therapy™, hosted by Igor Volovich

Risk. Security. Compliance. Get It Together.

Unsubscribe
Unsubscribe
Weekly+
 
Welcome to Compliance Therapy™, hosted by industry expert Igor Volovich. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join Igor and renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA ...
  continue reading
 
CyberSound is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
Learn about U.S. Exporting Trends and Regulation Changes that impact the U.S. Commercial Manufacturing Industry as well as the Defense Industrial Base. ITAR & EAR changes as well as Periodic Interviews with People of Industry. Hosted by Nicolette Reed
  continue reading
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
A Manufacturing Podcast. We talk with the owners, suppliers, partners, and customers of custom manufacturers. Listen and learn the secrets of top performing Job Shops. The tools, techniques and backgrounds that have made them successful. All in the quest for raising the bar for Custom Manufacturing.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
The LIPN Podcast

Long Island Professional Network

Unsubscribe
Unsubscribe
Monthly
 
Looking to grow your business through referral networking? Come visit the Long Island Professional Network at lipn.org and see if we are the right fit for you.
  continue reading
 
Artwork

1
The Cipher Podcast

Bill Bowman and others

Unsubscribe
Unsubscribe
Monthly+
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
  continue reading
 
Woods Rogers Vandeventer Black combines the forces of Woods Rogers, founded in Roanoke in 1893, and Vandeventer Black, established in Norfolk in 1883. The new firm continues to promote the original firms' principles of mutual respect, community leadership, and unwavering dedication to client service. The combined firm of more than 130 attorneys provides a robust offering of enhanced legal expertise for Virginia businesses, including the growing technology and manufacturing corridors. ATTORNE ...
  continue reading
 
Artwork

1
Navigating Cyber Risk

John Riley and George Usi

Unsubscribe
Unsubscribe
Monthly+
 
Cyber risk resilience for executives. Hackers are winning and lawmakers are taking action with new cyber risk mandates. In an increasingly internet delivered world, new cyberlaws and regulations with steep sanctions have been levied against leaders unable to prove their reasonable governance of the data privacy and cybersecurity problems. With cyber threats evolving at an alarming pace, cyber risk awareness and governance is needed as compliance alone is no longer enough for all businesses. ...
  continue reading
 
Loading …
show series
 
This week’s episode covers DOD’s proposed rule regarding Cybersecurity Maturity Model Certification 2.0, DOJ’s new Corporate Whistleblower Awards Pilot Program, and an OMB memo that proposes updates to FedRAMP, and is hosted by Peter Eyre and Yuan Zhou. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of si…
  continue reading
 
The discussion revolves around the proposed CMMC 2.0 rule by the US Department of Defense (DoD) to enhance cybersecurity in the defense industrial base. The rule aims to improve contractor implementation of cybersecurity requirements and tighten regulations. The hosts express the need for stricter measures, especially for large companies with gover…
  continue reading
 
Think your users are resistant to CMMC? You ain't seen nothin' yet! In this episode, Jacob speaks with Daniel Stark of Meerkat Cyber about the unique CMMC compliance challenges in a manufacturing environment. Here are some highlights: Daniel's experience running IT in a family-owned manufacturing shop How Controlled Unclassified Information (CUI) f…
  continue reading
 
John Christly, VP of Services for Blue Team Alpha, and author of two cybersecurity books, brings his wealth of experience to this episode of Kitecast. With a background spanning roles such as CEO, CIO, CISO, and CTO, as well as military service, Christly offers unique insights into the world of cybersecurity compliance for Department of Defense (Do…
  continue reading
 
This special edition covers the SBA’s August 2024 proposed rule to update and clarify various small business programs, and is hosted by Yuan Zhou and Olivia Lynch. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of significant government contracts legal and regulatory developments that no government contra…
  continue reading
 
In this episode, Ryan Williams Sr. interviews Shauna Weatherly from FedSubK, a website that provides resources and guidance for small businesses navigating the federal procurement process. Shauna shares her background in federal procurement and her motivation for starting FedSubK. They discuss the challenges and complexities of government procureme…
  continue reading
 
The hosts discuss the use of facial recognition technology in stadiums to expedite entry and enhance the fan experience. They explore the potential privacy concerns and the balance between security and personal liberties. The conversation touches on the accuracy of facial recognition technology, the value of personal data, and the future of consume…
  continue reading
 
Just in Time for Back to School! If you work in Export Compliance, or you don't understand the importance of EAR or ITAR Export Compliance -- this is the episode for you! -OR- If you have problem children on your Compliance Team or having the difficulty getting the help or support you need at your company when it comes to EAR or ITAR -- this is the…
  continue reading
 
In this episode of Cherry Bekaert’s Government Contracting podcast, we discuss how to choose the right Enterprise Resource Planning (ERP) system that fits your company’s unique needs. Host Eric Poppe, a Managing Director in the Government Contracting Industry practice, is joined by Christine DeYuliis, a Senior Manager. Tune in to learn more about s…
  continue reading
 
The conversation discusses a cybersecurity lawsuit filed against the Georgia Institute of Technology and Georgia Tech Research Corporation for alleged cybersecurity violations. The university was accused of submitting false results and not implementing the required system security plan for their networks. The discussion highlights the importance of…
  continue reading
 
In this episode, Ryan, Shannon, and Chris discuss their week and various topics, including their children's first week of school, video games they're playing, and TV shows they're watching. They also talk about the upcoming House of the Dragon series and their hopes for our favorite football teams. The conversation covers a range of themes, includi…
  continue reading
 
The FAA proposes new cybersecurity rules for airplanes to protect against intentional unauthorized electronic interactions that could create safety hazards. This is long overdue, as airplanes and other forms of mass transit have the potential to be used as weapons. The airline industry needs to take cybersecurity more seriously, especially with the…
  continue reading
 
Introducing the Cisco Whistleblower. In this episode, Jacob speaks with lawyer Hamsa Mahendranathan about the FIRST cybersecurity False Claims Act (FCA) lawsuit that reached a settlement! This goes all the way back to 2008 believe it or not… The lawsuit was FINALLY settled in 2019! As we all know, the DoJ has intervened in the Georgia Tech NIST 800…
  continue reading
 
We turn our magnifying glass to what some August 2024 headlines call the biggest data breach in history. One report said the entire population of the United States, Canada, and United Kingdom was hacked, with up to 2.9 billion people’s identities at risk. On closer inspection, it appears that 2.9 billion rows of data were packaged and posted for sa…
  continue reading
 
The podcast episode discusses the need for stronger encryption standards to protect against the threat of quantum computers. The Department of Defense and NIST are working on developing new encryption standards to safeguard sensitive information. IBM is leading the way in developing quantum-resistant encryption algorithms. The current administratio…
  continue reading
 
In this episode, the hosts discuss a data breach in which 2.9 billion records, including social security numbers, were stolen. They emphasize the importance of taking precautions to protect personal information, such as using multi-factor authentication, updating passwords, and being cautious with email and social media accounts. The hosts also sha…
  continue reading
 
In this episode, the hosts discuss their opinions on the Deadpool and Wolverine movies [SPOILER FREE]. They share their thoughts on the humor, action sequences, and overall storylines. The conversation also touches on the success of the Deadpool franchise and its impact on the R-rated movie genre. The hosts have differing opinions on certain aspect…
  continue reading
 
Microsoft announced at an April 2024 IAPP conference a preview offering called Microsoft Priva. Described as a platform that helps organizations automate how they handle and deal with personal information, Priva aims to “streamline compliance across on-premises, hybrid and multicloud environments.” https://www.microsoft.com/en-us/security/business/…
  continue reading
 
In this episode, the hosts discuss an article about a cybersecurity researcher who befriended and then exposed the leader of a ransomware gang. They explore whether this approach could be a future strategy for dealing with ransomware gangs. They also discuss the risks and implications of such actions, as well as the difference between cybersecurity…
  continue reading
 
The conversation discusses the constant cyber attacks on the healthcare sector and the need to boost healthcare cybersecurity. The healthcare sector is a soft target and is frequently targeted by ransomware attacks, putting lives at risk. The article highlights the importance of protecting hospitals and the healthcare sector as they are critical en…
  continue reading
 
In this episode of Cherry Bekaert’s Government Contracting podcast, we discuss ways to optimize the benefits of outsourcing your accounting operations. Host Craig Hunter, a Director in the Government Contracting Industry practice, is joined by Mike Cippel, Managing Director, and Directors Irwin Kaplin and Jonathan Reid. Tune in to learn more about:…
  continue reading
 
Long Description: In this episode, Max is joined by Matt King, Chief Security and Data Officer at Belcan. Matt shares his story of transitioning from Anthem to Belcan, where he has been instrumental in building a security program to meet the stringent requirements of federal compliance. The conversation dives into the DIBCAC assessment process, the…
  continue reading
 
The conversation discusses a vulnerability known as the '0.0.0.0 day' that has been present for 18 years and allows attackers to bypass browser security. The hosts express concern that this vulnerability is still widely used and that it could lead to unauthorized access and remote code execution on local services. They debate whether a complete reb…
  continue reading
 
In this episode, the hosts discuss their week, including watching YouTube videos, the Olympics, and TV shows. They also talk about their media consumption, such as movies and manga. The conversation then shifts to Marvel movies and their disappointment with recent releases. They also mention their beach trips and vacations, including a stay at a Sa…
  continue reading
 
Calendar scheduling—it can be simplified with third-party apps that schedule meeting times without a lot of back and forth. But third-party apps that do such scheduling entail significant privacy risks and choices. Using Calendly as an example, we explore in Episode 178 what happens when we allow a third-party app to connect through our IT platform…
  continue reading
 
In this episode, the hosts discuss a news article about a Fortune 50 company that paid a record-breaking $75 million ransom to the Dark Angels ransomware gang. They express frustration with the current state of cybersecurity hiring and the need to attract talented individuals to the field. The hosts also highlight the importance of building securit…
  continue reading
 
This week’s episode covers a DoD memorandum establishing procedures for covered joint venture facility security clearances, an SBA notice relating to the Mentor-Protégé Programs, and an upcoming mass modification to all existing GSA Multiple Award Schedule contracts, and is hosted by Peter Eyre and Yuan Zhou. Crowell & Moring's "Fastest 5 Minutes" …
  continue reading
 
In this episode of CyberSound, Vancord's Cybersecurity Podcast 2024, hosts Jason, Steve, and Michael discuss the critical topic of succession planning, particularly at the executive level, with a focus on Chief Information Security Officers (CISOs). They highlight the challenges of high turnover in these roles, emphasizing the importance of proacti…
  continue reading
 
In this episode, the hosts discuss the article titled 'Digicert to Delay Cert Revocation for Critical Infrastructure'. They talk about the challenges faced by companies in reissuing certificates within a short timeframe and the need for more time to ensure a seamless transition. They emphasize the importance of having a robust business continuity a…
  continue reading
 
The conversation discusses a vulnerability in VMware ESXi hypervisors that grants full admin privileges to threat actors. The vulnerability has been exploited by ransomware groups to deploy ransomware after gaining access to a network. The hosts emphasize the importance of patching systems and working with security teams or MSP/MSSPs to address the…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss their week and share their thoughts on movies, TV shows, and the Olympics. They talk about the extreme heat in Japan and other parts of the world, their media consumption, and their excitement for the upcoming Deadpool vs. Wolverine movie. They also mention their love for anime and manga, with a f…
  continue reading
 
In this episode we tackle the recent CrowdStrike outage that sent ripples through the cybersecurity community. We'll dissect what happened, explore the immediate impacts on businesses, and discuss the lessons learned so far from this incident. We also talk to Joe Anderson and examine the critical components of the CMMC framework, and discuss practi…
  continue reading
 
So… How do I get a CMMC’d early? In this episode, Jacob speaks with Steven Molter of IntelliGRC about his experiences helping IntelliGRC clients complete NIST 800-171 Joint Surveillance Voluntary Assessments (JSVAs). Here are some highlights: The JSVA process & how to request one The different teams within DIBCAC The challenge of subjectivity durin…
  continue reading
 
Join Brion St. Amour, Yugo Nagashima, and the Detective to review three top data privacy developments from July 2024. Our monthly review focuses on these topics: Automobiles - Are they spying on us without our consent? A letter from Senators Wyden and Markey to the U.S. Federal Trade Commission (FTC) asks for transparency and data protection from a…
  continue reading
 
In this episode, Shannon and Chris discuss the recent article about CrowdStrike's cybersecurity insurance losses and the warning from Warren Buffett. They explore the challenges of cybersecurity insurance, including the difficulty of obtaining coverage and the potential for disputes over potential losses. They also highlight the need for organizati…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss a cyber attack carried out by Russia on Ukraine, where they used malware to sabotage the heating utility of 600 buildings in the middle of winter. This affected 100,000 people and was a deliberate attempt to break the will of the Ukrainian people. The hosts highlight the evolving nature of warfare…
  continue reading
 
In the fourth episode of Cherry Bekaert’s Cost Accounting Standards (CAS) podcast series, Brendan Halloran, a Director in Cherry Bekaert’s Government Contracting Industry practice, is joined by Jeff Annessa, a Senior Manager in the Firm’s Government Contracting practice. Bringing extensive knowledge and experience in the government contracting spac…
  continue reading
 
In this episode, Shannon, Chris, and Daniel discuss an article about a North Korean fake IT worker who duped, KnowBe4, a security firm. The person used AI and facial recognition to pretend to be someone else and successfully got hired as a software engineer. The hosts discuss the sophistication of the attack and the importance of verification measu…
  continue reading
 
In this conversation, Ryan Williams Sr. interviews Professor Roger Whyte, a cybersecurity solutions architect and founder of Professor Roger Cyber Lounge. They discuss Professor Roger's mission to increase diversity in cybersecurity, particularly among African Americans. Professor Roger shares his experience as a mentor and coach, helping individua…
  continue reading
 
It’s time for standards about data provenance. Unless information is reliable and trustworthy - and able to be used properly - datasets hold doubtful value. Yet, datasets are the foundation of Artificial Intelligence. Standards for the provenance of data are thus essential, as Episode 175 explored. Enter the June 2024 release of Data Provenance Sta…
  continue reading
 
This week’s episode covers a GAO protest regarding the Procurement Integrity Act and a U.S. Supreme Court decision narrowing the scope of federal bribery law, and is hosted by Peter Eyre. Crowell & Moring's "Fastest 5 Minutes" is a biweekly podcast that provides a brief summary of significant government contracts legal and regulatory developments t…
  continue reading
 
In this episode, the hosts discuss the recent news that Microsoft laid off its diversity, equity, and inclusion (DEI) lead. They express their disappointment and concern about the future of DEI initiatives in companies. They highlight the importance of representation and diversity in the workplace and question why a trillion-dollar company like Mic…
  continue reading
 
Kayne McGladrey, the Field CISO at hyperproof, is a renowned cybersecurity expert with an extensive background in enhancing security landscapes across various industries. His career is marked by significant contributions in developing robust security frameworks, managing complex risk scenarios, and driving comprehensive compliance initiatives. With…
  continue reading
 
Kaspersky is shutting down its business in the United States after being sanctioned by the U.S. Treasury Department. The Department of Industry and Security also banned the company from selling software and delivering antivirus updates. This move is part of a trend where the U.S. is cutting ties with foreign companies due to concerns about data sec…
  continue reading
 
In this episode, the hosts discuss the recent CrowdStrike EDR update that crashed Windows systems worldwide. They highlight the impact of the update on various industries, including airlines and healthcare. The hosts also discuss the potential long-term consequences for CrowdStrike and Microsoft, as well as the need for better testing and quality c…
  continue reading
 
In this episode, Ryan Williams and Elizabeth Stephens discuss the recent IT outage caused by a bad patch from CrowdStrike that impacted Microsoft systems. They emphasize the importance of investing in people, processes, and tools to prevent such incidents and highlight the need for digital resilience. They also address the role of AI in cybersecuri…
  continue reading
 
In this episode, the hosts discuss their recent activities and media consumption. They mention watching documentaries, TV shows, and movies, as well as their experiences with family activities like bowling. They also talk about exploring different cuisines and cooking healthier meals. Additionally, they mention their interest in Japanese culture an…
  continue reading
 
Artificial intelligence is not new. But now an acronym in common usage, AI is dominating markets, politics, industry, and our attention. And its use affects personal privacy. Let’s take a couple examples. Bathsheba was the mother of Solomon in Torah and biblical days. Solomon’s father was King David. tIf you ask Google’s Gemini what ethnicity was B…
  continue reading
 
Loading …

Quick Reference Guide