Crystal Chavez public
[search 0]
Download the App!
show episodes
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Loading …
show series
 
In this episode of the Cyber Rants Podcast, Zach and Lauro are joined by Yasir Ali, CEO of Polymer, to dive deep into the critical issue of data leakage and shadow IT in today's SaaS-driven business environment. As companies rely on a multitude of software platforms, employees often create unauthorized accounts on new tools, posing significant secu…
  continue reading
 
Lauro and Zach welcome Denzil Wessels, Founder & CEO of Dymium, to explore groundbreaking innovations in database security. Denzil introduces Dymium's cutting-edge "Ghost layer" approach, which emphasizes securing data itself rather than just the network, offering granular control and preventing the need for data duplication. This episode highlight…
  continue reading
 
Last time on ‘Chronic’ –we heard from Karen McGuire who lives with vestibular migraine. Vestibular migraine may include headaches with symptoms such as vertigo, nausea and vomiting. Karen has soo many questions about why she got this diagnosis and what she can do to manage her symptoms. I promised her I would try my best to find her some answers. A…
  continue reading
 
In this episode of the Cyber Rants Podcast, we sit down with Chris Hadnagy, a prominent speaker at RSA, Black Hat, and DefCon's SE Capture the Flag events. Chris is the author of four influential books, including "Social Engineering: The Art of Human Hacking" and "Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Me…
  continue reading
 
Financial scams and cyber breaches are hitting more Americans than ever. This week, Zach and Lauro dive into common personal scams and cyber attacks, sharing essential prevention tips and steps to take if you're targeted. Tune in and share with non-tech-savvy friends to help them stay safe from online criminals. Pick up your copy of Cyber Rants on …
  continue reading
 
This week, Zach and Lauro welcome pen tester, CISO, and entrepreneur, Dan DeCloss. From navigating organizational challenges to systemizing vulnerability management processes, Dan shares expert insight that applies to IT and security professionals in every organization. The guys also discuss Dan's solution to simplify penetration test reporting, vu…
  continue reading
 
On this episode of ‘Chronic’ – Karen McGuire talks about life with vestibular migraine. Vestibular migraine may include headaches with symptoms such as vertigo, nausea and vomiting. Like many of us, she deals with more than one pain point–she also has endometriosis. Karen openly shares her experiences on everything from how she takes care of hersel…
  continue reading
 
In this episode of Cyber Rants, Zach and Lauro are joined by Jeremy Snyder, CEO of Firetail, to explore the intricacies of safeguarding vital API connections. Jeremy shares invaluable expertise on identifying and fortifying the vulnerable points targeted by cyber adversaries. Tune in as he discusses a range of topics, from API authentication to thr…
  continue reading
 
In this episode of Cyber Rants, Zach and Lauro sit down with Ty Smith, a former Navy SEAL turned successful tech entrepreneur, to uncover invaluable leadership and mindset lessons. Ty draws from his combat experience and entrepreneurial journey to offer crucial insights for technology leaders. Tune in to learn how to build resilient teams, lead wit…
  continue reading
 
In today's cyber landscape, breaches are often disclosed by criminals before victims are even aware, leaving companies scrambling to manage the fallout. Crafting a swift and effective response is essential to safeguarding trust and reputation. Join us this week with corporate communications expert Kevin Dinino, President of KCD PR, as he shares key…
  continue reading
 
It's not a matter of if an organization is going to be attacked, but when. This week, the guys dive into discussing what organizations should be doing more to ensure they are resilient and ready to recover after an attack. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us at www.silentsector…
  continue reading
 
When the turn of the year comes, so do the projections of Zach, Mike, and Lauro. Sharing both obvious reminders and concepts that are not widely known, the guys break out the crystal ball and give their take on what's coming this year in cybersecurity. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level…
  continue reading
 
On this episode of Chronic, we learn about Ayurveda: a system of health and medicine from India that's more than five thousand years old. Dr. Shivani Gupta is an Ayurvedic Practitioner with more than 20 years of experience studying Ayurveda in the U.S. and India. She shares the knowledge about some ancient tools and strategies we can use today for …
  continue reading
 
We are thrilled to welcome back Chris Rock, a cyber mercenary with the expertise to dismantle individuals, institutions, and even entire nations. Join us as Chris shares insights, captivating stories, and the harsh realities of the hacker's world, offering a unique perspective to help you comprehend the intricacies of safeguarding your organization…
  continue reading
 
In a digital realm rife with misinformation, the guys dissect the reliability of cyber score sites like Security Scorecard that rate the security level of companies. They discuss the repercussions of false ratings and the pressures on organizations to pay for correcting misleading information. Breaking down real-world examples to a technical level,…
  continue reading
 
Let's face it, disasters are prone to strike anytime and almost always when least expected. Most businesses can't afford to stop operations for an extended period of time. Having a plan for disaster recovery and business continuity is central to your cybersecurity program and most compliance requirements. This week, the guys talk about developing e…
  continue reading
 
The guys are asked regularly, "How can vendor risk management be quicker and easier?" After all, the process can be quite time-consuming. Others ask, "How do we answer these giant questionnaires from our clients without making ourselves look bad?" This week, the guys share tips to help organizations both manage vendor risk and present themselves in…
  continue reading
 
Let's face it, the end of the year is the busiest time in many areas of business - but fear not! Cybersecurity shouldn't be an end-of-year rush to catch up. This week the guys break down what you can do to make the 4th quarter easier for you so you can actually enjoy some time off during the holidays. They share their observations and insights so y…
  continue reading
 
This week, Zach and Lauro are joined by Milton Chavez, as all three guests have one unique connection - they're all U.S. Army Veterans that have made the post-military transition to the Cybersecurity sector. They discuss what life is like making the jump from a military background to the cybersecurity industry, and tips for current soldiers to make…
  continue reading
 
This week, Zach and Lauro talk about some critical but often overlooked topics including in-person social engineering attacks, the nuances of change management, and what it really means to hack wireless networks. They share why organizations need to do more in-person physical penetration testing and how to help employees react properly in the event…
  continue reading
 
Cyber criminals continue to increase their focus on executives and other high-profile individuals. Using well crafted and targeted attack methods, criminals are able to coerce people into sending money and information directly into the wrong hands. This week, the guys talk about whaling, spear phishing, and other tactics being used in successful at…
  continue reading
 
This week, the guys talk about vCISO challenges from the perspectives of both the vCISOs and their clients. But wait - what does it really mean to be a vCISO? How do you know if a vCISO is right for your organization? Which vCISO is best? You’ll get answers from the guys as they share their vCISO stories and discuss cybersecurity expertise for rent…
  continue reading
 
This triple-digit summer heat has only made it that much harder for those of us who suffer from hot flashes! A hot flash– for those lucky enough not to know– is a sudden warm feeling in your face, neck and chest. The skin gets flushed and you start to sweat. Some people also experience anxiety among other symptoms. "These symptoms are manageable an…
  continue reading
 
This week, the guys welcome one of the most interesting figures in cybersecurity! Meet Chris Rock, the hacker and cyber mercenary who can overthrow a government, digitally birth and kill people, and leverage a lot more unique skills he doesn't share with everyone. In addition to founding SIEMonster and being a three time DefCon presenter, Chris has…
  continue reading
 
It seems like there is a new cybersecurity regulation popping up every week and with so many changes, it can be hard to keep track. This week the guys explain the Securities and Exchange Commission Rule 10 and the Federal Trade Commission Safeguards Rule. They share who's affected and what these requirements could mean to your organization. Pick up…
  continue reading
 
For better or for worse, Artificial Intelligence has been dominating the news. Is it really what people say? What does easy access to AI tools mean for your cybersecurity program? The guys discuss pros, cons, and their opinions on how AI should be utilized in your cyber risk management program. Pick up your copy of Cyber Rants on Amazon. Looking to…
  continue reading
 
Enterprise customers want to work with vendors that are secure and reputable. This week, the guys discuss how smart companies leverage their cybersecurity efforts to increase revenue and gain a competitive edge. Zach, Mike, and Lauro share how they've helped clients gain millions of dollars in new contracts and tips so you can help your company thr…
  continue reading
 
This week, the guys celebrate the 100th episode of The Cyber Rants Podcast! They share Silent Sector’s origins as a company and how Cyber Rants was launched out of the desire to improve the cybersecurity industry. They also share a bit about their backgrounds and throw in quite a few rants for good measure. Help us look forward to another 100 episo…
  continue reading
 
We’ve covered various forms of remote penetration testing, so in this episode we get up close and personal. On-site penetration testing has its own benefits, risks, and nuances. This week, the guys discuss activities such as Wireless Network Penetration Testing and Physical Security Assessments that are conducted on-site. This is “the fun stuff” an…
  continue reading
 
This week, the guys discuss network penetration testing which is a critical aspect of cyber risk management. They share how internal and external network pen testing validates the effectiveness of the controls you have in place and helps you find exploitable vulnerabilities before the cyber criminals do. They discuss the differences between Black B…
  continue reading
 
On this episode of 'Chronic', we talk about all things sleep with sleep expert Vincent Mysliwiec. Mysliwiec is a professor of research and the director of sleep medicine at the STRONG STAR research unit at the University of Texas Health Science Center San Antonio. His expertise is with sleep disorders experienced by those in the military. We talk a…
  continue reading
 
This week, the guys reach the epic conclusion of the SOC 2 audit preparation series. They finish the Security Trust Services Criteria, discussing Control Categories 7,8, & 9. They also share tips and tricks to succeed with your SOC 2 audit. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us a…
  continue reading
 
This week, the guys return to helping you prepare for your SOC 2 audit. This time, they discuss Control Categories 5 and 6 in the Security Trust Services Criteria. They cover risk management controls and answer the question, "How does hosting in the cloud help with the audit?" Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber S…
  continue reading
 
We all know that data breaches are nightmares and the legal ramifications can be far worse than the breach itself. So what can we do to protect ourselves? This week, Zach and Mike welcome attorney John Gray, Chair of Data Privacy and Cybersecurity of Lewis Roca, who specializes in Data Privacy law. He shares how companies can prepare in advance to …
  continue reading
 
Web applications are drastically different and like anything, are prone to vulnerabilities. Application penetration tests come in all shapes and sizes, some good, some bad, and some are not even penetration tests at all. This week, the guys share their insights about Web Application Penetration Testing and get what you need out of your next test! D…
  continue reading
 
As we get deeper into the SOC 2 Preparation series, the guys discuss the controls around monitoring activities, tracking deficiencies, and assessing results (CC 4). If a SOC 2 audit is in your future, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next …
  continue reading
 
This week, the guys continue their series on how to prepare for your SOC 2 audit by discussing controls in Section 3 of the Security Trust Services Criteria. If your organization is about to undergo a SOC 2 audit or looking into it, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take …
  continue reading
 
Planning to go through your very first SOC 2 audit? If so, this series will be a binge worthy and enlightening adventure! This week, the guys walk you through the first few SOC 2 audit requirements with a step-by-step approach. They share what your auditor will be looking for, tips to prepare, and the pitfalls that might catch you off guard. Pick u…
  continue reading
 
The development of a cybersecurity committee will accelerate your company's alignment to a cybersecurity framework and compliance requirements. This week, the guys discuss why you may need a committee for your cybersecurity framework adoption, instead of leaving one person to lead the job. They also cover operational tempo with a 12-month calendar …
  continue reading
 
This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely. For more on Ken and Silverdraft, please see the links below. https://www.linkedin.com/in/wileyken/ https://silverdra…
  continue reading
 
David Richie started studying breathwork as a way to control anxiety-- to control the racing mind. Richie is a functional breathwork instructor in San Antonio. "Just really trying to harness what God gave us; I figured out that our bodies are very resilient in healing themselves and so I've been on a path of discovering all of these little 'bio hac…
  continue reading
 
This week, the guys talk about navigating the cybersecurity environment in 2023. From advancements and changes to cybersecurity practices, to economic conditions shifting budget priorities, to advancing your own career, this conversation is the primer for a great year! Start off strong and don't miss this episode! Pick up your copy of Cyber Rants o…
  continue reading
 
This week, the guys welcome cybersecurity expert and entrepreneur, Ed Vasko. Ed shares his insights from decades of experience and reveals a much-needed cybersecurity education model that he has built at Boise State University. With the cybersecurity industry experiencing a severe talent shortage, Ed is answering the challenge by improving the educ…
  continue reading
 
Sorry to say it, but nobody else can secure your organization from the outside. The reality is, every company has a significant amount of work that must be done internally (by real humans) to build an effective cybersecurity and compliance program. Be wise when looking at tools and services implying that they'll take care of your cybersecurity for …
  continue reading
 
When the calendar begins to turn, the infamous Cyber Rants crystal ball comes into view once more. This week, the guys discuss their predictions and cybersecurity trends in 2023. They share tips to stay ahead of the game while protecting your organization in the new year to come. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cybe…
  continue reading
 
This week the guys (and "Skippy the Intern") are joined by special guest, Caren Shiozaki, to discuss cybersecurity considerations among executive teams and boards of directors. Caren shares her experience as a technology executive, insights at the leadership level, and emerging trends that are changing the thought process around cybersecurity and c…
  continue reading
 
Cyber insurance is critical for risk management and the requirements are changing rapidly. With rate increases averaging 25-45% per year and many companies being declined for coverage altogether, this week the guys get the inside scoop with cyber insurance expert, Adam Guyton. Adam shares some important cyber insurance insights including how to get…
  continue reading
 
This week, the guys welcome Founder and President of the Idaho Technology Council, Jay Larsen. They discuss his journey to building Idaho's premier tech organization, how technology councils help businesses thrive, the traits of a strong entrepreneurial ecosystem, and the benefits technology companies bring to their communities. Visit www.idahotech…
  continue reading
 
Unfortunately, there are some IT professionals who feel threatened when a 3rd party cybersecurity team is engaged. While it's the exception rather than the norm, there are both in-house and 3rd party IT professionals who become uncooperative, feeling as if security people are trying to poke holes in their work. While many IT professionals are very …
  continue reading
 
Thinking about a career in cybersecurity? This week, the guys share their thoughts about getting into the cybersecurity field. They share the pros and cons of the job, training and experience that helps along the way, how to find your first position or two, plus some reasons why cybersecurity is NOT a good career for some people. Chances are, you'r…
  continue reading
 
Loading …

Quick Reference Guide