MRCC is an ISO 27001 and ISO 9001 certified
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
An irreverent take on the world. May include interesting views on cybersecurity, data privacy and GRC stuff. But mainly two middle-aged men chewing the fat.
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
Hosted by Betsy Sikma, this ongoing series of 15- to 20-minute podcasts is designed to break down complex topics that have a huge impact on life at Milliken.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
Welcome to The Energy Exchange podcast hosted by EnerNex. Concise and Actionable Intelligence for Today’s Most Relevant Grid Modernization Topics.
…
continue reading
Compliancehelp Consulting, LLC
…
continue reading
Join Mitratech’s very own experts Karl Viertel, Stefan Sulistyo and Henry Umney on our podcast: The RegTech Report. Your update to all things RegTech. Listen to our hosts as they discuss the latest RegTech news, speak with industry pioneers and muse about the latest tech.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
1
The Cisco Whistleblower - The First Settled Cybersecurity False Claims Act (FCA) Lawsuit
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30
Introducing the Cisco Whistleblower. In this episode, Jacob speaks with lawyer Hamsa Mahendranathan about the FIRST cybersecurity False Claims Act (FCA) lawsuit that reached a settlement! This goes all the way back to 2008 believe it or not… The lawsuit was FINALLY settled in 2019! As we all know, the DoJ has intervened in the Georgia Tech NIST 800…
…
continue reading
1
Episode 43 Understanding Cyber Threat Intelligence: Staying Ahead of Cyber Attacks
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32
In this episode, I dive into the critical importance of Cyber Threat Intelligence (CTI) and how it helps organisations stay ahead of attackers. Learn about the practice of gathering, analyzing, and applying information to understand potential or existing threats. I break down the three levels of CTI: strategic, tactical, and operational intelligenc…
…
continue reading
1
Episode 142: CNAPP - Secure Cloud Apps in a Snap
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06
By John Verry
…
continue reading
Think your users are resistant to CMMC? You ain't seen nothin' yet! In this episode, Jacob speaks with Daniel Stark of Meerkat Cyber about the unique CMMC compliance challenges in a manufacturing environment. Here are some highlights: Daniel's experience running IT in a family-owned manufacturing shop How Controlled Unclassified Information (CUI) f…
…
continue reading
1
Insights on NIST 800-171 Joint Surveillance Voluntary Assessments (JSVA) from IntelliGRC
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40
So… How do I get a CMMC’d early? In this episode, Jacob speaks with Steven Molter of IntelliGRC about his experiences helping IntelliGRC clients complete NIST 800-171 Joint Surveillance Voluntary Assessments (JSVAs). Here are some highlights: The JSVA process & how to request one The different teams within DIBCAC The challenge of subjectivity durin…
…
continue reading
1
Key Aspects of CMMI Training and Certification
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18
How do I get CMMI certified? To resolve a question like that, learn everything about CMMI training and certification here! https://www.quality-assurance.com/key-aspects-of-training-and-certification-you-must-know-and-how-to-be-cmmi-certified.html
…
continue reading
The recent Global IT outage affected 8.5 million computers worldwide. Did it affect Milliken? Betsy Sikma talks one-on-one with IT’s Ken Brown, Director of Cybersecurity and Governance, in a special Milliken For Everyone recorded via Teams.By Milliken & Company
…
continue reading
1
S04.E1 - Crowdstrike - the global blue screen
42:10
42:10
Play later
Play later
Lists
Like
Liked
42:10
Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matterBy SecurityLah
…
continue reading
1
Hypori Halo: Redefining Mobile Device Security with Brian Kovalski
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58
In this episode, Jacob speaks with Brian Kowalski, Senior Vice President of Federal at Hypori. In the episode they discuss Hypori's origin story and its innovations in the mobile security space. Here are some highlights from the episode: Hypori's origin story and its roots starting as an NSA Commercial Solutions for Classified Program (CSfC) produc…
…
continue reading
1
Episode 141: Stopping Business Email Compromise with a Novel Malicious File Reconstruction Approach
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with Aviv Grafi, CTO and founder of Votiro, as they discuss innovative solutions to combat business email compromise. Join us as we discuss: The mechanisms of business email compromise How malicious files are used in cyberattacks The limitations of traditi…
…
continue reading
1
Details for Compliance and What Is the CMMI Process
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08
Do you want to learn about the CMMI process in detail? If yes, continue reading! Learn everything about the process for efficient management. To read more visit https://www.quality-assurance.com/a-detailed-cmmi-process-for-small-companies-in-the-us-2.html
…
continue reading
The IT team works hard to protect our customers and associates from the threat and effects of cyberattacks. They are successful thanks to their own dedication and the work they do with teams in Security, Legal, Compliance, Human Resources, Brand and Communications, and more. On this episode of Milliken For Everyone, host Betsy Sikma talks...…
…
continue reading
1
Episode 140: DIB/CMMC Cybersecurity – Interesting Observations from a Significant Study
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44
Join us for an engaging episode of the Virtual CISO Podcast with host John Verry. This episode features Chris Petersen, co-founder of LogRhythm and current CEO of Radical. Chris brings over two decades of experience in cybersecurity, offering deep insights into the industry's challenges and advancements. In this episode, we'll explore: - The surpri…
…
continue reading
1
The Business Case for Information Security with Mark Nicholls
28:31
28:31
Play later
Play later
Lists
Like
Liked
28:31
In this episode, Jacob speaks with Mr. Mark Nicholls! Mark is the CEO of Information Professionals Group and has over 30 years of experience! In the episode they discuss the business case for information security, and how cybersecurity professionals can effectively communicate with the C-suite and other business leaders! Here are some highlights fr…
…
continue reading
1
Episode 139: How adding Crisis Management to your Incident Response Plan can save your bacon?
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53
Join us for an engaging episode of the Virtual CISO Podcast with host John Verry. This episode features Kevin Dinino, President of KCD PR, who delves into the critical aspects of crisis management and communications. Kevin brings over 20 years of experience in guiding companies through the complexities of strategic communications, particularly in t…
…
continue reading
1
How To Stop Social Engineering in Its Tracks with Chris Silvers
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04
In this episode, Jacob speaks with Penetration Tester & Social Engineer Chris Silvers! Chris Silvers is the founder of CG Silvers Consulting! Chris has a vast amount of experience ranging from CMMC assessments to penetration testing. He even won the prestigious DEF CON black badge during the DEF CON 24 Social Engineering Capture the Flag (SECTF)! I…
…
continue reading
Milliken has long been known as a place where jobs turn into careers. Our associates are proud to call themselves Team Milliken, and it’s common to meet people who have been with the company 10, 20, 30 years and even more. But no matter where you are in your time with Milliken, you might benefit...By Milliken & Company
…
continue reading
1
Episode 138: Is Consuming SaaS an Information Security Faustian Bargain? w/ William Eshagh
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30
By John Verry
…
continue reading
1
Internal Audit Service Providers for Quality Assurance
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22
Internal audit service providers are hired for not only to conduct audits, but also for a diverse range of internal assessments and evaluations. To read more visit https://www.quality-assurance.com/blog/why-you-should-hire-internal-audit-service-providers-for-quality-assurance-support.html
…
continue reading
The following blog will focus on the R2 certification requirements and will list out how to help receive answers to any of your questions. To implement and manage responsible practices, the following aspects will play a crucial role. To read more visit https://www.quality-assurance.com/blog/is-it-simple-or-complex-to-decode-r2-certification-require…
…
continue reading
Wondering how much is the ISO 13485 certification costs or what factors contribute to the overall charges? Then click here and learn more! https://www.quality-assurance.com/blog/decoding-factors-that-determine-the-iso-13485-certification-cost.html
…
continue reading
In this episode, Jacob speaks with ISO 27001 expert Aron Lange! Aron is the founder of the GRC Lab, and a Udemy instructor with more than 11,000 students! He is an experienced auditor for management systems based on ISO 27001, ISO 9001, ISO 27018 and ISO 22301. In this episode they discuss the essentials of ISO 27001 including the history of the st…
…
continue reading
1
Episode 137: Strategies and Insights w/ Sagi Brody
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57
By John Verry
…
continue reading
1
Why Threat Intel is Essential for Vulnerability Management with Patrick Garrity
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07
In this episode, Jacob speaks with cybersecurity researcher Patrick Garrity! Patrick Garrity is a seasoned security researcher at VulnCheck where he focuses on vulnerabilities, vulnerability exploitation and threat actors. In this episode they discuss the importance of integrating threat intelligence into vulnerability management using the Exploit …
…
continue reading
1
What does a quality assurance consultant do?
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22
What does a quality assurance consultant do? Before hiring these specialists, read about their responsibilities, how they carry out and how they will perform. Read now! https://www.quality-assurance.com/blog/before-you-hire-an-expert-learn-what-a-quality-assurance-consultant-does.html
…
continue reading
1
Eight Steps to Find Internal Audit Service Providers in the US
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00
The following blog sheds light on the process of finding and hiring internal audit experts without facing exhaustion. Read now! Click here! https://www.quality-assurance.com/blog/easy-selection-of-internal-audit-service-providers-in-just-eight-steps.html
…
continue reading
Learn everything about the CMMI training and certification here! What are the courses available in the market? Read now! https://www.quality-assurance.com/blog/everything-you-must-know-about-cmmi-training-and-certification.html
…
continue reading
1
Episode 42 Defenders of the Cyberverse - Insights from Alexander Rogan and Christian Rogan of Platinum High Integrity Technologist.
1:01:28
1:01:28
Play later
Play later
Lists
Like
Liked
1:01:28
Welcome to Episode 42 of the Cyber Security Happy Hour Podcast, with your host, Christie. In this gripping episode, I interview Alexander Rogan and Christian Rogan, co-founders of Platinum High Integrity Technologies. They discuss their disruptive Cyber Security solution, a technology that works at ring zero, effectively blocking unauthorised binar…
…
continue reading
Thinking about how to obtain the ISO 9001 certification? Obtain the most relevant answers here! A step-by-step direction for your use! Read now! https://www.quality-assurance.com/blog/how-to-obtain-the-iso-9001-certification-from-experts-that-can-make-the-process-simple.html
…
continue reading
1
Episode 136: AI Risk Management – Is ISO 42001 the Solution? w/ Ariel Allensworth
52:45
52:45
Play later
Play later
Lists
Like
Liked
52:45
By John Verry
…
continue reading
1
10 ISO 27001 certification benefits | Learn and Apply
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
Want to learn more about ISO 27001 certification benefits? You can learn about the advantages information security management brings to you. To read more visit https://www.quality-assurance.com/blog/which-iso-27001-certification-benefits-augment-business-sustainability.html
…
continue reading
1
Episode 135: Can Distributed Ledger Technology Simplify Privacy Compliance? W/ Zenobia Godschalk
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Zenobia Godschalk, Senior Vice President of Hedera Hashgraph, as they discuss distributed ledger technology and its effects on privacy compliance. Join us as we discuss the following: The erosion of Privacy Online Distributed Ledger Technology (…
…
continue reading
1
The False Claims Act and The DOJ's Civil Cyber Fraud Initiative with Julie Bracker
40:54
40:54
Play later
Play later
Lists
Like
Liked
40:54
In this episode, Jacob speaks with attorney Julie Bracker! Julie is the whistleblower attorney for both the Penn State University and Georgia Tech University FCA complaints. These complaints essentially allege the defendants misrepresented their compliance with NIST 800-171! They discuss the False Claims Act and the DOJ's Civil Cyber Fraud Initiati…
…
continue reading
1
ISO 27001 certification benefits for small enterprises
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52
According to last year’s report on cyber-attacks, more than 41% of the small enterprises in the United States fall victim to malware. Learn about the ISO 27001 certification benefits. To read more visit https://www.quality-assurance.com/blog/real-certification-benefits-of-the-iso-27001-for-small-enterprises.html…
…
continue reading
Do you give to charity? Donate to your favorite college? Have you ever wished you could give more? Well, Milliken wants to help. The company is expanding our Associate Gift Match Program, which is designed to help you turbocharge your charitable giving. To explain how it works, podcast producer Alan Jenkins slides into the host...…
…
continue reading
1
CMMC and Security Compliance in Higher Education
1:15:56
1:15:56
Play later
Play later
Lists
Like
Liked
1:15:56
In this episode, Jacob speaks with a panel of information security experts from universities about CMMC and their experience preparing for it! They discuss security and compliance challenges at universities, the Penn State NIST 800-171 False Claims Act lawsuit, and much more! Here are some highlights from the episode: How universities are different…
…
continue reading
Conducting an internal audit soon? Are you aware of the five C’s of an audit? Learn about them in detail here! Click here! https://www.quality-assurance.com/blog/the-five-cs-of-internal-audits-and-expert-recommendations-101.html
…
continue reading
Are you confused about the differences of the AS9100 vs the ISO 9001? Read about the differences that distinguish each quality management standard. Read now! https://www.quality-assurance.com/blog/what-are-the-six-factors-for-the-as9100-vs-iso-9001.html
…
continue reading
1
Episode 41 Demystifying Vulnerability Scans
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16
Welcome to Episode 41 of the Cyber Security Happy Hour Podcast. In this podcast, your host, Christie, explores the critical facet of cyber security vulnerability scanning. Decode the myths, understand what vulnerability scans encompass, and why their role within an organization is of paramount importance. Firstly, begin with an overview of vulnerab…
…
continue reading
1
Episode 134: Understanding TISAX w/ Alexander Häusler
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47
By John Verry
…
continue reading
1
ISO Certification Renewal Process | Online Guidance
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21
Want to renew your ISO certification? Learn everything about the process here! Know why you must hire professionals for timely renewal. https://www.quality-assurance.com/blog/a-step-by-step-iso-certification-renewal-process-2.html
…
continue reading
1
AI's Impact on Cybersecurity Risk with Dr. Raghuram Srinivas of MetricStream
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59
In this episode, Jacob talks to Dr. Raghuram Srinivas from MetricStream! They discuss the beginnings of AI, how it has evolved over time, and the risks and opportunities it presents to companies around the world! Raghuram is the Senior Vice President of Product Management at MetricStream. He is an AI expert and has worked in AI-focused roles at JPM…
…
continue reading
Every day, we take customers on a journey. It may begin with a casual inquiry or a sales call. It goes on to a satisfied customer and, if we’re really good, a sales relationship that lasts for decades. How do we track that journey at Milliken? How do we monitor customer sentiment and transform sales...…
…
continue reading
1
Kubernetes Security – Simplified Shauli Rozen, CEO of ARMO
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Shauli Rozen, CEO and Co-Founder of ARMO, exploring the intricacies of Kubernetes, the orchestration tool that's reshaping how we deploy, scale, and manage containerized applications. Join us as we discuss: What a container is Implications of co…
…
continue reading
1
9 - Credential stuffing - How to protect your Business
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
Credential Stuffing is a fairly common way that attackers can gain access to your network, email and even banking. This cyber security podcast discusses: What is credential stuffing; How does it impact business networks; and How you can protect your business and your staff. Check out the free ACSC Essential 8 self assessment audit tool. After compl…
…
continue reading
1
CMMI Process | Compliancehelp Consulting LLC
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38
Learn everything about the critical CMMI process. Know what to keep in mind and what to expect from an error-free CMMI analysis. Read here! https://www.quality-assurance.com/blog/cmmi-appraisals-how-is-cmmi-assessment-done.html
…
continue reading
1
ISO 13485 certification cost | Compliancehelp
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20
Are you thinking about implementing the ISO 13485 certification and its cost? To better understand all costs, get an expert’s opinion now! https://www.quality-assurance.com/what-is-the-total-iso-13485-certification-cost.html
…
continue reading
Do you know why you should hire certified audit specialists to complete the ISO 9001 process? Click here to learn everything about the process and the roles of the professionals. https://www.quality-assurance.com/blog/learn-the-role-of-certified-auditors-in-the-iso-9001-process.html
…
continue reading
How much is the ISO certification price? Are you thinking about becoming certified? Clear your doubts here! Read about the charges and appoint professionals accordingly. https://www.quality-assurance.com/blog/what-does-iso-certification-cost-can-small-companies-afford-professional-services.html
…
continue reading
1
Episode 132: Optimize Your SOC 2 - Lessons Learned from the 2023 Benchmark Study w/ Scott Woznicki
43:31
43:31
Play later
Play later
Lists
Like
Liked
43:31
By John Verry
…
continue reading