Silent Sector LLC public
[search 0]
Download the App!
show episodes
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
  continue reading
 
Loading …
show series
 
Let's face it, the end of the year is the busiest time in many areas of business - but fear not! Cybersecurity shouldn't be an end-of-year rush to catch up. This week the guys break down what you can do to make the 4th quarter easier for you so you can actually enjoy some time off during the holidays. They share their observations and insights so y…
  continue reading
 
This week, Zach and Lauro are joined by Milton Chavez, as all three guests have one unique connection - they're all U.S. Army Veterans that have made the post-military transition to the Cybersecurity sector. They discuss what life is like making the jump from a military background to the cybersecurity industry, and tips for current soldiers to make…
  continue reading
 
This week, Zach and Lauro talk about some critical but often overlooked topics including in-person social engineering attacks, the nuances of change management, and what it really means to hack wireless networks. They share why organizations need to do more in-person physical penetration testing and how to help employees react properly in the event…
  continue reading
 
Cyber criminals continue to increase their focus on executives and other high-profile individuals. Using well crafted and targeted attack methods, criminals are able to coerce people into sending money and information directly into the wrong hands. This week, the guys talk about whaling, spear phishing, and other tactics being used in successful at…
  continue reading
 
This week, the guys talk about vCISO challenges from the perspectives of both the vCISOs and their clients. But wait - what does it really mean to be a vCISO? How do you know if a vCISO is right for your organization? Which vCISO is best? You’ll get answers from the guys as they share their vCISO stories and discuss cybersecurity expertise for rent…
  continue reading
 
This week, the guys welcome one of the most interesting figures in cybersecurity! Meet Chris Rock, the hacker and cyber mercenary who can overthrow a government, digitally birth and kill people, and leverage a lot more unique skills he doesn't share with everyone. In addition to founding SIEMonster and being a three time DefCon presenter, Chris has…
  continue reading
 
It seems like there is a new cybersecurity regulation popping up every week and with so many changes, it can be hard to keep track. This week the guys explain the Securities and Exchange Commission Rule 10 and the Federal Trade Commission Safeguards Rule. They share who's affected and what these requirements could mean to your organization. Pick up…
  continue reading
 
For better or for worse, Artificial Intelligence has been dominating the news. Is it really what people say? What does easy access to AI tools mean for your cybersecurity program? The guys discuss pros, cons, and their opinions on how AI should be utilized in your cyber risk management program. Pick up your copy of Cyber Rants on Amazon. Looking to…
  continue reading
 
Enterprise customers want to work with vendors that are secure and reputable. This week, the guys discuss how smart companies leverage their cybersecurity efforts to increase revenue and gain a competitive edge. Zach, Mike, and Lauro share how they've helped clients gain millions of dollars in new contracts and tips so you can help your company thr…
  continue reading
 
This week, the guys celebrate the 100th episode of The Cyber Rants Podcast! They share Silent Sector’s origins as a company and how Cyber Rants was launched out of the desire to improve the cybersecurity industry. They also share a bit about their backgrounds and throw in quite a few rants for good measure. Help us look forward to another 100 episo…
  continue reading
 
We’ve covered various forms of remote penetration testing, so in this episode we get up close and personal. On-site penetration testing has its own benefits, risks, and nuances. This week, the guys discuss activities such as Wireless Network Penetration Testing and Physical Security Assessments that are conducted on-site. This is “the fun stuff” an…
  continue reading
 
This week, the guys discuss network penetration testing which is a critical aspect of cyber risk management. They share how internal and external network pen testing validates the effectiveness of the controls you have in place and helps you find exploitable vulnerabilities before the cyber criminals do. They discuss the differences between Black B…
  continue reading
 
This week, the guys reach the epic conclusion of the SOC 2 audit preparation series. They finish the Security Trust Services Criteria, discussing Control Categories 7,8, & 9. They also share tips and tricks to succeed with your SOC 2 audit. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us a…
  continue reading
 
This week, the guys return to helping you prepare for your SOC 2 audit. This time, they discuss Control Categories 5 and 6 in the Security Trust Services Criteria. They cover risk management controls and answer the question, "How does hosting in the cloud help with the audit?" Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber S…
  continue reading
 
We all know that data breaches are nightmares and the legal ramifications can be far worse than the breach itself. So what can we do to protect ourselves? This week, Zach and Mike welcome attorney John Gray, Chair of Data Privacy and Cybersecurity of Lewis Roca, who specializes in Data Privacy law. He shares how companies can prepare in advance to …
  continue reading
 
Web applications are drastically different and like anything, are prone to vulnerabilities. Application penetration tests come in all shapes and sizes, some good, some bad, and some are not even penetration tests at all. This week, the guys share their insights about Web Application Penetration Testing and get what you need out of your next test! D…
  continue reading
 
As we get deeper into the SOC 2 Preparation series, the guys discuss the controls around monitoring activities, tracking deficiencies, and assessing results (CC 4). If a SOC 2 audit is in your future, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next …
  continue reading
 
This week, the guys continue their series on how to prepare for your SOC 2 audit by discussing controls in Section 3 of the Security Trust Services Criteria. If your organization is about to undergo a SOC 2 audit or looking into it, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take …
  continue reading
 
Planning to go through your very first SOC 2 audit? If so, this series will be a binge worthy and enlightening adventure! This week, the guys walk you through the first few SOC 2 audit requirements with a step-by-step approach. They share what your auditor will be looking for, tips to prepare, and the pitfalls that might catch you off guard. Pick u…
  continue reading
 
The development of a cybersecurity committee will accelerate your company's alignment to a cybersecurity framework and compliance requirements. This week, the guys discuss why you may need a committee for your cybersecurity framework adoption, instead of leaving one person to lead the job. They also cover operational tempo with a 12-month calendar …
  continue reading
 
This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely. For more on Ken and Silverdraft, please see the links below. https://www.linkedin.com/in/wileyken/ https://silverdra…
  continue reading
 
This week, the guys talk about navigating the cybersecurity environment in 2023. From advancements and changes to cybersecurity practices, to economic conditions shifting budget priorities, to advancing your own career, this conversation is the primer for a great year! Start off strong and don't miss this episode! Pick up your copy of Cyber Rants o…
  continue reading
 
This week, the guys welcome cybersecurity expert and entrepreneur, Ed Vasko. Ed shares his insights from decades of experience and reveals a much-needed cybersecurity education model that he has built at Boise State University. With the cybersecurity industry experiencing a severe talent shortage, Ed is answering the challenge by improving the educ…
  continue reading
 
Sorry to say it, but nobody else can secure your organization from the outside. The reality is, every company has a significant amount of work that must be done internally (by real humans) to build an effective cybersecurity and compliance program. Be wise when looking at tools and services implying that they'll take care of your cybersecurity for …
  continue reading
 
When the calendar begins to turn, the infamous Cyber Rants crystal ball comes into view once more. This week, the guys discuss their predictions and cybersecurity trends in 2023. They share tips to stay ahead of the game while protecting your organization in the new year to come. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cybe…
  continue reading
 
This week the guys (and "Skippy the Intern") are joined by special guest, Caren Shiozaki, to discuss cybersecurity considerations among executive teams and boards of directors. Caren shares her experience as a technology executive, insights at the leadership level, and emerging trends that are changing the thought process around cybersecurity and c…
  continue reading
 
Cyber insurance is critical for risk management and the requirements are changing rapidly. With rate increases averaging 25-45% per year and many companies being declined for coverage altogether, this week the guys get the inside scoop with cyber insurance expert, Adam Guyton. Adam shares some important cyber insurance insights including how to get…
  continue reading
 
This week, the guys welcome Founder and President of the Idaho Technology Council, Jay Larsen. They discuss his journey to building Idaho's premier tech organization, how technology councils help businesses thrive, the traits of a strong entrepreneurial ecosystem, and the benefits technology companies bring to their communities. Visit www.idahotech…
  continue reading
 
Unfortunately, there are some IT professionals who feel threatened when a 3rd party cybersecurity team is engaged. While it's the exception rather than the norm, there are both in-house and 3rd party IT professionals who become uncooperative, feeling as if security people are trying to poke holes in their work. While many IT professionals are very …
  continue reading
 
Thinking about a career in cybersecurity? This week, the guys share their thoughts about getting into the cybersecurity field. They share the pros and cons of the job, training and experience that helps along the way, how to find your first position or two, plus some reasons why cybersecurity is NOT a good career for some people. Chances are, you'r…
  continue reading
 
As technology's most widespread and trusted vendors are compromised, who can you really trust in today's environment? This week, the guys discuss attacks originating from compromised tech products, how the bad guys gain insider access, multi-factor authentication fatigue, and even a few hints at their love for Rick Astley. Get the show notes and ar…
  continue reading
 
Cloud services can offer tremendous benefits and cloud computing environments have become a standard across all industries. However, marketing hype leads consumers to believe that "the cloud is secure" by default and that someone else is taking responsibility for their protection. Too many people are quick to adopt cloud services without truly unde…
  continue reading
 
Ransomware can infect your on-premise or cloud environments at any given time but we've noticed that ransomware attacks seem to spike during certain times of the year. This week, the guys talk about how ransomware can be deployed on your devices, how to prevent ransomware attacks, and even some horror stories from how ransomware has impacted major …
  continue reading
 
It's cyber risk assessment season! This is the time of year when many organizations seem to perform their annual cyber risk assessment. Unfortunately, the standard methods often result in limited visibility. This week, the guys discuss a more holistic risk assessment approach to make your cybersecurity program stronger than ever. Get the show notes…
  continue reading
 
This week, the guys discuss some cybersecurity trends, tips, and words to the wise that are timely and relevant in today's technology-centric world! They discuss: Are attacks ramping up and if so, why? The pros and cons of spending your cybersecurity budget on Black Hat and DefCon Why you need specific objectives in your penetration testing, not ju…
  continue reading
 
Does your company recruit IT and cybersecurity staff with the same methods used to fill other positions? If so, don't miss this episode. This week, the guys welcome Cammas Freeman, an expert on finding and retaining the best technology professionals. Cammas shares a unique approach for recruiting the best talent, using a methodology that saves a tr…
  continue reading
 
Cyber criminals are heavily focused on compromising backups so their attacks are as crushing and painful as possible for the victims. Good backups and the ability to quickly restore are a critical part of every infosec program but many organizations still treat backups as an afterthought. This week, the guys welcome the recognized authority on data…
  continue reading
 
This week, the guys discuss one of their favorite topics, Payment Card Industry Data Security Standards (PCI DSS)! Companies that transmit, process, or store credit card data need to be compliant but PCI has its own nuances. What level of PCI compliance do you need? How do you determine what is in scope? How do you work with auditors? The guys answ…
  continue reading
 
Inflation and other economic factors are affecting companies large and small. Some organizations are cutting budgets but still have security and compliance requirements to maintain. This week, the guys discuss what organizations can do if they need to reduce spending, how to get the most bang for your buck, plus mistakes you don't want to make duri…
  continue reading
 
Building and managing a cybersecurity program can be confusing for organizations with multiple product lines, subsidiaries, or industry divisions. How do you manage security across all business units? What can you do to set standards that are followed by the entire organization? How do you control the quality of the cyber risk management practices …
  continue reading
 
This week, the guys reconvene after a mini-hiatus and talk about some topics and tips in the news today such as Goodwill Ransomware Hacking Safe Browsing - the hidden dangers people need to know A word to the wise about Wordpress (even though they supposedly "don't talk about wordpress") Pick up your copy of Cyber Rants on Amazon. Looking to take y…
  continue reading
 
Is there really such a thing as "offense" in cybersecurity? This week, the guys discuss how it's possible to proactively protect organizations against criminals and how to identify potential attacks so you can stop them before it's too late. They share the realities of offensive cybersecurity and "hacking back." Pick up your copy of Cyber Rants on …
  continue reading
 
Think that cybersecurity is all about protecting data and achieving compliance? Think again! This week the guys share real-world examples about companies using cybersecurity to grow revenue, create a competitive advantage, and become market leaders! Learn how to use your cybersecurity program to create an outstanding return on investment! Pick up y…
  continue reading
 
This week, the guys continue to walk through the NIST Cybersecurity Framework, by discussing the Detect, Respond, and Recover control categories. They rant about logging, SIEMs, and incident response when you're facing a worst case scenario. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us …
  continue reading
 
A cybersecurity framework is the foundation of any good cyber risk management program but many people are not familiar with what a framework really is and what they include. This week the guys reveal the importance of following an industry-recognized cybersecurity framework and begin walking through the National Institute of Standards & Technology …
  continue reading
 
This week, the guys discuss cybersecurity for healthcare companies. From medical facilities and laboratories, to MedTech, benefits companies, and healthcare services firms, the medical world faces its own set of challenges. The guys share thoughts and strategies around HIPAA compliance, dealing with deprecated medical technologies, and assessment p…
  continue reading
 
This week the guys discuss physical security controls (and lasers) to ensure that your organization is both secure and compliant! Cybersecurity doesn't stop at technology implementation. If you follow NIST 800-171, CMMC, PCI-DSS, or a number of other compliance requirements, you'll need to physically secure your premises to protect systems and data…
  continue reading
 
This week, the guys are joined by Eric Adams, experienced CISO and FedRAMP Strategist discuss what precisely is FedRAMP, why should organizations consider it for their structure, and the steps to make it happen. Follow Eric on LinkedIn Here - https://www.linkedin.com/in/eadams2/ Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber…
  continue reading
 
This week, the guys deviate a little from the usual format and discuss some of the latest trends in Cybersecurity, and rant on what's on their minds, no matter how off-topic it may be! Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, lea…
  continue reading
 
It's a wild market for cybersecurity services, often confusing buyers and selling companies less than ideal solutions. The question is, what cybersecurity services are the best fit for your organization's needs? This week, the guys discuss the pros and cons of the common services to help you understand the best fit. From Managed Security Services P…
  continue reading
 
Loading …

Quick Reference Guide