Silent Sector LLC public
[search 0]
More

Download the App!

show episodes
 
Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Pr ...
 
Loading …
show series
 
We all know that data breaches are nightmares and the legal ramifications can be far worse than the breach itself. So what can we do to protect ourselves? This week, Zach and Mike welcome attorney John Gray, Chair of Data Privacy and Cybersecurity of Lewis Roca, who specializes in Data Privacy law. He shares how companies can prepare in advance to …
 
Web applications are drastically different and like anything, are prone to vulnerabilities. Application penetration tests come in all shapes and sizes, some good, some bad, and some are not even penetration tests at all. This week, the guys share their insights about Web Application Penetration Testing and get what you need out of your next test! D…
 
As we get deeper into the SOC 2 Preparation series, the guys discuss the controls around monitoring activities, tracking deficiencies, and assessing results (CC 4). If a SOC 2 audit is in your future, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next …
 
This week, the guys continue their series on how to prepare for your SOC 2 audit by discussing controls in Section 3 of the Security Trust Services Criteria. If your organization is about to undergo a SOC 2 audit or looking into it, be sure to catch all the SOC 2 audit readiness episodes! Pick up your copy of Cyber Rants on Amazon. Looking to take …
 
Planning to go through your very first SOC 2 audit? If so, this series will be a binge worthy and enlightening adventure! This week, the guys walk you through the first few SOC 2 audit requirements with a step-by-step approach. They share what your auditor will be looking for, tips to prepare, and the pitfalls that might catch you off guard. Pick u…
 
The development of a cybersecurity committee will accelerate your company's alignment to a cybersecurity framework and compliance requirements. This week, the guys discuss why you may need a committee for your cybersecurity framework adoption, instead of leaving one person to lead the job. They also cover operational tempo with a 12-month calendar …
 
This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely. For more on Ken and Silverdraft, please see the links below. https://www.linkedin.com/in/wileyken/ https://silverdra…
 
This week, the guys talk about navigating the cybersecurity environment in 2023. From advancements and changes to cybersecurity practices, to economic conditions shifting budget priorities, to advancing your own career, this conversation is the primer for a great year! Start off strong and don't miss this episode! Pick up your copy of Cyber Rants o…
 
This week, the guys welcome cybersecurity expert and entrepreneur, Ed Vasko. Ed shares his insights from decades of experience and reveals a much-needed cybersecurity education model that he has built at Boise State University. With the cybersecurity industry experiencing a severe talent shortage, Ed is answering the challenge by improving the educ…
 
Sorry to say it, but nobody else can secure your organization from the outside. The reality is, every company has a significant amount of work that must be done internally (by real humans) to build an effective cybersecurity and compliance program. Be wise when looking at tools and services implying that they'll take care of your cybersecurity for …
 
When the calendar begins to turn, the infamous Cyber Rants crystal ball comes into view once more. This week, the guys discuss their predictions and cybersecurity trends in 2023. They share tips to stay ahead of the game while protecting your organization in the new year to come. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cybe…
 
This week the guys (and "Skippy the Intern") are joined by special guest, Caren Shiozaki, to discuss cybersecurity considerations among executive teams and boards of directors. Caren shares her experience as a technology executive, insights at the leadership level, and emerging trends that are changing the thought process around cybersecurity and c…
 
Cyber insurance is critical for risk management and the requirements are changing rapidly. With rate increases averaging 25-45% per year and many companies being declined for coverage altogether, this week the guys get the inside scoop with cyber insurance expert, Adam Guyton. Adam shares some important cyber insurance insights including how to get…
 
This week, the guys welcome Founder and President of the Idaho Technology Council, Jay Larsen. They discuss his journey to building Idaho's premier tech organization, how technology councils help businesses thrive, the traits of a strong entrepreneurial ecosystem, and the benefits technology companies bring to their communities. Visit www.idahotech…
 
Unfortunately, there are some IT professionals who feel threatened when a 3rd party cybersecurity team is engaged. While it's the exception rather than the norm, there are both in-house and 3rd party IT professionals who become uncooperative, feeling as if security people are trying to poke holes in their work. While many IT professionals are very …
 
Thinking about a career in cybersecurity? This week, the guys share their thoughts about getting into the cybersecurity field. They share the pros and cons of the job, training and experience that helps along the way, how to find your first position or two, plus some reasons why cybersecurity is NOT a good career for some people. Chances are, you'r…
 
As technology's most widespread and trusted vendors are compromised, who can you really trust in today's environment? This week, the guys discuss attacks originating from compromised tech products, how the bad guys gain insider access, multi-factor authentication fatigue, and even a few hints at their love for Rick Astley. Get the show notes and ar…
 
Cloud services can offer tremendous benefits and cloud computing environments have become a standard across all industries. However, marketing hype leads consumers to believe that "the cloud is secure" by default and that someone else is taking responsibility for their protection. Too many people are quick to adopt cloud services without truly unde…
 
Ransomware can infect your on-premise or cloud environments at any given time but we've noticed that ransomware attacks seem to spike during certain times of the year. This week, the guys talk about how ransomware can be deployed on your devices, how to prevent ransomware attacks, and even some horror stories from how ransomware has impacted major …
 
It's cyber risk assessment season! This is the time of year when many organizations seem to perform their annual cyber risk assessment. Unfortunately, the standard methods often result in limited visibility. This week, the guys discuss a more holistic risk assessment approach to make your cybersecurity program stronger than ever. Get the show notes…
 
This week, the guys discuss some cybersecurity trends, tips, and words to the wise that are timely and relevant in today's technology-centric world! They discuss: Are attacks ramping up and if so, why? The pros and cons of spending your cybersecurity budget on Black Hat and DefCon Why you need specific objectives in your penetration testing, not ju…
 
Does your company recruit IT and cybersecurity staff with the same methods used to fill other positions? If so, don't miss this episode. This week, the guys welcome Cammas Freeman, an expert on finding and retaining the best technology professionals. Cammas shares a unique approach for recruiting the best talent, using a methodology that saves a tr…
 
Cyber criminals are heavily focused on compromising backups so their attacks are as crushing and painful as possible for the victims. Good backups and the ability to quickly restore are a critical part of every infosec program but many organizations still treat backups as an afterthought. This week, the guys welcome the recognized authority on data…
 
This week, the guys discuss one of their favorite topics, Payment Card Industry Data Security Standards (PCI DSS)! Companies that transmit, process, or store credit card data need to be compliant but PCI has its own nuances. What level of PCI compliance do you need? How do you determine what is in scope? How do you work with auditors? The guys answ…
 
Inflation and other economic factors are affecting companies large and small. Some organizations are cutting budgets but still have security and compliance requirements to maintain. This week, the guys discuss what organizations can do if they need to reduce spending, how to get the most bang for your buck, plus mistakes you don't want to make duri…
 
Building and managing a cybersecurity program can be confusing for organizations with multiple product lines, subsidiaries, or industry divisions. How do you manage security across all business units? What can you do to set standards that are followed by the entire organization? How do you control the quality of the cyber risk management practices …
 
This week, the guys reconvene after a mini-hiatus and talk about some topics and tips in the news today such as Goodwill Ransomware Hacking Safe Browsing - the hidden dangers people need to know A word to the wise about Wordpress (even though they supposedly "don't talk about wordpress") Pick up your copy of Cyber Rants on Amazon. Looking to take y…
 
Is there really such a thing as "offense" in cybersecurity? This week, the guys discuss how it's possible to proactively protect organizations against criminals and how to identify potential attacks so you can stop them before it's too late. They share the realities of offensive cybersecurity and "hacking back." Pick up your copy of Cyber Rants on …
 
Think that cybersecurity is all about protecting data and achieving compliance? Think again! This week the guys share real-world examples about companies using cybersecurity to grow revenue, create a competitive advantage, and become market leaders! Learn how to use your cybersecurity program to create an outstanding return on investment! Pick up y…
 
This week, the guys continue to walk through the NIST Cybersecurity Framework, by discussing the Detect, Respond, and Recover control categories. They rant about logging, SIEMs, and incident response when you're facing a worst case scenario. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us …
 
A cybersecurity framework is the foundation of any good cyber risk management program but many people are not familiar with what a framework really is and what they include. This week the guys reveal the importance of following an industry-recognized cybersecurity framework and begin walking through the National Institute of Standards & Technology …
 
This week, the guys discuss cybersecurity for healthcare companies. From medical facilities and laboratories, to MedTech, benefits companies, and healthcare services firms, the medical world faces its own set of challenges. The guys share thoughts and strategies around HIPAA compliance, dealing with deprecated medical technologies, and assessment p…
 
This week the guys discuss physical security controls (and lasers) to ensure that your organization is both secure and compliant! Cybersecurity doesn't stop at technology implementation. If you follow NIST 800-171, CMMC, PCI-DSS, or a number of other compliance requirements, you'll need to physically secure your premises to protect systems and data…
 
This week, the guys are joined by Eric Adams, experienced CISO and FedRAMP Strategist discuss what precisely is FedRAMP, why should organizations consider it for their structure, and the steps to make it happen. Follow Eric on LinkedIn Here - https://www.linkedin.com/in/eadams2/ Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber…
 
This week, the guys deviate a little from the usual format and discuss some of the latest trends in Cybersecurity, and rant on what's on their minds, no matter how off-topic it may be! Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com. Be sure to rate the podcast, lea…
 
It's a wild market for cybersecurity services, often confusing buyers and selling companies less than ideal solutions. The question is, what cybersecurity services are the best fit for your organization's needs? This week, the guys discuss the pros and cons of the common services to help you understand the best fit. From Managed Security Services P…
 
It is important to know what you're getting into when you invest in a cybersecurity services firm to help with security and compliance! There are critical considerations and points you must know in order to get the most from your cybersecurity services company. This week, the guys discuss how to properly engage your cybersecurity firm to make sure …
 
What do you think of when you hear "Red Team vs. Blue Team"? Board or video games, military exercises, or cybersecurity terms? This week the guys discuss Red Teaming as it relates to cybersecurity and penetration tests, when Red Team Testing is an appropriate method and when other colors are better, plus the critical considerations you need to thin…
 
In today's Cybersecurity Gold Rush, we see so many new technology products claiming to solve the world's problems and companies promoting the newest trend of the week. However, are the new tools and products really measuring up? What can technologies really do for you and when do you need the human element? This week, the guys discuss where tools p…
 
The transition to a remote workforce has left many companies wondering how they'll achieve compliance with various requirements like CMMC, ISO 27001, and SOC 2. Meanwhile, remote workers have made it easier than ever for cyber criminals to attack. This week, the guys discuss securing a remote workforce and meeting compliance requirements, sharing p…
 
This week the guys discuss some of the bigger cybersecurity struggles for mid-market and emerging companies. Developing an effective incident response plan is a major challenge and when done incorrectly, can cause a lot of damage. The guys also share struggles SaaS companies face when they're inundated with cybersecurity questionnaires that are hol…
 
This week the guys reunite for the first episode of 2022 by taking a look into the future. With their crystal ball of predictions, the guys look into the future of cybersecurity, ranting about potential trends, exploits, and tips for you to stay ahead in the new year! Plus, they share some housekeeping tips and how to "tidy up" your cyber risk mana…
 
Cyber insurance is a critical part of any risk management program and something that every company must have. Finding the right policy with the proper coverage can be tricky and the major insurance companies are not always the best fit. This week the guys talk with cyber insurance expert, Tony Robbins, about the fundamentals you must know to proper…
 
Cyber criminals can learn more about you than you ever realized. Open Source Intelligence (OSINT) often exposes information that you didn't realize was available to the public. Cyber criminals use OSINT to find weak spots in cybersecurity and exploit employees through social engineering. This week, the guys unwrap the fact that while Open Source In…
 
If your organization is growing and is getting ready to build its own InfoSec team, this week's episode is for you. The guys discuss the "Who's Who" of cybersecurity, explaining the key players that growing organizations need when maturing their cybersecurity programs. From Chief Information Security Officers to Architects, Engineers, and Project M…
 
Is being compliant the same as being secure? If you're meeting all the requirements, are you adequately protected? This week, the guys discuss the differences, nuances and overlaps between cybersecurity and compliance, plus how you can simplify alignment to multiple compliance requirements. Pick up your copy of Cyber Rants on Amazon. Looking to tak…
 
Are your executives and board members struggling to understand cyber risk? This week, the guys are joined by David Moon of Arx Nimbus, a company that turns cyber risk into the language that all business leaders understand. David shares how they translate cybersecurity into financial metrics that allow organizations to make better risk management de…
 
This week the guys discuss the good steps forward that are making the cybersecurity industry strong, from awareness to technologies, education to growing the workforce. They share the silver linings in the turmoil, plus some areas for improvement in the industry. Pick up your copy of Cyber Rants on Amazon. Looking to take your Cyber Security to the…
 
This week, the guys welcome a new member to the team, longtime technology professional, David Baker! They discuss his experience in helping small businesses with IT and security, plus the challenges SMBs are facing with new cybersecurity and compliance requirements. This episode is perfect for any businesses struggling with stepping into today's IT…
 
This week, the guys discuss wireless penetration testing and explain many of the common findings that are revealed through the testing process. They provide an indepth look at how wireless penetration testing works and why certain organizations should make it a part of their annual cyber risk assessment process. If you're wondering about the risks …
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service