Welcome to the Cybersecurity Readiness Podcast Site

Episodes

Nov. 20, 2024

From reactive to proactive: How behavioral psychology is transforming…

IBM recently reported a 71% year-over-year increase in attacks using valid credentials. This continued use of stolen credentials is also evident through ongoing public incidents like the string of attacks targeting Snowflake's customers that resulted in breaches at AT&T and …

Episode page
Nov. 1, 2024

Compliance in the Cloud: Challenges and Best Practices

Accelerating into the cloud without caution often brings complexities that can cause more harm than good. Gartner has noted that cloud configuration errors cause 95% of cybersecurity breaches. With the rapid pace of cloud adoption, less time is spent ensuring …

Episode page
Oct. 20, 2024

Reducing the Risk of Social Engineering to Exploit IT Help Desk

In this episode, Mike Manrod, the Chief Information Security Officer (CISO) of Grand Canyon Education, and Ori Eisen, the Founder and CEO of Trusona, joined me to discuss how best to reduce the risks of social engineering attacks on IT …

Episode page
Oct. 6, 2024

Unlocking Cyber Potential: The Power of Collaboration in K-12 Cyber E…

In this episode, Laurie Salvail, Ph.D., Executive Director of CYBER.ORG, joins me to discuss the importance of cybersecurity education for K-12 students. Primarily funded by the Cybersecurity and Infrastructure Security Agency (CISA), CYBER.ORG is a powerful and free resource available …

Episode page
Sept. 23, 2024

Large Language Model (LLM) Risks and Mitigation Strategies

As machine learning algorithms continue to evolve, Large Language Models (LLMs) like GPT-4 are gaining popularity. While these models hold great promise in revolutionizing various functions and industries—ranging from content generation and customer service to research and development—they also come …

Episode page
Sept. 2, 2024

Identity Continuity in Multi-Cloud Environments

The importance of maintaining uninterrupted services cannot be overemphasized, especially in light of the recent global IT outage fiasco. With the increasing dependence on cloud-based services, uninterrupted connectivity is essential to maintaining business continuity. Since identity providers control access to …

Episode page
Aug. 20, 2024

Securing SMBs Serving Defense Industrial Base and U.S. Critical Infra…

In this episode, Chris Petersen, Co-Founder and CEO of RADICL, and I discuss the challenges of securing the small and medium-sized businesses (SMBs) that serve the United States defense industrial base (DIB) and critical infrastructure. These SMBs play a significant …

Episode page
July 31, 2024

2024 Cyber Trends and Predictions: Global IT Outage and More

In this episode, John Funge, Managing Director at DataTribe, and I discuss the Global IT Outage caused by a flawed update to CrowdStrike's cloud-based security software. We also review DataTribe's recently published report on cybersecurity trends and predictions for 2024. …

Episode page
June 25, 2024

Fortifying Healthcare Data: Proactive Defense Strategies

The recent breach of the Change Healthcare platform serves as a strong reminder that the healthcare sector remains extremely vulnerable to different types of attacks. In late February, a ransomware gang known as Black Cat claimed responsibility for hacking Change …

Episode page
June 5, 2024

Quantum Computing and Cybersecurity – Examining Trends and Implicatio…

The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts of data and solve complex problems at an unprecedented speed, quantum computing holds great promise for new material …

Episode page
May 22, 2024

Creating a Security-Minded Culture

In this podcast, I enjoyed talking with Chirag Shah, Model N's Global Information Security Officer and Data Privacy Officer, about creating a security-minded culture. Infusing a security culture within organizations starts with leadership buy-in and support. Chirag highlighted the need …

Episode page
May 5, 2024

Securing the Future: Inside Student-Led Cybersecurity Clinics

Student-led cybersecurity clinics are increasingly playing an essential role in strengthening the digital defenses of nonprofits, hospitals, municipalities, small businesses, and other under-resourced organizations in our communities while also developing a talent pipeline for cyber-civil defense. Sarah Powazek, Program Director …

Episode page
April 24, 2024

Developing Resilient and Secure Mission Critical Facilities (Data Cen…

Developing and maintaining resilient and secure data centers is a huge part of cybersecurity readiness. Spiros Liolis, Chief Technologist and Managing Consultant, EYP Mission Critical Facilities, Part of Ramboll, joins me to discuss the challenges and best practices of creating …

Episode page
April 10, 2024

Securing Application Programming Interfaces (APIs)

Application Programming Interfaces (APIs) play a vital role in modern software development, enabling the integration of services and facilitating the exchange of information. The ubiquity of APIs is a testament to their success in supporting many functions. However, their prominence …

Episode page
March 27, 2024

The Last Line of Defense Against a Ransomware Attack

Attackers have started increasingly targeting victims' backups to prevent organizations from restoring their data. Veeam's "2023 Ransomware Trends Report" found more than 93% of ransomware attacks specifically targeted backup data. My discussion with Gabe Gambill, VP of Product and Technical …

Episode page
March 13, 2024

Overcoming the Stale Nature of Tabletop Exercises

While tabletop exercises (TTX) are considered a proven tool for finding gaps in an organization’s security posture, they can be painstakingly challenging to plan and implement effectively. In a time where information security teams are understaffed and overworked, are TTX …

Episode page
Feb. 28, 2024

Securing Artificial Intelligence (AI) Applications

As artificial intelligence (AI) technologies continue to evolve and be leveraged, organizations need to make a concerted effort to safeguard their AI models and related data from different types of cyber-attacks and threats. Chris Sestito (Tito), Co-Founder and CEO of …

Episode page
Feb. 14, 2024

Building a Resilient Disaster Recovery Infrastructure

The latest disaster recovery statistics reveal that modern businesses still face costly interruptions due to a variety of threats, ranging from ransomware attacks to sudden hardware failures. The monetary costs of disasters and outages can be significant. According to results …

Episode page
Nov. 22, 2023

Unraveling the Positive and Negative Impacts of Generative AI

In a very thought provoking discussion, Artificial Intelligence (AI) expert, Tony Hoang, Ph.D., traced the evolution of Gen AI, highlighted the many benefits, and also shared his concerns about the irresponsible and abusive use of this technology. What got my …

Episode page
Nov. 1, 2023

Best Practices for Overcoming Troublesome Vulnerability Management Tr…

A 2023 State of Vulnerability Management Report finds that only half of the surveyed organizations (51%) have, at best, a moderate level of visibility into vulnerabilities. Several other vulnerability management metrics, such as maturity levels, frequency of vulnerability scans, and …

Episode page
Oct. 18, 2023

Streamlining and Improving Security by Standardizing Identity Managem…

While cloud computing has become a great digitization enabler to enterprises, multiple clouds—especially when intersecting with on-premises systems and one another—can produce some challenges. Many organizations can end up with an "identity gridlock" of competing identity systems and protocols since …

Episode page
Oct. 3, 2023

How Informed is the Board of Directors on Cybersecurity Risks?

With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the Diligent Institute survey 'What Directors Think,' board members ranked cybersecurity as the most challenging issue to oversee. Even …

Episode page
Sept. 6, 2023

Enhancing Incident Response Effectiveness

According to a 2023 IBM report, companies take 197 days to identify a breach and 69 days to contain one on average. The delay between infection, detection, and containment can cost businesses millions of dollars. Only 45% of the companies …

Episode page
July 12, 2023

Cybersecurity in the Age of AI

While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber-attacks. There is growing recognition of AI’s potential to fight cybercrime. Ian L. Paterson, CEO, Plurilock, …

Episode page