
All Episodes
Episodes
Neglected NIST Concepts
The Neglected Pages of NIST
When you download a NIST document, whether NIST 800-53, NIST 800-39, NIST 800-37, or the NIST Cybersecurity Framework, what page do you start reading first?
==========How can a vCISO help...
View Episode
Financial Institutions - Theft of Funds
How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and...
View Episode
Financial Institutions - Theft of Information
Theft of Information is present in every organization and varies widely concerning value. The value of information is directly related to its criticality to the business. However, information can be further...
View Episode
Operational and Strategic Perspective
Do you have an operational or strategic view when protecting your organization's systems?
==========How can a vCISO help your organization?
The CISO role is all about the strategy, leadership, management, and...
View Episode
Acronyms, Jargons, and Idioms
Acronyms, Jargons & Idioms Impacting Communication Between Board, C-Suite, and Specialists. Communication is a two-way street, and company executives must be prepared to ask their own questions exploring the data...
View Episode
Mission-Centric Risk Metrics
Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I'll discuss a framework you can use.
1. Identify the system's environment (production,...
View Episode
Expanding Cyber Risk Beyond IT
Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banking divisions may also be in charge of...
View Episode
Three Cybersecurity Checkups
Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organization, I suggest the following three...
View Episode
Cybersecurity - A Core Business Risk
Do you believe these are business challenges?UpskillingLow morale or quiet quittingHiring and talent retentionKeeping up with technology and toolsIf so, why aren’t you considering cybersecurity as a core business...
View Episode
A Worthy Mention - Antivirus Software
Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage;...
View Episode
Greater than Cybersecurity
Greater than CybersecurityWhen we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories with emotions and ideas attached, one...
View Episode
Protective Techology
Protective TechnologyThe last item I want to mention under the Protect function that supports the attack surface reduction and limits the cyber events' impact on your systems is “protective technologies.” Remember,...
View Episode