Episodes
Published 04/01/24
The National Institute of Standards and Technology, or NIST, just issued version 2.0 of its Cybersecurity Framework (CSF), which emphasizes supply chain risk management and puts the C-Suite at the heart of cybersecurity management activities with the new “Govern” function.Today’s guest, Cy Sturdivant, cybersecurity expert, certified information systems auditor and director at FORVIS Consulting, will help us get a handle on the important changes and their impact on businesses.The NIST CSF 2.0...
Published 04/01/24
Let’s imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more difficult to enter. In cybersecurity, there’s a similar strategy called Zero Trust microsegmentation. Today’s guest, Bria Haugli, cybersecurity expert and CEO of SideChannel, explains how Zero Trust microsegmentation can reinforce managed detection and...
Published 01/25/24
When it comes to cybersecurity, most businesses focus on prevention and detection. That sounds reasonable, but today’s guest – a former CIA hacker, presidential cybersecurity commissioner and Air Force Cyber Wingman argues that approach is too little, too late – literally! Businesses are compromised on average 27 months before detection! Instead of waiting for the inevitable breach, he advocates a proactive approach designed to stay one step ahead of your adversary. Tune in for this engaging...
Published 12/19/23
In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone online is vulnerable if they connected to the world wide web, which includes our youth. Our very impressionable kids who love to click. Today, our guest on Cybersecurity Simplified is Amber DeVilbiss, a cyber queen who has a special place in her heart...
Published 11/15/23
Breaking News: MGM and Caesar’s are two U.S. casino giants breached in a cyberattack costing them millions of dollars a day. What can you learn from the social engineered cyberattack? How can you prevent your business from becoming the next victim? In this 15-minute episode, co-hosts David Barton and Susanna Song leave you with practical steps in creating a layered defense strategy. Learn how to stop ransomware attacks with one click: ...
Published 09/21/23
Cybersecurity threats make news headlines daily. It’s hard to keep up – unless it’s your job like it’s ours at High Wire Networks. Our team meets daily to review the top cybersecurity news headlines. Today, we’re giving a sneak peek into our daily news briefing. Stay tuned as we discuss some of the most high-profile cyberthreats happening today, along with how to protect against them.  To get more cybersecurity news from High Wire Networks,...
Published 08/17/23
ChatGPT is the talk of the town, dominating tech conversations around the world. But like any AI-powered tool, it brings with it the good, the bad and the ugly. Is ChatGPT a blessing or a threat? A boon for business or the bane of our existence? A cybersecurity tool or a hacker’s weapon?   The guest on today’s podcast is Aaron Martin, Overwatch Senior Security Architect. Aaron has many years of experience as a software architect and security analyst and is here to share his insights and...
Published 07/06/23
The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing your network to viruses and other threats.  Our guest is Debe Gash, Senior Vice President and Chief Digital Officer for Saint Luke’s Health System in Kansas City, Missouri.  Debe has a long history in health care IT management and consulting and is very familiar with the digital transformation taking place in medical practices along with the risk of...
Published 06/13/23
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-changing law? One way is to focus on the fundamental principles related to privacy and cybersecurity. Here about these principles and more with special guest, Matti Neustadt who has a background as in-house counsel for some leading tech logos. She knows...
Published 04/06/23
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect these entities from lost or stolen data, networks being held hostage, etc. In today’s landscape, attacks are nearly an inevitability and even more so than in decades past. So, knowing how important it is to the functions of our society, what’s next for...
Published 03/15/23
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach.  To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address advanced and evolving cyberthreats.  Today on Cybersecurity Simplified, we’ll discuss why cybersecurity is as much a mindset as a toolset. Stay tuned to hear from our special guest - none other than High Wire Networks’ own CEO, Mark Porter.      Want to learn...
Published 02/27/23
Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about technology partners who sell security solutions? What protections do they have? Those are great questions for our guest, Kirsten Bay, co-founder and CEO of Cysurance. Her company offers Cysurance-as-a-Service, which bundles protections into the managed...
Published 02/22/23
Can the difference between a healthy, growing managed security services business and a stagnant one lie in a simple methodology?  In episode 36, we invite Ryan O'Hara, CEO of a Detroit-based MSP, to join the conversation. He shares how this one cybersecurity strategy has helped grow his business and empower his clients.    This episode is for you, if: You've built your tech stack but there are too many solutions that don’t talk to each otherYour clients are looking for managed security but...
Published 12/22/22
Veteran Security Practitioner Rick Howard shares how Alan Turing’s ideas and Thomas Bayes' Theorem hold the key to how organizations should forecast risk. Most organizations default to heat maps relying on a low, medium, and high model. But they aren’t reliable. What if we said you’re better off providing risk metrics, that offer ballpark answers and not so much precision? Is it possible to forecast complex things without a lot of data? 
Published 11/29/22
We’re all well aware that a cyberattack can take a heavy toll on an organization’s financial and reputational status, but what about the emotional toll on the employees who’ve had to work through it? Our guests today are here to talk about just that. Ed Vasko, CISSP is the director at Boise State University’s Institute for Pervasive Cybersecurity. He’s here with fellow Bronco, Carol Barkes, who is an expert on neuroscience-based conflict resolution and communication. Stay tuned for a...
Published 10/24/22
“Unauthorized access” sounds like a line from the classic 1980s movie, Wargames. And you might be surprised to learn that the Computer Fraud & Abuse Act, or CFAA, was partly passed in response to that movie’s plot, as a way to thwart hackers. But what does “unauthorized access” look like today? And, spoiler alert, it’s not just for hackers anymore! So, instead of “playing games,” let’s talk to today’s guest on Cybersecurity Simplified! Lorrie Mah, Product Counsel at Google, is an expert...
Published 10/10/22
It isn’t lost to us here at Cybersecurity Simplified that many of you listen and watch because you have a keen interest in cybersecurity work… you want to make that career leap from wherever you are at or pivot for those of you already in IT or in a technical role. We applaud you because you are taking steps and not just waiting for it to happen. This episode is for you! Our two guests today are security practitioners who took different paths to where they are at today. We have Aaron Martin,...
Published 09/26/22
Our next guest has spent his career designing and building strong defenses, literally and technically. First, serving for more than 28 years in active-duty military and now as a cybersecurity MSP helping DoD contractors comply with the government’s stringent Cybersecurity Maturity Model Certification. In this episode of Cybersecurity Simplified, we’ll visit the front lines of the U.S. cybersecurity defense with John Hill, President and CEO of TechSage Solutions. Stay tuned.
Published 08/10/22
What do cybersecurity and ranching have in common? A bit of wrangling, a lot of bull and CISO Allan Alford, host of the Cyber Ranch podcast. Allan’s 20-year cybersecurity journey includes serving as CISO four different times in three industries and working with companies from 5 to 50,000 employees. He’s currently focused on getting ACTUAL value from your tech stack and adding a human perspective to cybersecurity. So, saddle up and settle in. In this episode of Cybersecurity Simplified, we’ll...
Published 07/28/22
If it isn't enough that hospitals have been overrun with Covid patients during the pandemic, they also have been targeted by cyber criminals. Many have even been forced to cancel vital medical services because their systems, software or networks are disabled. It's more important than ever for healthcare organizations to keep their networks healthy. In this episode of Cybersecurity Simplified, we will get a prescription for good cyber hygiene from our special guest, Sunila Thelma Levi, a...
Published 07/15/22
Cybercriminals are escalating their attacks. What can you do? Take managed security to a higher level with SOAR - Security Orchestration, Automation and Response. In this episode of Cybersecurity Simplified, learn how SOAR can reach into IT environments and stop cyberthreats in progress, reduce mean time to repair and minimize the impact of cyberattacks.
Published 06/29/22
In the cybersecurity war, there are no rules. The enemy has upped their game with more frequent and destructive attacks. What can you do? Take your cybersecurity defense to the next level. Stay ahead of evolving threats with vulnerability management. In this episode of Cybersecurity Simplified, we’ll talk about how to go from reactive to adaptive strategies with our guest, vulnerability management expert Cristian Sandescu, Founder and CEO of CODA Intelligence. Stay tuned.
Published 06/03/22
Cyberthreats are not only increasing but evolving. Keeping up is more than a full-time job. That’s why many business owners and IT leaders turn to cybersecurity experts. Should they be looking for MSPs or MSSPs? What’s the difference? Today’s guest has some deep thoughts about this and other pressing cybersecurity questions. In this episode of Cybersecurity Simplified, we'll chat with Mr.MSP himself, Charles Weaver, CEO of the MSP Alliance. Stay tuned.
Published 04/19/22
Living on the edge means taking on risk, and that’s exactly what today’s special guest has done when it comes to network security. Instead of accepting the risks, he’s faced them head on to make living (and working) on the network edge safer for all of us. Stay tuned. In this special edition of Cybersecurity Simplified, we’ll meet John Peterson, the inventor of the ZTEdge zero trust security platform.
Published 03/01/22