Episodes
We’ve come to the end of another Season of The Tea on Cybersecurity and you know what that means. Join host Jara Rowe in her ultimate receipts from season 3. She highlights the most important things she has learned from her guests this season including why MFA is key to keeping yourself safe online, how to manage vulnerabilities, what steps you need in preparing for cybersecurity incidents, and how to cultivate trust and transparency within your organizations. Listen in as Jara revisits her...
Published 07/02/24
Published 07/02/24
"Multi-factor authentication? You better get it today. Don't wait till tomorrow." – Jim Goldman We talk a lot about SaaS companies in this show, but today, we’re bringing you something a little different. Jim Goldman, CEO of Trava and one of our favorite cybersecurity experts, joins host Jara Rowe to discuss the complexities of cybersecurity across healthcare and banking, including their unique challenges and regulatory requirements. Jim discussed how healthcare organizations navigate a web...
Published 06/18/24
"Every business today runs on technology. Every business is a technology business. Right? Even a taco cart uses a little payment thing that you swipe your card in to do that." - Michael Magyar Michael Magyar, a seasoned cybersecurity expert with a decade of experience, joins host Jara Rowe on this episode of The Tea on Cybersecurity to give us the tea on third-party risks. As a penetration tester and a virtual Chief Information Security Officer (vCISO) with Trava, Michael brings unparalleled...
Published 06/04/24
“Trust is foundational to both the relationship, interpersonal relationship, B2B relationship. Then also we're having to convey that trust to our customers," - John Boomershine John Boomershine– also known as Boomer– sits down with host, Jara Rowe in this episode of The Tea on Cybersecuity to talk about trust and transparency in cybersecurity. As the Vice President of Security and Compliance at BlackInk IT, Boomer brings nearly 40 years of experience in the IT realm, and a wealth of...
Published 05/21/24
“Education is by far the most cost-effective tool that you can deploy in your organization before any other types of information, security controls, or complex tools or any additional services. Using the hygiene analogy, you can buy the most expensive toothbrush, and you can buy the fanciest toothpaste. But if you don't teach your child that they need to brush their teeth every night, they're still going to get cavities.” - Mario Vlieg Host Jara Rowe and guests Craig Saldanha and Mario Vlieg...
Published 05/07/24
“Especially if this is the first time an organization is creating a plan like this, the focus should really be working on it piece by piece to not be overwhelmed. So, start outsmall. What are the designated roles and responsibilities that you have? Then, determine how the plan can best fit your needs. This can be done by assessing what types of incidents are most detrimental to your organization.” - Christina Annechino Host Jara Rowe and guest Christina Annechino delve into incident response...
Published 04/23/24
“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph This episode's conversation covers the basics of asset inventories and...
Published 04/09/24
“Not only do we need to understand what risks might exist, but we need to understand what impact that might have. That goes into both the chance that they're going to happen and the chance that they're going to be successful in creating damage, and then also the likely damage that's going to happen from them.” - Michael Magyar On this week’s episode, host Jara Rowe gets the tea on risk management with Trava’s vCISO consultant, Michael Magyar. Hear what risk management is, how it differs from...
Published 03/26/24
“So the concept of vulnerability management in many ways is universal. And so if we think about it in a physical sense, try to keep our homes or our businesses secure from a physical sense. It's one of the vulnerabilities. Leaving your doors unlocked, leaving your windows unlocked, leaving a candle lit, and then leaving the house and going somewhere. Those are vulnerabilities.” - Jim Goldman Join our host, Jara Rowe, as she sits down with Trava CEO and Co-founder Jim Goldman to uncover the...
Published 03/12/24
“Find a compliance platform, it'll make life a lot easier. Then I would develop the policies and procedures, if you don't already have those, and then collect evidence to justify, to prove everything you're doing that's in the framework. It's going to be important for audits and just internal or external audits.” - Scott Schlimmer In this episode, host Jara Rowe is once again joined by cyber risk specialist Scott Schlimmer with a deep dive into the world of compliance frameworks and...
Published 02/27/24
“It's hard to have privacy without security and to have effective security that requires strong protection of personal identifiable information, or PII. So security, privacy, and compliance really must go hand in hand. If one is prioritized over the other, it can have an adverse effect.” - Christina Annechino On this episode, we welcome back both Christina Annechino and Marie Joseph to bring us back to a little more 101 on Cybersecurity. With host Jara Rowe, the team breaks down terms and...
Published 02/13/24
“There's a converging of several forces or several trends going on right now that I think are going to potentially cause significant changes in 2024.” @Jim Goldman, CEO of Trava Security, knows a thing or two about cybersecurity. In this episode, Jim and host @Jara Rowe dive into the latest scoop on what's happening in the world of cybersecurity and compliance and what you need to know to keep your business safe and secure in 2024.  They discuss how ransomware is alive and well, and federal...
Published 01/30/24
You asked for it, so we’re back for another season of your favorite cybersecurity podcast, The Tea on Cybersecurity. In the last two seasons, host Jara Rowe covered everything from the basics – what is phishing? – to implementation – do I need cyber insurance? This season, we dive deep into compliance but, true to our word, simplify things and cover more basics – a must-listen boost your cybersecurity knowledge! Connect with the Host: Jara Rowe’s LinkedIn Connect with Trava: Website -...
Published 01/16/24
"Having a really thorough cybersecurity plan is essential. It's honestly what everything comes down to." We’ve reached the end of season 2 of the Tea on Cybersecurity, where we wrap up the season with the most important receipts learned from previous guests. In this episode, we touch on the importance of conducting cyber risk assessments to understand the current risks in your business, the difference between audits and assessments, the significance of having a strong cybersecurity plan as...
Published 11/07/23
"Cybersecurity awareness training is not about creating cybersecurity experts. It's about making staff and stakeholders aware of the threats and how to respond to them." In this episode of The Tea on Cybersecurity, VP of Customer Success at Carbide, @Kathy Issac, joins host @Jara Rowe to discuss the ins and outs of cybersecurity awareness training and why every company must partake in it. As the world leans increasingly into technology, cybersecurity awareness training is crucial for...
Published 10/24/23
"The shift to remote work has transformed the cybersecurity landscape, forcing companies to rethink their approach to protecting their attack surface." In this episode of The Tea on Cybersecurity, @Jara Rowe sits down with Trava Senior Security Engineer @Anh Pham to discuss the blend of remote work and cybersecurity.  The shift to remote work has significantly transformed the cybersecurity landscape, forcing companies and cybersecurity professionals to rethink their approach to protecting...
Published 10/10/23
"Proactive protection is not just about fixing vulnerabilities, it's about implementing a comprehensive security strategy and understanding your system boundaries and actively defending against cyber threats before they can breach your defenses." In the latest episode of The Tea on Cybersecurity, @Jara Rowe talks with @Jim Goldman and @Ryan Dunn to uncover the importance of being proactive in cybersecurity management to avoid the pitfalls of a cyber attack. To be proactive, companies need...
Published 09/26/23
"Whenever you have a piece of software that has an obligation to perform a duty, like a SaaS company, the intersection of cyber insurance and professional liability is crucial. It's important to transfer the risk with a comprehensive cyber insurance policy to protect against both code failures and potential cyber breaches." In the latest episode of The Tea on Cybersecurity, @Jara Rowe chats with @Ryan Dunn, Director of Insurance at Trava, to discuss the importance of cyber insurance as it...
Published 09/12/23
"It's easier to protect your company's assets when you know exactly what your security posture looks like and where your problems are." In the latest episode of The Tea on Cybersecurity, @Jara Rowe chats with @Christina Annechino, Cybersecurity Analyst at Trava, to delve into the world of penetration testing or “pen Testing” and its significance in the realm of cybersecurity. Pen Testing involves carrying out controlled attacks that mimic real-world scenarios, allowing businesses to identify...
Published 08/29/23
"The more data you have, the more painful it's going to be if you mess up your cybersecurity and all that leaks out." On the most recent episode of The Tea on Cybersecurity, host Jara Rowe is joined by Chris Vannoy from The Juice, a renowned MarTech firm, to dive into a discussion about data protection.  Chris underscores the significance of SOC2 processes in ensuring data precision and controlling access, while also tackling the tough task of juggling ethical and legal restrictions with the...
Published 08/15/23
"Security is all about the protection of your data. While privacy is determining how your data is being used." On this episode of The Tea on Cybersecurity, join host Jara Rowe as she delves into the world of privacy and security certificates with expert guest @Marie Joseph, Senior Security Solutions Engineer at Trava. Protecting sensitive data has become more important than ever. But with the vast array of privacy and security certifications available, it can be challenging to know where to...
Published 08/01/23
"The thing about security also is the threats are always changing. So you can't just keep doing what you've been doing and think you're going to be fine. You have to adapt to the changing threat landscape." In the world of Cybersecurity, things are everchanging. This week Cybersecurity expert and CEO & Co-Founder of Trava Security Jim Goldman and Ben Phillips CPA and Director at KSM, discuss the differences between an audit and an assessment when it comes to information security internal...
Published 07/18/23
“When a customer compares between vendors, the one with an ISO certification is going to have an edge.” We’ve covered the concept of compliance frameworks in previous episodes, but now we’re taking a deep dive into what it takes to obtain a specific certification: ISO 27001. If you’ve ever wondered about the benefits of ISO compliance and the potential challenges you may face during the certification process, you’re in the right place. In this conversation, Marie Joseph, Senior Security...
Published 07/04/23
“Compliance isn’t something that happens overnight.” If the phrase ‘compliance frameworks’ makes you want to run for the hills, hang in there – we've got you covered.  In this conversation, Marie Joseph, Senior Security Solutions Engineer at Trava, unpacks the different compliance frameworks and explains which certifications you need to meet your business goals.  While compliance frameworks aren’t as scary as they may sound, they do take significant time and effort to put into practice. Marie...
Published 06/20/23