The Cyber Rants Podcast

Bringing you cybersecurity insider tips, guidance, news, and rants!

apple-logo-white      podcast-icons-google-podcasts     spotify-podcasts     podcast-iheartradio

Episode #30 - Beware of these Top 10 Cybersecurity Myths

Zach and Lauro discuss 10 common cybersecurity myths that are causing business leaders to make poor decisions and making companies an easy target for cyber criminals. They clear up these myths and share how you can be better informed if you hear something that doesn't sound quite right. Learn about the most common cybersecurity questions on this week’s episode.

Open Episode

Episode #29 - Social Engineering: Minimize the Exposure of Human Error

This week, the guys discuss Social Engineering - the most common way cyber criminals get access to their targets. They discuss the controls smart companies are implementing to prevent their staff from falling for cyber-criminal scams and how to minimize exposure resulting from human error.

Open Episode

Episode #28: Moving CISOs from Good to Great - with Ed Escobedo

This week, the guys welcome back Ed Escobedo, former Head of Technology Risk Management for PayPal, CIO of Apollo Education Group, VP for DHL, and Charles Schwab, and currently Silent Sector's Chief Strategy Officer. They share how to bust through the growth roadblocks that Cyber security CISOs hit when improving their Organizational Adoption Methodology. They also share the unique Organizational Adoption Framework and Methodology (TM) that Silent Sector uses to bring established cybersecurity programs to the next level.

Open Episode

Episode #27: The Joy of SOC 2 Audits

This week, the guys dive into the rapidly growing topic of SOC 2 Security Audits. The SOC 2 Audit is widely becoming a requirement for B2B technology companies serving large enterprise clients. As both SOC 2 auditors and the guys who help companies prepare for audits, they cover common misconceptions such as the SOC 2 being all about IT security. They talk about the important factors to consider when undergoing the SOC 2 Audit Process for the first time such as scope, timeline, and even auditor selection.

Open Episode

Episode 26: Defense Contractors and CMMC Requirements

This week, the guys dive into all the "fun" requirements that U.S. Government defense contractors are facing when working with Controlled Unclassified Information (CUI), including the NIST 800-171 Self-Assessment and getting CMMC certificated. Learn about defense contractors CMMC, CMMC requirements, and CMMC Regulations. They share their insights and experience about how organizations align to these requirements and what's involved.

Open Episode

Episode #25 - CISO As A Service

Companies are turning to Virtual CISO and CISO as a Service providers for help as cybersecurity requirements continue to grow. Some see CISO as a service value, while others might not consider it important. Is hiring a vCISO always the right option? What are the pros and cons? How do you find a good one? This week the guys answer these common vCISO questions and more.

Open Episode

Episode #24 - To Cloud or Not to Cloud?

The "cloud" is arguably one of the most common topics of discussion in technology today, primarily for its cost savings and accessibility benefits. Corporate cloud security can be tricky. However, it's also a hot topic for cybersecurity professionals and not always for the best reasons. This week, the guys discuss cloud considerations for organizations of all sizes, providing recommendations for transitioning to the cloud, the security risks of cloud computing, safely storing information, and avoiding data loss nightmares.

Open Episode

Episode #23 - Penetration Testing: What You Need to Know (Part 4)

This week in the final part of our Penetration Test Mini-Series, the guys discuss the realities of automated vs. manual penetration tests and what those terms actually mean. They also talk about timeframes, approaches, and situations that seem to cause some confusion for companies undergoing their first penetration test. The team also gets into Virtual CISO Penetration Testing and the VCISO Pen Testing Requirements.

Open Episode

Episode #22 - Penetration Testing: What You Need to Know (Part 3)

This week, the guys continue their penetration testing discussion, covering the following common questions:

How often should your organization conduct a penetration test?
What's the right approach, red team penetration testing or purple team penetration testing?
What should you see in your penetration test reports?

Open Episode

Episode #21 - Penetration Tests: What You Need to Know (Part 2)

This week we take a deeper dive into the types of penetration testing. The guys discuss why it's important to consider the reason behind a penetration test and some different methods of testing to consider. The team compares white box vs black box penetration test. In addition, they cover options that companies can take in their testing initiatives, along with providing best practices for companies getting their first pen test.

Open Episode