In this episode of the Cyber Savvy Podcast, host Mike Shelah interviews Amira Armond from Kieri Solutions, a Certified Third Party Assessing Organization (C3PAO), about the complexities of achieving Cybersecurity Maturity Model Certification (CMMC). Amira provides deep insights into the challenges government contractors face when preparing for CMMC certification, emphasizing that it's not just about passing an initial assessment, but maintaining ongoing compliance and understanding the nuance...
In this podcast episode, Mike Shelah interviews Amira Armond, founder of Kieri Solutions, about the Cybersecurity Maturity Model Certification (CMMC). They discuss the program's role in protecting sensitive defense contractor information and its impact on cybersecurity standards for government contractors.The conversation also offers a brief personal insight into Amira's background, revealing her interest in search and rescue work with her German Shepherd, adding a human touch to the technica...
This episode discusses the importance of compliance frameworks like HIPAA and CMMC in cybersecurity. Cybersecurity expert Loren Larson explains how these standards help organizations secure their systems and data.The conversation covers the challenges businesses face in meeting compliance requirements, such as the perceived high costs. Loren and host Mike Shelah share examples of companies that ignored compliance only to face serious consequences later.The episode emphasizes the business need...
We are excited to announce the Cyber Savvy Podcast season 3 with our very own Mike Shelah! Mike has taken the reins delivering education to business owners and sharing what they need to know about cybersecurity. On this episode, Mike sits down with Loren Larson, cybersecurity specialist at Dell. Loren talks about the difference between cybersecurity and traditional IT support - it's not just firewalls and software updates. Follow us on our YouTube channel as well! We will be posting...
In this special episode, we're marking a significant transition in our podcast's journey. With a mix of gratitude and anticipation, we bid farewell to our beloved host, Andrew Rose, and warmly welcome our new host, Mike Shelah.We cannot express enough appreciation for Andrew's dedication and passion as the host of this podcast. His insightful conversations, thought-provoking questions, and warm personality have been instrumental in shaping our show and building our wonderful community of list...
In today's episode, we will be discussing the main cyber threats against medical professionals with Scott Leister, a Dev Sec Ops engineer who has been in the MSP industry working for DTC for over 20 years.Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after recognizing that the ag sector wasn’t getting the attention it needed about the risks posed by cybercriminals and other adversaries. He helped coordinate several symposiums and events focusin...
In this podcast episode, our host Andrew and guests Monica and Pam dive into what shapes DTC's vibrant company culture, highlighting its focus on fostering collaboration, innovation, and employee empowerment. They discuss the role of "just culture," where accountability and fairness are prioritized, creating an environment where employees can learn from mistakes without fear. The conversation emphasizes how this approach is crucial for long-term business success, driving both employee satisfa...
This episode of Cyber Savvy, we are continuing our talk about Just Culture and it not only applies to the workplace, but everyday life as well.Our newest guest Pablo Breuer is a highly accomplished and decorated cyber security and information technology executive with unmatched global expertise and exemplary performance in the areas of innovation, cyber security, and vulnerability assessment. Polished speaker, team leader, and trusted advisor to executives. Recognized as a technology and poli...
Special guest Andrew Rose is an award winning CISO, Speaker, Brand Evangelist, Industry Analyst, NED & Board Advisor, CISO Mentor, Ultra runner - passionate about driving information & cyber security through a people-centric focus. He is also a board level Advisor with recognized expertise in information security and risk management, ISO27001, information security strategy; security organization and budgeting, security awareness, EU Data Protection, business engagement; information se...
Join us for a new episode of Cyber Savvy where we explore the Henry Schein cyber attack. Our experts break down how it happened, why it matters, and what it means for healthcare security. From the breach's timeline to its broader implications, we discuss it all. We start by tracing the timeline of events leading up to the breach, exploring the vulnerabilities exploited and the techniques deployed by the threat actors. Through in-depth analysis, we uncover the motives behind the attack and its...
Welcome back Cyber Savvy fans! This first episode of the season recaps what was discussed in season 1 as well as what is to come for season 2, including the Henry Schein attack of October 2023. Special guest Andrew Rose is an award winning CISO, Speaker, Brand Evangelist, Industry Analyst, NED & Board Advisor, CISO Mentor, Ultra runner - passionate about driving information & cyber security through a people-centric focus. He is also a board level Advisor with recognized expertise in i...
Today to end the season hosts Mike Urbanik and Andrew Rose welcome CISO Andrew Rose for a conversation about the future of Cybercrime and Cybersecurity in the world today. CISO Andrew speaks about the new wave of cyber-attacks, how they come about, and have changed through the years. The discussion leads into preventive measures that can be taken to make sure that you are properly ready not if but when an attack happens to you.Special guest Andrew Rose is an award winning CISO, Speaker, Brand...
Today hosts Mike Urbanik and Andrew Rose welcome back special guest Andrew Gerner, President of R.K. Tongue to have a conversation about Data Breach. It’s estimated that in 2022 more than 422 million US individuals were impacted by a data breach. A fair statement would be to say that this number will only continue to increase as the general population manages accounts and conducts most business online. So how can business owners be proactive about their data security and protect private clien...
Some cyber crimes are more relatable than others. Did you know that about 33% of people have been affected by identity theft crimes? Or that the majority of the exposures go unreported to law enforcement? On this episode of Cyber Savvy Mike and Andrew will be joined by a special guest that was recently affected by a compromise of their personal identifying information. Our guest will share their experience and some advisable steps they took to protect their personal data from this and future ...
What do cybercriminals do with the information they may take after a successful phishing attempt? On this episode of Cyber Savvy Andrew and Mike will discuss Cyber Extortion. Victims of cyber extortion can range from individuals to small businesses, to huge corporate entities. Listen in as Mike details some of the dangers and costs that can be faced once cybercriminals have gotten their hands on sensitive information.Andrew Rose began a cybersecurity awareness program in 2016 while at a major...
In recent decades we have seen the number of computers and mobile devices multiply greatly making phishing scams incredibly lucrative. Phishing attempts are often the first step to more invasive and damaging attacks in which individual and corporate data is compromised. Join Andrew, Mike, and special guest Scott Leister, Director of Technology from DTC, as they discuss the many clever ways cybercriminals may disguise correspondence as coming from familiar and reputable entities in the attempt...
Cybercrime-where did it all begin? It is difficult to frame the full breadth of cybercrime today without understanding the history first. Mike Urbanik has spent considerable time researching the subject and highlights for us where the roots of today’s cyber criminals, their motivations, and their techniques come from. Join us as Andrew Rose and Mike touch on some significant instances and have a conversation about those that best represent various sectors. Andrew Rose began a cybersecurity aw...
A successful cyber-attack has taken your organization/agency off-line. The FBI and CISA have been contacted. As you know, if this hasn’t already impacted you (either directly or indirectly), it will. When your networks are compromised, what happens next? Who do you call?Be cyber savvy. Beginning June 13, 2023 our podcast series starts with the history of cybercrime, discusses how to mitigate against being a victim or what to do as you are being attacked, and finally the aftermath. The dust pa...
In this month's episode, we have one of our DTC experts, Scott Leister, join us in a Q&A on all thing's cyber security. Scott is a DevSecOps at DTC and shares his insights on the latest trends, challenges, and best practices in the field. Special guest Andrew Rose is an award winning CISO, Speaker, Brand Evangelist, Industry Analyst, NED & Board Advisor, CISO Mentor, Ultra runner - passionate about driving information & cyber security through a people-centric focus. He is al...