AI fortifies cybersecurity but it also strengthens cyberthreats. How can your company tackle this double-edged dilemma? We’re asking our guest, Rob Lee, Chief of Research at the SANS Institute, the go-to leader in cybersecurity training.With more than 20 years of experience in digital forensics and incident response, Rob is dubbed “The Godfather of DFIR.” He’s also the co-author of the must-read book, Know Your Enemy.Get ready to learn about … 🎓👨💻 The critical expertise gap in AI that c...
When it comes to physical school safety, K-12 districts are generally well-prepared and understand the risks when planning for fires, severe weather, or lockdowns. However, the situation is different when it comes to cybersecurity.As discussed in a previous episode—episode 54 with K-12 Six’s national director, Doug Levin—preparation and response plans for cyberattacks across the country are often disjointed and inadequate.In this episode, Ed Vasko joins Susanna Song to explore the data points...
With K-12 schools going digital, they’re in the crosshairs for cybercriminals. Why are they such easy prey, and what’s being done to stop it?To answer these questions, we’ve invited K-12 cybersecurity expert Doug Levin, National Director at K12 SIX, to break it down.K12 SIX is the only national non-profit solely focused on K-12 cybersecurity, offering crucial threat intelligence and support to these vulnerable institutions. Stay tuned to hear Doug’s take on:why our schools are at riskthe...
The rules of B2B marketing have changed—traditional plays won’t cut it anymore. From AI content overload to dark social, five major disruptors are shaking up the game. Khali Henderson, Chief Content Officer at BuzzTheory, breaks down the new playing field and how cybersecurity partners can bring their A game. Tune in for winning cybersecurity marketing strategies that will keep you ahead of the competition.Interested in more cybersecurity marketing strategies, watch: https://youtu.be/9P...
We get a lot of inquiries from our viewers about Cybersecurity, but by far one of the most frequent questions we receive is, “How do I get into the cybersecurity industry?” It’s a vast and complex field, but today’s guest is here to help serve as navigator. Chris Farrell, Overwatch Sales Engineer, had years of experience in a completely different field when he decided to make the switch to a career in cybersecurity, and has found significant success since transitioning. So how did he do ...
Summary: In this special edition of Cybersecurity Simplified, host Susanna Song takes the global stage in Warsaw, Poland.You may not always hear about cyberattacks or feel the immediate impact, but cyberterrorism on the rise, targeting our very own backyards. Advanced Persistent Threats or APT attacks are crippling critical infrastructure worldwide, undermining public trust and elections, and spreading disinformation. In parallel, modern warfare today is no longer limited to the t...
SIEM has been a cybersecurity standard as far back as 2005. Its job is to collect, correlate and analyze data from disparate sources for use in risk detection and forensic investigation. Over the last two decades SIEM has evolved to leverage advances like big data analytics and AI to process more data faster.But today’s guest says SIEM has a fatal flaw.Chris Jordan, CEO of Fluency Corp., says SIEM’s database-centric design causes critical delays in early detection and rapid response.What...
Cybercrime is relentless and keeps cybersecurity pros on their toes looking for creative and cutting-edge solutions to secure their operations. Worldwide investment in cybersecurity is now nearly $250 billion a year. What’s behind this huge number? In this episode, we’ll discuss the macrotrends in cybersecurity and what they mean for managed security service providers and their business customers. To help us out, we’ve invited one of the IT channel’s pre-eminent ...
The National Institute of Standards and Technology, or NIST, just issued version 2.0 of its Cybersecurity Framework (CSF), which emphasizes supply chain risk management and puts the C-Suite at the heart of cybersecurity management activities with the new “Govern” function.Today’s guest, Cy Sturdivant, cybersecurity expert, certified information systems auditor and director at FORVIS Consulting, will help us get a handle on the important changes and their impact on businesses.The NIST CSF 2.0 ...
Let’s imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more difficult to enter.In cybersecurity, there’s a similar strategy called Zero Trust microsegmentation.Today’s guest, Bria Haugli, cybersecurity expert and CEO of SideChannel, explains how Zero Trust microsegmentation can reinforce managed detection and response...
When it comes to cybersecurity, most businesses focus on prevention and detection.That sounds reasonable, but today’s guest – a former CIA hacker, presidential cybersecurity commissioner and Air Force Cyber Wingman argues that approach is too little, too late – literally!Businesses are compromised on average 27 months before detection!Instead of waiting for the inevitable breach, he advocates a proactive approach designed to stay one step ahead of your adversary.Tune in for this engaging disc...
In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone online is vulnerable if they connected to the world wide web, which includes our youth. Our very impressionable kids who love to click.Today, our guest on Cybersecurity Simplified is Amber DeVilbiss, a cyber queen who has a special place in her heart fo...
Breaking News: MGM and Caesar’s are two U.S. casino giants breached in a cyberattack costing them millions of dollars a day. What can you learn from the social engineered cyberattack? How can you prevent your business from becoming the next victim?In this 15-minute episode, co-hosts David Barton and Susanna Song leave you with practical steps in creating a layered defense strategy.Learn how to stop ransomware attacks with one click: https://www.highwirenetworks.com/how-to-stop-ransomwar...
Cybersecurity threats make news headlines daily. It’s hard to keep up – unless it’s your job like it’s ours at High Wire Networks. Our team meets daily to review the top cybersecurity news headlines. Today, we’re giving a sneak peek into our daily news briefing.Stay tuned as we discuss some of the most high-profile cyberthreats happening today, along with how to protect against them. To get more cybersecurity news from High Wire Networks, visit: https://www.highwirenetworks.com/news...
ChatGPT is the talk of the town, dominating tech conversations around the world. But like any AI-powered tool, it brings with it the good, the bad and the ugly. Is ChatGPT a blessing or a threat? A boon for business or the bane of our existence? A cybersecurity tool or a hacker’s weapon? The guest on today’s podcast is Aaron Martin, Overwatch Senior Security Architect. Aaron has many years of experience as a software architect and security analyst and is here to share his insights and p...
The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing your network to viruses and other threats. Our guest is Debe Gash, Senior Vice President and Chief Digital Officer for Saint Luke’s Health System in Kansas City, Missouri. Debe has a long history in health care IT management and consulting and is very familiar with the digital transformation taking place in medical practices along with the risk...
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-changing law? One way is to focus on the fundamental principles related to privacy and cybersecurity. Here about these principles and more with special guest, Matti Neustadt who has a background as in-house counsel for some leading tech logos. She knows w...
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect these entities from lost or stolen data, networks being held hostage, etc. In today’s landscape, attacks are nearly an inevitability and even more so than in decades past.So, knowing how important it is to the functions of our society, what’s next for n...
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach. To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address advanced and evolving cyberthreats. Today on Cybersecurity Simplified, we’ll discuss why cybersecurity is as much a mindset as a toolset. Stay tuned to hear from our special guest - none other than High Wire Networks’ own CEO, Mark Porter. &nb...
Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about technology partners who sell security solutions? What protections do they have?Those are great questions for our guest, Kirsten Bay, co-founder and CEO of Cysurance. Her company offers Cysurance-as-a-Service, which bundles protections into the managed se...