loader from loading.io

Cybersecurity Weekly - Season 1, Episode 20

Cyber Ops Unmasked

Release Date: 05/18/2020

What is a Cyber Resilience Analysis? show art What is a Cyber Resilience Analysis?

Cyber Ops Unmasked

In this episode of Cyber Ops Unmasked, Keith Hales and Chris Bevil dive into the world of cyber resilience, asking questions that all business owners should be asking in order to move their business forward.  How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be?  Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their...

info_outline
What is the Difference Between Cybersecurity and Cyber Compliance? show art What is the Difference Between Cybersecurity and Cyber Compliance?

Cyber Ops Unmasked

In this episode of Cyber Ops Unmasked, Keith Hales, CEO of InfoSystems, and Chris Bevil, CISO at InfoSystems, dive into the intricate relationship between cybersecurity and compliance. They explore common misconceptions surrounding these two aspects of security and highlight why each should be treated as a separate entity. Additionally, Chris Bevil provides valuable insights on how organizations can navigate the complexities of compliance and what to look for to determine their compliance obligations. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE:...

info_outline
Cybersecurity Best Practices for Data Backup and Recovery show art Cybersecurity Best Practices for Data Backup and Recovery

Cyber Ops Unmasked

Is your data backed up and safe from the bad guys? In this episode of Cyber Ops Unmasked, Keith Hales and Robert Goodwin from InfoSystems explore best practices when it comes to the complexities of data backup and recovery. It’s not enough to store your data somewhere and pull it out when you need it anymore. You must implement effective measures and systems to safeguard your digital assets. Listen to this episode to learn more about what immutable copies of your data are, how you can keep your data safe from the bad guys, and why it is absolutely necessary to test your backups. VISIT THE...

info_outline
How and Why to Set Cybersecurity Standards and Frameworks in Your Business show art How and Why to Set Cybersecurity Standards and Frameworks in Your Business

Cyber Ops Unmasked

As cyber threats continue to evolve, it becomes essential for companies to establish effective standards to protect their data and ensure the security of their operations. Recently, we relaunched our podcast, Cyber Ops Unmasked, where we cover all things cybersecurity. Cybersecurity initiatives are often misunderstood, mismanaged, or purposely hidden in companies to avoid scrutiny. In this podcast, we’ll have an open discussion so that cybersecurity operations are understood, managed effectively, and open to questioning and scrutiny. To learn more about InfoSystems Cyber, visit .

info_outline
Cybersecurity in Session - Season 1, Episode 39 show art Cybersecurity in Session - Season 1, Episode 39

Cyber Ops Unmasked

Here’s a fact: the data you store and transmit across your organization’s networks is a highly valuable asset that needs to be protected. The size of your business is irrelevant; the industry you work in is also irrelevant. What matters to cybercriminals is if they can compromise your data and how much you will pay for its safe return.

info_outline
Cybersecurity in Session - Season 1, Episode 38 show art Cybersecurity in Session - Season 1, Episode 38

Cyber Ops Unmasked

Are you a cyberattack enabler due to apathy or lack of understanding of what is happening within the Internet universe? In this episode, Fred and Garrett discuss why the “it cannot happen to me” approach to cybersecurity is fostering the growth of cybercrime and other threats delivered to your organization, courtesy of your Internet habits. 

info_outline
Cybersecurity Weekly - Season 1, Episode 37 show art Cybersecurity Weekly - Season 1, Episode 37

Cyber Ops Unmasked

In this episode, Fred and Rob discuss cybersecurity from a new angle. Let’s take off our geek hats and discuss the business side of cyber-attacks. From why it's an essential part of an organization's risk management program to the costs these attacks can have on finances, revenue, and reputation.

info_outline
Cybersecurity Weekly - Season 1, Episode 36 show art Cybersecurity Weekly - Season 1, Episode 36

Cyber Ops Unmasked

In this episode, Fred and Garrett discuss the last CIS Control, Penetration Tests and Red Team Exercises. This control focuses on testing the security measures already in place within your organization. Penetration Tests and Red Team Exercises are most impactful when a company has taken action against the first 19 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

info_outline
Cybersecurity Weekly - Season 1, Episode 35 show art Cybersecurity Weekly - Season 1, Episode 35

Cyber Ops Unmasked

In this episode, Fred and Garrett discuss the third Organizational CIS Control, Incident Response and Management. This control focuses on creating an incident response plan to protect your organization's information and reputation. Incident Response and Management is most impactful when a company has taken action against the first 18 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

info_outline
Cybersecurity Weekly - Season 1, Episode 34 show art Cybersecurity Weekly - Season 1, Episode 34

Cyber Ops Unmasked

In this episode, Fred and Garrett discuss the second Organizational CIS Control, Application Software Security. This control is used to manage the security life cycle of your software. This control is used to prevent, detect, and correct security weaknesses. Application Software Security is most impactful when a company has taken action against the first 16 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

info_outline
 
More Episodes

In this episode, Fred and Rob discuss part two of becoming a Cybersecurity professional. Previously, Fred and Rob discussed being on the "offense" in the Cybersecurity industry. Now they'll discuss being on the "defense" and what that side of Cybersecurity looks like. Because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming and new opportunities are arising every day.