The CyberGuide show

The CyberGuide

Summary: Podcast by COMPASS Cyber Security

Join Now to Subscribe to this Podcast

Podcasts:

 Email Security | File Type: audio/mpeg | Duration: 00:11:27

Humans are the weakest link when it comes to cyber security and criminals are preying on this through email. Learn more about email threats and best practice tips to mitigate these risks in this episode of The CyberGuide.

 WannaCry Ransomware | File Type: audio/mpeg | Duration: 00:06:04

The WannaCry Ransomware attack that began May 12, 2017 is one of the largest ransomware attacks in history. This attack used a computer worm, borrowed from leaked NSA exploits, to target Microsoft Windows operating systems at an unprecedented scale. To date, over 300,000 machines in 150 countries have been affected. This podcast offers an in-depth analysis of the attack and best practice tips to prevent ransomware from affecting your organization.

 Protecting Yourself From Your Internet Service Provider | File Type: audio/mpeg | Duration: 00:08:34

President Trump recently signed legislation that blocked the implementation of the Federal Communications Commission’s Online Privacy Rule that was to take effect at the end of this year. This rule was intended to prevent Internet Service Providers (ISPs) from capturing and selling user data. Learn best practice tips to secure your sensitive information from ISPs on this episode of The CyberGuide.

 The CIA Vault 7 Release | File Type: audio/mpeg | Duration: 00:12:54

This episode of The CyberGuide discusses the CIA Vault 7 Release on WikiLeaks. This exposed the CIA’s ability to manipulate and exploit software without consumer knowledge. For example, the documents introduced a new series of threat actors of which demonstrate the CIA’s capability to hack smart TVs and smartphones. Tune in for more information about the wide range of effects this leak has.

 2016 A Look Back & 2017 A Look Forward | File Type: audio/mpeg | Duration: 00:33:36

This episode of The CyberGuide reviews the landscape of cyber security in 2016 and offers predictions for 2017. Organizations are in the early stages of understanding the importance of cyber security and investing in it. However, threats, including ransomware and spear phishing, are becoming more sophisticated. These facts make way for an interesting future in an ever-changing technological world.

 The Internet of Things | File Type: audio/mpeg | Duration: 00:19:54

The Internet of Things (IoT) is the interconnectedness of devices that have an IP address, that are embedded in everyday objects, and have the ability to send and receive data. Examples of IoT devices include mobile devices, fitness trackers, and smart speakers, among many others. These devices have endless potential but users must be aware of the security implications of using them. Learn more during this episode of The CyberGuide.

 Threat Identification & Analysis | File Type: audio/mpeg | Duration: 00:25:07

It is impossible to protect your organization from a threat you don’t know exists. As a result, it is imperative your organization goes through the threat identification and analysis process at least once a year. This episode of The CyberGuide explains this procedure and how it is applicable and it begins by broadly examining potential threat sources. Then it discusses how organizations must determine the most relevant and unique threats to their organization and act on them. Listen to learn more.

 The 5 Steps to a Security Plan | File Type: audio/mpeg | Duration: 00:11:13

It is difficult for organizations to make informed decisions on cyber security risk management without understanding the unique threats they may face. As a result, the 5 Steps to Develop a Security Program helps businesses determine where their vulnerabilities exist and offer suggestions on remediation. To allocate your resources effectively, it is important to assess your organization before investing in new technology. Companies that are methodical in their defense strategy are much more successful in protecting their organization from the cyber security attacks they may face, as discussed in this episode of The CyberGuide.

 10 Most Common Findings in Security Assessments | File Type: audio/mpeg | Duration: 00:21:00

Regardless of an organization’s size and industry, the Top 10 Most Common Findings in Security Assessments are applicable and help organizations understand their unique cyber security threats. The commonalities in these assessments allow organizations to better allocate their resources. The top 10 findings are broken out across the Three Pillars of Cyber Security: People, Policies, and Technology. It is crucial that your organization understands the impact that cyber security threats can have. You will find The CyberGuide suggests your organization is proactive and takes an enterprise risk management approach.

 Insider Threats | File Type: audio/mpeg | Duration: 00:15:55

Negligent and malicious insiders are major threats to organizations as they are responsible for a large percentage of data breaches. Insiders pose a unique threat to your organization because they know your network the best and typically have access that an outsider does not. Businesses must find a balance between security and functionality because insiders must be able to do their job however, they also have the ability to circumvent security controls and policies. You can discover the difference between negligent and malicious insiders and how their actions can affect your business in this episode of The CyberGuide.

 How to Talk to Executives about Cyber Security | File Type: audio/mpeg | Duration: 00:13:53

Cyber security is a foreign language to most executives. This episode offers suggestions when speaking with executives about cyber security and enterprise risk management in your organization. Cyber security is a broad topic that addresses a range of topics from risk management to regulatory compliance. Executives need to think of cyber security as a business risk, not just an IT issue, to best protect their organization.

 CEO & Boardmembers Perspectives on Cyber Security | File Type: audio/mpeg | Duration: 00:11:49

CEOs and Board Members are responsible for making major, strategic decisions within their organization but they are not expected to be cyber security experts. However, they do need to understand the unique cyber security threats their organization may face to best protect their sensitive information. This episode of The CyberGuide discusses the top down leadership approach CEOs and Board Members should take in regards to cyber security risk management. This involves regulatory compliance audits, assessments, incident response plans, financial investments, and policies understood by all employees. If CEOs or Board Members are not paying attention to the cyber security program within their organization, they better start!

 CFO Perspectives on Cyber Security | File Type: audio/mpeg | Duration: 00:12:45

Cyber security is critically important to CFOs and Risk Managers as they are frequently tasked with leading the organizations cyber risk management program. This is particularly challenging because the financial and reputational impact of a breach is difficult to quantify. Nonetheless it threatens the objectives and core functions of an organization, as discussed in this episode of The CyberGuide. Organization-wide awareness is crucial to effective risk management. In addition, it is important to understand the key threats to your business assets. Learn more here.

 CIO & Network Engineer Perspectives on Cyber Security | File Type: audio/mpeg | Duration: 00:14:52

CIOs, CISOs, and IT Leaders are responsible for the technological components of an organization. They must ensure that their internal and external network infrastructure are safe and secure. If they don’t set up a multilayered defense strategy, the entire organization can be impacted. This episode of The CyberGuide examines the effect technology has on day to day business operations while also highlighting necessary defensive tactics and the importance of an incident response plan.

Comments

Login or signup comment.