Podchaser Logo
Home
Cybersecurity Simplified

Susanna Song

Cybersecurity Simplified

Good podcast? Give it some love!
Cybersecurity Simplified

Susanna Song

Cybersecurity Simplified

Episodes
Cybersecurity Simplified

Susanna Song

Cybersecurity Simplified

Good podcast? Give it some love!
Rate Podcast

Episodes of Cybersecurity Simplified

Mark All
Search Episodes...
Summary:  In this special edition of Cybersecurity Simplified, host Susanna Song takes the global stage in Warsaw, Poland.You may not always hear about cyberattacks or feel the immediate impact, but cyberterrorism on the rise, targeting our ver
SIEM has been a cybersecurity standard as far back as 2005. Its job is to collect, correlate and analyze data from disparate sources for use in risk detection and forensic investigation. Over the last two decades SIEM has evolved to leverage ad
Cybercrime is relentless and keeps cybersecurity pros on their toes looking for creative and cutting-edge solutions to secure their operations. Worldwide investment in cybersecurity is now nearly $250 billion a year.   What’s behind this huge n
The National Institute of Standards and Technology, or NIST, just issued version 2.0 of its Cybersecurity Framework (CSF), which emphasizes supply chain risk management and puts the C-Suite at the heart of cybersecurity management activities wi
Let’s imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more diffic
When it comes to cybersecurity, most businesses focus on prevention and detection.That sounds reasonable, but today’s guest – a former CIA hacker, presidential cybersecurity commissioner and Air Force Cyber Wingman argues that approach is too l
In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone
Breaking News: MGM and Caesar’s are two U.S. casino giants breached in a cyberattack costing them millions of dollars a day. What can you learn from the social engineered cyberattack? How can you prevent your business from becoming the next vic
Cybersecurity threats make news headlines daily. It’s hard to keep up – unless it’s your job like it’s ours at High Wire Networks. Our team meets daily to review the top cybersecurity news headlines. Today, we’re giving a sneak peek into our da
ChatGPT is the talk of the town, dominating tech conversations around the world. But like any AI-powered tool, it brings with it the good, the bad and the ugly. Is ChatGPT a blessing or a threat? A boon for business or the bane of our existence
The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing your network to viruses and other threats. Our guest is Debe Gash, Senior Vice President and Chief Digi
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-ch
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach.  To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address advance
Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about t
Can the difference between a healthy, growing managed security services business and a stagnant one lie in a simple methodology? In episode 36, we invite Ryan O'Hara, CEO of a Detroit-based MSP, to join the conversation. He shares how this one
Veteran Security Practitioner Rick Howard shares how Alan Turing’s ideas and Thomas Bayes' Theorem hold the key to how organizations should forecast risk. Most organizations default to heat maps relying on a low, medium, and high model. But the
We’re all well aware that a cyberattack can take a heavy toll on an organization’s financial and reputational status, but what about the emotional toll on the employees who’ve had to work through it?Our guests today are here to talk about just
“Unauthorized access” sounds like a line from the classic 1980s movie, Wargames. And you might be surprised to learn that the Computer Fraud & Abuse Act, or CFAA, was partly passed in response to that movie’s plot, as a way to thwart hackers.Bu
It isn’t lost to us here at Cybersecurity Simplified that many of you listen and watch because you have a keen interest in cybersecurity work… you want to make that career leap from wherever you are at or pivot for those of you already in IT or
Our next guest has spent his career designing and building strong defenses, literally and technically. First, serving for more than 28 years in active-duty military and now as a cybersecurity MSP helping DoD contractors comply with the governme
What do cybersecurity and ranching have in common? A bit of wrangling, a lot of bull and CISO Allan Alford, host of the Cyber Ranch podcast.Allan’s 20-year cybersecurity journey includes serving as CISO four different times in three industries
If it isn't enough that hospitals have been overrun with Covid patients during the pandemic, they also have been targeted by cyber criminals. Many have even been forced to cancel vital medical services because their systems, software or network
Cybercriminals are escalating their attacks. What can you do? Take managed security to a higher level with SOAR - Security Orchestration, Automation and Response. In this episode of Cybersecurity Simplified, learn how SOAR can reach into IT env
In the cybersecurity war, there are no rules. The enemy has upped their game with more frequent and destructive attacks. What can you do? Take your cybersecurity defense to the next level. Stay ahead of evolving threats with vulnerability manag
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features