All Episodes

May 4, 2025 38 mins

Angel Mosley, founder of Cybase Risk Management, shares her journey from media studies to becoming a cybersecurity expert with over 20 years of experience helping small businesses and nonprofits protect themselves from digital threats.

• Starting her career in media before switching to computer science after learning about the salary differences
• Focusing on small businesses and nonprofits because they're often the vulnerable "cracks" that hackers exploit to reach larger corporations
• Creating customized crisis simulation exercises that walk C-suite executives through realistic cybersecurity breach scenarios
• Using AI to develop tailored security scenarios that provide probability-based outcomes for different decision paths
• Explaining the importance of multi-factor authentication as a critical first step in cybersecurity protection
• Educating clients about cybersecurity insurance and helping them implement the baseline controls needed to qualify
• Mentoring both young students and career-changers interested in entering the cybersecurity field
• Building an AI-powered tool that will help consultants multiply their impact in cybersecurity training

For more information about Angel's services or to protect your business from cyber threats, visit cybaserisk.com or call 858-413-RISK.

Email: angel@cybaserisk.com

Linkedin Link >>>Click Here<<<

🎙 Market It With ATMA Podcast
Brought to you by Advent Trinity Marketing Agency
www.adventtrinity.com


Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Storie (00:00):
Welcome back to Market.
It with.
Atmo, where we share the tips,tools and strategies to help
your business be successful.
Today we have on the show avery special guest, ms Angel
Mosley.
She is the founder of SybaseRisk Management, a company
devoted to helping smallbusinesses and nonprofits
protect themselves from cyberthreats.

(00:21):
I'll let.
Angel tell you more.

Angel (00:23):
Welcome, angel.
Thank you, thank you, thank you.

Storie (00:26):
I'm so excited to have you today.

Angel (00:28):
I know I couldn't wait for this day to come here.

Storie (00:30):
Tell me more about one, how you even came to one want to
be a business owner, and two,why this industry and what led
you to this.

Angel (00:42):
Absolutely.
I'll do the business on theheart.

Storie (00:46):
Down the road.

Angel (00:46):
Yeah, so my story, my backstory, or origin story, as
the young people say.
Now, I actually, when I washere in Dallas, texas, graduated
from Duckerville High Schooland I was one of the first
graduating class of a mediaprogram that they had and still

(01:09):
have to this day.

Storie (01:10):
Wow.

Angel (01:10):
And so I found a love for media, radio, TV, film, Went to
college for it.
Believe it or not, Around mysophomore year I was hanging out
with Janet Jackson and Ice Cubeno, billy Ray.
Cyrus.
I was doing internships, doingall of that, and so when you do

(01:32):
an internship and you're incollege, you think you could ask
anybody anything of course.
I happened to wander into thecomputer room and um started
asking the guys that weresitting there the guys that were
sitting there, the guys thatwere sitting there how much
money did you make when you gotout of college?
And they were like oh, wegraduated making $60,000 a year,
which back then was phenomenal,but $60,000 is still a pretty

(01:55):
good salary To start off.

Storie (01:57):
That's very reasonable, Absolutely.

Angel (02:00):
So I was like $30,000, $60,000, $30,000?
I've always liked computers.
If I didn, like 30,000, 60,000,30,000.

Storie (02:05):
I've always liked computers, so if I didn't before
I may now Right.

Angel (02:09):
So I went back and changed my major to computer
science, Graduated a computerscience degree and I actually
started off like literallycrawling under desks connecting
cables, you know.

Storie (02:21):
Isn't that part of the whole cyber, almost IT?
I don't want to call you itbecause I know you're not, but
that's where you start reallyback then, yeah, that's where
you started.

Angel (02:31):
Now it's a little different, but back then, yeah,
that's exactly where I startedum and so I don't remember what
year 2000 ish there was thisthing that came out that was
called starving socks league.
Okay, and it's.
People call it socks.
Now it's a regulation.
And it's the regulation thatcame out that was called
Sarbanes-Oxley Okay, and we callit Sox.
Now it's a regulation.
And it's the regulation thatbasically says that if you are

(02:51):
an officer of a publicly tradedcompany, Okay.
Do you remember Enron?

Storie (02:56):
Yes, Okay, I think everyone does.

Angel (02:59):
So Enron is the cause of this particular regulation, and
if you cook the books, you cango to jail for it.
Wow.
So when that regulation cameout, my I was one of a law firm.
My boss at the time was likehey, we need you to go find out
what this thing is all about.

Storie (03:15):
So we're gonna get on the front end of it, right.
Absolutely.
What's a training?

Angel (03:20):
for a guy certified as a CISA, which stands for Computer
Information Systems Auditor.
I had to think about that, theacronym for IT I cannot keep
track of, so that's what startedme down this cybersecurity
journey, and it really startedwith what we call GRC, which is

(03:41):
Governance, Risk and Compliance,and it's the foundation of
cybersecurity.
It's the rules and regulationsthat say thou must do thus and
so.
Like the umbrella rules ofeverything.
Exactly Okay, I got you.
So everything we do starts witha foundation or a base, which
is where sci-base comes from.

Storie (04:01):
I love it, so it's our cybersecurity baseline controls.

Angel (04:04):
But yeah, that's how I got started, wow so over 20
years of experience.

Storie (04:07):
Yes, that is incredible.
And so when you started out,the internet was known right,
but not as prevalent as it isnow.
Right, I mean, it seems likeit's moving faster than I can
wake up in the morning.
So why are you focused so muchon these small businesses and
nonprofits?

(04:28):
Why is that your focus?
Thank you for asking that.

Angel (04:32):
So throughout my 20-year career, I spent a lot of time in
corporate.
America and working for largecorporations.
During that time, I realizedthat the weakest link is what
you need to go after, and so Idon't think there are any large

(04:53):
corporations that don't rely onsmall companies Right.

Storie (04:57):
You always have to have somebody kind of lifting it up
right.
Absolutely it takes the village.

Angel (05:03):
Absolutely so.
And large corporations arerequired, you know, to contract
and offer business to smallcompanies, right, and so when
you have to rely on what we callthird party risk, so these
smaller companies, theyintroduce risk that the larger

(05:23):
companies sometimes are notaware of.
And what I realized is it'sreally the smaller companies,
medium-sized companies, thatneed cybersecurity and don't
always have access to it.
So, when I decided toquote-unquote start my own
business.

Storie (05:43):
I'm a business owner.

Angel (05:45):
I just look back on my career and was thinking there's
a lot of stuff I can do, butwhat do I actually want?

Storie (05:53):
right, what's your?

Angel (05:53):
passion, right, exactly because it has to be that thing
that wakes you up in the work,that get you out of bed, guys,
right.
But get you out of bed in themorning, right, and so that's
that's where my passion is issmall, medium-sized businesses,
nonprofits, right.

Storie (06:07):
I'm a heart for that.
It's almost like those smallbusinesses are the cracks in the
large corporations.
So if you have, a smallhairline fracture.
it's going to crack eventually,right?
So the nonprofits as well.
Nonprofits are a whole otherbeast in terms of everything
they're doing.
A lot with little, Would youagree?

(06:29):
So you're focused on that.
How do you reach that audience?
Because I know that nonprofitsare so busy with so many
different things.
So how is your outreach towardsthose areas?
I am learning to get out andnetwork many different things,
so how is your outreach towardsthose, those areas in the
industry.

Angel (06:52):
I am learning to get out and network and that's that's
actually been very successful.
So, just stepping out of myhouse I have a home office
stepping out of my house and andgetting on platforms like
Eventbrite, right, and seeingwhat else is out there, uh, meet
up and uh and market to them.
So, as I tell people, what I amspending a lot of time doing is
convincing companies that theyneed me, because when you target

(07:16):
small, medium-sized businesses,they think they're too small
for the bad people, the hackers,hackers to find them and I'm
like oh, no, no, no.

Storie (07:28):
It's almost the way you frame it.
It's not so much convincing,it's opening their eyes.
It feels like to me.
So you would say in-personnetworking and referrals are
your primary way of spreadingwhat you do and how you do it.
Because I mean, when I thinkcyber security, I'm like this is
already over my head just withthat word.

(07:49):
Right, exactly, so, yeah, sohow do you um approach it when
you are in person?

Angel (07:54):
good question, so close your eyes, okay.
Imagine you just got a callfrom the fbi and they said that
your company data has beenstolen and it's out on the dark
web.
What do you do?

Storie (08:09):
next, one of them I hang up the phone because I don't
think the FBI makes phone calls.
They actually do.
Okay, all right, so go backafter they call me back three
times maybe.
They validate themselves.
You're scared.
Yeah, you don't know what to do.
I have no idea.
I would not know where to start.

Angel (08:26):
Exactly.
So that's what I do and thatjust that question.
Um, and you know, I'm I'm alittle traumatic, so the closing
of the eyes is no, it reallydoes.

Storie (08:38):
It really internalized that, that feeling of fear, like
who do I need to help me?
Exactly, Exactly.

Angel (08:46):
So what I do.
Going back to focusing on, Ican do a lot but what I actually
want to do, is the preparednesspart of it.
Okay.
So when you are able to sit downand answer questions and go
through a mock, a fake, asimulation scenario of an actual

(09:10):
I'm using the word actual andmock together but a mock
scenario that is put together asif it were real scenario and
you, as the CEO of your company,have to make decisions, and you
, as the CEO of your company,have to make decisions.
So a lot of people think thatthe decisions are on the IT side

(09:35):
and the cybersecurity side, andthat's actually not true.
Information is what I, so ITstands for information right
Technology and on the flip sideof that you have information
security.
They're responsible forproviding information to the
C-suite of a company.
So your CEO, your CFO, your CIO, your.
CTO, your chief informationsecurity officer, if you have

(09:57):
one chief of marketing, believeit or not.
So they're almost the middlemanin between, absolutely.
So I get those people in a roomand we walk through a scenario
that's tailored specifically totheir industry and their company
.
So if they have, for example, aserver called superman right,

(10:20):
because we love to name ourservers funny names and super
Superman houses all of theirconfidential information their
proprietary information, theircustomers' personal information,
right, and all that's sittingon server Superman or server XYZ
.
I introduce that particularserver into the scenario and I

(10:41):
say things like okay, ceo of thecompany, you just got to call
it eight o'clock in the morningfrom your IT guy or girl and
they're like hey, somethingfunny is going on.
I'm not sure you know.
I'll check you back and let youknow if we you know, anything
else happens.
You get a call 30 minutes later.
Oh yeah, there's definitelysome bad actors in our
environment.

(11:01):
Right now we I got my guys on itwe're trying to get them out.
Now your decision that you haveto make.
Do I notify my customers?
Do I notify my employees?
Do I need to call my legaldepartment?
What do I need to do?
So I walk them through all ofthose decisions.
We spend two hours doing thatand then it gets worse and worse

(11:24):
, just like a movie it getsworse, it escalates right, and
so then you get to that,crescendo the climax yes, right
and then you know, we go backdown the other side of the
mountain with now we're cleaningup and all the things so, wow,
that's a great strategy, though,to really put them through a
real-life scenario of their ownpersonal information.

Storie (11:45):
So you're customizing strategies for these businesses
that really work for them.
You're not just saying herehere's McAfee software, fix it.
Yeah.
You're actually walking thesec-suite companies through what
they need to know prior to thechaos happening right Now.
In terms of when the chaoshappens, are you coming in and

(12:08):
being hands-on, if it's one ofyour clients or not one of your
clients?

Angel (12:12):
Absolutely, so I offer that service as well.
So that is I tell people thinkof me as the cyber fire chief.
So, when something happens, youwant to have that point person.
That's kind of like a trafficcop, you know.
That's like, you know, levelheaded, directing people.
Absolutely Okay, and so thatperson serves as called the

(12:34):
incident commander, and they arenot necessarily the what I call
hands on keyboard but, they'rethe ones that have gone through
it several times, so they knowokay, this is going on.
We need to bring this entity in.
Call your external.
Your internal counseldefinitely needs to be involved,

(12:54):
but your external counsel a lotof companies don't have it.
Wow, there are other companies.
So I am a one woman shop as ofright now.
I can't do everything, but I dopartner with other companies
that do the things that I knowneed to get done.
In the midst of things likethat that you've vetted.
Yes, ma'am, thank you for that.
Yes, absolutely.

Storie (13:16):
Because you have to have a team.
I mean my job, I could not doit without my team.
I mean we have somebody helpingus, right now that you just
can't do it without right.
So you're not a one-woman show.
But the fact that you vet themand you know that they're
credible and they'll beavailable is another benefit to
what you offer.
Right, definitely.
So now take me through what'sto come.

(13:39):
It looks like you have a lot ofdifferent upcoming visions or
actual implementation of ideasthat you're wanting to kind of
expand on.

Angel (13:49):
I do things fast so I have, I have a non-profit I.
I've had that since 2018 and weteach and this is a we,
that's's not just an angel weteach children, students in
middle school and high school,about careers in technology and
cyber security Wow, and we dothat through summer camps,

(14:12):
through after school programs,through what's it called career
days at school.
You know, just going out andtalking to the schools, working
with counselors, that type ofthing, and with that, people
always ask do you do it foradults?
And my answer has been no,because I like to work with kids
.
But I've gotten that question somuch.

(14:34):
And then just out and aboutnetworking, right, not even
necessarily.
Sometimes, I'm not socializingNot, you know, don't have my
business hat on and people justask me, you are your friend,
though right, absolutely, and somy number one I did a post
recently.
The number one question that Iget asked is how do you get into
cybersecurity?
And that I get asked is how doyou get into cybersecurity?
And when you ask people thatare in the industry, almost

(15:01):
everybody's story is completelydifferent.
Really, yes, and that's okay.
There's multiple ways that youcan get into the industry.
So what I decided to do wastake that model that I do for
the middle school, high schoolstudents and apply it to what
I'm calling young professionals,not discriminating as that age
discrimination.
Right, it's young professionalsand the word young is used
loosely because it's people thatare trying to break into the

(15:23):
industry and also careerchangers, and so they may be in
marketing, right.
Right, and I worked with andshe has an amazing story a young
lady that was a chef for yearsand is now in cybersecurity and
she's killing the game.
That's amazing.
Yeah, it just doesn't matterwhat your background or where

(15:44):
you come from.

Storie (15:45):
I mean 20 years ago when some people got into maybe
cybersecurity or IT either, orit's changed, it's ever changing
.
So even having a seasonedprofessional kind of go through
this in the new day and agecybersecurity is probably
beneficial right, absolutely so.

Angel (16:02):
It's a mentoring program I love it I tell people it's not
technology training, becauseyou can find that anywhere.
But I do bet technology becausethere's unfortunately a lot of
scammers out there when it comesto trading, you hear the
commercials sometimes on the tv.
They pop up on your ig right,your facebook, and not to say

(16:23):
that the ones that pop upbecause you have to advertise,
obviously, but so not to say theones that pop up are scammers,
but sometimes they are you know,they feed on the fact that you
don't know and you're eager tolearn and you're eager to learn,
which is great, and so I telleven my students and my adults
that you can break intocybersecurity without having a
college degree, but you have tobe a lifelong learner, oh,

(16:47):
ever-changing right.
I mean even social media.

Storie (16:50):
We have a head of social media and she's learning
something new every day.
It seems like we're shifting toso much AI and digital.
You say that with a littledifferent tone.

Angel (17:02):
Tell me about how AI and cybersecurity are working
together, so I'll tell you howthey're working together and
against.
So I'll start with the togetherwith my company.
So what I just told you aboutis my brainchild right the,
walking the C-suite through thatscenario.
I use AI to put the scenariostogether.

(17:24):
So they answer a questionnaire,I feed that data into an AI
model that I'm training and thenit will put together a scenario
specifically for that companyin that industry.
That's the surface level part.
The bigger part that I'm workingon the yet to be is being able

(17:45):
to give them near real worldanswers based on their responses
.
So it'll be something like thisBased on your decision to do A,
b, c, at this time of thescenario, there's an 80% chance
that X, y, z is going to happen.
And with that 80% chance, ifthey don't like the outcome,

(18:06):
then they can make anotherdecision, because we're sitting
at a table walking through a bigscenario, absolutely, and so
when they make that seconddecision, or third or fourth,
it'll feed that data in and sayyou know, here's the and it's
all probability right.
There's nothing that'sguaranteed, of course, but it
gives them muscle memory.

(18:28):
I like to say Absolutely,because when you're going
through, when you're in a fire,you know, you don't know, you
panic, you panic.

Storie (18:38):
So, going through you do , and you're right that muscle
memory, just like training ourkids when there's a fire, don't
go in the closet, get down onthe floor, you know, remember,
stop, drop and roll Right.
So you're training them to havethat muscle and you're really
incorporating ai as a realbenefit, because the analytics
and the information that you'regiving them used to take days,

(19:00):
if not weeks, right, and nowyou're able to do it more
quickly.
Absolutely, that's a wonderfuluse of ai.
Some people love it, somepeople don't.
So I know this is a little offtopic from what we discussed,
but do you feel that AI has thesame cybersecurity risk as, say,

(19:21):
just creating a website?

Angel (19:22):
hundred percent.
So that's, let's talk about theagainst part yeah so, just the
same way that you know, I'm agood guy or good good gal,
there's bad actors out there andthey have access to the same
and they're training their AImodels for bad things.
And so what that means is thatthere are a lot of security

(19:46):
tools that have good AI baked in.
There are security tools thatpeople are building that have
bad AI built in.

Storie (19:55):
Everyone's worst fear right.
Is AI going to win?

Angel (19:59):
And it's.
You know.
Ai is a tool just like anythingelse, absolutely.
You know people say, okay, ahammer, you know, in a
carpenter's hands is used tobuild a house, but a hammer in a
murderer's hands, completelydifferent outcome, but it's
still a tool.
So it's about, in cybersecurity, getting ahead of the game, and

(20:22):
the way that you get ahead ofthe game is that you prepare and
practice and then you have agood plan so that when something
happens, and we always say incyber it's not.
if it's when something happens,you're prepared for it.
You're not going to get itright.
Nobody does you know you'regoing to make mistakes.
You're probably going to makemistakes that will cost you

(20:45):
money, but you would rather makea mistake that may cost you
$5,000 and not $50,000 or $5million, absolutely being
proactive in any business, inany area of your business.

Storie (21:00):
it's going to benefit you right and, in this day and
age, I think, a lot of people.
I'm really glad you clarifiedthat AI and the example with the
hammer, because so many peopleare fearful, like they were with
the internet right, and it'slike either you get with it and
utilize how to use itappropriately or you're left

(21:21):
behind Absolutely and you'reopening yourself to a lot of
risk right.
Absolutely.

Angel (21:24):
And so on the risk side of the house, the other thing
that I've trained businessowners and I'm glad that there's
most of the people that I knowthat are in cybersecurity are
doing the same thing with AI, inthat they are teaching the
companies that are using AI whatto put in, what they can put in
and what they cannot.

(21:45):
So when you use a publiclyavailable AI model, that data
like I tell my students, whenyou take a picture of yourself
that is not the most flattering,then you may not want your
parents to see it's out on theinternet forever.
Same thing with that data.

(22:07):
If you're putting a proprietaryforecast report right from your
financials because you wantthat model to do something
different with the data and giveyou a predictive outcome,
that's great.
That's what it's used for.
But if that data is tied toyour company and it's for

(22:28):
something that has yet to bepublicized, then you're at risk
for a lot of stuff You're atrisk of somebody stealing the
data.
You're at risk of somebody usingthe data against you and you're
at risk, going back toSarbanes-Oxley, of potentially
facing some jail time becauseyou put your company's data out
on.
You know.

Storie (22:48):
And a lot of people don't know these things Right.
Especially, I worked in thefinancial industry prior to this
and they give you so muchtraining but this is something
that they don't.
I wouldn't say don't, don'tquote me on anything but you
don't see as much on how to notget your company in a situation
they can't get out of.

(23:09):
So your real purpose is to oneeducate.
Exactly that's number one andtwo, to strategize on a
customizable basis.
Yes, one by one.
So are you on site?
Are you holding webinars to dothese trainings?

Angel (23:24):
I am, I actually have a webinar this evening, oh
wonderful.
Now the webinar this evening ison the career side, it's on
that mentoring side, but I'mpartnering.
I have another webinar comingup with a partner company of
mine.
They produce firewalls and so ifI are walls, that physical

(23:45):
appliance that sits between theinternet in your company and
it's kind of like a traffic copand it makes sure the bad stuff
doesn't get in and it keeps thegood stuff that's supposed to
stay in your network in yournetwork right right, um, so they
have created proprietaryinformation that sits on that
hardware appliance and what I'mdoing is being able to the

(24:08):
companies that are using theirfirewalls being able to pull
that data out of the firewalland then put it into those
scenarios that we just talkedabout and then show them how to
use that real time so that theycan do what we call threat
hunting.
So look at that data, try tosee if there's somebody bad that
is trying to break in and thenknow how to put those defenses

(24:31):
up.

Storie (24:32):
So as a marketing company, a digital marketing
company, we utilize yourservices a lot Because we have
clients that we have to protectand a lot of people don't
understand that You're not justcreating a website.
So these people that aren'tcertified they may create your
website, but they've opened youup to all kinds of risks because
they haven't put that back inincorrectly and that's something

(24:54):
so important people have toknow.
I couldn't explain it to savemy life, but that's why I call
you right.
I mean because if you don'thave that, you're setting
yourself up for failure and itseems like with your webinar
tonight, thinking about it,plumbing, ac and heat those are

(25:14):
forever, forever jobs.
I don't see us ever gettingaway from digital.
So cybersecurity is reallysomething that is job security.

Angel (25:24):
A hundred percent.
There are any statistic thatyou look, you know, you Google,
you know AI it's going to sayglobally.
There are millions of unbilledcybersecurity jobs out there.
Now you have to also take intoconsideration the market that
you're in Dallas happens to be areally good market because
there's a lot of tech companiesthere's just a lot of companies

(25:47):
here with their headquarters inDallas, so it's a good place to
be a cybersecurity professional.
But even if you're in a littlebitty town like Corpus Christi,
texas, which is my hometown,there's still a need for
cybersecurity professionalsthere, as well, Absolutely so.

Storie (26:06):
With that being said, you've scared me to death but, I
want to join your webinartonight because I really I mean,
with kids growing up, I wouldlove to learn more about what it
takes to get in there and Ithink what you're doing is
absolutely amazing.
So what challenges are youfacing right now in educating
the market?
You're great at educating, butwhat challenges are you facing?

(26:28):
Thank you.
What challenges?

Angel (26:33):
Reaching the right people in the small, medium-sized
business space.
So, as we said earlier, whenyou're a nonprofit, when you're
a smaller company you wearmultiple hats.
So when I was in corporateAmerica, I knew my CMO was my
Chief Marketing Officer.
That's the person that I needto reach out if I want marketing

(26:57):
Well, in smaller companies, youmight have the CFO be the CMO
as well, absolutely and youmight have the CFO be head of IT
.
As weird as it sounds, it'shappened so.
So finding out that person thatis responsible for the digital
assets at the companies rightnow is one of my biggest

(27:21):
challenges now.
Once I find out who that personis right to market to then I
can start educating, but that's.
That's actually one of my it's.
It's not a big barrier, butit's.
It's one that I'm learning howto overcome, right there's.

Storie (27:34):
So many different variables and so many different
even businesses or industries,right, yes, and your best
outreach right now for expandingthat breadth and education?
What platform would you say isthe best for expanding that
information?

Angel (28:01):
platform that probably 80 to 90 percent of the people I'm
trying to reach have a LinkedInprofile.
Their company probably 100percent of the companies have a
LinkedIn profile so we'rereverse engineering, reaching
out, but then I don't discountother platforms like Instagram
you know, because people who areand I think, a lot of
cybersecurity companies arelearning this also when you take
off your work hat you have yourpersonal life, you have an IG

(28:25):
account, right, and so when youget a pop-up to a cybersecurity
company in IG, you might want to, you know, click on it, check
it out and see.
So yeah, I think those areprobably, and I'm more
comfortable with IG, facebookand all that probably because

(28:46):
I'm old I would not say old atall, but LinkedIn is my number
one.

Storie (28:50):
Okay, I would agree with you If I'm a business owner and
I'm trying to relax in my offtime, but still stay focused on
business.
I'm going to go on there andI'm trying to relax in my off
time, but still stay focused onbusiness.
I'm going to go on there and Iwant to see advertisements that
are going to help me or give metips on how to protect me,
because, at the end of the day,if they're really serious about
it, they're going to give you acall right, absolutely.

(29:12):
So, with that being said, whattip?
One tip that you would givebusiness owners any business on
our small, large, medium ornonprofit to help protect
themselves from cybersecurity,or one thing they know, that
they need to know multi-factorauthentication okay, and what

(29:33):
that is is something it's yourpassword in combination with
something that you have orsomething that you are so if you
notice your banks.

Angel (29:46):
Nowadays all banks are have multi-factor authentication
.
That means that you have to puta password in and then they may
send you to an authenticator appon your phone or they may send
you a text message on your phonewith the code that you have to
put in on your computer.
Now they have the biometrics onthere with the fingerprints and

(30:06):
your phones have the.
I've knew where iPhones havethe face recognition yeah right.
So those that's as smallmedium-sized businesses have to
rely on cloud infrastructure.
That means that thatinformation is not on a desktop
or sitting on the hard drive ofa laptop.

(30:26):
They're using Workday andSalesforce and Google Docs and
Google Drive and Microsoft 365,right.
That means their data, theircompany data is in the cloud, so
one of the best ways to protectit is to turn on.
It's a pain in the butt, it is.

Storie (30:45):
Thank you.

Angel (30:46):
It is a pain in the butt, but it's worth it Right, and
it's one of the best ways toprotect your data that and know
where your risks are right.
Start you know, don't be anostrich with your head in the
sand.
Start looking into where are myrisks, where you know most

(31:07):
companies hopefully know theirlegal, you know regulatory risks
.
So if I'm a healthcareorganization, I have to be HIPAA
compliant Absolutely.
If I'm you know, a financialorganization it's.
FICO and the other regulationsthat are out there.
If you are a legal organization, you have the Sarvay, Zoxley

(31:28):
public traded companies, thattype of thing.
So most companies know from alegal regulatory standpoint what
they have to be compliant with.
Every single one of those hascybersecurity controls Every
single one and so if you're notdoing those, then you're at risk
.
In addition cybersecurityinsurance.

Storie (31:48):
I was actually.
That was going to be my nextquestion.
Yes.
I never knew there was such athing and forgive me because I
should know, but tell me more.
You can acquire cybersecurityinsurance, and what does that
cover?
Absolutely.

Angel (32:03):
So because I don't sell insurance.
I will say basically, it willcover you in the midst of an
incident or a breach.
Now think about it like thiswhen you get life insurance,
they ask you do you smoke, Doyou skydive, Do you drive your

(32:25):
car really fast?

Storie (32:26):
Right.

Angel (32:26):
Do you engage, as a human being, in any life risky
activities?
Yep.
Because if you answer yes toany of those questions, your
premiums are higher.

Storie (32:38):
So note to everyone out there don't answer those
questions Go ahead Say the samething right.

Angel (32:47):
When you get cybersecurity insurance, they're
going to ask you do you havemulti-factor authentication in
place?
Do you have a way to identifyeverybody that's in your company
?
Do you know where all yourdigital assets are?
They're going to ask you thesequestions have you performed any
type of risk assessment tounderstand where your digital

(33:08):
risks are?
And if you're answering no tothose questions, one of two
things will happen They'll coveryou at a higher rate or they'll
tell you no, wow, just flat out.
No, they'll tell you no, wow,just flat out.
No, they'll tell you.
No, they'll tell you go, getyour act together and then come
back.
That's a service that I offerBaseline controls.

(33:29):
Let's get those baselinecybersecurity controls in place
so that, if you already havecybersecurity insurance, we can
lower your premiums.
And if you don't, you can turnthat no into a yes.

Storie (33:41):
Wow, that is almost necessary for every business
nowadays.
We're on such a digital.
Whether you like it or not,we're digital world now, yes,
and the fact that I didn't knowthat.
Now, mind you, I'm in themarketing strategy part, so we
have a designated person thathandles our back-end stuff and

(34:02):
she's very familiar with all ofthese things.
But as an outsider looking in,just you know, talking with
clients and businesses, I knowwe have the infrastructure, but
I did not know that you couldprotect yourself.

Angel (34:13):
Yes, Just like it's similar to errors in the mission
insurance.
You know so when, if you thinkabout it from a financial aspect
because finances are done bypeople, right People have the
preventative to make a mistake.

Storie (34:27):
Everyone Right, yeah, and it's natural.

Angel (34:29):
Yeah, it's an error, right?
So you have insurance thatcovers you in case you make a
huge error that costs you a lotof money.
You have insurance that coversthat.
It's cyber security.
Insurance is similar to thatbecause, again, it's not if it's
when?

Storie (34:47):
no kidding and you'll walk them and help these small
businesses and non-profits walkthrough the process of obtaining
what they need to do to toacquire that insurance and also
to get the insurance.

Angel (34:58):
Absolutely, and I partner with insurance agencies and
brokers that offer cybersecurityinsurance.

Storie (35:04):
So, yes, Wow, Are these mainly insurance workers for
small businesses for?
Commercial.

Angel (35:10):
Are they insurance.
They can write.
Most of them can write policiesregardless.

Storie (35:16):
Wow, that's incredible.
It's great information to know,as a business owner at least.
So what is your next mission,your next cohort?
What's on the horizon for you?
That's a good question.
If you don't want to tell us,that's fine, I definitely want
to tell you I am so much lookingforward to this AI that.

Angel (35:42):
I'm building that is going to, because the product
which I have not named.
I haven't given it a name yet,and that's okay.
I don't know what it's going tobe called of developing will be
useful to other consultants likemyself, because one person show

(36:04):
, even though I have a team ofpartners, I can multiply myself
by using this particularapplication.
Wow, other consultants can use,will be able to use the tool as
well, and so will largercorporations, because they have
the teams, they have the people,the cybersecurity people there,

(36:26):
that if I were to sell them anapplication, they can take the
same thing without me and run itthemselves.
So that is what I am mostexcited about is getting this
product developed, getting itmarketed and in the hands of the
people to be able to use.
I would love to be your testdummy on that one, by the way.

Storie (36:47):
I wholeheartedly trust you.
We say pilot program.

Angel (36:49):
Okay, pilot, I'd love to be your pilot.
It sounds more prestigious thantest dummy.

Storie (36:54):
I enjoy that, I love that and I love that you're
local and that you grew up here,because it seems like you
really have a passion for whatyou do.
So if anyone wants to learnmore about your education, your
workshops, obtainingcybersecurity insurance or any
of the things that you mentioned, how can they?

Angel (37:09):
reach you.
They can reach me through mywebsite, which is cybasecom.
Okay, I should know my number.
What's that?
858-413-risk?
There we go.

Storie (37:26):
You don't call yourself there, y'all I don't.

Angel (37:28):
858-413-risk.
Perfect, and you can find me onLinkedIn, angel Mosley, and I
think I'm the only Angel Mosleyout there, but you'll see
Sidebase Risk in the backgroundand I don't have an IG profile
just yet.
I'm working on that.

Storie (37:45):
But yeah.

Angel (37:46):
SidebaseRiskManagementcom .

Storie (37:49):
Well, I'll list all that information at the bottom of
this description and I reallyappreciate you educating me and
our audience.
And if anyone would like toreach out and be proactive about
protecting yourself, please,please click the link below to
reach Angel and get connected.
Stay protected, everyone.
We'll see you next time.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.