Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Join three longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices." Zach Fuller, Mike Rotondo, and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back when it comes to cybersecurity and compliance!

Episodes

November 15, 2022 38 min

This week the guys (and "Skippy the Intern") are joined by special guest, Caren Shiozaki, to discuss cybersecurity considerations among executive teams and boards of directors. Caren shares her experience as a technology executive, insights at the leadership level, and emerging trends that are changing the thought process around cybersecurity and compliance.

Pick up your copy of Cyber Rants on Amazon.
Looking to take your Cy...

Mark as Played

Cyber insurance is critical for risk management and the requirements are changing rapidly. With rate increases averaging 25-45% per year and many companies being declined for coverage altogether, this week the guys get the inside scoop with cyber insurance expert, Adam Guyton. Adam shares some important cyber insurance insights including how to get the most out of your policy, what to look for in your coverage, insurance carrier re...

Mark as Played

This week, the guys welcome Founder and President of the Idaho Technology Council, Jay Larsen. They discuss his journey to building Idaho's premier tech organization, how technology councils help businesses thrive, the traits of a strong entrepreneurial ecosystem, and the benefits technology companies bring to their communities. 


Visit www.idahotechcouncil.org for more about the Idaho Tech Council.
Pick up your copy of Cyber Rant...

Mark as Played

Unfortunately, there are some IT professionals who feel threatened when a 3rd party cybersecurity team is engaged. While it's the exception rather than the norm, there are both in-house and 3rd party IT professionals who become uncooperative, feeling as if security people are trying to poke holes in their work. While many IT professionals are very accepting of cybersecurity support, it should never be the case that anyone feels...

Mark as Played

Thinking about a career in cybersecurity? This week, the guys share their thoughts about getting into the cybersecurity field. They share the pros and cons of the job, training and experience that helps along the way, how to find your first position or two, plus some reasons why cybersecurity is NOT a good career for some people. Chances are, you're probably closer than you realize to landing your first cybersecurity job.

Pick u...

Mark as Played
October 4, 2022 40 min

As technology's most widespread and trusted vendors are compromised, who can you really trust in today's environment? This week, the guys discuss attacks originating from compromised tech products, how the bad guys gain insider access, multi-factor authentication fatigue, and even a few hints at their love for Rick Astley.


Get the show notes and articles at www.CyberRantsPodcast.com
Pick up your copy of Cyber Rants on Amazon.
...

Mark as Played

Cloud services can offer tremendous benefits and cloud computing environments have become a standard across all industries. However, marketing hype leads consumers to believe that "the cloud is secure" by default and that someone else is taking responsibility for their protection. Too many people are quick to adopt cloud services without truly understanding the risks. This week, the guys discuss the risks and considerations...

Mark as Played
September 13, 2022 31 min

Ransomware can infect your on-premise or cloud environments at any given time but we've noticed that ransomware attacks seem to spike during certain times of the year. This week, the guys talk about how ransomware can be deployed on your devices, how to prevent ransomware attacks, and even some horror stories from how ransomware has impacted major networks.


Get the show notes and articles at www.CyberRantsPodcast.com
Pick up your...

Mark as Played

It's cyber risk assessment season! This is the time of year when many organizations seem to perform their annual cyber risk assessment. Unfortunately, the standard methods often result in limited visibility. This week, the guys discuss a more holistic risk assessment approach to make your cybersecurity program stronger than ever.

Get the show notes and articles at www.CyberRantsPodcast.com
Pick up your copy of Cyber Rants on Amaz...

Mark as Played

This week, the guys discuss some cybersecurity trends, tips, and words to the wise that are timely and relevant in today's technology-centric world! They discuss: 

  • Are attacks ramping up and if so, why?
  • The pros and cons of spending your cybersecurity budget on Black Hat and DefCon
  • Why you need specific objectives in your penetration testing, not just the numbers
  • The wrong and right way to establish vendor relationships
  • And more! 
  • Ge...

    Mark as Played

    Does your company recruit IT and cybersecurity staff with the same methods used to fill other positions? If so, don't miss this episode. This week, the guys welcome Cammas Freeman, an expert on finding and retaining the best technology professionals. Cammas shares a unique approach for recruiting the best talent, using a methodology that saves a tremendous amount of time and money. She also shares tips to build a strong culture...

    Mark as Played

    Cyber criminals are heavily focused on compromising backups so their attacks are as crushing and painful as possible for the victims. Good backups and the ability to quickly restore are a critical part of every infosec program but many organizations still treat backups as an afterthought. This week, the guys welcome the recognized authority on data backup W. Curtis Preston (aka. Mr. Backup) to reveal the backup and recovery trends ...

    Mark as Played

    This week, the guys discuss one of their favorite topics, Payment Card Industry Data Security Standards (PCI DSS)! Companies that transmit, process, or store credit card data need to be compliant but PCI has its own nuances. What level of PCI compliance do you need? How do you determine what is in scope? How do you work with auditors? The guys answer these questions and more, plus share some wizard-like tactics to help you maneuver...

    Mark as Played

    Inflation and other economic factors are affecting companies large and small. Some organizations are cutting budgets but still have security and compliance requirements to maintain. This week, the guys discuss what organizations can do if they need to reduce spending, how to get the most bang for your buck, plus mistakes you don't want to make during turbulent times. 

    Pick up your copy of Cyber Rants on Amazon.
    Looking to take yo...

    Mark as Played

    Building and managing a cybersecurity program can be confusing for organizations with multiple product lines, subsidiaries, or industry divisions. How do you manage security across all business units? What can you do to set standards that are followed by the entire organization? How do you control the quality of the cyber risk management practices through different cultures? This week, the guys answer these questions and more, disc...

    Mark as Played

    This week, the guys reconvene after a mini-hiatus and talk about some topics and tips in the news today such as 

  • Goodwill Ransomware Hacking
  • Safe Browsing - the hidden dangers people need to know
  • A word to the wise about Wordpress (even though they supposedly "don't talk about wordpress")

  • Pick up your copy of Cyber Rants on Amazon.
    Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com
    Be su...

    Mark as Played

    Is there really such a thing as "offense" in cybersecurity? This week, the guys discuss how it's possible to proactively protect organizations against criminals and how to identify potential attacks so you can stop them before it's too late. They share the realities of offensive cybersecurity and "hacking back."

    Pick up your copy of Cyber Rants on Amazon.
    Looking to take your Cyber Security to the next level? ...

    Mark as Played

    Think that cybersecurity is all about protecting data and achieving compliance? Think again! This week the guys share real-world examples about companies using cybersecurity to grow revenue, create a competitive advantage, and become market leaders! Learn how to use your cybersecurity program to create an outstanding return on investment!


    Pick up your copy of Cyber Rants on Amazon.
    Looking to take your Cyber Security to the next leve...

    Mark as Played

    This week, the guys continue to walk through the NIST Cybersecurity Framework, by discussing the Detect, Respond, and Recover control categories. They rant about logging, SIEMs, and incident response when you're facing a worst case scenario.

    Pick up your copy of Cyber Rants on Amazon.
    Looking to take your Cyber Security to the next level? Visit us at www.silentsector.com
    Be sure to rate the podcast, leave us a review, and subsc...

    Mark as Played

    A cybersecurity framework is the foundation of any good cyber risk management program but many people are not familiar with what a framework really is and what they include. This week the guys reveal the importance of following an industry-recognized cybersecurity framework and begin walking through the National Institute of Standards & Technology Cybersecurity Framework (NIST CSF) as an example. You'll understand why cyber...

    Mark as Played

    Popular Podcasts

      Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

      Crime Junkie

      If you can never get enough true crime... Congratulations, you’ve found your people.

      The Piketon Massacre

      The most notorious mass murder in Ohio’s history happened on the night of April 21, 2016 in rural Pike County. Four crime scenes, thirty-two gunshot wounds, eight members of the Rhoden family left dead in their homes. Two years later a local family of four, the Wagners, are arrested and charged with the crimes. As the Wagners await four back-to-back capital murder trials, the KT Studios team revisits Pike County to examine: crime-scene forensics, upcoming legal proceedings, and the ties that bind the victims and the accused. As events unfold and new crimes are uncovered, what will it mean for all involved? What will it mean for Pike County?

      Morbid

      It’s a lighthearted nightmare in here, weirdos! Morbid is a true crime, creepy history and all things spooky podcast hosted by an autopsy technician and a hairstylist. Join us for a heavy dose of research with a dash of comedy thrown in for flavor.

      Stuff You Should Know

      If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks then look no further. Josh and Chuck have you covered.

    Advertise With Us

    For You

      Music, radio and podcasts, all free. Listen online or download the iHeart App.

      Connect

      © 2022 iHeartMedia, Inc.