Cybersecurity Sense

Cybersecurity Sense

45 episodes

CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAMP, FISMA Compliance, HIPAA Compliance, HITRUST CSF Certifications, NIST 800-171 Certifications, PCI Data Security Standards, SOC Reporting and SOX Compliance.

Podcasts

Hiring Perspectives

Published: Dec. 8, 2020, 10:44 p.m.
Duration: 42 minutes 53 seconds

Listed in: Technology

Information Security Careers (Part 2)

Published: Nov. 10, 2020, 8:47 p.m.
Duration: 21 minutes 48 seconds

Listed in: Technology

Information Security Careers

Published: Oct. 21, 2020, 12:06 a.m.
Duration: 36 minutes 21 seconds

Listed in: Technology

What is the Cybersecurity Maturity Model Certification (CMMC)?

Published: Oct. 21, 2020, 12:02 a.m.
Duration: 28 minutes 42 seconds

Listed in: Technology

HITRUST Guide

Published: Sept. 18, 2020, 8:14 p.m.
Duration: 13 minutes 42 seconds

Listed in: Technology

PCI Pen Testing

Published: July 10, 2020, 5 p.m.
Duration: 27 minutes 6 seconds

Listed in: Technology

The Return to a "New Normal"

Published: May 20, 2020, 8:22 p.m.
Duration: 21 minutes 48 seconds

Listed in: Technology

The Impact of Remote Work on IT Audits

Published: May 6, 2020, 6:29 p.m.
Duration: 15 minutes 46 seconds

Listed in: Technology

Using Zoom Securely

Published: April 22, 2020, 5:52 p.m.
Duration: 21 minutes 41 seconds

Listed in: Technology

Not All Phishing Assessments Are Equal

Published: April 9, 2020, 11:59 p.m.
Duration: 16 minutes 20 seconds

Listed in: Technology

MFA is NOT a Silver Bullet

Published: April 9, 2020, 11:56 p.m.
Duration: 18 minutes 12 seconds

Listed in: Technology

HITRUST Conference Overview

Published: Aug. 16, 2019, 8:34 p.m.
Duration: 20 minutes 44 seconds

Listed in: Technology

Key Insights on PCI DSS Version 4.0

Published: May 29, 2019, 10:06 p.m.
Duration: 13 minutes 8 seconds

Listed in: Technology

New Tools for PCI Compliance

Published: May 15, 2019, 4:41 p.m.
Duration: 15 minutes 44 seconds

Listed in: Technology

2018 Was Second-Most Active Year for Data Breaches

Published: March 20, 2019, 3:12 a.m.
Duration: 10 minutes 30 seconds

Listed in: Technology

Targeted Attacks Compared to Opportunistic Attacks

Published: Oct. 3, 2018, 8:51 p.m.
Duration: 8 minutes 28 seconds

Listed in: Technology

Incident Response Should Be Common Sense

Published: Aug. 16, 2018, 4:43 p.m.
Duration: 7 minutes 23 seconds

Listed in: Technology

Attack Simulation

Published: July 18, 2018, 2:07 p.m.
Duration: 6 minutes 28 seconds

Listed in: Technology

Purple-Teaming

Published: July 10, 2018, 3:24 p.m.
Duration: 6 minutes 59 seconds

Listed in: Technology

GDPR and Preparing for DSARs

Published: May 8, 2018, 8:03 p.m.
Duration: 15 minutes 56 seconds

Listed in: Technology

GDPR—How to Prepare

Published: May 8, 2018, 7:50 p.m.
Duration: 16 minutes 49 seconds

Listed in: Technology

Does GDPR Apply to Me?

Published: May 8, 2018, 7:33 p.m.
Duration: 14 minutes 38 seconds

Listed in: Technology

Why Employees Are Your Number One Risk

Published: April 19, 2018, 4:47 p.m.
Duration: 9 minutes 36 seconds

Listed in: Technology

Phishing Emails with 100% Click Rate

Published: April 10, 2018, 7:53 p.m.
Duration: 6 minutes 49 seconds

Listed in: Technology

IIA Knoxville—Implementing Cloud-Managed Security

Published: April 10, 2018, 7:38 p.m.
Duration: 7 minutes 42 seconds

Listed in: Technology

IIA Knoxville—Risky Business

Published: March 19, 2018, 5:51 p.m.
Duration: 7 minutes 8 seconds

Listed in: Technology

IIA Knoxville—Dear President Trump: How to Secure the United States & Demonstrate That Your Company Is

Published: March 12, 2018, 5:14 p.m.
Duration: 7 minutes 36 seconds

Listed in: Technology

IIA Knoxville—SOC for Cybersecurity

Published: March 5, 2018, 5:51 p.m.
Duration: 5 minutes 53 seconds

Listed in: Technology

5 Reasons Why Organizations Don’t Detect a Cyber Breach

Published: Jan. 18, 2018, 4:15 p.m.
Duration: 9 minutes 33 seconds

Listed in: Technology

2017 Year-End Healthcare Breach Review

Published: Jan. 12, 2018, 4:07 p.m.
Duration: 11 minutes 11 seconds

Listed in: Technology

Law Firms are Cybersecurity Targets

Published: Dec. 19, 2017, 5:24 p.m.
Duration: 7 minutes 45 seconds

Listed in: Technology

SOC for Cybersecurity

Published: Dec. 12, 2017, 8:11 p.m.
Duration: 23 minutes 15 seconds

Listed in: Technology

Information Security Questions for SMBs

Published: Dec. 5, 2017, 5:02 p.m.
Duration: 10 minutes 19 seconds

Listed in: Technology

Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data

Published: Nov. 27, 2017, 8:42 p.m.
Duration: 15 minutes 46 seconds

Listed in: Technology

Manufacturing and Industrial Sectors Are Cybersecurity Targets

Published: Nov. 13, 2017, 5:13 p.m.
Duration: 7 minutes 21 seconds

Listed in: Technology

Attacking the InfoSec Supply Chain

Published: Nov. 1, 2017, 7:20 p.m.
Duration: 8 minutes 17 seconds

Listed in: Technology

Kaspersky vs the U.S. Government

Published: Oct. 2, 2017, 10:50 p.m.
Duration: 9 minutes 12 seconds

Listed in: Technology

Ransomware and Unintended Disclosure

Published: Sept. 24, 2017, 8:37 p.m.
Duration: 9 minutes 46 seconds

Listed in: Technology

Risks Rising for Email Data Breaches

Published: Sept. 14, 2017, 4:30 p.m.
Duration: 10 minutes 40 seconds

Listed in: Technology

The Risks of Remote Access

Published: Aug. 28, 2017, 10:55 p.m.
Duration: 9 minutes 20 seconds

Listed in: Technology

Attacker Dwell Time

Published: Aug. 22, 2017, 6:42 p.m.
Duration: 8 minutes 52 seconds

Listed in: Technology

Combating Insider Threats

Published: Aug. 8, 2017, 9:56 p.m.
Duration: 9 minutes 15 seconds

Listed in: Technology

Business Email Compromise: When The Threat is Internal

Published: Aug. 8, 2017, 9:39 p.m.
Duration: 12 minutes

Listed in: Technology

How To Create SIEM ROI

Published: Aug. 1, 2017, 6:53 p.m.
Duration: 16 minutes 28 seconds

Listed in: Technology

The Value of Incident Response Table Top Exercises

Published: July 26, 2017, 4:02 p.m.
Duration: 9 minutes 38 seconds

Listed in: Technology