This week, The guys discuss Wireless Device Penetration testing, and reveal why not only any organization that has wireless devices needs to undergo a test, but also how potential household smart items that you may have could be at risk as well!
This week, The guys discuss Wireless Device Penetration testing, and reveal why not only any organization that has wireless devices needs to undergo a test, but also how potential household smart items that you may have could be at risk as well!
There is a lot of news about cyber attacks but the big question is, "Do people actually care?" This week the guys rant about cyber crime and how it affects people and companies who often don't care until it's too late. Through real-life examples, horror stories, and tips to help you stay protected, this episode is not one to miss!
This week the guys share what Silent Sector is all about, from the origins of the company to what makes the services and methodologies stand apart. The guys share their "why" behind what they do and what they are working to change in the world of cybersecurity. This episode is perfect for anyone wanting to know about Silent Sector at a deeper level.
This week, the guys share simple tips that individuals and very small businesses can use to protect themselves and their data from cyber criminals, even without any technical background or experience! These are the basic cybersecurity measures that everyone should follow.
This week the guys share what they saw in the cybersecurity and IT industries from the start of COVID to the current day. They share what went poorly as well as lessons learned and why our Nation's cybersecurity will come out stronger than pre-COVID.
For some organizations, vendor vetting for cyber risk management is a process that runs like a well-oiled machine. For most, it's a tedious and challenging nightmare. This week, the guys discuss the vendor vetting process from both sides, vetting your vendors and navigating the vetting process of your prospects. They share how organizations of all sizes can use the vetting process to their advantage.
This week, the guys discuss technical controls to protect your employees and protect your company from its own employees. From honest mistakes to gross negligence and malicious activity, proper protections minimize employee related cyber risk. The guys also share tips for configuring and issuing devices to your team members, which is especially critical for those working from home.
This week, the guys welcome Heather Monthie, PhD, who's illustrious career has blended her passions for cybersecurity, aviation, and education. She has been an integral part of K-12 and university education systems, developing STEM programs that build a stronger technology workforce.
Heather shares her insight about the world of cybersecurity education, plus valuable advice and resources for anyone looking to work toward a career in technology.
Nobody loves cybersecurity governance documentation like we do! This week, the guys discuss cybersecurity policies and why the proper policies make all the difference for security, compliance, and audits. Plus, learn what documents are most important, why the "one size fits all" cybersecurity policy templates don't work, and how to build documentation to your exact needs.
Silent Sector® builds and strengthens exceptional cybersecurity programs for US-based mid-market and emerging companies.
Expertise-Driven Cybersecurity®