silent-sector-us

The Cyber Rants Podcast

Bringing you cybersecurity insider tips, guidance, news, and rants!

apple-logo-white      spotify-podcasts     podcast-iheartradio

Zach Fuller

Zach Fuller
Zach Fuller is an entrepreneur who has built businesses in multiple industries. He served as Green Beret in the U.S. Army, conducting highly sensitive combat operations in Afghanistan. Zach was awarded a Bronze Star Medal and other decorations for his actions overseas. He later built an investor relations team for a private equity company. Holding the role of Executive Vice President, he lead the team to raising well over $300,000,000 in private capital to acquire real estate assets and making it to the Inc. 500 list of Fastest Growing Private Companies. Zach is a Certified Ethical Hacker and founding partner of Silent Sector, where he is focused on mid-market and emerging companies which he considers to be the backbone of the American economy and our way of life.
Find me on: Medium.com, Apple Podcasts, Amazon, and Businesswire.com

Recent Posts

Episode #45 - Cyber Crime - Do People Care?

There is a lot of news about cyber attacks but the big question is, "Do people actually care?" This week the guys rant about cyber crime and how it affects people and companies who often don't care until it's too late. Through real-life examples, horror stories, and tips to help you stay protected, this episode is not one to miss! 

Open Episode

Episode #44: What Is Silent Sector?

This week the guys share what Silent Sector is all about, from the origins of the company to what makes the services and methodologies stand apart. The guys share their "why" behind what they do and what they are working to change in the world of cybersecurity. This episode is perfect for anyone wanting to know about Silent Sector at a deeper level.

Open Episode

Episode #43 - Top 5 Tips for Personal Cyber Protection

This week, the guys share simple tips that individuals and very small businesses can use to protect themselves and their data from cyber criminals, even without any technical background or experience! These are the basic cybersecurity measures that everyone should follow.

Open Episode

Episode #42 - Lessons and Silver Linings of the COVID Pandemic

This week the guys share what they saw in the cybersecurity and IT industries from the start of COVID to the current day. They share what went poorly as well as lessons learned and why our Nation's cybersecurity will come out stronger than pre-COVID.

Open Episode

Episode #41 - Both Sides of the Vendor Vetting Process

For some organizations, vendor vetting for cyber risk management is a process that runs like a well-oiled machine. For most, it's a tedious and challenging nightmare. This week, the guys discuss the vendor vetting process from both sides, vetting your vendors and navigating the vetting process of your prospects. They share how organizations of all sizes can use the vetting process to their advantage.

Open Episode

Episode #40 - Protect Your People From Themselves

This week, the guys discuss technical controls to protect your employees and protect your company from its own employees. From honest mistakes to gross negligence and malicious activity, proper protections minimize employee related cyber risk. The guys also share tips for configuring and issuing devices to your team members, which is especially critical for those working from home. 

Open Episode

Episode #39 - Combining Passion and Career with Heather Monthie, PhD

This week, the guys welcome Heather Monthie, PhD, who's illustrious career has blended her passions for cybersecurity, aviation, and education. She has been an integral part of K-12 and university education systems, developing STEM programs that build a stronger technology workforce.

Heather shares her insight about the world of cybersecurity education, plus valuable advice and resources for anyone looking to work toward a career in technology.  

Open Episode

Episode #38 - The Joy of Cybersecurity Policies!

Nobody loves cybersecurity governance documentation like we do! This week, the guys discuss cybersecurity policies and why the proper policies make all the difference for security, compliance, and audits. Plus, learn what documents are most important, why the "one size fits all" cybersecurity policy templates don't work, and how to build documentation to your exact needs. 

Open Episode

Episode #37 Keeping Your Data.. Your Data

From PII (Personal Identification Information) and PHI (Protected Health Information) to intellectual property and sensitive business information, the guys talk about how to keep your sensitive data from leaking to the outside world.
While there is no single answer, they cover both technology and governance tips to keep your data where it belongs. Plus, they rant to everyone, "Don't be a data hoarder!"

Open Episode

Episode #36 - Covering the "What Ifs" with Incident Response Planning

What's the difference between having an Incident Response Plan and just "winging it"? This week the guys talk about their real-world cybersecurity incidents and share their knowledge about proper planning and preparation. Having an incident response plan for cybersecurity is important. Learn what goes into incident response planning, who should be involved, and how to ensure everyone is on the same page for quick response and minimizing damage during a cyber-attack.

Open Episode
10103417-small

Send Us Your Questions & Rants!