28 episodes

Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” This series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers and industry leaders. It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant. You don’t want to miss this must-hear series.

30 Minutes with a Hacker TD SYNNEX Corporation

    • Technology

Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” This series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers and industry leaders. It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant. You don’t want to miss this must-hear series.

    You Think You’re Not a Target? Think Again!

    You Think You’re Not a Target? Think Again!

    Stan Rabin, CTO of Keno Kozie, joins us as our guest as we dive into the legal sector and why a hacker considers law firms, large and small, a prime target and the steps to take to protect yourself.

    • 29 min
    The War Is In Your Backyard

    The War Is In Your Backyard

    Join us as Lewis Needham and Rick Conlee of ATEC Group discuss several of the recent breaches that have taken place in Albany, NY and how that translates across the country and globally.  The war is not out there somewhere, it is in each of our backyards.  It is time small companies realize their exposure and take the steps to protect themselves or face the potential catastrophic outcome.

    • 29 min
    The Must Have Cybersecurity “Table Stakes” for Smaller Companies

    The Must Have Cybersecurity “Table Stakes” for Smaller Companies

    It is no surprise that if you don't have effective cybersecurity, your organization is exposed to bad actors. It’s not just a matter of if, but rather when, you will suffer a major breach – the effects of which could be catastrophic. Yet, it costs money to secure your organization and you likely can't afford to do everything. Focusing in on the critical, must-have cybersecurity solutions is essential to small to midsized businesses. Join us as we discuss the essential cybersecurity "table stakes" for smaller companies, with Monreal IT.

    • 31 min
    The Cybersecurity Skills Gap

    The Cybersecurity Skills Gap

    Join us as we discuss the global cybersecurity skills gap, the impact it is having on businesses and what organizations can do about it.

    • 29 min
    Why Having an Incident Response Plan is Critical to an Organization’s Survival

    Why Having an Incident Response Plan is Critical to an Organization’s Survival

    Join us as we discuss the importance of creating - and testing - an effective Incident Response Plan, which can make all the difference in whether your company can survive a cyber attack. Few organization realize they are either a direct target or a pathway to a larger target, and therefore susceptible to a breach that can have a potentially catastrophic impact. Learn the steps you need to take before a breach happens.

    • 32 min
    Important Aspects of Deploying an Effective SIEM or XDR Solution

    Important Aspects of Deploying an Effective SIEM or XDR Solution

    Join us as we discuss one of the critical elements for having a fighting chance against hackers. We dive into important elements of deploying an effective security information and event management (SIEM) solution and compare it to extended detection and response (XDR), something continuing to gain momentum in the marketplace for cybersecurity

    • 30 min

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
Conviction | Pod People
The New York Times
NPR
Ben Gilbert and David Rosenthal