53 episodes

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up.
 
We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cybersecurity Weekly and begin your journey to becoming a more secure company.

Cybersecurity Weekly with Fred Cobb Fred Cobb, CISO - InfoSystems, Chattanooga, TN

    • Business

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up.
 
We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cybersecurity Weekly and begin your journey to becoming a more secure company.

    Cybersecurity Weekly - Season 1, Episode 28

    Cybersecurity Weekly - Season 1, Episode 28

    In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).

    • 13 min
    Cybersecurity Weekly - Season 1, Episode 27

    Cybersecurity Weekly - Season 1, Episode 27

    In this episode, Fred and Rob discuss how you can secure network devices. This is the fourth Foundational CIS Control and is used to secure the configuration for network devices such as Firewalls, Routers, and Switches. Secure configuration for network devices is most impactful when a company has taken action against the first ten CIS Controls (following the CIS Top 20 Cybersecurity Controls).

    • 13 min
    Cybersecurity Weekly - Season 1, Episode 26

    Cybersecurity Weekly - Season 1, Episode 26

    In this episode, Fred and Rob discuss Data Recovery Capability, the processes and tools used to back up your data. This is the fourth Foundational CIS Control and focuses on backing up and recovering your data as quickly as possible. Data Recovery Capability is most impactful when a company has taken action against the first nine CIS Controls (following the CIS Top 20 Cybersecurity Controls).

    • 13 min
    Cybersecurity Weekly - Season 1, Episode 25

    Cybersecurity Weekly - Season 1, Episode 25

    In this episode, Fred and Garrett discuss how you can manage ports, protocols, and services on devices connected to your company's network. This control focuses on minimizing your vulnerability to cyber-attackers. This is the third Foundational CIS Control and is used to minimize your vulnerability to attackers.

    • 18 min
    Cybersecurity Weekly - Season 1, Episode 24

    Cybersecurity Weekly - Season 1, Episode 24

    In this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).

    • 16 min
    Cybersecurity Weekly - Season 1, Episode 23

    Cybersecurity Weekly - Season 1, Episode 23

    In this episode, Fred and Garrett discuss the recent Mozilla Firefox Vulnerability Patches that were issued. These vulnerabilities have been found to allow cyber criminals to install programs, manipulate data, and create new accounts with full user rights under your account(s). Anyone currently using Mozilla Firefox versions prior to 77.0 should take immediate action.

    • 11 min

Top Podcasts In Business

Listeners Also Subscribed To