37 episodes

Cybersecurity—a word we hear all the time. Show of hands for those who actually understand what it means.
The Tea on Cybersecurity is here to help educate the newbs on what cybersecurity is, why it is important, and everything in between. The Tea on Cybersecurity is for everyone, but especially those small and medium-sized businesses that are starting their journey in building a cyber risk management program. Each show is about 15-30 minutes long to deliver you with the facts and less fluff.

The Tea on Cybersecurity Trava Security

    • Technology
    • 5.0 • 7 Ratings

Cybersecurity—a word we hear all the time. Show of hands for those who actually understand what it means.
The Tea on Cybersecurity is here to help educate the newbs on what cybersecurity is, why it is important, and everything in between. The Tea on Cybersecurity is for everyone, but especially those small and medium-sized businesses that are starting their journey in building a cyber risk management program. Each show is about 15-30 minutes long to deliver you with the facts and less fluff.

    Identifying Third-Party Vendor Risks with Michael Magyar, Trava

    Identifying Third-Party Vendor Risks with Michael Magyar, Trava

    "Every business today runs on technology. Every business is a technology business. Right? Even a taco cart uses a little payment thing that you swipe your card in to do that." - Michael Magyar

    Michael Magyar, a seasoned cybersecurity expert with a decade of experience, joins host Jara Rowe on this episode of The Tea on Cybersecurity to give us the tea on third-party risks. As a penetration tester and a virtual Chief Information Security Officer (vCISO) with Trava, Michael brings unparalleled insight into the challenges and solutions surrounding vendor security. 
    Michael and Jara discuss the complex subject of third-party risks and why every business, big or small, needs to be cautious about their vendors' security practices. From identifying potential risks to evaluating security measures, Michael offers essential steps businesses should take if a vendor experiences a security incident, stressing the importance of containment, breach notification, and calling in the right experts for help.

    Key Takeaways:

    Third-Party risks are everywhere and to understand where these gaps could be, think about a vendor or third-party as “outsourced staff”What to look out for when working with any vendor or third - party, namely Public Statements of SecurityHow to handle a situation if a vendor or third-party of yours is breached
    Timestamps:
    [00:00 - 01:24] Introducing Identifying Third-Party Vendor Risks with Michael Magyar, Trava
    [01:25 - 02:36] Expanding understanding of vendors and third parties
    [03:59 - 05:25] Real-world examples of third-party risks - SolarWinds in 2020 and XZ Utils in 2024
    [02:36 - 03:59] How to identify risks associated with vendors and third parties
    [05:25 - 07:53] Red flags to look out for, plus Microsoft breach 
    [07:54 - 09:16] Penetration testing and third-party security
    [09:16 - 11:19] Other ways that businesses can help evaluate the security practices of a third-party
    [11:19 - 12:54] Key cybersecurity measures to look for when working with a vendor
    [12:54 - 13:40] Why it's essential for businesses to regularly check in on their external partners' cybersecurity efforts
    [13:41 - 15:42] Cybersecurity steps my company needs to take when signing on with a new vendor
    [16:41 - 20:02] Jara's Receipts

    Connect with the Guest:
    Michael Magyar's LinkedIn

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity 

    • 20 min
    Cyber Trust and Transparency with John Boomershine, BlackInk IT

    Cyber Trust and Transparency with John Boomershine, BlackInk IT

    “Trust is foundational to both the relationship, interpersonal relationship, B2B relationship. Then also we're having to convey that trust to our customers," - John Boomershine

    John Boomershine– also known as Boomer– sits down with host, Jara Rowe in this episode of The Tea on Cybersecuity to talk about trust and transparency in cybersecurity. As the Vice President of Security and Compliance at BlackInk IT, Boomer brings nearly 40 years of experience in the IT realm, and a wealth of knowledge particularly focused on cybersecurity and compliance. 

    Boomer and Jara discuss why trust and transparency are absolute bedrocks in the world of cybersecurity. Boomer elaborates on the importance of effective communication, revealing how businesses can use privacy policies and FAQ sections to build consumer confidence. He takes us through the game-changing NIST and CIS frameworks and why adopting these can fortify your cybersecurity strategy. Additionally, he stresses the importance of having a solid incident response plan when things go south and emphasizes that cybersecurity is a team effort—everyone has a role to play, from implementing MFA to raising your hand when in doubt.

    In this episode, you’ll learn: 
    Trust is foundational for cybersecurity in any organization and the cornerstone of a great client relationshipWhy you need to have a superhero plan for cyber incidents to tackle any problem that may come up quickly and efficiently.To boost your customer confidence and safety, you need to adopt a cybersecurity framework to act as your compass, guiding you on what’s essential to protect your business and your data. 
    Things to listen for:
    [00:00- 00:55]  Introduction to The Tea on Cybersecurity
    [01:53 - 03:16] Trust is foundational in cybersecurity and business
    [03:16 - 05:34] Effectively communicating data handling with your customers 
    [05:35 - 08:41] CIS controls framework: 18 sections, 153 safeguards.
    [08:42 - 11:10] Data collection transparency and where companies should focus on
    [11:15 - 12:46] Some of the biggest challenges businesses face in maintaining transparency and trust
    [12:46 - 14:12] Combating cyber threats with teamwork and commitment
    [14:14 - 16:03] Final thoughts from Boomer
    [16:17 - 19:55] Jara’s Receipts

    Resources:
    How SOC2 helps you build trust with clients7 Tips for Talking to Your Customers After Getting Hacked

    Connect with the Guest:
    John Boomershine’s LinkedIn

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity 

    • 20 min
    Defending Your Data Through Cyber Hygiene with Industry Experts Craig Saldanha and Mario Vlieg, Insight Assurance

    Defending Your Data Through Cyber Hygiene with Industry Experts Craig Saldanha and Mario Vlieg, Insight Assurance

    “Education is by far the most cost-effective tool that you can deploy in your organization before any other types of information, security controls, or complex tools or any additional services. Using the hygiene analogy, you can buy the most expensive toothbrush, and you can buy the fanciest toothpaste. But if you don't teach your child that they need to brush their teeth every night, they're still going to get cavities.” - Mario Vlieg

    Host Jara Rowe and guests Craig Saldanha and Mario Vlieg discuss good digital hygiene practices in this episode. We dive into best digital hygiene practices, common weak spots, and digital breach response plans.

    Learn more about technology trends like AI and machine learning that enhance cyber defenses, practical tips and resources for improving cyber hygiene habits, and future challenges and opportunities in the field. We also explore regulatory standards, frameworks, and compliance, emphasizing their contribution to robust cyber hygiene practices. 

    In this episode, you’ll learn: 
    Why employees should be educated about the latest cyber threats, recognize phishing attempts, and adopting best practices in cybersecurity. What steps organizations and individuals can take to assess and recover effectively in a data breach.Why advancements in technologies are enhancing cyber hygiene efforts even as they introduce new risks. 
    Things to listen for:
    [01:20 - 02:14] Definition of cyber hygiene
    [03:12 - 03:59] The role of Employee training and awareness in cyber hygiene
    [03:59 - 04:52] How often organizations and individuals should review digital hygiene practices
    [05:08 - 06:00] Emerging technologies that can help with cyber hygiene efforts
    [06:00 - 08:23] Tips and resources for improving cyber hygiene habits
    [08:26 - 09:18] Challenges and opportunities in the future of cyber hygiene
    [09:20 - 10:04] The most cost-effective cyber security tool for early SaaS companies and founders 
    [10:17 - 11:56] What steps organizations should take to assess the impact and recover from a data breach
    [12:00 - 13:56] How compliance standards and frameworks improve cyber hygiene practices
    [13:56 - 15:39] Proactive steps to improve cyber hygiene practices
    [15:47 - 19:15] Jara’s receipts


    Resources:
    Cyber Hygiene ExplainedCybersecurity Awareness Training is Not an Option, It’s EssentialData Security 101: Decoding Incidents and BreachesWhy Human Error is the Cause of Most Data Breaches

    Connect with the Guest:
    Craig Saldanha’s LinkedIn
    Mario Vlieg’s LinkedIn

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com 
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity

    • 19 min
    Mastering Incident Response Plans and Tabletop Exercises with Christina Annechino, Trava

    Mastering Incident Response Plans and Tabletop Exercises with Christina Annechino, Trava

    “Especially if this is the first time an organization is creating a plan like this, the focus should really be working on it piece by piece to not be overwhelmed. So, start outsmall. What are the designated roles and responsibilities that you have? Then, determine how the plan can best fit your needs. This can be done by assessing what types of incidents are most detrimental to your organization.” - Christina Annechino

    Host Jara Rowe and guest Christina Annechino delve into incident response plans and tabletop exercises in this week’s episode. We’ll identify common challenges with developing incident response plans and the ins and outs of tabletop exercises. 

    Gain tips on forming an incident response plan and insight into the documentation and testing requirements and compliance standards such as NIST, SOC 2, PCI DSS, and ISO 27001. We provide a comprehensive understanding of the critical elements and processes involved in incident response planning, compliance, and tabletop exercises.

    In this episode, you’ll learn: 

    What defines an incident, and what to include in an incident response plan to be prepared and compliant. Why tabletop exercises are essential for identifying any gaps in the documented processes and procedures and preparing teams for emergencies.How incident response plans and tabletop exercises are crucial in compliance readiness and maintaining security certifications. 
    Things to listen for:

    [01:58 - 02:40] Definition of an incident and incident response plan
    [03:55 - 04:34] Tips for creating an incident response plan
    [04:51 - 05:25] The role of incident response plans in overall risk management
    [05:33 - 06:00] How incident response plan maintain security and annual certifications
    [06:21 - 07:05] Definition of a tabletop exercise and its role in incident response plans
    [07:10 - 08:18] How often to conduct tabletop exercises and their challenges and benefits
    [08:34 - 09:19] Addressing compliance-related aspects through tabletop exercises
    [09:30 - 09:59] Compliance standards and the importance of testing incident response capabilities
    [10:06 - 10:36] Demonstrating a functional incident response plan during compliance audits
    [10:47 - 10:56] Structure of documentation for incident response plans and tabletop exercises
    [11:07 - 11:43] Tips on creating an incident response plan and the purpose of tabletop exercises
    [12:1 - 15:15] Jara’s receipts

    Resources:

    Data Security 101: Decoding Incidents and Breaches
    Data Breach Preparedness: Developing an Incident Response Plan
    7 Tips for Talking to Your Customers After Getting Hacked


    Connect with the Guest:
    Christina Annechino’s LinkedIn

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com 
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity

    • 15 min
    Navigating Asset Management and Compliance with Marie Joseph, Trava

    Navigating Asset Management and Compliance with Marie Joseph, Trava

    “Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph

    This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.
    Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.

    In this episode, you’ll learn: 

    Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements. 

    Things to listen for:

    [00:00 - 00:18] Intro to The Tea on Cybersecurity
    [00:48 - 02:44] The definition of asset inventory and asset management
    [04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements
    [04:34 - 05:51] Common challenges with establishing a complete asset inventory
    [07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts
    [09:34 - 10:29] How asset management contributes to maintaining compliance.
    [12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance
    [13:48 - 14:55] The importance of tracking all devices connected to a network
    [15:23 - 17:48] Jara’s receipts

    Resources:
    From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets
    Regular Software Updates and Patching: The Importance of Staying on Top of This

    Connect with the Guest:
    Marie Joseph's LinkedIn

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com 
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity

    • 18 min
    Deciphering Risk Management and Compliance with Michael Magyar

    Deciphering Risk Management and Compliance with Michael Magyar

    “Not only do we need to understand what risks might exist, but we need to understand what impact that might have. That goes into both the chance that they're going to happen and the chance that they're going to be successful in creating damage, and then also the likely damage that's going to happen from them.” - Michael Magyar
    On this week’s episode, host Jara Rowe gets the tea on risk management with Trava’s vCISO consultant, Michael Magyar. Hear what risk management is, how it differs from crisis management, and what considerations fall under each to maintain compliance. 

    This episode serves as a comprehensive guide for listeners looking to gain a better understanding of risk management, compliance, and general cybersecurity practices. Michael encourages a proactive approach to risk assessment and management to enhance organizational cybersecurity with actionable advice. 

    What you’re learn:
    Why risk management is proactive and crisis management is reactive, and how to approach both from a preparation standpoint.What components of risk management realistically fall under compliance, and why understanding this helps you mitigate potential risk.How to start small with risk assessment to identify possible risks and how they might impact your business to build a foundation for effective risk management and cybersecurity practices. 
    Things to listen for:
    [02:57 - 03:28] Explanation of risk as exposure to danger, harm, or loss
    [05:45 - 06:53] The importance of risk management for businesses
    [06:59 - 07:54] Comparison of risk management and crisis management
    [08:14 - 10:00] Key components of being proactive in cybersecurity
    [10:07 - 12:27] The role of risk management in compliance efforts
    [12:37 - 14:38] Challenges and tips in aligning risk management with compliance standards
    [15:17 - 17:47] Michael's advice for organizations and general cybersecurity
    [17:55 - 20:32] Jara’s receipts

    Resources:
    How to Choose the Right Cyber Risk Management Solution Provider
    What is Risk Management?

    Connect with the host:
    Jara Rowe’s LinkedIn

    Connect with Trava:
    Website www.travasecurity.com 
    Blog www.travasecurity.com/blog
    LinkedIn @travasecurity
    YouTube @travasecurity

    • 28 min

Customer Reviews

5.0 out of 5
7 Ratings

7 Ratings

PeaceGirl88 ,

what an important topic!

We take tech for granted in all we do in life and business, this podcast is bringing important info for a thriving business!

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Catalyst with Shayle Kann
Latitude Media
Hard Fork
The New York Times
TED Radio Hour
NPR