12 episodes

Are you looking for a reliable source of information on cybersecurity and future-ready solutions?
Logically Speaking - the speaker series from Logically - has got you covered.
Hosted by Logically’s Chief Revenue Officer, Steven Rivera, each episode of Logically Speaking will bring industry experts to cover a variety of topics such as ransomware trends, data breach prevention protocols, cloud services security, and much more. Our aim is to provide you with the tools and knowledge you need to keep your organization secure and future-ready.
Whether you’re a cybersecurity professional or simply interested in learning more about cybersecurity and the growing complexity in technology, Logically Speaking is the perfect source of information for you.

Logically Speaking Logically

    • Technology
    • 5.0 • 6 Ratings

Are you looking for a reliable source of information on cybersecurity and future-ready solutions?
Logically Speaking - the speaker series from Logically - has got you covered.
Hosted by Logically’s Chief Revenue Officer, Steven Rivera, each episode of Logically Speaking will bring industry experts to cover a variety of topics such as ransomware trends, data breach prevention protocols, cloud services security, and much more. Our aim is to provide you with the tools and knowledge you need to keep your organization secure and future-ready.
Whether you’re a cybersecurity professional or simply interested in learning more about cybersecurity and the growing complexity in technology, Logically Speaking is the perfect source of information for you.

    Beyond 2FA: Increasing Business Security, Insights from John Swanson at GitHub

    Beyond 2FA: Increasing Business Security, Insights from John Swanson at GitHub

    It's time to move beyond simple passwords and simple secrets. In this bonus episode of the podcast, Tatianna Harris talks with John Swanson, Director of Security Strategy at GitHub, about a business' weak link; insufficient security. "Humans are humans, and they'll reuse passwords. MFA is the most dramatic thing any business can do to remain resilient against compromise."
    Listening to this episode, you'll learn:
    Why any 2FA is better than no 2FA.How to implement two-factor or multi-factor authentication in your business.What options to consider when evaluating your security needs.The potential negative ramifications to your business without having today's most basic security measures in place.Reach out to John Swanson: https://www.linkedin.com/in/swannysec/
    Connect with Tatianna Harris: https://www.linkedin.com/in/tatiannaharris/

    • 28 min
    Asset & Data Management in “The Disposable Era” with Aaron Zeper

    Asset & Data Management in “The Disposable Era” with Aaron Zeper

    Ensuring data privacy and confidentiality is no small order, but the most overlooked part of that? Proper data and asset management and destruction. In this episode, Steve and CEO of DMD Systems Recovery, Aaron Zeper, dive into the three main areas of critical asset management: physical, data, and virtual.
    Tune in to this discussion to:
    Uncover the unglamorous side of IT - asset disposalUnderstand why virtual assets are just as useful as physical devices in the hands of attackersConsider environmental factors at play in your management strategyKnow the chain of responsibility when it comes to your assets and data

    • 32 min
    Building Business Continuity & Resilience with Max Alexander

    Building Business Continuity & Resilience with Max Alexander

    Business continuity and cyber resilience are terms many professionals know. But, they don't always understand what it takes for an organization to be resilient and maintain continuity. This week, Logically CRO, Steve Rivera, and JPMorgan Chase VP, Max Alexander, touch on threat actor TTPs hitting small and mid-size businesses, the recovery process after an attack, and everything in between.
    Tune in to this discussion to:
    Discovery common tactics, techniques, and procedures used by big-name threat actors.Learn how to empower employees to make the best secure decisions to avoid unintentional insider threat.Understand why having an incident response and recovery plan in place (before an attack!) could save your company millions.

    • 53 min
    Decoding Cybersecurity: The Nuances of Securing Technology

    Decoding Cybersecurity: The Nuances of Securing Technology

    No one has security “figured out”, and that’s OK. Matt Lee from Pax8 dives into nuances of cybersecurity from impacts on businesses to customers, and what we really mean when talking about securing technology. In this special event edition of Logically Speaking, Tatianna and Matt review the history of technology and how its advancement requires a new lens to understand and adapt to today’s expectations and standards. Learn as Matt shares his experiences in IT and Cybersecurity and the major challenges he sees businesses facing in the wake of artificial intelligence.
    Reach out to Matt Lee - https://www.linkedin.com/in/cybermattlee/
    Reach out to Tatianna Harris - https://www.linkedin.com/in/tatiannaharris/

    • 28 min
    Trained to Protect: Creating a Culture of Security with Tiffany Ricks

    Trained to Protect: Creating a Culture of Security with Tiffany Ricks

    Happy cybersecurity awareness month!
    In this week’s episode of Logically Speaking, we welcome special guest, Tiffany Ricks, Founder and CEO of HacWare, to share her experiences in IT and Cybersecurity and the major challenges facing businesses today. As a former Ethical Hacker, Tiffany saw first hand how hard it was for companies to protect their company from phishing attacks and other threats. But, having the right support within an organization can make being compromised a bit harder for attackers. Steve and Tiffany dive in to:
    Preventing disgruntled employees from turning into insider threatsDiscovering how to cultivate a culture of security in an organizationTop current and emerging threats facing businesses todayLearn more about the importance of training your employees and the positive impacts it will have for you.

    • 53 min
    Effects of Compromise: Incident Recovery and Data Sharing with Michael F.D. Anaya

    Effects of Compromise: Incident Recovery and Data Sharing with Michael F.D. Anaya

    Starting season 2 of Logically Speaking, we welcome special guest, Michael F.D. Anaya, Founder of decodingCyber and the Global Director of Attribution at Palo Alto Networks. This episode is packed with critical information every business should know as Steve and Michael dive deep into remote cyber threats, incident response, legal ramifications of a breach, and the importance of data sharing after a compromise. After enjoying this episode, you’ll understand what your business has that threat actors covet, and how to better prepare for and respond to potential attacks.
    Key Takeaways from the Episode
    Understand threat actors and their motivations for cyber crimeLearn the effects of compromise to businesses in every industryDiscover tips on how to effectively mitigate attacksFind out why data sharing is critical after any compromise

    • 55 min

Customer Reviews

5.0 out of 5
6 Ratings

6 Ratings

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Catalyst with Shayle Kann
Latitude Media
TED Radio Hour
NPR
Hard Fork
The New York Times