Cybersecurity: Amplified And Intensified-logo

Cybersecurity: Amplified And Intensified

Technology Podcasts

Plans are useless but planning is indispensable and crisis will reveal how you operate. Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.

Plans are useless but planning is indispensable and crisis will reveal how you operate. Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.

Location:

United States

Description:

Plans are useless but planning is indispensable and crisis will reveal how you operate. Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.

Language:

English

Contact:

2018127300


Episodes

Episode 33 - Vulnerability Disclosure Programs (VDP) with Matt Lee

10/18/2021
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the...

Duration:00:43:32

Episode 32 - Ransomware recourse.

10/11/2021
After a one week hiatus Eric and Shiva are back discussing what needs to be done to bring meaningful and lasting change to our security posture. Articles referenced are listed...

Duration:00:46:50

Escalate, Exfiltrate & Encrypt - Round 10

10/8/2021
Steve Taylor runs an MSP while podcasting at The RocketMSP Podcast with new episodes being released weekly. The RocketMSP podcast interviews great guests from around the industry while having some fun along the way! You can also find Steve in the RocketMSP peer community, coaching MSP business owners through changes to operate a more successful company. https://www.rocketmsp.io These will be quick. We dive into questions and articles submitted from listeners and/or evolving...

Duration:00:26:59

Episode 31 - Security and compliance guidelines with Vince Crisler

9/27/2021
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board. Prior to...

Duration:00:42:20

Allstate to block Datto, Ninja RMM and Kaseya - Escalate, Exfiltrate & Encrypt - Round 9

9/23/2021
It would appear Allstate has decided to block RMM platforms from Datto, Ninja and Kaseya effective September 27th without any clear indication as to why. https://www.reddit.com/r/msp/comments/pte6av/allstate_to_block_datto_rmm_ninja_and_kaseya/Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/

Duration:00:19:34

Episode 30 - COVID-19 and its effect on cybersecurity with Scott Davis

9/20/2021
Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services. Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, project management, and network design. Scott’s background and knowledge of PCI-DSS, HIPAA, NIST, GDPR, CIS Controls, CCPA and other state breach...

Duration:00:52:54

Escalate, Exfiltrate & Encrypt - Round 8

9/17/2021
These will be quick. We dive into questions and articles submitted from listeners and/or evolving...

Duration:00:26:15

Episode 29 - Identifying NSO Pegasus breaches with CrowdStrike Mobile - Cameron Buriani

9/13/2021
Recorded September 6, 2021 On this episode we discuss using CrowdStrike tools to identify and help mitigate mobile and USB borne attacks. https://github.com/AmnestyTech/investigations Cameron Buriani is a cyber security professional who works as a Senior Solutions Architect at Crowdstrike over 3 years now. Over the last two years , he’s dedicated his efforts to building out the Crowdstrike MSSP offering from the ground up to the full blown solution it is today. In his spare time, he...

Duration:00:30:19

Escalate, Exfiltrate & Encrypt - Round 7

9/11/2021
Shiva and Eric will talk about the latest Pax8 incident and the response that they have given. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/

Duration:00:14:34

Escalate, Exfiltrate & Encrypt - Round 6

9/10/2021
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://securityaffairs.co/wordpress/121985/cyber-crime/groove-gang-fortinet-leaks.htmlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444https://securityintelligence.com/posts/lockbit-ransomware-attacks-surge-affiliate-recruitment/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva...

Duration:00:16:11

Episode 28 - Cyber Insurance & Loss Prevention with Joseph Brunsman

9/6/2021
Joseph Brunsman joined the cyber and professionally liability realm in 2015 after serving as a Lieutenant in the United States Navy, working as an Anti-Terrorism / Force Protection Officer responsible for a billion dollars of equipment and 280+ military personnel. Prior to that he served tours as a Combat Information Center Officer and an Electronic Warfare Officer. During his enlisted time he was an Information Systems Technician dealing with Unix database management and network...

Duration:01:17:01

Unpacking the tech and gear left in Afghanistan. Escalate, Exfiltrate & Encrypt - Round 5

9/3/2021
On todays episode we're joined by John Wetzel the Director of Intelligence Solutions at Recorded Future. We discuss: John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong...

Duration:00:56:52

Episode 27 - Training with James McQuiggen of KnowBe4

8/30/2021
James is Security Awareness Advocate is responsible for amplifying messaging related to the importance of, effectiveness of, and the need for security awareness and training within organizations through social media, webinars, in-person presentations, industry trade shows and traditional media outlets. Information Security Awareness: manage Internal Awareness Program to inform and provide training to enterprise employees through department experts in the areas of Phishing, Intellectual...

Duration:00:46:42

Escalate, Exfiltrate & Encrypt - Round 4

8/27/2021
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/https://www.reuters.com/world/us/cyber-threats-top-agenda-white-house-meeting-with-big-tech-finance-executives-2021-08-25/Eric...

Duration:00:24:23

Escalate, Exfiltrate & Encrypt - Round 3

8/23/2021
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://gizmodo.com/the-state-department-has-reportedly-been-hacked-1847536299https://twitter.com/vxunderground/status/1429185341194444805Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/

Duration:00:18:54

Episode 26 - Matthé Smit Director of Product Management, Datto RMM

8/23/2021
As Director of Product Management for RMM, Matthé is responsible for driving the RMM product roadmap and managing the product management team. He plays a critical role in making Datto RMM one of the most scalable remote management platforms in the world. Over the last 15 years, Matthé has exclusively worked in the managed services market working for leading software vendors. Having worked with countless MSPs across the world, Matthé has a deep understanding of the space and a strong focus...

Duration:00:54:18

Elevate, Exfiltrate & Encrypt - Round 2

8/20/2021
These will be quick. We dive into questions and articles submitted from listeners and/or evolving...

Duration:00:18:39

Episode 25 - Threat Intelligence with John Wetzel of Recorded Future.

8/16/2021
John Wetzel is currently the Director of Intelligence Solutions at Recorded Future. John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law...

Duration:00:48:19

Episode 24 - Where is the risk?

8/9/2021
On this episode we dig into where responsibility and accountability, compromised hardware beaconing, Senators lobbying for APT's, defining a breach with two words, how much should you have to push your vendors security development, zero knowledge and more. Eric Taylor | LinkedIn Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com Brian J. Weiss | LinkedIn Twitter: bweiss805 www.itech-solutions.com Robert Nelson |...

Duration:00:33:14

Elevate, Exfiltrate & Encrypt - Round 1

8/6/2021
These will be quick. We dive into questions submitted from listeners and/or evolving incidents.

Duration:00:32:35