Cybersecurity Weekly with Fred Cobb-logo

Cybersecurity Weekly with Fred Cobb

Technology Podcasts

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cybersecurity Weekly and begin your journey to becoming a more secure company.

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cybersecurity Weekly and begin your journey to becoming a more secure company.

Location:

United States

Description:

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cybersecurity Weekly and begin your journey to becoming a more secure company.

Twitter:

@InfoSystems

Language:

English

Contact:

423-697-9527


Episodes

Cybersecurity Weekly - Season 1, Episode 26

6/29/2020
In this episode, Fred and Rob discuss Data Recovery Capability, the processes and tools used to back up your data. This is the fourth Foundational CIS Control and focuses on backing up and recovering your data as quickly as possible. Data Recovery Capability is most impactful when a company has taken action against the first nine CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:13:55

Cybersecurity Weekly - Season 1, Episode 25

6/22/2020
In this episode, Fred and Garrett discuss how you can manage ports, protocols, and services on devices connected to your company's network. This control focuses on minimizing your vulnerability to cyber-attackers. This is the third Foundational CIS Control and is used to minimize your vulnerability to attackers. The Limitation and Control of Network Ports, Protocols, and Services control is most impactful when a company has taken action against the first six Basic CIS Controls and first two...

Duration:00:18:24

Cybersecurity Weekly - Season 1, Episode 24

6/15/2020
In this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).

Duration:00:16:37

Cybersecurity Weekly - Season 1, Episode 23

6/8/2020
In this episode, Fred and Garrett discuss the recent Mozilla Firefox Vulnerability Patches that were issued. These vulnerabilities have been found to allow cyber criminals to install programs, manipulate data, and create new accounts with full user rights under your account(s). Anyone currently using Mozilla Firefox versions prior to 77.0 should take immediate action.

Duration:00:11:37

Cybersecurity Weekly - Season 1, Episode 22

6/1/2020
In this episode, Fred and Rob discuss how you can protect your email and web browsers. This is the first Foundational CIS Control and is used to minimize your vulnerability to attackers. The Email and Web Browser Protections control is most impactful when a company has taken action against the first six Basic CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:21:22

Cybersecurity Weekly - Season 1, Episode 21

5/27/2020
In this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, has Controlled Use of Administrative Privileges, and has Secured Configuration of Hardware/Software (following the CIS Top 20...

Duration:00:13:52

Cybersecurity Weekly - Season 1, Episode 20

5/18/2020
In this episode, Fred and Rob discuss part two of becoming a Cybersecurity professional. Previously, Fred and Rob discussed being on the "offense" in the Cybersecurity industry. Now they'll discuss being on the "defense" and what that side of Cybersecurity looks like. Because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming and new opportunities are arising every day.

Duration:00:15:51

Cybersecurity Weekly - Season 1, Episode 19

5/11/2020
In this episode, Fred and Rob discuss how to establish, implement, and manage security arrangements of hardware and software on devices. This helps prevent cyber attackers from getting control of vulnerable settings and services. The secure configuration for hardware and software is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, and has Controlled Use of Administrative Privileges (following the...

Duration:00:15:55

Cybersecurity Weekly - Season 1, Episode 18

5/4/2020
In this episode, Fred and Rob discuss professional roles in the Cybersecurity industry and why you should consider it. Not only are Cybersecurity experts the most sought after professionals in the technology industry, but because the Cybersecurity field is ever changing, there is a great need for these experts and their unique skill set. The industry is booming with no end in sight. And new opportunities are arising every day.

Duration:00:19:28

Cybersecurity Weekly - Season 1, Episode 17

4/27/2020
In this episode, Fred and Rob discuss controlling the use of administrative privileges, the process of managing privileges on computers, networks, and applications. The controlled use of administrative privileges is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, and practices Continuous Vulnerability Management (following the CIS Top 20 Cybersecurity Controls).

Duration:00:15:04

Cybersecurity Weekly - Season 1, Episode 16

4/15/2020
Setting up a remote workforce is frustrating when there are no policies or plans in place to help. In addition, without the proper security measures, a remote workforce is vulnerable to cyber-attack. In this episode, Fred and Josh discuss how to respond to the demand of a remote workforce with proactive policies, plans, and security controls. This episode is not meant to be a quick fix or legal advice, but tried and true advice from InfoSystems' lead Cybersecurity expert, Fred Cobb. First,...

Duration:00:21:56

Cybersecurity Weekly - Season 1, Episode 15

3/23/2020
In this episode, Fred and Chad discuss continuous vulnerability management, the practice of regularly scanning and cleaning devices and the applications being used on those devices. Vulnerability Management is most impactful when a company first has an inventory of Hardware Assets and Software Assets (following the CIS Top 20 Cybersecurity Controls).

Duration:00:12:40

Cybersecurity Weekly - Season 1, Episode 14

3/16/2020
In this episode, Fred and Chad discuss Software Assets, or in other words, the software your company uses. Learn why your company needs to keep an inventory of software assets, how to get control of software assets, and tools that can help you do both of the above.

Duration:00:14:04

Cybersecurity Weekly - Season 1, Episode 13

3/9/2020
In this episode, Fred and Chad discuss Hardware Assets, or in other words, the technology devices your company owns. Learn why your company needs to keep an inventory of hardware assets, how to get control of hardware assets, and tools that can help you do both of the above.

Duration:00:10:46

Cybersecurity Weekly - Season 1, Episode 12

3/2/2020
In this episode, Fred and Chad discuss how an organization can create a Culture of Security, a holistic mindset of being more secure. A culture of security isn't just another initiative an organization should consider. With the growing rate and cost of cyber-attacks, it's pertinent for organizations and employees to understand what it takes to be secure and prepared.

Duration:00:15:33

Cybersecurity Weekly - Season 1, Episode 11

2/24/2020
In this episode, Fred and Chad discuss a topic that has been all over the news. It has created fear and has made quarantines and evacuations necessary in certain parts of the world. This discussion is all about the Coronavirus and the scams being spread amidst a time of global uncertainty.

Duration:00:12:00

Cybersecurity Weekly - Season 1, Episode 10

2/17/2020
In this episode, Fred and Chad discuss Firewalls, the perimeter that stands between the outside (online) world and your company's internal networks. Firewalls add a higher level of security to your company.

Duration:00:16:57

Cybersecurity Weekly - Season 1, Episode 9

2/10/2020
In this episode, Fred and Chad discuss End-of-Life (EOL), when your systems, devices, or firmware are no longer supported by their developers. You'll learn how to prepare for the End-of-Life dates for your technology and how to decide whether you need to upgrade, retire, or completely replace these tools.

Duration:00:14:02

Cybersecurity Weekly - Season 1, Episode 8

2/3/2020
In this episode, Chad and Fred discuss patching, the act of updating your system and applications to fix vulnerabilities. Hardware and software manufacturers are consistently scanning their systems and applications for vulnerabilities. When vulnerabilities are found, patches - or rather, updates - are released by these manufacturers to fix those vulnerabilities. Patching not only rids systems of vulnerabilities; patching blocks the ability for cyber criminals to exploit them.

Duration:00:14:46

Cybersecurity Weekly - Season 1, Episode 7

1/27/2020
In this episode, Fred and Josh discuss simulated cyber-attacks, which is when companies act out real world situations and test their ability to respond. There are 16 scenarios with countless variables that a cybersecurity services company can use to help businesses test their plans and discover where they may fall short. Cyber-attacks are happening every day and becoming more sophisticated. Experts agree that these types of simulations are one of the best ways to prepare for them.

Duration:00:17:41