Cyber Ops Unmasked-logo

Cyber Ops Unmasked

Technology Podcasts

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cyber Ops Unmasked and begin your journey to becoming a more secure company.

Location:

United States

Description:

You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the business you care about so much. Don’t feel guilty about skipping the IT conferences, lunch-and-learns, and panel discussions. Just subscribe to our podcast Cyber Ops Unmasked and begin your journey to becoming a more secure company.

Twitter:

@InfoSystems

Language:

English

Contact:

423-697-9527


Episodes
Ask host to enable sharing for playback control

What is a Cyber Resilience Analysis?

10/17/2023
In this episode of Cyber Ops Unmasked, Keith Hales and Chris Bevil dive into the world of cyber resilience, asking questions that all business owners should be asking in order to move their business forward. How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be? Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses.

Duration:00:15:30

Ask host to enable sharing for playback control

What is the Difference Between Cybersecurity and Cyber Compliance?

9/18/2023
In this episode of Cyber Ops Unmasked, Keith Hales, CEO of InfoSystems, and Chris Bevil, CISO at InfoSystems, dive into the intricate relationship between cybersecurity and compliance. They explore common misconceptions surrounding these two aspects of security and highlight why each should be treated as a separate entity. Additionally, Chris Bevil provides valuable insights on how organizations can navigate the complexities of compliance and what to look for to determine their compliance obligations. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Duration:00:12:05

Ask host to enable sharing for playback control

Cybersecurity Best Practices for Data Backup and Recovery

8/21/2023
Is your data backed up and safe from the bad guys? In this episode of Cyber Ops Unmasked, Keith Hales and Robert Goodwin from InfoSystems explore best practices when it comes to the complexities of data backup and recovery. It’s not enough to store your data somewhere and pull it out when you need it anymore. You must implement effective measures and systems to safeguard your digital assets. Listen to this episode to learn more about what immutable copies of your data are, how you can keep your data safe from the bad guys, and why it is absolutely necessary to test your backups. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc- INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems

Duration:00:14:09

Ask host to enable sharing for playback control

How and Why to Set Cybersecurity Standards and Frameworks in Your Business

8/10/2023
As cyber threats continue to evolve, it becomes essential for companies to establish effective standards to protect their data and ensure the security of their operations. Recently, we relaunched our podcast, Cyber Ops Unmasked, where we cover all things cybersecurity. Cybersecurity initiatives are often misunderstood, mismanaged, or purposely hidden in companies to avoid scrutiny. In this podcast, we’ll have an open discussion so that cybersecurity operations are understood, managed effectively, and open to questioning and scrutiny. To learn more about InfoSystems Cyber, visit https://infosystemscyber.com/.

Duration:00:12:46

Ask host to enable sharing for playback control

Cybersecurity in Session - Season 1, Episode 39

12/9/2020
Here’s a fact: the data you store and transmit across your organization’s networks is a highly valuable asset that needs to be protected. The size of your business is irrelevant; the industry you work in is also irrelevant. What matters to cybercriminals is if they can compromise your data and how much you will pay for its safe return.

Duration:00:14:08

Ask host to enable sharing for playback control

Cybersecurity in Session - Season 1, Episode 38

11/2/2020
Are you a cyberattack enabler due to apathy or lack of understanding of what is happening within the Internet universe? In this episode, Fred and Garrett discuss why the “it cannot happen to me” approach to cybersecurity is fostering the growth of cybercrime and other threats delivered to your organization, courtesy of your Internet habits.

Duration:00:14:54

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 37

10/8/2020
In this episode, Fred and Rob discuss cybersecurity from a new angle. Let’s take off our geek hats and discuss the business side of cyber-attacks. From why it's an essential part of an organization's risk management program to the costs these attacks can have on finances, revenue, and reputation.

Duration:00:23:43

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 36

9/8/2020
In this episode, Fred and Garrett discuss the last CIS Control, Penetration Tests and Red Team Exercises. This control focuses on testing the security measures already in place within your organization. Penetration Tests and Red Team Exercises are most impactful when a company has taken action against the first 19 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:18:18

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 35

8/31/2020
In this episode, Fred and Garrett discuss the third Organizational CIS Control, Incident Response and Management. This control focuses on creating an incident response plan to protect your organization's information and reputation. Incident Response and Management is most impactful when a company has taken action against the first 18 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:15:19

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 34

8/24/2020
In this episode, Fred and Garrett discuss the second Organizational CIS Control, Application Software Security. This control is used to manage the security life cycle of your software. This control is used to prevent, detect, and correct security weaknesses. Application Software Security is most impactful when a company has taken action against the first 16 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:24:12

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 33

8/17/2020
In this episode, Fred and Rob discuss the first Organizational CIS Control, Implement a Security Awareness and Training Program. This control is used to develop and execute a plan for a security awareness and training program. This control is useful for those at all levels of an organization. Implementing a Security Awareness and Training Program is most impactful when a company has taken action against the first 16 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:18:47

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 32

8/10/2020
In this episode, Fred and Rob discuss the tenth Foundational CIS Control, Account Monitoring and Control. This control is used to actively manage and control user accounts-such as that of employees or contractors-from creation to deletion. Account Monitoring and Control is most impactful when a company has taken action against the first 15 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:14:06

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 31

8/6/2020
In this episode, Fred and Tim discuss the ninth Foundational CIS Control, Wireless Access Control. This control is used to track, control, prevent, and correct the way you use your wireless local area networks, access points, and wireless client systems. Wireless Access Control is most impactful when a company has taken action against the first 14 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:15:30

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 30

7/27/2020
In this episode, Fred and Rob discuss the eighth Foundational CIS Control, Controlled Access Based on the Need to Know. This control is used to track, control, prevent, and correct secure access to sensitive systems and data. Controlled Access Based on the Need to Know is most impactful when a company has taken action against the first 13 CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:18:28

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 29

7/20/2020
In this episode, Fred and Tim discuss how you can protect your data. Data protection is the seventh Foundational CIS Control and is used to prevent your data from being exploited, lessen the effects if it is exploited, and ensure your sensitive information is kept intact. Data Protection is most impactful when a company has taken action against the first twelve CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:16:12

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 28

7/13/2020
In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:13:23

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 27

7/7/2020
In this episode, Fred and Rob discuss how you can secure network devices. This is the fourth Foundational CIS Control and is used to secure the configuration for network devices such as Firewalls, Routers, and Switches. Secure configuration for network devices is most impactful when a company has taken action against the first ten CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:13:03

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 26

6/29/2020
In this episode, Fred and Rob discuss Data Recovery Capability, the processes and tools used to back up your data. This is the fourth Foundational CIS Control and focuses on backing up and recovering your data as quickly as possible. Data Recovery Capability is most impactful when a company has taken action against the first nine CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:13:55

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 25

6/22/2020
In this episode, Fred and Garrett discuss how you can manage ports, protocols, and services on devices connected to your company's network. This control focuses on minimizing your vulnerability to cyber-attackers. This is the third Foundational CIS Control and is used to minimize your vulnerability to attackers. The Limitation and Control of Network Ports, Protocols, and Services control is most impactful when a company has taken action against the first six Basic CIS Controls and first two Foundational CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Duration:00:18:24

Ask host to enable sharing for playback control

Cybersecurity Weekly - Season 1, Episode 24

6/15/2020
In this episode, Fred and Garrett discuss how you can adopt defenses to deflect Malicious Software (AKA Malware). This is the second Foundational CIS Control and is crucial for your personal and business security. The Malware Defenses control is most impactful when a company has taken action against the first six Basic CIS Controls and the first Foundational CIS Control (following the CIS Top 20 Cybersecurity Controls).

Duration:00:16:37