The CyberCast

By: Andrew Morgan
  • Summary

  • The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data ProtectionDuo - CIS Control - Multifactor Authentication
    © 2024 The CyberCast
    Show More Show Less
Episodes
  • CIS Controls - Version 8.1 Update Overview
    Aug 9 2024

    With the release of NIST Cybersecurity Framework 2.0, CIS felt strongly that an update to The Controls was necessary to crossmap to CSF 2.0. Specifically the strongest driver, was the release of the Govern function.

    Co-hosts:
    Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
    Brian Blakely: https://www.linkedin.com/in/bblakley/
    Eric Woodard: https://www.linkedin.com/in/eric-woodard/

    Sponsored by Right of Boom cybersecurity conference: https://www.rightofboom.com/

    Show More Show Less
    52 mins
  • CIS Control 18 - Penetration Testing - Sponsored by Hacket Cyber
    Jul 26 2023

    Penetration testing is something that more companies and organizations should be considering a necessary expense. Pen Testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight on how your digital and human assets perform.

    In this episode we review the criticality of scoping a Pen Test, along with differences between Pen Testing, Red Teaming and Vulnerability Assessment. Why should you choose one over the other and when would one proceed the other.

    Sponsored by: Hacket Cyber and post game interview with Founder James Carroll. Hacket Cyber is a security consulting firm specializing in penetration testing, ethical hacking, and industry-leading cybersecurity services. Our offerings are purpose-built for the MSP, MSSP, and VAR channels. https://hacketcyber.com/partner/

    James Carroll LinkedIn: https://www.linkedin.com/in/jchax/

    Co-hosts:
    Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
    Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
    Wes Spencer: https://www.linkedin.com/in/wesspencer/

    Show More Show Less
    1 hr and 6 mins
  • CIS Control 17 - Incident Response Management - Sponsored by Exigence
    Jun 2 2023

    The biggest takeaway from CIS Control 17 is that planning and communication are critical when responding to an incident. The longer an intruder has access to your network, the more time they’ve had to embed themselves into your systems. Communicating with everyone involved can help limit the duration between attack and clean-up.

    Establish a program to develop and maintain an incident response capability (e.g., policies, plans, procedures, defined roles, training, and communications) to prepare, detect, and quickly respond to an attack.

    Our sponsor: Exigence (https://www.exigence.io) is a multi-tenant, Incident Readiness, Incident Response platform, built for MSP/MSSPs. Drive new revenue streams and meet cyber insurance & regulatory requirements for Incident Response plans and tabletops.

    The Exigence platform gives you full control of critical incidents by uniquely addressing every aspect of the incident – turning an unstructured situation into one that is structured and easy to manage. ​

    It coordinates all stakeholders and systems all the time, orchestrates complex workflows from trigger to resolution, simplifies the post-mortem, and always leverages lessons learned for doing it even better next time.

    Contact Noam here: noam@exigence.io

    Co-hosts:
    Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
    Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
    Wes Spencer: https://www.linkedin.com/in/wesspencer/
    '

    Show More Show Less
    54 mins

What listeners say about The CyberCast

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.