Ranked #1
5 Reasons Why Organizations Don’t Detect a Cyber Breach
5 Reasons Why Organizations Don’t Detect a Cyber Breach
Incident response consultants are often contacted by clients who are in complete shock that their systems or networks ha... Read more
18 Jan 2018
•
9mins
Ranked #2
SOC for Cybersecurity
SOC for Cybersecurity
Since business leaders and board members are not often technically-inclined, they tend to have many questions about cybe... Read more
12 Dec 2017
•
23mins
Ranked #3
Phishing Emails with 100% Click Rate
Phishing Emails with 100% Click Rate
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was ... Read more
10 Apr 2018
•
6mins
Ranked #4
Using Zoom Securely
Using Zoom Securely
Zoom is soaring in popularity as a large population of remote workers are using it for video conferencing. With it's sur... Read more
22 Apr 2020
•
21mins
Ranked #5
HITRUST Conference Overview
HITRUST Conference Overview
The LBMC Information Security team recaps the 2019 HITRUST conference that was held in Texas in May. The team talks abou... Read more
16 Aug 2019
•
20mins
Ranked #6
Why Employees Are Your Number One Risk
Why Employees Are Your Number One Risk
The question is not, “Will your employees will get your company hacked?” but rather “When will your employees get your c... Read more
19 Apr 2018
•
9mins
Ranked #7
Key Insights on PCI DSS Version 4.0
Key Insights on PCI DSS Version 4.0
In this podcast, LBMC Information Security’s Mark Burnette offers a summary and perspective on the council’s insights—sp... Read more
29 May 2019
•
13mins
Ranked #8
Incident Response Should Be Common Sense
Incident Response Should Be Common Sense
Since incident response issues are no longer just an IT issue and can often involve legal issues, it is important for or... Read more
16 Aug 2018
•
7mins
Ranked #9
IIA Knoxville—SOC for Cybersecurity
IIA Knoxville—SOC for Cybersecurity
The AICPA Cybersecurity Working Group brought to life a new type of cybersecurity examination report in 2017 known as SO... Read more
5 Mar 2018
•
5mins
Ranked #10
Attack Simulation
Attack Simulation
In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on... Read more
18 Jul 2018
•
6mins
Ranked #11
Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data
Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data
Often in the information security industry, professionals can be accused of spreading fear, uncertainty, and doubt with ... Read more
27 Nov 2017
•
15mins
Ranked #12
2017 Year-End Healthcare Breach Review
2017 Year-End Healthcare Breach Review
In comparison to previous years, 2017 was a good year as the number of healthcare records compromised was significantly ... Read more
12 Jan 2018
•
11mins
Ranked #13
IIA Knoxville—Risky Business
IIA Knoxville—Risky Business
No matter the industry—government, healthcare, financial, or even smaller, mom-and-pop businesses—each deal with some ty... Read more
19 Mar 2018
•
7mins
Ranked #14
Targeted Attacks Compared to Opportunistic Attacks
Targeted Attacks Compared to Opportunistic Attacks
All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the... Read more
3 Oct 2018
•
8mins
Ranked #15
The Impact of Remote Work on IT Audits
The Impact of Remote Work on IT Audits
In this episode, Chelsea Smith talks with Bill Dean about the impact of remote work on IT audits during the COVID-19 pan... Read more
6 May 2020
•
15mins
Ranked #16
Purple-Teaming
Purple-Teaming
Most penetration testers are considered “red team,” while most defenders are considered “blue team.” Thus, the irony of ... Read more
10 Jul 2018
•
6mins
Ranked #17
2018 Was Second-Most Active Year for Data Breaches
2018 Was Second-Most Active Year for Data Breaches
2018 was one of the biggest years for data breaches to date, with more than 6,500 data breaches reported throughout the ... Read more
20 Mar 2019
•
10mins
Ranked #18
GDPR and Preparing for DSARs
GDPR and Preparing for DSARs
The EU’s General Data Protection Regulation (GDPR) permits users certain rights (referred to as “data subject access rig... Read more
8 May 2018
•
15mins
Ranked #19
New Tools for PCI Compliance
New Tools for PCI Compliance
In this podcast, LBMC Information Security’s Bill Dean and John Dorling discuss some of the new tools available to help ... Read more
15 May 2019
•
15mins
Ranked #20
IIA Knoxville—Implementing Cloud-Managed Security
IIA Knoxville—Implementing Cloud-Managed Security
When cloud-managed security was first introduced, there was some concern about the levels of security as compared to the... Read more
10 Apr 2018
•
7mins