In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
All content for Breaching the Boardroom is the property of NetGain Technologies, LLC and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
In this exclusive webinar, Breaching the Boardroom host David Mauro sits down with industry veteran Mike Stramaglio, President & CEO of Stramaglio Consulting and former President of Hitachi. With decades of leadership in global technology organizations—including Ricoh, Minolta, and Konica Minolta—Michael shares powerful insights on leadership, industry transformation, and the evolving role of workplace services providers. 💡 What You’ll Learn: ✅ The evolution of the imaging and technology ...
Breaching the Boardroom
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...