In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
All content for Breaching the Boardroom is the property of NetGain Technologies, LLC and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Mapping the Future: GPRS and the Art of Underground Discovery
Breaching the Boardroom
57 minutes
3 months ago
Mapping the Future: GPRS and the Art of Underground Discovery
In this episode of "Breaching the Boardroom," host David Mauro sits down with Matt Aston, President of GPRS, to explore the fascinating world of underground radar and detection. Matt shares the journey of GPRS from its inception, highlighting the challenges and triumphs of building a company that specializes in visualizing the unseen world beneath our feet. Discover how GPRS has evolved into a data-driven enterprise, offering groundbreaking solutions for construction, infrastructure, and engi...
Breaching the Boardroom
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...