Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
Health & Fitness
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/35/66/2a/35662a5e-8cc2-2a41-9c3b-804574f7beb8/mza_13057736488520478394.jpg/600x600bb.jpg
Breaching the Boardroom
NetGain Technologies, LLC
50 episodes
4 days ago
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Show more...
Business
RSS
All content for Breaching the Boardroom is the property of NetGain Technologies, LLC and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Show more...
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/35/66/2a/35662a5e-8cc2-2a41-9c3b-804574f7beb8/mza_13057736488520478394.jpg/600x600bb.jpg
Navigating CMMC: A Survival Guide for Small Businesses
Breaching the Boardroom
37 minutes
2 months ago
Navigating CMMC: A Survival Guide for Small Businesses
This conversation delves into the Cybersecurity Maturity Model Certification (CMMC), a crucial compliance framework for small to mid-sized businesses engaged with the Department of Defense. Sam Durso, a CMMC expert, explains the significance of CMMC, the differences between Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), and the compliance levels required for businesses. The discussion highlights the risks of non-compliance, the importance of timely action, a...
Breaching the Boardroom
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...