In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
All content for Breaching the Boardroom is the property of NetGain Technologies, LLC and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...
Navigating CMMC: A Survival Guide for Small Businesses
Breaching the Boardroom
37 minutes
2 months ago
Navigating CMMC: A Survival Guide for Small Businesses
This conversation delves into the Cybersecurity Maturity Model Certification (CMMC), a crucial compliance framework for small to mid-sized businesses engaged with the Department of Defense. Sam Durso, a CMMC expert, explains the significance of CMMC, the differences between Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), and the compliance levels required for businesses. The discussion highlights the risks of non-compliance, the importance of timely action, a...
Breaching the Boardroom
In this conversation, cybersecurity experts discuss the increasing threat of cyber attacks, particularly focusing on the anatomy of a compromise, the importance of incident response planning, and the impact of business email compromise. They delve into the definitions of security events, incidents, and breaches, and emphasize the need for organizations to be prepared for potential attacks. The discussion also covers the significance of user training, communication strategies during an attack,...