Learn How To Use The Next Level Of Video Conferencing In 2021

November 24th, 2020

About Strikeforce Technologies, Inc:

StrikeForce Technologies is a cyber security developer, and has been in business for 20 years. StrikeForce helps to prevent Cyber theft and data security breaches for consumers, corporations, and government agencies. We are the proud inventor of several highly accepted & distributed technologies: “Out-of-Band” authentication and “Keystroke Encryption”. StrikeForce Technologies, Inc. (OTC PINK:SFOR) is headquartered in Edison, N.J., and can be reached at www.strikeforcetech.com or by phone at (732) 661-9641 or toll-free at (866) 787-4542.

About George Waller:

George is a co-founder of StrikeForce Technologies, Inc., and is an entrepreneur and technologist with over 30 years in the computer industry. George played a pivotal role in introducing two of the leading cyber security technologies i.e., out-of-band authentication and keystroke encryption to the marketplace. Today, these technologies are widely used in Banking, Healthcare, Education, manufacturing and government sectors. Prior to founding StrikeForce, George served as Executive Vice President and Chief Strategist at: Connexus Corporation, RxRemedy, TeachMeIT, Incubation Systems, and HealthSCOUT. George studied aerospace engineering at the Academy of Aeronautics.

Share | Download(Loading)

The Online Wild West & The Virtual Varmints That Inhabit It

November 18th, 2020

Dozens of high-profile breaches hit the news waves every year, and for every one you know about there are a dozen or more than have happened that you don’t. 

The sudden acceleration of the remote work environment has once again created a wild west of sorts, where bad actors are rubbing their hands in anticipation. There has never been a better chance to hit paydirt than right now. 

During this 45-60-minute conversation, we’re talking with the cybersecurity front lines to get a pulse on the changes they’ve seen in the online landscape, threat environment, and changes attack trends. Where are bad actors focusing, and what does the risk for your organization look like? 

How are things different now than they were six months ago? 

The goal of the conversation is to highlight areas your organization can focus and what steps you can take as the landscape continues to evolve. 

Share | Download(Loading)

Understanding DoD Supply Chain Cybersecurity Requirements

November 12th, 2020

The Totem Journey:

We started our government contracting journey in 2015 after our parent company, Haight Bey & Associates was awarded a multi-million-dollar U.S. Air Force tactical weapons support contract. One portion of the contract provided cybersecurity on ruggedized deployable laptops. CEO Aliahu "Alli" Bey reached out to a former business colleague, Adam Austin, owner of a cybersecurity company in Pennsylvania.  As a cybersecurity expert, Mr. Austin’s experience and involvement was a no-brainer and he was promptly brought on as a partner.

In 2017, adherence to NIST 800-171 requirements, which state that small businesses (like ours) must comply with more than 300 cyber-requirements and controls that the large Prime Contractors adhere to (DFARS 252.204-7012). Mr. Austin spent nearly a year combing through hundreds and hundreds of requirements and created an early version of what we now call Totem’s Cybersecurity Planning Tool, a revolutionary organizational software that meshes perfectly with cybersecurity and compliance requirements for our existing DoD contracts…and yours as well. 

About Adam Austin:

Adam Austin is the Cybersecurity Lead at Totem.Tech, a minority veteran-owned Prime DoD contractor.  Mr. Austin has a decade of experience securing classified, unclassified, and HIPAA-environment US Government IT systems, having worked with NASA, the Centers for Medicare and Medicaid (CMS), and all branches of the Department of Defense.  Adam holds a Master's in Information Assurance from Capitol Technology University, and is an ISACA Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA).  Adam's goal is to leverage his experience and education to help small businesses in regulatory environments implement affordable, compliant, risk-based cybersecurity programs.

Share | Download(Loading)

Evolution Of The Connected Medical Device Industry Through A Cybersecurity Lens

November 9th, 2020

About Nova Leah:

Connected medical devices represent a rapidly growing sector in healthcare. There are currently between 10 to 15 billion such devices in use globally, and the global connected medical device market will exceed $136.8 billion by 2021.

Nova Leah was founded in Dundalk, Ireland as a spinout from our CEO’s PhD at the Dundalk Institute of Technology.

Since then, we’ve been fortunate to see our company and brand grow. We’ve been recognized as industry experts that deliver solutions to critical business challenges, and our technology continues to be adopted by top medical device companies.

About Anita Finnegan:

Dr. Anita Finnegan is the Founder and CEO of Nova Leah, a world leader in the provision of cybersecurity risk management solutions for connected medical devices. She is an internationally recognized expert in the field of medical device cybersecurity risk management and is an active member of a number of International Standards Communities. Her PhD research focused on medical device cybersecurity through the use of security assurance cases. In addition to many peered reviewed journals and a number of book chapters, Anita authored, and was the international project leader for two technical reports (IEC/TR 80001-2-8 and IEC/TR 80001-2-9).

In 2016, Anita spun-out Nova Leah from the research work she conducted in The Regulated Software Research Centre at Dundalk Institute of Technology. Through her work with Nova Leah, Finnegan has won multiple awards for innovation, security and technological impact. Nova Leah was named Emerging Company of Year at the 2019 Technology Ireland Awards in association with Ibec, KTI Spinout Company of the Year 2019 and was runner-up by DIGITALEUROPE for the European 'Future Unicorn Award' in 2020. 

Share | Download(Loading)

Digital Forensics and Cybersecurity-Two Worlds Together

October 27th, 2020

Amber Schroader

CEO & Founder, Paraben Corporation

Over the past three decades, Ms. Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed numerous software programs, courses, and guides in the areas of recovering data from smartphones, computer hard drives, cloud, email, and gaming systems. Ms. Schroader’s established protocols for the seizure and processing of digital evidence that has been used by numerous organizations throughout the world. Ms. Schroader has coined the concept of the “360-degree approach to digital forensics” and “Forensics of Everything-FoE” with her focus on unique problems in digital evidence and solutions.

Ms. Schroader has been a huge industry influence in pushing for a big-picture consideration of digital evidence. An accomplished design architect, curriculum developer, and instructor; Ms. Schroader has written and taught numerous classes for this specialized field as well as founded multiple certifications. Ms. Schroader continues to support through book contributions and other industry speaking engagements.

Share | Download(Loading)

Andrew Lassise & Rush Tech: Cyber Security In The Accounting Industry

October 21st, 2020

About Andrew Lassise:

Andrew Lassise (pronounced La-Cease) is a serial entrepreneur and has helped build and scale several 6, 7, and 8 figure IT businesses. He is the chief dorkestrator of Rush Tech Support, an IT company that specializes in IT and cyber security for accountants. In 2020 Rush Tech Support has been listed as an Accounting Today Top 100 VARS, The Manifest's Top 100 Cyber Security Companies, and has technicians that all hold certifications with the AICPA in cyber security.

When he's not saving the world from hackers & malware, he enjoys traveling, cooking, and spending time with his wife, Emma, and two sons, Jack & Colby.

About Rush Tech Support:

Rush Tech Support is an IT company specializing in cyber security for the accounting industry. They have a team of technicians that all hold cyber security certifications from the AICPA and are uniquely trained in how to best protect accounting firms, whether it is 100 employees or 1, they have mastered the industry and can deliver exceptional service time after time. They have over 500 five-star reviews online and have been featured as one of the best IT companies from organizations like Accounting Today, Clutch, and the Manifest. The company continues to grow every day as they serve clients world wide.

Share | Download(Loading)

What Best in-Class Cyber Security Looks Like Today

October 1st, 2020

About Digital Defense, Inc.:

Based in San Antonio, Texas and serving clients across numerous industries, Digital Defense’s innovative and leading-edge technology helps organizations safeguard sensitive data and ease the burdens associated with information security. Frontline.Cloud, the original Security SaaS platform, delivers unparalleled accuracy and efficiencies through multiple systems including Frontline Vulnerability Manager (Frontline VM™), Frontline Web Application Scanning (Frontline WAS™), Frontline Active Threat Sweep (Frontline ATS™) and Frontline Pen Test™, while SecurED®, the company’s security awareness training, promotes employees’ security-minded behavior.

About Bob Layton:

As chief revenue officer for Digital Defense, Bob is responsible for leading the company’s marketing, sales and business development efforts to support the company’s next phase of growth and its expanding go-to-market plans. Prior to Digital Defense, Layton was SVP with Centre Technologies, where he focused on delivering flexible hybrid cloud managed services and SaaS business transformation. Prior to that, he was at Alert Logic where his accomplishments included a global re-launch of the partner program resulting in year-over-year (YoY) bookings growth and platform consumption on AWS and Azure platforms by more than 2X.

Share | Download(Loading)

Multi-Dimensional Cybersecurity

September 15th, 2020

About Stealth-ISS Group® Inc.:

We act as your extended IT, cybersecurity, risk and compliance team and provides strategic guidance, engineering and audit services, along with technical remediation and security operations. We pride ourselves on the quality and professionalism of our workforce, collaborative relationships with our clients, and our ability to bring you innovative, customized but affordable vendor-agnostic solutions based on your immediate needs while aligning with your business strategy and operations.  Learn more: https://www.stealth-iss.com

About Dasha Deckwerth, President & Founder:

As the president and founder of Stealth-ISS Group® Inc., Dasha Deckwerth is an expert in cybersecurity operations and delivery, as well as a U.S. Veteran.  With over 25 years of experience as a technology professional, Deckwerth has led key cybersecurity initiatives within the government and civilian sectors where she has provided IT Security and Cyber Warfare services to NATO, various US, EU and Asian government agencies as well as multiple global commercial clients. 

About Robert Davies, CEO:

As the CEO of Stealth-ISS Group® Inc., Robert Davies is instrumental in leading and growing this innovative cybersecurity company. With over 25 years of experience in business strategy, technology and IT security, predominantly in global financial services, Davies has delivered success as proven when the company landed in the Inc. 500 list (2018 and 2019), and the VET100 list (2019 and 2020). His qualifications include an MBA, PRINCE2, and ITIL, and in 2019 he won two “CEO of the Year” awards in the US. 

Share | Download(Loading)

Cybersecurity Performance Management

September 4th, 2020

About TDI:

Tetrad Digital Integrity (TDI) has developed CnSight is an automated, lightweight, executive level dashboard that increases cybersecurity efficiency and reduces organizational risk through continuous KPI visibility. This powerful platform enables security leaders stay informed of the most important cybersecurity metrics that provide key insight into performance against established goals and objectives. This proactive management helps security leaders intelligently inform the status of cyber initiatives to upper management, promote organizational alignment, aide in compliance, understand their risk posture, and ultimately enables cyber security teams to do more with less. ​

TDI is one of the longest practicing cybersecurity companies. Since 2001 they have provided cybersecurity services to the Fortune 500, Government Agencies, and SMBs all over the world. For more information please visit  https://www.tdisecurity.com/ and https://cnsight.io/.​

About Jesse Dean:

Jesse Dean is the Vice President of Solutions at TDI. Mr. Dean has 20 years of experience leading and delivering cyber services and solutions, including a $130M AWS IaaS contract through two federal healthcare open-enrollment periods. He is a FedHealthIT Innovation Award winner and currently leads TDI’s CnSight division.  

Share | Download(Loading)

The Cybersecurity Insider PodCast

August 18th, 2020

About 2Secure:

Current attacks can’t be detected by standard tools like Antivirus and SIEM, as those new attacks are using “Living off the Land” or the use of “Automated compromise followed by human-led farming” attacks technics to avoid detection.

We know that keeping up with the latest cyber threats is not easy and that technology alone can easily fail at safeguarding your Digital assets.

Unlike other IT companies where security is just one menu item of what they do, at 2secure, securing your digital assets from unauthorized access is our sole focus.

About Yigal Behar:

Mr. Behar founded 2Secure in 2003 and this is his 2nd business.

Prior to his move to the USA from Israel he worked as a security consultant for Avnet Deloitte & Touche Information Security LTD. providing information security guidance to various clients including government bodies such as the Social Security Administration and The Office of The Prime Minister, financial institutions such as Hapoalim Bank, Mercantile Discount Bank and privately held companies.

Since 2004 Mr. Behar is constantly growing his business and sets the future vision and direction of the company. He likes to meet each client personally, providing a personal touch, along with his expertise in Cyber Security and business development.

Mr. Behar has over 30 years of an extensive experience in Cybersecurity & IT.

Share | Download(Loading)

- Older Posts »

Play this podcast on Podbean App