Interview With Ross & Reza Of ITUNeed, LLC

February 26th, 2021

About ITUNeed:

ITUNeed always prospers on a challenge. If you deal with a specific problem, our consultants and engineers will carefully examine the issue and work with you closely to provide an exclusive insight into the best solutions available that fit best into your business needs. We believe good teamwork is essential when dealing with IT challenges. Our main focus is on serving you with staff that take ownership of your case and take the time to explain the root cause and action plans in a language to which you can relate until you are completely satisfied.

About Ross::

Ross has over 10 years of experience in development of cyber solutions, namely enterprise and government systems. He is proficient in Cybersecurity solutions, policy and procedure creation for information systems including FISMA, NIST, and RMF (Risk Management Framework). Ross is also a Certified Ethical Hacker. His extensive experience and willingness to learn and grow with the industry make him a perfect fit for ITUNeed’s leadership team.

About Reza:

Reza has over 10 years of experience in Information Technology, Information Security, and System Administration and Management. As a certified Amazing Web Services (AWS) Subject Matter Expert (SME), Cisco CCNA and IBM Websphere MQ, Reza has managed environments comprised of heterogeneous mission critical application systems. Additionally, he has designed and implemented a Disaster Recovery Solution that saved the client company over $200k within a 3-year course. He has devoted his time to leading ITUNeed through each and every project, ensuring all steps are done correctly and thoroughly

Share | Download(Loading)

A New Way To Do Penetration Testing From The Standpoint Of Physical Security

February 22nd, 2021

About Security Illusion:

After working in Cyber Security for well over a decade, the founder and lead tester at Security Illusion (Phillip Bosco), wanted to approach cyber security differently. Through highly-customizable & personalized assessments, Security Illusion stands out from the rest by focusing heavily on the quality of our assessments and relationships over sheer quantity.

About the Boscloner:

Built by penetration testers for penetration testers, the Boscloner Pro is the most robust RFID testing toolkit on the planet. Within seconds, the Boscloner Pro can identify virtually any Low-Frequency (LF) or High-Frequency (HF), crack the encryption, capture the badge, and immediately copy or simulate this badge, all up to an astounding 6ft away! In a single, full-featured kit, the Boscloner Pro supports capturing and cloning (or simulating) the following badge technologies: HID ProxCard II, EM4100, HID iClass, Indala, and MIFARE Classic. 

About Phillip Bosco:

Phillip holds over 12 years of experience in information security and penetration testing between his roles with various government agencies, as a former United States Cyber Marine with a secret clearance, and consulting with the private sector among numerous Fortune 50/500 companies. With a passion for social engineering, Phillip is the creator of the Boscloner, an all-in-one RFID cloning toolkit, which has been utilized by law enforcement, red teams, military, and security consultants around the globe. In his spare time, Phillip enjoys another type of hacking: bio-hacking. Through specialty diets and lifestyle, Phillip connects with all things wellness to heal the body and mind through his passionate exploration of natural and holistic methods.

Share | Download(Loading)

CMMC Update – An MSP’s Perspective

January 19th, 2021

SysArc Overview:

SysArc is a Managed Services Provider (MSP) that has been focused on helping Government Contractors and DIB Suppliers manage their internal IT infrastructure in a cost effective and professional manner for 17 years.  For the past 4 years, SysArc has consulted with more than 500 suppliers on their journey to cybersecurity compliance, primarily around NIST 800-171, DFARS 7012 and CMMC.   SysArc is a CMMC Registered Provider Organization and we have several CMMC Registered Practitioners on our team.

Speaker Bios:

Bernhard Bock, CISO, SysArc:

Bernhard Bock is the Chief Information Security Officer (CISO) at SysArc. As CISO, Bernhard provides strategic guidance and direction for SysArc’s internal operations and he is responsible for providing clients with strategic consulting and guidance by aligning their business objectives with technology solutions that meet their needs.   Bernhard has more than 15 years of experience working in the IT industry and has been focused on helping small DoD suppliers navigate the NIST 800-171/DFARS/CMMC  requirements for the past 4 years having led over 75 Assessment & Remediation projects in that time.

Tim Brennan, CEO, SysArc:

Tim Brennan is the CEO of SysArc, an IT Managed Services Provider he founded 2004, that focuses on helping Government Contractors stand up effective cybersecurity programs for their internal systems to reduce risk,  maintain business continuity and comply with industry regulations and best practices.  SysArc provides contractors with a competitive advantage in winning more business with their Federal customers and teaming partners by implementing and maintaining the latest cybersecurity compliance solutions that are required in new DoD contract awards and many other civilian agency solicitations in the near future.

Share | Download(Loading)

Learn How To Be HIPAA Compliant In 2021

December 23rd, 2020

About Sentree Systems:

We are a Business Consulting firm dedicated to small businesses, with a focus on Business Continuity & Disaster Preparedness.  Our services cover a vast array of solutions to help small businesses get an accurate image of how stable and resilient their practice is when facing business crippling disasters.  These Disasters can range from Fires, Health outbreaks, Pandemics, Ransomware, Malware infections, Loss of Internet access, Robbery of critical Assets and the list can go on...

About Kevin Mabry:

What began as a desire for electronics and computers in 1979 eventually evolved in the formation of his business in 1999 out of Kevin Mabry’s living room.  That same year, he sought after an AAS in Electronics at Ivy Tech Community College with the hopes of helping others with their electronic gadgets.  As the president and CEO of Sentree Systems Corporation, Mr. Mabry is responsible for day to day operations of the overall health of the company, and the vision and the direction it takes.  He is also the face of the business and is very active when it comes to Data Security speaking engagements with local associations like the Indiana State Bar Association, Indiana CPA Society, Indiana SBA, networking events and hosting booths at various events.

Once Mr. Mabry dove into his business, he truly began to understand the need that small businesses had in getting better information for their technology needs.  Most managed service companies like his tend to focus mostly on the larger of the small businesses and either leave the small businesses for someone else or give them less attention.  Mr. Mabry believes, however, they need just as much attention as the larger companies, if not more, because they are the majority of businesses in the US.

Share | Download(Loading)

Introducing SecureCare Technology

December 1st, 2020

About Greg Manson:

As the Vice President of Security, Audit and Compliance, Greg Manson is the leader of Logically’s Security Audit and Compliance team and an expert in security tools, security solutions, internal audit, IT governance and compliance initiatives.

He holds an MBA from the University of North Carolina at Wilmington and a Bachelor of Science degree in Computer Information Systems from the Kelley School of Business at Indiana University.

About Logically:

Logically is the leading Managed IT Service Provider (MSP) to small and midsize organizations. We take care of your Information Technology, so you can take care of business. Since 1999, we have made IT management easy and secure for hundreds of corporations, healthcare organizations, non-profits and public sector agencies.

We set the standard for responsivenessand operational excellence for organizations seeking to augment existing IT teams or outsource IT completely. Logically, powered by OpLogic™, our unique Intelligent MSP platform, cost-effectively amplifies our customers’ competitiveness. We strategically implement and manage the right balance of mature and emerging information technologies that improve collaboration, security, cloud adoption, customer experiences, productivity and business results.

Share | Download(Loading)

Learn How To Use The Next Level Of Video Conferencing In 2021

November 24th, 2020

About Strikeforce Technologies, Inc:

StrikeForce Technologies is a cyber security developer, and has been in business for 20 years. StrikeForce helps to prevent Cyber theft and data security breaches for consumers, corporations, and government agencies. We are the proud inventor of several highly accepted & distributed technologies: “Out-of-Band” authentication and “Keystroke Encryption”. StrikeForce Technologies, Inc. (OTC PINK:SFOR) is headquartered in Edison, N.J., and can be reached at www.strikeforcetech.com or by phone at (732) 661-9641 or toll-free at (866) 787-4542.

About George Waller:

George is a co-founder of StrikeForce Technologies, Inc., and is an entrepreneur and technologist with over 30 years in the computer industry. George played a pivotal role in introducing two of the leading cyber security technologies i.e., out-of-band authentication and keystroke encryption to the marketplace. Today, these technologies are widely used in Banking, Healthcare, Education, manufacturing and government sectors. Prior to founding StrikeForce, George served as Executive Vice President and Chief Strategist at: Connexus Corporation, RxRemedy, TeachMeIT, Incubation Systems, and HealthSCOUT. George studied aerospace engineering at the Academy of Aeronautics.

Share | Download(Loading)

The Online Wild West & The Virtual Varmints That Inhabit It

November 18th, 2020

Dozens of high-profile breaches hit the news waves every year, and for every one you know about there are a dozen or more than have happened that you don’t. 

The sudden acceleration of the remote work environment has once again created a wild west of sorts, where bad actors are rubbing their hands in anticipation. There has never been a better chance to hit paydirt than right now. 

During this 45-60-minute conversation, we’re talking with the cybersecurity front lines to get a pulse on the changes they’ve seen in the online landscape, threat environment, and changes attack trends. Where are bad actors focusing, and what does the risk for your organization look like? 

How are things different now than they were six months ago? 

The goal of the conversation is to highlight areas your organization can focus and what steps you can take as the landscape continues to evolve. 

Share | Download(Loading)

Understanding DoD Supply Chain Cybersecurity Requirements

November 12th, 2020

The Totem Journey:

We started our government contracting journey in 2015 after our parent company, Haight Bey & Associates was awarded a multi-million-dollar U.S. Air Force tactical weapons support contract. One portion of the contract provided cybersecurity on ruggedized deployable laptops. CEO Aliahu "Alli" Bey reached out to a former business colleague, Adam Austin, owner of a cybersecurity company in Pennsylvania.  As a cybersecurity expert, Mr. Austin’s experience and involvement was a no-brainer and he was promptly brought on as a partner.

In 2017, adherence to NIST 800-171 requirements, which state that small businesses (like ours) must comply with more than 300 cyber-requirements and controls that the large Prime Contractors adhere to (DFARS 252.204-7012). Mr. Austin spent nearly a year combing through hundreds and hundreds of requirements and created an early version of what we now call Totem’s Cybersecurity Planning Tool, a revolutionary organizational software that meshes perfectly with cybersecurity and compliance requirements for our existing DoD contracts…and yours as well. 

About Adam Austin:

Adam Austin is the Cybersecurity Lead at Totem.Tech, a minority veteran-owned Prime DoD contractor.  Mr. Austin has a decade of experience securing classified, unclassified, and HIPAA-environment US Government IT systems, having worked with NASA, the Centers for Medicare and Medicaid (CMS), and all branches of the Department of Defense.  Adam holds a Master's in Information Assurance from Capitol Technology University, and is an ISACA Certified Information Security Manager (CISM) and Certified Information Systems Auditor (CISA).  Adam's goal is to leverage his experience and education to help small businesses in regulatory environments implement affordable, compliant, risk-based cybersecurity programs.

Share | Download(Loading)

Evolution Of The Connected Medical Device Industry Through A Cybersecurity Lens

November 9th, 2020

About Nova Leah:

Connected medical devices represent a rapidly growing sector in healthcare. There are currently between 10 to 15 billion such devices in use globally, and the global connected medical device market will exceed $136.8 billion by 2021.

Nova Leah was founded in Dundalk, Ireland as a spinout from our CEO’s PhD at the Dundalk Institute of Technology.

Since then, we’ve been fortunate to see our company and brand grow. We’ve been recognized as industry experts that deliver solutions to critical business challenges, and our technology continues to be adopted by top medical device companies.

About Anita Finnegan:

Dr. Anita Finnegan is the Founder and CEO of Nova Leah, a world leader in the provision of cybersecurity risk management solutions for connected medical devices. She is an internationally recognized expert in the field of medical device cybersecurity risk management and is an active member of a number of International Standards Communities. Her PhD research focused on medical device cybersecurity through the use of security assurance cases. In addition to many peered reviewed journals and a number of book chapters, Anita authored, and was the international project leader for two technical reports (IEC/TR 80001-2-8 and IEC/TR 80001-2-9).

In 2016, Anita spun-out Nova Leah from the research work she conducted in The Regulated Software Research Centre at Dundalk Institute of Technology. Through her work with Nova Leah, Finnegan has won multiple awards for innovation, security and technological impact. Nova Leah was named Emerging Company of Year at the 2019 Technology Ireland Awards in association with Ibec, KTI Spinout Company of the Year 2019 and was runner-up by DIGITALEUROPE for the European 'Future Unicorn Award' in 2020. 

Share | Download(Loading)

Digital Forensics and Cybersecurity-Two Worlds Together

October 27th, 2020

Amber Schroader

CEO & Founder, Paraben Corporation

Over the past three decades, Ms. Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed numerous software programs, courses, and guides in the areas of recovering data from smartphones, computer hard drives, cloud, email, and gaming systems. Ms. Schroader’s established protocols for the seizure and processing of digital evidence that has been used by numerous organizations throughout the world. Ms. Schroader has coined the concept of the “360-degree approach to digital forensics” and “Forensics of Everything-FoE” with her focus on unique problems in digital evidence and solutions.

Ms. Schroader has been a huge industry influence in pushing for a big-picture consideration of digital evidence. An accomplished design architect, curriculum developer, and instructor; Ms. Schroader has written and taught numerous classes for this specialized field as well as founded multiple certifications. Ms. Schroader continues to support through book contributions and other industry speaking engagements.

Share | Download(Loading)

« Newer Posts - Older Posts »

Podbean App

Play this podcast on Podbean App