POPULARITY
Categories
In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversation covers the evolution of cybersecurity. They delve into how Berry assists businesses in understanding cybersecurity risks, communicating effectively with clients, and preparing for and recovering from cyber incidents. This episode is packed with insightful stories, practical advice, and a deep dive into the realities of cybersecurity for businesses of all sizes. 00:00 The Urgency of Cybersecurity 00:33 Introduction to the Podcast 01:00 Meet Graham Berry: A White Hat Hacker 01:31 Graham's Journey into Technology 04:04 From Technology to Cybersecurity 05:49 The Reality of Cyber Threats for Small Businesses 10:44 The Importance of Cyber Insurance 14:23 Engaging with Clients on Cybersecurity 17:08 Turning Around a Reluctant Client 20:10 The Growing Demand for Cyber Coverage 22:12 Third Party Risk Management 22:50 Effective Tabletop Exercises 23:58 Engaging Executives in Cybersecurity 26:43 Importance of Cyber Insurance 28:33 Successful Recovery Stories 34:16 Challenges with AI in Security 38:57 Looking Forward in Security 40:21 Conclusion and Farewell
Send us a textHey guys! This month's live Q&A was packed with real talk about the nitty-gritty of running a bookkeeping business. We covered everything from pricing cleanups (spoiler: diagnostics are your best friend) to getting cyber insurance (yes, it's non-negotiable), and I even got vulnerable about my experience juggling babies and business. If you've ever wondered how to market to trades, what reports clients actually need, or how to take maternity leave as a business owner, this episode is for you!In this episode you'll hear:How to price cleanups without Getting BurnedMarketing Strategies that Actually Work for Your NicheCyber InsuranceMaternity Leave and BusinessResources mentioned in this episode:Jock Wols - featured on Ambitious Bookkeeper Podcast for cyber insurance discussion: https://youtu.be/QmXfN_PaKWECarissa Martino - Health Insurance SpecialistElevate: https://www.ambitiousbookkeeper.com/elevateConfident Compliance Bundle: https://www.ambitiousbookkeeper.com/offers/tgPgMBJ7Mini Course Bundle: https://www.ambitiousbookkeeper.com/offers/vYYfsxH9Akadian: https://fastandeasyqbo.samcart.com/affiliates/loginEmail List - Sign up at: https://www.ambitiousbookkeeper.com/subscribeKeeper: https://keeper.app/?via=serenaCanva: https://www.canva.com/join/relish-scale-floristicUpcounsel: https://www.upcounsel.com/rf/8dCYxoOUHousecall Pro: https://link.hscll.com/3i3yrLady Pros Facebook GroupAlignableThanks for listening. If this episode inspired you in some way, take a screenshot of you listening on your device and post it to your Instagram stories and tag me @ambitiousbookkeeperFor more information about the Ambitious Bookkeeper Podcast or interest in our programs or mentoring visit our resources below:Visit our website: https://www.ambitiousbookkeeper.comFollow the Blog: https://www.ambitiousbookkeeper.com/blogConnect on Instagram: https://www.instagram.com/ambitiousbookkeeperConnect on Threads: https://www.threads.net/@ambitiousbookkeeperConnect on Facebook: https://www.facebook.com/serenashoupcpaThank you for your support of our show. If you haven't left a review yet it's super simple. Please go to ambitiousbookkeeper.com/podcast and leave your review.Podcast Publishing Tools we use:Editing → SabrGet access to the Dubsado Decoded Private Podcast Series here>> Join me and Alyssa Lang, the Workflow Queen for The Advisory Edge Workshop - only $97 > Grab the Spotify Playlists here: ambitiousbookkeeper.com/spotify
Telemetry is changing the underwriting game, enabling a shift from clunky forms to real-time, verifiable risk data.In this episode, host Anthony Hess sits down with Alex Jomaa, Chief Underwriting Officer at Onda, to explore how real-time data is transforming cyber underwriting, and why it's time the industry stopped relying on outdated processes that frustrate clients and slow brokers down.Alex explains how Onda's Navigator platform integrates directly with a client's infrastructure to deliver objective, verifiable cyber risk insights, thereby eliminating the back-and-forth of long-form questionnaires. In addition, he unpacks the biggest hurdles to cyber adoption, from poor timing and over-complication to misaligned incentives and volatile pricing cycles.You'll learn:1. How telemetry brings scale, accuracy, and speed to cyber underwriting2. What really stops buyers from purchasing cyber policies3. How brokers can sell cyber coverage more effectively4. The key signals Onda uses to assess cyber hygiene and risk quality5. Why market volatility is damaging long-term trust in cyber insurance___________Get in touch with Alex Jomaa on LinkedIn: https://www.linkedin.com/in/alex-jomaa-b84b8520/ ___________About the host Anthony Hess:Anthony is passionate about cyber insurance. He is the CEO of Asceris, which supports clients to respond to cyber incidents quickly and effectively. Originally from the US, Anthony now lives in Europe with his wife and two children.Get in touch with Anthony on LinkedIn: https://www.linkedin.com/in/anthonyhess/ or email: ahess@asceris.com.___________Thanks to our friends at SAWOO for producing this episode with us!
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes host a discussion with, Cyber Coffee Hour's, Dr. Joseph Burt-Miller Jr. and Alfredo Nash about the current state of cybersecurity, focusing on the rise of Common Vulnerabilities and Exposures (CVEs), the challenges faced by cyber insurers, and the implications of AI vulnerabilities, particularly with Google's Gemini. The conversation emphasizes the importance of responsible AI usage, data sharing concerns, and the need for proactive measures in cybersecurity. Article: Despite More CVEs, Cyber Insurers Aren't Altering Policies https://www.darkreading.com/cyber-risk/more-cves-cyber-insurers-arent-altering-policies?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExajN5amZVMWpibElPY2V4eQEec7YqnFZKChC13sYroUwfPniTctt7fmHUuFDWCO8NT5qxZimY92rqX6FBcsw_aem_GG7xSAOwsjq1f7PKHtPJ2w 'Trifecta' of Google Gemini Flaws Turn AI Into Attack Vehicle https://www.darkreading.com/vulnerabilities-threats/trifecta-google-gemini-flaws-ai-attack-vehicle Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
Cybercrime isn't just a corporate problem anymore. James South from Aviva Canada joins Bruce to explain personal cyber insurance, a new layer of protection for the digital age. From online fraud recovery and ransomware response to cyberbullying coverage and dark-web monitoring, this coverage can help individuals and families stay financially and emotionally protected after an online attack. Learn how it works, what it costs (hint: about $6/month), and why every connected Canadian should consider adding it to their home or tenant policy. Find out more at aviva.ca and connect on Instagram and LinkedIn.
Every day, critical infrastructure is under siege with about 1.2 million cyberattacks per day. For facility managers, that means cybersecurity isn't just an IT issue, it's a frontline responsibility. In today's episode, Stacey Shepard and E.J. von Schaumburg from Building Cybersecurity, discuss why facility managers must treat digital threats with the same urgency as physical ones and how leaders can use proactive strategies, assessments and insurance awareness to stay prepared. Together, they share how facility managers can build resilience, safeguard their organizations, and lead the way in a world where cyber risk is constant.Sponsor:This episode is sponsored by ODP Business Solutions! 00:00 Introduction: The Growing Threat of Cyber Attacks00:19 Podcast Overview and Guest Introduction01:23 Understanding Cybersecurity in Facility Management02:24 The Importance of Data Management02:54 Building Cybersecurity: Framework and Training03:38 The Role of Facility Managers in Cybersecurity05:01 Cybersecurity Training and Preparedness08:11 Insurance and Risk Management11:11 Leadership and Legal Implications11:48 Resources and Conclusion Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org
In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Russia, China and North Korea are using ChatGPT to influence you — here's how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI's popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”• The Case for AI Loss of Control Response Planning and an Outline to Get Started• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week• Cyber attack contingency plans should be put on paper, firms told• Policyholder Plot Twist: Cyber Insurer Sues Policyholder's Cyber Pros• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF• Paying off cyber criminals no guarantee stolen data won't be published – studySevere Weather: Hurricane Season continues18 Oct: No Kings nationwide protestsQuick Hits:• Peace in Israel and Gaza?• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections• Yet another shutdown and its impact on cybersecurity professionals• Experts: Shutdown Strains Healthcare Cyber Defenses• Is the government shutdown impacting info sharing for healthcare cyber threats? • ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more! • Poland says cyberattacks on critical infrastructure rising, blames Russia• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense• Belgian PM reported to be among targets of ‘jihad-inspired' drone plot• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
In this episode, I sit down with John Czapko, CEO of CyberSecure, a leader with 26 years of experience in IT before founding a successful commercial insurance firm. That rare blend of technical expertise and risk management insight gives John a unique perspective on one of today's biggest business challenges: cyber insurance.John explains why the current cyber insurance landscape is broken—where policies don't align with real-world tech stacks, brokers can't translate cyber risk into business terms, and companies are left hoping instead of knowing when incidents occur.We dive into how CyberSecure is changing the game with trusted carrier partnerships, coverage that stands up to audits and regulatory demands, and proprietary tools like the CyberSecure RiskMeter and Board Brief, which turn complex cyber threats into clear business strategy.If your business can't afford to get cyber wrong, this conversation will help you understand how to make cyber insurance make sense—and make sure it performs when it matters most.
In the third installment of this Shoptalk series, host David Carothers and guest Zane Goldthorp of ProWriters shift the focus to proactive risk management for cyber insurance. They make the case that even in a soft market, a responsible business owner's focus should be on security, not just on meeting minimum carrier requirements. The conversation covers the essential security controls every business should have, including MFA, MDR, and employee training. They also dive into a real-world claim scenario that highlights a critical coverage gray area—the "Bring Your Own Device" (BYOD) issue—and discuss the potential conflicts between carrier-provided security services and an agent's referral relationships with Managed Service Providers (MSPs). Key Highlights: Essential Risk Management Controls Zane Goldthorp outlines the foundational security measures agents should be discussing with their clients. While carriers may have relaxed some requirements, essentials like MFA (Multi-Factor Authentication), regular backups, and email security are non-negotiable. He also notes the industry's shift from EDR (Endpoint Detection and Response) to the more proactive MDR (Managed Detection and Response). The Human Element: Employee Training The conversation stresses that one of the most effective and overlooked risk management tools is consistent employee training. With phishing and business email compromise being the source of most breaches, training employees to spot increasingly sophisticated attacks can be the make-or-break difference in preventing a major claim. A Critical Coverage Lesson: The BYOD Problem David shares a story from a real claim that exposed a major potential coverage gap: whether a breach is covered if it originates on a personal device not owned by the company. This "Bring Your Own Device" (BYOD) issue highlights the critical importance of understanding policy nuances and working with an expert wholesaler who knows the forms inside and out. Navigating Carrier Services and MSP Relationships Many cyber carriers now offer security services as part of their policies. While valuable, David cautions agents to be mindful of their referral relationships with MSPs (Managed Service Providers). An MSP may view these carrier offerings as direct competition, potentially damaging a crucial referral source. The key is clear communication to ensure all parties are aligned. Connect with: Zane Goldthorp LinkedIn David Carothers LinkedIn Kyle Houck LinkedIn Visit Websites: Power Producer Base Camp ProWriters Killing Commercial Crushing Content Power Producers Podcast Policytee The Dirty 130 The Extra 2 Minutes
And I Quote: Building Relationships with Insurance Agents and Small Business Owners
It's Cybersecurity Awareness Month and we invite insurance agents to listen to this episode to get their small business clients prepared.In this episode, Ashleigh Burden and Eder Ribeiro discuss the critical importance of cybersecurity and cyber insurance for small businesses. They explore common misconceptions about small business security, the impact of cyber incidents, and the necessity of having adequate cyber insurance coverage. Eder shares insights from his extensive experience in incident response and emphasizes the need for small businesses to take cybersecurity seriously. The conversation also touches on the evolving regulatory landscape and the partnership between Coterie and TransUnion to make cyber insurance more accessible for small businesses.Learn more about TransUnion: https://www.transunion.com/lp/cyberscout-explainerlinkedin.com/company/transunionLearn more about Coterie Insurance:https://coterieinsurance.com/insurance/cyber-insurance-for-small-businesses/https://coterieinsurance.com/blog/5-reasons-your-clients-need-cyber-insurance/Timeline: 00:00 - 01:54: Introductions01:54 - 04:42: The Myth of Small Business Security04:42 - 06:36: Common Cyber Attack Vectors for Small Businesses06:36 - 09:59: Impact of Cyber Incidents on Small Businesses09:59 - 12:06: Trends for Agents and Brokers in Cyber Insurance12:06 - 13:53: Regulatory Landscape for Small Businesses13:53 - 16:49: Making Cyber Insurance Accessible16:49 - 18:59: Understanding Cyber Insurance Coverage18:59 - 23:03: Key Takeaways for Cybersecurity Awareness Monthcybersecurity, cyber insurance, small business, cyber attacks, incident response, insurance agents, regulatory compliance, risk management, TransUnion, Coterie
Joseph Hines from Gallagher Insurance in Canada reveals why cyber insurance is critical for every Canadian business in 2025 and beyond. Joining host Mike Reeves, Joe walks through the big shifts we've seen in cyber insurance over the past five years. From nice-to-have to must-have, it isn't t just about building cybersecurity resilience anymore–it's become a requirement for working with partners and customers across industries. They also discuss how companies can navigate the process of getting insurance and the importance of having a strong cybersecurity foundation for speeding the process and lowering premiums.
One weak password. A business older than the telephone. Hundreds of jobs lost.In this episode of Darnleys Cyber Café, Darnley examines a stunning real-world case of cybercrime that shows how even the most established organizations can fall overnight. You'll learn how attackers exploit everyday security gaps, what happens inside a business during a ransomware crisis, and, most importantly, the practical steps you can take now to keep your own organization from becoming the next headline.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Organizations continue to face an increasingly complex cyber threat landscape. Amid ongoing geopolitical and geoeconomic tensions and supply chain disruptions, a robust and comprehensive cyber risk management strategy can help businesses mitigate risks and improve resiliency. In this episode of Risk in Context, Marsh McLennan's Dan Bowden speaks with Marsh's Helen Nuttall and Matt Berninger about the importance of reviewing and reinforcing cyber controls to help minimize cyber exposures and uncertainty and better protecting their people, finances, and operations from cyber threats. You can access a transcript of the episode here. Read Cybersecurity Signals, Connecting Controls and Incident Outcomes and The 2025 OT Security Financial Risk Report. For more insights and insurance and risk management solutions, follow Marsh on LinkedIn and X and visit marsh.com.
Simon Jelley, VP&GM Data Protection, ArcteraBanking and financial services are prime targets for cyberattacks – it is going to happen! So, the question you have to answer is what are you going to do to mitigate the risks and ensure a speedy recovery? How should financial organisations best manage data to close any compliance gaps? Simon Jelley of data guardian Arctera discusses the issues with Robin Amlôt of IBS Intelligence.
In this episode of Risky Chicks, Abbie and Joey discuss the importance and intricacies of personal cyber insurance in today's digital age. They share real-life experiences with scams and identity theft, delve into what personal cyber insurance covers and what it doesn't, and highlight the significance of protecting personal data. Join us as we explore how adding cyber protection to your homeowner's policy can safeguard you and your family against modern digital threats.
Nonprofits lean on outside platforms to save time and stretch budgets—but those relationships can quietly expose sensitive donor, client, and payment data. In this episode, Senior Cybersecurity Advisor Parker Brissette of Richey May explains how to recognize and manage third-party software risk before it becomes tomorrow's headline. He starts with a simple lens: follow the data. Where is it stored? Who can touch it—directly or indirectly? Many teams only think about contracted vendors, but Parker widens the aperture to “shadow IT” and consumer tools staff use without formal approval. As he puts it, “Third parties is really anybody that can touch the data at any point in your business, whether you have an agreement with them or maybe not.”From privacy regulations (GDPR, CCPA) to sector-specific rules (HIPAA, PCI), nonprofits carry legal and reputational exposure the moment personal information enters their systems. Parker offers practical steps: inventory paid tools via your accounting system; ask, “If this vendor vanished tomorrow, what would break?”; and press vendors for proof—SOC 2 reports, ISO 27001, or completed security questionnaires. For organizations without a CIO, he recommends clear contracts and one non-negotiable safeguard: “The biggest thing that I recommend in any third-party engagement is setting an expectation of having cyber insurance, because that's a big protection for you financially.”AI enters the picture with both promise and peril. Consumer AI tools can learn from and retain your uploads, potentially exposing proprietary or personal information. Enterprise agreements (e.g., Microsoft Copilot) can offer stronger data protections, but only if configured and used correctly. Parker's guidance is pragmatic: don't ban AI; set guardrails, choose vetted tools, and train teams.Finally, he urges preparation and transparency. Incidents can happen—even with good controls. Donors and corporate funders expect frank communication about what protections exist and what happens if data is exposed. Build trust now by documenting safeguards, validating vendors, and rehearsing your response.You don't have to be a security expert to make smart choices—but you do need a map: know your systems, test your assumptions, ask vendors for evidence, and write risk into your contracts and budgets. That approach turns anxiety into action—and preserves the trust your mission depends on.Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
Cyber threats are escalating, and SMEs are finding themselves increasingly in the firing line, from phishing and ransomware to costly business email compromise. Yet a QBE survey shows fewer than 4 in 10 SMEs in Singapore carry cyber insurance, with many citing cost or doubts about relevance. The real challenge is understanding what’s at stake: the financial risks of downtime, how coverage fits alongside basic cyber hygiene, and whether insurance should be treated as core to risk management. Sam Russell-Vick, Senior Cyber Underwriter, QBE Asia, joins the Breakfast Show to unpack the rising risks, why uptake remains low, and how SMEs can balance prevention, protection, and preparedness in 2025 and beyond.See omnystudio.com/listener for privacy information.
Send me a text (I will personally respond)Are you wondering how to leverage unconventional go-to-market strategies to accelerate growth in cybersecurity? Curious about integrating cyber insurance into your offer to stand out in a crowded landscape? This episode provides answers by spotlighting a company bucking the traditional playbook—and winning.In this conversation we discuss:
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Pankaj Goyal on Cyber Insurance Coverage for OT EnvironmentsPub date: 2025-09-01Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationPankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in calculating risk and exposure around IT, but cannot say the same for OT. Goyal discusses how fragmentation in the OT ecosystem, along with an ever-expanding attack surface, is contributing to the challenges around properly insuring these environments. The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in calculating risk and exposure around IT, but cannot say the same for OT. Goyal discusses how fragmentation in the OT ecosystem, along with an ever-expanding attack surface, is contributing to the challenges around properly insuring these environments.
Send us a textIn this action-packed episode, Joey Pinz sits down with cybersecurity veteran and ex-MSP operator Chris Loehr. From his early days as a two-footed soccer midfielder to leading Solis Security through complex ransomware response cases, Chris shares insights forged in both cleats and crisis. ⚽
In the compelling finale of this three-part insurance series, host Kirsten Howe and insurance expert Dean Myers tackle the coverage that keeps business owners up at night—cyber insurance. Dean shares fascinating real-world stories, from ransomware attackers offering customer service hotlines to disgruntled employees planting digital "time bombs" in company systems. You'll discover why this isn't just another insurance policy but essential business survival protection that covers everything from system failures to deepfake fraud. Dean reveals the surprising realities about whether companies should pay ransoms, how insurers use "white hat" attacks during applications, and why Silicon Valley startups are outpacing traditional insurance giants. If you think your business is too small to be targeted or that basic IT protection is enough, this episode will be a wake-up call you can't afford to ignore. Time-stamped Show Notes: 0:00 Introduction 1:12 What is cyber insurance, and why it's the broadest coverage for such esoteric risks? 1:48 The comprehensive scope: system failure, ransomware, business email compromise, business interruption, contingent business interruption, and forensics coverage. 2:15 Why cyber claims require hiring attorneys, CPAs, forensics experts, claims adjusters, and legal counsel, unlike traditional workers' comp claims. 2:45 The two key reasons carriers provide such broad coverage: rapid system restoration at the lowest cost and mandatory industry claim reporting. 3:48 How cyber insurance provides both first-party and third-party coverage, protecting you when you accidentally send infected emails to clients. 4:37 Real-world business email compromise: When hackers send fake invoices to your clients from compromised email accounts. 5:10 Why cyber attacks almost always originate overseas in countries with lax cybersecurity laws and accountability. 5:37 Will cyber insurance pay ransoms, and when is it appropriate? 6:42 Real claim story: How a tired CPA two days before tax season fell for a phishing email with a partner's name containing just one extra letter 8:25 Why paying ransoms creates a "bull's eye on your back" and marks you as a repeat target for extortionists. 11:06 Cyber insurance qualification requirements, why multi-factor authentication is now absolutely mandatory across all carriers. 12:15 "White hat" mock attacks: How insurers test your system vulnerabilities during the application process using the "open parking spot" analogy. 14:41 Insider sabotage case study: Bay Area law firm manager discovers her job posted on LinkedIn, teams up with IT brother-in-law for revenge. 15:53 The emerging deepfake threat, how voice cloning technology is creating new fraud risks for fund transfers. 16:25 Protection strategies: Using "trip questions" with personal knowledge to verify client identity during suspicious calls. 17:12 The AI counterbalance: How artificial intelligence may help prevent cyber claims in the future.
Cyber risk is a top global concern, yet middle market companies often lag in coverage. This excerpt of the Insuring Cyber Podcast, hosted by Elizabeth Blosfield, explores how … Read More » The post Making Cyber Insurance Work for the Middle Market appeared first on Insurance Journal TV.
Cyber risk is a top global concern, yet middle market companies often lag in coverage. This excerpt of the Insuring Cyber Podcast, hosted by Elizabeth Blosfield, explores how … Read More » The post Making Cyber Insurance Work for the Middle Market appeared first on Insurance Journal TV.
Cyber risk is a top global concern, yet middle market companies often lag in coverage. This excerpt of the Insuring Cyber Podcast, hosted by Elizabeth Blosfield, explores how … Read More » The post Making Cyber Insurance Work for the Middle Market appeared first on Insurance Journal TV.
When a cyberattack hits your nonprofit, do you know what to do? Cybersecurity expert Michael Nouguier, Partner at Cybersecurity Services at Richey May, walks us through the essential steps every nonprofit must take—before, during, and after a cyber event. As host Julia Patrick notes, it's not a matter of if, but when, and being unprepared is no longer an option.From clarifying what cyber insurance actually covers to practicing realistic incident response exercises, Michael offers a pragmatic and step-by-step guide tailored for nonprofit leaders. He points out, “Failure to plan is planning to fail,” and urges organizations to move beyond hope and into action.The conversation dissects misconceptions, such as thinking IT alone can handle a breach or believing cyber insurance is a comprehensive solution. Instead, Michael recommends building internal resilience with tabletop exercises that include the board, C-suite, legal, and communications staff. These scenario-based run-throughs help teams build muscle memory and prevent panic when disaster strikes.Third-party vendors—often a hidden weak spot—are addressed in detail. Michael reminds us, “You are the trusted data collector,” meaning nonprofits must ensure their vendors share the same security culture, including notification clauses and accountability.What if the worst happens? Michael stresses calm, communication, and preservation of evidence. “Don't delete anything,” he cautions, as doing so can sabotage forensic investigations and potential fund recovery. He also reminds leaders to report incidents to local authorities and the FBI's IC3.gov, reinforcing the legal and ethical responsibility to act swiftly and transparently.Perhaps one of the most human insights is around fostering a blame-free culture. Employees fearing punishment won't report mistakes, making things worse. “Everyone—even me—has clicked a phishing link,” Michael admits, highlighting the importance of openness and psychological safety within teams.This is a call to action for NPO leaders to shift from avoidance to preparedness. Cyberattacks are not just technical disruptions—they can financially and operationally dismantle an organization. With the right mindset, strategy, and comms plan, your nonprofit can weather the storm!00:00:00 Welcome and Episode Overview 00:02:00 The Evolution of Richie May's Cybersecurity Services 00:04:00 What Cyber Insurance Really Covers 00:08:00 Third-Party Vendor Risks and Due Diligence 00:12:00 Real-World Impact of Cyberattacks on Nonprofits 00:15:00 Why Response Planning Beats Hoping for the Best 00:17:00 Tabletop Exercises: Practicing Incident Response 00:20:00 Who to Call When a Breach Happens 00:23:00 First Response Steps: Breathe, Engage, Preserve Evidence 00:26:00 Creating a Culture Where Mistakes Are Reported 00:29:00 Episode Recap and Takeaway #TheNonprofitShow #CyberResilience Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
Cybersecurity Insurance and Risk Management are generally conversations we avoid in the ITSP space, but with recent events, Matt Lee and I sit down to talk about how the two complement each other, the pitfalls, and some tips for protecting yourself through both.
The managed service provider (MSP) cyber insurance landscape is facing significant challenges, primarily due to the certification process rather than the coverage itself. Edouard von Herberstein, a seasoned expert in complex risk management, recognized the inefficiencies within this system and founded Spectra, the first MSP certification platform acknowledged by major insurers. His insights reveal that the lack of trust and understanding between insurers and MSPs has created a bottleneck, preventing effective collaboration in enhancing cyber resilience and risk management.Spectra's approach focuses on certifying the MSP as an organization rather than individual technicians. This certification process involves a thorough examination of how MSPs protect themselves, the resilience of the solutions they offer, and the deployment of these solutions to customers. By ensuring that MSPs meet specific standards and best practices, Spectra aims to build trust with insurers, who have historically been skeptical of the MSP sector. This certification not only enhances the credibility of MSPs but also provides insurers with a reliable way to assess risk.The conversation also touches on the skepticism that exists on both sides of the insurance and MSP relationship. Many MSPs view insurers as profit-driven entities that often deny claims, while insurers perceive MSPs as lacking value. However, through initiatives like Spectra, there is a growing recognition of the mutual benefits that can arise from collaboration. Brokers are increasingly seeking certified MSPs to refer to clients, creating a new dynamic where both parties can thrive.Finally, the discussion highlights the importance of insurance in the broader context of cybersecurity. While some argue that organizations can self-insure by maintaining sufficient funds for potential breaches, the reality is that many SMEs do not recover from incidents like ransomware attacks. Insurance provides not only financial support but also critical guidance and resources post-incident. By fostering a partnership between certified MSPs and insurers, Spectra aims to create a more resilient cybersecurity ecosystem that benefits all stakeholders involved. Supported by MSPRADIO : https://mspradio.com/engage/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
When the market softened, Ridge didn't follow the crowd. Here's how discipline became their competitive edge. In this episode, host Anthony Hess sits down with Greg Markell, President & CEO at Ridge Canada Cyber Solutions Inc., for a candid conversation on what it takes to build a sustainable cyber MGA.Greg shares how Ridge has resisted the pull of chasing market share during soft cycles—maintaining its underwriting standards since 2020—and why he believes cyber risk transfer must be earned, not assumed. He unpacks Ridge's strategy of building proprietary underwriting tools in-house, explains why AI is an efficiency enhancer (not a replacement for people), and introduces the company's new “risk marketplace,” which helps brokers turn declines into actionable paths to coverage. You'll learn:1. Why consistent underwriting is Ridge's strategy for long-term profitability2. Why cyber coverage should depend on client maturity, not market capacity3. How Ridge balances internal tech and AI with human-led underwriting4. What Ridge's “risk marketplace” offers when clients aren't ready for coverage5. Why trusted vendor partnerships are core to a strong claims experience___________Get in touch with Greg Markell on LinkedIn: https://www.linkedin.com/in/gregmarkell/___________About the host Anthony Hess:Anthony is passionate about cyber insurance. He is the CEO of Asceris, which supports clients to respond to cyber incidents quickly and effectively. Originally from the US, Anthony now lives in Europe with his wife and two children.Get in touch with Anthony on LinkedIn: https://www.linkedin.com/in/anthonyhess/ or email: ahess@asceris.com.___________Thanks to our friends at SAWOO for producing this episode with us!
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assessment Tool: https://www.beyondtrust.com/products/identity-security-insights/assessment For a copy of the Microsoft Vulnerabilities Threat Report: https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report Blog re: Report: https://www.beyondtrust.com/blog/entry/microsoft-vulnerabilities-report Stephan will discuss OpenText Core Threat Detection and Response, a new AI-powered solution designed to quickly spot and neutralize threats across an organization's attack surface without the need to overhaul existing security stacks. He will also provide insights into the most dangerous threats facing enterprises today along with practical steps to mitigate them. https://www.opentext.com/products/core-threat-detection-and-response https://www.prnewswire.com/news-releases/opentext-launches-next-generation-opentext-cybersecurity-cloud-with-ai-powered-threat-detection-and-response-capabilities-302381481.html This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them! This segment is sponsored by BeyondTrust. Visit https://securityweekly.com/beyondtrustrsac to for a copy of the Microsoft Vulnerabilities Threat Report! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-400
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the importance of collaboration between CISOs and insurers. The guests share insights on risk assessment, the significance of incident response planning, and the need for CISOs to be recognized as key players in the boardroom. The conversation emphasizes the necessity of building strong relationships with insurers and leveraging data to enhance security measures. This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assessment Tool: https://www.beyondtrust.com/products/identity-security-insights/assessment For a copy of the Microsoft Vulnerabilities Threat Report: https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report Blog re: Report: https://www.beyondtrust.com/blog/entry/microsoft-vulnerabilities-report Stephan will discuss OpenText Core Threat Detection and Response, a new AI-powered solution designed to quickly spot and neutralize threats across an organization's attack surface without the need to overhaul existing security stacks. He will also provide insights into the most dangerous threats facing enterprises today along with practical steps to mitigate them. https://www.opentext.com/products/core-threat-detection-and-response https://www.prnewswire.com/news-releases/opentext-launches-next-generation-opentext-cybersecurity-cloud-with-ai-powered-threat-detection-and-response-capabilities-302381481.html This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them! This segment is sponsored by BeyondTrust. Visit https://securityweekly.com/beyondtrustrsac to for a copy of the Microsoft Vulnerabilities Threat Report! Show Notes: https://securityweekly.com/bsw-400
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assessment Tool: https://www.beyondtrust.com/products/identity-security-insights/assessment For a copy of the Microsoft Vulnerabilities Threat Report: https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report Blog re: Report: https://www.beyondtrust.com/blog/entry/microsoft-vulnerabilities-report Stephan will discuss OpenText Core Threat Detection and Response, a new AI-powered solution designed to quickly spot and neutralize threats across an organization's attack surface without the need to overhaul existing security stacks. He will also provide insights into the most dangerous threats facing enterprises today along with practical steps to mitigate them. https://www.opentext.com/products/core-threat-detection-and-response https://www.prnewswire.com/news-releases/opentext-launches-next-generation-opentext-cybersecurity-cloud-with-ai-powered-threat-detection-and-response-capabilities-302381481.html This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them! This segment is sponsored by BeyondTrust. Visit https://securityweekly.com/beyondtrustrsac to for a copy of the Microsoft Vulnerabilities Threat Report! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-400
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the importance of collaboration between CISOs and insurers. The guests share insights on risk assessment, the significance of incident response planning, and the need for CISOs to be recognized as key players in the boardroom. The conversation emphasizes the necessity of building strong relationships with insurers and leveraging data to enhance security measures. This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assessment Tool: https://www.beyondtrust.com/products/identity-security-insights/assessment For a copy of the Microsoft Vulnerabilities Threat Report: https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report Blog re: Report: https://www.beyondtrust.com/blog/entry/microsoft-vulnerabilities-report Stephan will discuss OpenText Core Threat Detection and Response, a new AI-powered solution designed to quickly spot and neutralize threats across an organization's attack surface without the need to overhaul existing security stacks. He will also provide insights into the most dangerous threats facing enterprises today along with practical steps to mitigate them. https://www.opentext.com/products/core-threat-detection-and-response https://www.prnewswire.com/news-releases/opentext-launches-next-generation-opentext-cybersecurity-cloud-with-ai-powered-threat-detection-and-response-capabilities-302381481.html This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them! This segment is sponsored by BeyondTrust. Visit https://securityweekly.com/beyondtrustrsac to for a copy of the Microsoft Vulnerabilities Threat Report! Show Notes: https://securityweekly.com/bsw-400
U.S. hiring continues to show modest growth, with the Bureau of Labor Statistics reporting an addition of 139,000 jobs in May, surpassing economists' expectations. However, the unemployment rate remains steady at 4.2%, marking a prolonged period of stagnation. Revisions to previous months revealed a combined loss of 95,000 jobs, raising concerns about the overall health of the labor market. While wage growth remains consistent at 3.9%, sectors such as healthcare and leisure are thriving, whereas manufacturing and professional services are experiencing declines. This mixed landscape reflects economic uncertainty that is affecting hiring decisions, particularly among smaller firms.The adoption of Windows 11 has plateaued, with its market share slightly decreasing to 43.22% as Windows 10's share rises to 53.19%. Despite this stall, experts predict a gradual increase in Windows 11 adoption through the end of the year. However, the looming end of support for Windows 10 on October 14 poses a significant risk, as half of the world's PCs will be left without mainstream support. Service providers are encouraged to prepare for a migration wave by utilizing automated tools to assess upgrade eligibility and prioritize device refreshes.In the realm of cybersecurity, UConn is enhancing its cyber insurance marketplace by partnering with BlackPoint Cyber and Cork Protection. These collaborations aim to empower managed service providers (MSPs) with better risk management tools and insurance options. As cyber risk financing merges with prevention strategies, MSPs are positioned as key players in this evolving landscape. The need for providers to understand insurance language and align their security offerings with underwriting requirements is becoming increasingly critical.CrowdStrike has issued a soft revenue forecast for the second quarter, leading to a decline in its stock price. The company anticipates revenue between $1.14 billion and $1.15 billion, falling short of analyst expectations. This downturn is attributed to reduced government and enterprise spending on cybersecurity products amid economic pressures. For managed service providers, this situation serves as a reminder to diversify their vendor portfolios to mitigate operational risks associated with vendor concentration. The episode underscores the importance of balancing security efficacy with vendor resilience in a challenging market. Four things to know today 00:00 Growth Slows, Gaps Widen: Jobs Up 139 K, Unemployment Steady, AI-Exposed Roles Shrink and Talent Budgets Surge06:27 Windows 11 Plateau Meets Windows 10 Sunset: Half of Business PCs Face October 2025 Deadline—MSPs Positioned to Monetize the Refresh Wave08:49 From Detection to Dollars: UKON's Insurance Engine, Blackpoint's 24×7 Defense, Cork's Risk Insights and Guardz's $56 M Raise Signal Security-Finance Convergence11:53 CrowdStrike's Lower-Than-Expected Q2 Outlook and $29 M Outage Bill Spotlight the Hidden Cost of Vendor Concentration for MSPs Supported by: https://timezest.com/mspradio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
S2E8: Cyber Insurance for Healthcare Provider Organizations Guest host Lisa Gallagher, National Cybersecurity Advisor, CHIME Guest: Dan Bowden, CISO, McLennan Global Business To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
Microsoft wants to update all the things LexisNexis breach impacts 364,000 people Cyber insurance premium volume expected to double Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
Podcast: ICS Cyber Talks PodcastEpisode: Michal Shlomo Head of cyber-Insurance @Howden Insurance Brokers IL on insurance role & cyber attackPub date: 2025-05-26Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationאחת המחלוקות הגדולות בין אנשי המקצוע בסייבר היא נושא ביטוח הסייבר. כן צריך, לא צריך, האם המוצר הביטוחי מצדיק את ההוצאה והאם הוא נותן פתרון אמיתי בזמן משבר. הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו יועץ ואוונגליסט סייבר מארחים את מיכל שלמה ראש מחלקת ביטוחי סייבר בסוכנות הביטוח האודן, בשיחה על ביטוחי סייבר ומה האמת למול השמועות. האם ביטוח סייבר באמת יקר האם ברגע שיש אירוע סייבר, חברת הביטוח לוקחת את המושכות ומנהלת את המשבר גם אם בניגוד לדעת הלקוח האם ביטוח סייבר הוא במקום התקשרות מבעוד מועד עם חברת איי.אר ועוד One of the most significant disputes among cyber professionals concerns cyber insurance. Is it necessary? Does the insurance product justify the expense? Does it provide a real solution during a cyber crisis? Hadas Tamam Ben Avraham, Vice Dean at the Ono Academic College, and Nachshon Pincu, cyber evangelist and consultant, host Michal Shlomo, Head of the Cyber Insurance Department at Howden Insurance Brokers Israel, in a conversation about cyber insurance and the truth in the face of rumours. Is cyber insurance costly? Does the insurance company take the reins and manage the crisis as soon as a cyber event occurs, even if contrary to the customer's opinion? Is cyber insurance a substitute for a contract in advance with an IR company? And moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Send us a textToday's topic: How to Pass the NCUA Tech Audit (Without Losing Your Mind)The guest is Mike Robins, COO at Dynamic Edge, a company that's helped many credit unions - particularly ones with assets between $25 million and $400 million - successfully navigate the NCUA Tech Audit which occurs “periodically,” according to the agency.Hear what's involved in the audit, how to pass it and - crucially - how to prepare for it.Robin's key point: prepare and you won't lose your mind.Interesting, too, is that NCUA provides cheat sheets for the Tech Audit on its website. Robins tells where to find them and how to use them. He also tells if the auditors are in fact following the cheat sheets.Listen up.Like what you are hearing? Find out how you can help sponsor this podcast here. Very affordable sponsorship packages are available. Email rjmcgarvey@gmail.com And like this podcast on whatever service you use to stream it. That matters. Find out more about CU2.0 and the digital transformation of credit unions here. It's a journey every credit union needs to take. Pronto
What if the biggest threat to your cyber claims portfolio isn't ransomware—but a spreadsheet buried in someone's inbox?In this episode, host Anthony Hess chats with John Spiehs, Head of Claims at Converge, about what's shifting in the cyber claims space—and what insurance professionals should have on their radar.John breaks down how Converge is leading efforts to simplify Business Interruption (BI) claims with a cleaner, more intuitive, top-down approach. He also digs into the growing exposure around data privacy, where even small incidents can trigger costly class actions. Finally, he explains what's getting lost as the market softens, why vendor relationships matter more than price tags, and the kind of talent today's claims teams really need.You'll learn:1. Why BI claims are evolving, and how Converge is simplifying the process2. Why data privacy and class actions are emerging as cyber's new frontier3. Why soft market dynamics threaten underwriting discipline4. How poor email habits can explode breach costs overnight5. What defines a strong vendor partnership, beyond cut-rate solutions___________Get in touch with John Spiehs on LinkedIn: https://www.linkedin.com/in/john-s-b981337/___________About the host Anthony Hess:Anthony is passionate about cyber insurance. He is the CEO of Asceris, which supports clients to respond to cyber incidents quickly and effectively. Originally from the US, Anthony now lives in Europe with his wife and two children.Get in touch with Anthony on LinkedIn: https://www.linkedin.com/in/anthonyhess/ or email: ahess@asceris.com.___________Thanks to our friends at SAWOO for producing this episode with us!
In this episode, Drex highlights former HCA CSO Paul Connolly's practical cyber insurance guidance, introduces OpenAI's new "Operator" AI agent that can independently perform web tasks, and examines the emerging organizational risks of "shadow AI" as employees implement unauthorized AI solutions in their workflows without proper oversight.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Dan Candee, CEO of Cork, discusses the innovative approach of combining software with insurance to provide cybersecurity solutions for managed service providers (MSPs) and their clients. Cork stands out in the cybersecurity landscape by validating the compliance of all client endpoints and offering a cyber warranty that provides financial protection. This model addresses the complexities of cybersecurity, where software vendors often avoid liability for failures, leaving businesses vulnerable. Cork aims to simplify the cybersecurity landscape, integrating with existing MSP tech stacks to ensure comprehensive protection.The conversation delves into the challenges of managing financial risk in the cybersecurity sector. Candee explains that Cork's unique technology allows them to monitor and assess risks across all endpoints, providing a clear picture of compliance and security. This proactive approach helps MSPs maintain a secure environment for their clients, ensuring that they are prepared for potential cyber threats. The discussion highlights the importance of accountability and transparency in the cybersecurity ecosystem, emphasizing that Cork's model is designed to support MSPs in their efforts to protect their clients.Candee also addresses the issue of human error in cybersecurity, noting that a significant percentage of incidents stem from mistakes made by individuals rather than technology failures. Cork's system not only identifies these risks but also provides a framework for compliance, ensuring that clients are aware of their security posture. By offering a warranty that covers incidents resulting from human error, Cork reinforces the idea that businesses have the right to survive cyber attacks, fostering a culture of security awareness.Finally, the conversation touches on the evolving landscape of cyber insurance, which has been described as chaotic. Candee shares insights on how Cork collaborates with insurance companies to create a sustainable model that balances risk and profitability. He emphasizes the need for continuous improvement in cybersecurity practices and the integration of automation and AI to enhance efficiency. As the industry evolves, Cork remains committed to simplifying processes for MSPs and their clients, ensuring that they can navigate the complexities of cybersecurity with confidence. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
In Part 2 of this series, Steve Brady, Market Leader of Transaction Advisory at Withum, welcomes back Joe Ehrlich, National Practice Leader of Private Equity, Family Office, and M&A, and John Kerns, Executive Managing Director for the Northeast Region—both of Brown & Brown. Steve, Joe, and John discuss the current state of the RWI market as it comes to coverage for cyber.
In Part 1 of this two-part series, Steve Brady, Market Leader of Transaction Advisory at Withum, sits down with Joe Ehrlich, National Practice Leader of Private Equity, Family Office, and M&A, and John Kerns, Executive Managing Director for the Northeast Region—both of Brown & Brown. Together, they explore the evolving role of cyber insurance and its growing impact on deal-making.
As cyber threats evolve, the insurance industry struggles to keep pace, leading to shifting policies, increasing exclusions, and unexpected coverage gaps. Watch this highlight from the latest Cyber … Read More » The post Cyber Insurance: Navigating the Ever-Changing Risk Landscape appeared first on Insurance Journal TV.
Send us a textIn this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptability shaped his path to leadership in incident response and ransomware negotiation. Packed with insights on cybersecurity careers, leadership mentality, and the future of satellite warfare, this conversation is a must-listen for aspiring security professionals and military transitioners. Connect with Ricoh at firstresponder.us or on Instagram @rico_danielson_. Subscribe for more inspiring stories!00:00 - Introduction to Ricoh Danielson02:17 - Military Background and Special Forces Transition06:40 - Career Pivot to IT and Cybersecurity16:58 - Leadership Lessons in Cyber35:40 - Digital Forensics and Ransomware Insights47:56 - How to Connect with RicohSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Thomas Reagan is the Global Head of Cyber at Marsh. In this episode, he joins host Paul John Spaulding and Kris Lovejoy, Global Security and Resilience Practice Leader at Kyndryl, to discuss how cybercrime is affecting the cyber insurance market, including the financial impact, and policies across global infrastructure. As the global leader in IT infrastructure services, Kyndryl advances the mission-critical technology systems the world depends on every day. Collaborating with a vast network of partners and thousands of customers worldwide, Kyndryl's team of highly skilled experts develops innovative solutions that empower enterprises to achieve their digital transformation goals. Learn more about our sponsor at https://kyndryl.com.
In this episode of Command Control Power, the hosts welcome back Justin Esgar of ACEs Conference. The discussion kicks off with light-hearted banter about colds and convincing Jerry to buy a ticket for the upcoming ACEs Conference. Justin shares behind-the-scenes insights into his daily routine and the value of attending ACEs, highlighting its focus on business growth for consultants, the expansion of the conference to include special training sessions at the 'big fruit company' campus, and how it helps attendees improve client relations and efficiencies. The conversation also covers the unique supportive nature of the Apple community and the upcoming Edward Esgar ACES Scholarship in honor of Justin's father. The episode wraps up with an insightful discussion about the ACES Mastermind program, emphasizing the importance of continuous learning and community support in the tech industry. 00:00 Introduction and Welcoming Justin Esgar 01:01 Daily Routine and Behind the Scenes 01:56 ACEs Conference Overview 02:50 Special Training and Business Focus 04:43 Consulting and Sales Strategies 16:24 Importance of Cyber Insurance 19:13 Bringing Employees to ACEs 26:28 Tim Pearson's Chat and Wedding Insights 26:55 Honoring My Dad: The Edward Esgar ACES Scholarship 28:35 Funny Story: The Car Mix-Up 29:59 All Things MSP and Podcasting 31:22 The Sandwich Compliment and Fearless Feedback 36:57 Mastermind Program and Business Coaching 42:06 The Unique Apple Community 47:44 Wrapping Up and Final Thoughts
Send us a textNavigating Cybersecurity and Insurance: Insights from Industry Experts Craig Sekowski and Ralph Pasquariello Join host Chris Whitaker on this episode of The Wireless Way, where he converses with seasoned IT executives Craig Sekowski and Ralph Pasquariello . Discover their extensive backgrounds in IT, insurance, and fintech, and get insights on the intersection of cybersecurity and insurance. Learn about their innovative CARE program (Cyber Insurance Assessment and Risk Evaluation) and how it helps businesses measure and manage risk effectively. They delve into the complexities of cybersecurity, the importance of adequate insurance, and the ever-evolving landscape of cyber threats. Featuring a discussion on the significance of multi-level security approaches and real-world examples, this episode is a crucial listen for tech enthusiasts and business owners alike.00:00 Introduction and Host's Welcome00:32 Guest Introductions: Craig Sekowski and Ralph Pasquariello 03:04 Craig's Career Journey03:55 Ralph's Career Journey07:29 The Origin of the CARE Report12:13 Small Business Cyber Insurance Needs19:30 Cybersecurity Trends and Challenges27:16 Client Security Assessment28:03 Analyzing Client Risk28:19 Deep Dive into Threat Titles28:38 External Network Data and Simulations31:36 Industry-Specific Risks33:37 Benchmarking and Remediation35:39 Importance of Mobile Device Management37:16 Final Thoughts and Recommendations39:03 Conclusion and Contact Information39:59 Introduction to Pure Talk41:32 Cybersecurity and Insurance Insights44:38 MDM and Corporate-Owned Devices46:03 Partnering for Cybersecurity Solutions49:23 Final Words and New Video SeriesLearn more about The Tech CollectiveOur Sponsor, PuretalkSupport the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.
Fan Mail: Got a challenge digitizing your intake? Share it with us, and we'll unpack solutions from our experience at Cytora.In this episode of Making Risk Flow, host Juan de Castro welcomes Jonathan Spry, CEO and co-founder of Envelop Risk, for an insightful discussion on how AI and advanced analytics are transforming cyber insurance. They explore Envelop Risk's “data flywheel” strategy, emphasising the power of data-driven decision-making in risk assessment. Jonathan shares how AI-driven underwriting has evolved over the past eight years, shifting from industry scepticism to widespread adoption. They also discuss "augmented underwriting," where AI enhances—rather than replaces—human expertise, especially in speciality insurance. The conversation extends to emerging risks, such as quantum computing's impact on cybersecurity and how AI reshapes risk management across industries. To receive a custom demo from Cytora, click here and use the code 'Making Risk Flow'.Our previous guests include: Bronek Masojada of PPL, Craig Knightly of Inigo, Andrew Horton of QBE Insurance, Simon McGinn of Allianz, Stephane Flaquet of Hiscox, Matthew Grant of InsTech, Paul Brand of Convex, Paolo Cuomo of Gallagher Re, and Thierry Daucourt of AXA.Check out the three most downloaded episodes: The Five Pillars of Data Analytics Strategy in Insurance | Craig Knightly, Inigo 20 Years as CEO of Hiscox: Personal Reflections and the Evolution of PPL | Bronek Masojada Implementing ESG in the Insurance and Underwriting Space | Simon Tighe, Chaucer, and Paul McCarney, Moody's
In this episode of Insurance Town, Mayor Heath Shearon sits down with his good friend and insurance powerhouse, Ariel Rivera, the newly appointed President of PIA National. Ariel shares his journey, the responsibilities of his new role, and how he's embracing the challenges of leadership in the independent insurance world.Episode Highlights:✅ Ariel's Journey to Leadership – From starting in the industry to becoming the youngest-ever PIA National President, Ariel reflects on his path and what drives his passion for the independent agency space.✅ What PIA Does for Agents – Ariel breaks down the advocacy, education, and networking opportunities PIA provides, and why agents need to be engaged to reap the full benefits.✅ Hard Market Realities – Ariel and Heath discuss the ongoing hard market, its impact on independent agents, and what agents can do to navigate these challenging times.✅ Advocacy Matters – Hear Ariel's firsthand experience testifying before Congress about flood insurance reform, and why agents need to be aware of legislative issues affecting the industry.✅ Cyber Insurance & RGS – Ariel shares his work with RGS, helping agencies provide cyber coverage solutions in a rapidly evolving digital landscape.✅ Stronger Together – The importance of unity and collaboration in the insurance space, and how the PIA is growing stronger through collective action and support.Heath and Ariel bring the energy, passion, and love for the industry in this episode—one you don't want to miss!Sponsors:A big thank you to our sponsors for making this episode possible!
