Podcasts about lbmc information security

  • 5PODCASTS
  • 41EPISODES
  • 15mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 16, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about lbmc information security

Latest podcast episodes about lbmc information security

Cybersecurity Sense
Interviewing a Real Hacker

Cybersecurity Sense

Play Episode Listen Later Feb 16, 2023 17:14


William Parks takes this podcast to introduce a key member of LBMC Information Security's Technical Services team, Daniel Nguyen. Daniel is a manager on the team with quite the insightful background. William and Daniel spend time discussing current steps to keep your organization successful in their journey to a healthier security posture. Questions for Daniel? Find him here: daniel.nguyen@lbmc.com  

The Virtual CISO Moment
Throwback Thursday - A Conversation with Mark Burnette

The Virtual CISO Moment

Play Episode Listen Later Jan 26, 2023 26:28


From September 28, 2022 - Mark Burnette, Shareholder-In-Charge at LBMC Information Security, discusses his path from Senior IT Auditor to overseeing and directing LBMC's Risk Services practice nationwide. He is very active in the information security community, including as co-founder and past president of the Middle Tennessee ISSA chapter (one of the largest in the world), and co-founder and board member of the Southern CISO Security Council. His certifications include CPA, CISA, CISSP, CISM, and CRISC, and he frequently speaks on information security topics, including a fabulous TEDx talk on the Humanity Behind Cyber Attacks - https://www.ted.com/talks/mark_burnette_the_humanity_behind_cybersecurity_attacks. --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message

The Beer Mighty Things Podcast
# 166 - On Cybersecurity Safety with Mike Ciunci of LBMC

The Beer Mighty Things Podcast

Play Episode Listen Later Dec 20, 2022 57:36


Today we're joined by Cybersecurity Specialist Mike Ciunci of LBMC Information Security to cover the state of the cyber industry. We review & learn how to identify the common cyber scams: phishing, social engineering, ransomware and what to do if your systems are breached, but first we discuss his current fitness challenge: #75Hard We discuss a few real-life examples of brewery hacks and we stress the importance of creating a trustworthy culture while educating your staff using the free tools available on the web. We debunk the common myths like "We're too small to be hacked" or "We're safe, we have the cloud" and how to secure your data. Click for Breach Guide / Ransomware Checklist / CanIFish Phishing Simulator / Key links - https://www.knowbe4.com/ - https://www.mimecast.com/ - https://www.nist.gov/ - www.cisa.gov - - DarkReading - Bleeping Computer - The Hacker News Feel free to Email mike.ciunci@lbmc.com and connect on LinkedIn Cheers, and #beermightythings

safety cybersecurity lbmc information security
The Virtual CISO Moment
The Virtual CISO Moment S4E44 - A Conversation with Mark Burnette

The Virtual CISO Moment

Play Episode Listen Later Sep 28, 2022 27:00


In this month's special end of month Wednesday episode Mark Burnette, Shareholder-In-Charge at LBMC Information Security, discusses his path from Senior IT Auditor to overseeing and directing LBMC's Risk Services practice nationwide. He is very active in the information security community, including as co-founder and past president of the Middle Tennessee ISSA chapter (one of the largest in the world), and co-founder and board member of the Southern CISO Security Council. His certifications include CPA, CISA, CISSP, CISM, and CRISC, and he frequently speaks on information security topics, including a fabulous TEDx talk on the Humanity Behind Cyber Attacks - https://www.ted.com/talks/mark_burnette_the_humanity_behind_cybersecurity_attacks. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/virtual-ciso-moment/message Support this podcast: https://anchor.fm/virtual-ciso-moment/support

Cybersecurity Sense
Information Security Careers

Cybersecurity Sense

Play Episode Listen Later Oct 21, 2020 36:21


Learn how a few members of the LBMC Information Security team got started in their careers, and what you should consider when going into the field. 

careers information security lbmc information security
Cybersecurity Sense
HITRUST Guide

Cybersecurity Sense

Play Episode Listen Later Sep 18, 2020 13:42


Nancy Spizzo, Senior Manager at LBMC Information Security, joins Bill Dean to talk about HITRUST and the new LBMC Information Security HITRUST Guide being released later this fall. 

guide senior manager hitrust bill dean lbmc information security
Cybersecurity Sense
HITRUST Conference Overview

Cybersecurity Sense

Play Episode Listen Later Aug 16, 2019 20:44


The LBMC Information Security team recaps the 2019 HITRUST conference that was held in Texas in May. The team talks about the latest news on third-party assurance, HITRUST CSF adoption and controls implementation, SOC 2 + HITRUST, and the latest initiatives in the quality sub committee.

Cybersecurity Sense
Key Insights on PCI DSS Version 4.0

Cybersecurity Sense

Play Episode Listen Later May 29, 2019 13:08


In this podcast, LBMC Information Security’s Mark Burnette offers a summary and perspective on the council’s insights—specifically addressing the three likely changes for the next version of the PCI DSS.

pci key insights dss pci dss mark burnette lbmc information security
Cybersecurity Sense
New Tools for PCI Compliance

Cybersecurity Sense

Play Episode Listen Later May 15, 2019 15:44


In this podcast, LBMC Information Security’s Bill Dean and John Dorling discuss some of the new tools available to help merchants who are trying to achieve PCI compliance.

Cybersecurity Sense
2018 Was Second-Most Active Year for Data Breaches

Cybersecurity Sense

Play Episode Listen Later Mar 19, 2019 10:30


2018 was one of the biggest years for data breaches to date, with more than 6,500 data breaches reported throughout the year. In this podcast, LBMC Information Security’s Bill Dean dives deeper into these recent data breach statistics and why it’s important to keep investing in the hard work involved with combating cyber-attacks to prevent data breaches in the days to come.

Cybersecurity Sense
Targeted Attacks Compared to Opportunistic Attacks

Cybersecurity Sense

Play Episode Listen Later Oct 3, 2018 8:28


All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the data you generate or maintain? In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.

Cybersecurity Sense
Incident Response Should Be Common Sense

Cybersecurity Sense

Play Episode Listen Later Aug 16, 2018 7:23


Since incident response issues are no longer just an IT issue and can often involve legal issues, it is important for organizations to develop an incident response team, seek outside expertise, and have an overall action plan in the event of an incident. In this podcast, LBMC Information Security’s Bill Dean discusses how a complex situation like incident response can be purely based on common sense.

Cybersecurity Sense
Attack Simulation

Cybersecurity Sense

Play Episode Listen Later Jul 18, 2018 6:28


In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on that approach, starting with the differences between attack simulation and conventional penetration tests. The methodology of attack simulation is the assumption that the network or a system will become compromised and the current controls will not prevent the infection. So, how does attack simulation differ from purple-teaming? With purple-teaming, everyone know what controls are being tested and when. The attack simulation is a bit different, asthe focus is the emulation of a specific attacker group and their methods of obtaining sensitive data. In this podcast, LBMC Information Security’s Bill Dean discusses attack simulation, or what some people label adversary simulation.

attack simulation attack simulation bill dean lbmc information security
Cybersecurity Sense
Purple-Teaming

Cybersecurity Sense

Play Episode Listen Later Jul 10, 2018 6:59


Most penetration testers are considered “red team,” while most defenders are considered “blue team.” Thus, the irony of a conventional penetration test is that these two groups are typically pitted against each other. When the red teams and blue teams are working together, you have what’s called a “purple team.” While purple-teaming has not always been a thing, it can be a win for both groups. Purple-teaming has now become somewhat of a buzzword. However, the effort behind it has great merit and value. In this podcast, LBMC Information Security’s Bill Dean helps purple-teaming, as well some of the benefits involved with the practice.

purple purple teaming bill dean lbmc information security
Cybersecurity Sense
Does GDPR Apply to Me?

Cybersecurity Sense

Play Episode Listen Later May 8, 2018 14:38


As the May 25, 2018 GDPR enforcement date fast approaches, many organizations are asking, “How does the GDPR will apply to my organization?” As the GDPR extends to U.S. organizations that offer services to or monitor behaviors of E.U. citizens, it’s important to understand how to classify your organization’s data to determine GDPR applicability. While the GDPR presents new challenges for organizations storing or processing personal data, maintaining compliance with the proper guidance is essential. In this podcast, LBMC Information Security’s Drew Hendrickson explains GDPR, how it can apply to you, and why GDPR compliance matters.

compliance gdpr lbmc information security
Cybersecurity Sense
GDPR—How to Prepare

Cybersecurity Sense

Play Episode Listen Later May 8, 2018 16:49


As organizations determine whether the E.U.’s General Data Protection Regulation (GDPR) is applicable to them, there are several important things to consider when it comes to compliance. Among those things involves preparing for and responding to personal data breaches which is not just a requirement of the GDPR; it’s a good business practice in general), data consent, and how you are protecting our data (like data pseudonymisation). With GDPR, personal data is defined a bit differently, which means there’s potentially much more data for organizations to protect. In this podcast, LBMC Information Security’s Drew Hendrickson highlights a list of things to consider when it comes to GDPR compliance.

Cybersecurity Sense
GDPR and Preparing for DSARs

Cybersecurity Sense

Play Episode Listen Later May 8, 2018 15:56


The EU’s General Data Protection Regulation (GDPR) permits users certain rights (referred to as “data subject access rights” or “DSARs” in the documentation) that organizations will need to be prepared to accommodate if they must comply with GDPR. For organizations to be prepared to respond, it’s important to have a clear understanding of DSARs before you risk consuming too much time, money, and resources in efforts to remain compliant. In this podcast, LBMC Information Security’s Drew Hendrickson shares some considerations for how to prepare and respond when a customer chooses to request action on one of their new rights under GDPR.

european union preparing gdpr lbmc information security
Cybersecurity Sense
Why Employees Are Your Number One Risk

Cybersecurity Sense

Play Episode Listen Later Apr 19, 2018 9:36


The question is not, “Will your employees will get your company hacked?” but rather “When will your employees get your company hacked?” A recent article from HITECH Answers highlights this sad reality of human-error being the most common reason for a cyber intrusion and data compromise. So, while employee actions can circumvent most every security control you have invested in, security awareness training is critical to prevent your employees from being your number one risk. Users are often the last line in your cyber-defense efforts, and there is no patch for people wanting to be helpful or wanting to do the right thing. In this podcast, LBMC Information Security’s Bill Dean explains why ongoing employee security training is crucial to ensuring employees know how to spot a hacking attempt, ultimately protecting your organization from a potential cyber-attack. Listen, and discover these key takeaways:  Reasons why employees often do not realize how important they are to the process How not enabling multi-factor authentication on remote access to email allows hackers to easily access employee email accounts Why 91% of cyberattacks begin with a spear phishing email The importance of having strong passwords for employees Why backing up data is a must for protecting against cyber-attacks

Cybersecurity Sense
Phishing Emails with 100% Click Rate

Cybersecurity Sense

Play Episode Listen Later Apr 10, 2018 6:49


In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released research data indicating that over one-third of security incidents start with phishing emails or malicious attachments sent to company employees. In this podcast, LBMC Information Security’s Bill Dean digs into these research findings and shares some reasons why training employees to spot phishing emails, messages, and pre-texting calls can’t be done just once or once a year. Listen, and discover these key takeaways: Fascinating new research findings about phishing attacks Reasons for training employees about phishing attacks on an ongoing basis Why it only takes one user to follow the link in a phishing email for your network to be compromised New approaches that may be implemented into our menu of phishing schemes

Cybersecurity Sense
IIA Knoxville—Implementing Cloud-Managed Security

Cybersecurity Sense

Play Episode Listen Later Apr 10, 2018 7:42


When cloud-managed security was first introduced, there was some concern about the levels of security as compared to the security of data on an organization’s premises. Today, security professionals have implemented the appropriate controls to help could-based data management be safe and effective. As many organizations are now embracing and migrating to the cloud, it is important to know the risks and proper controls associated with the movement. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Sese Bennett discuss the effectiveness and concerns surrounding migrating to cloud-managed security measures and what organizations today should know. Listen, and discover these key takeaways: Why you should evaluate your current security frameworks and compare with cloud-managed controls A brief explanation of FedRAMP and FISMA Reasons to consider moving to cloud-managed security The potential risks associated with cloud frameworks if not implemented properly Why not to stop at the assessment phase

Cybersecurity Sense
IIA Knoxville—Risky Business

Cybersecurity Sense

Play Episode Listen Later Mar 19, 2018 7:08


No matter the industry—government, healthcare, financial, or even smaller, mom-and-pop businesses—each deal with some type of sensitive customer information, and each has decisions to make when it comes to managing risk. Most security and audit frameworks (HIPAA, ISO, PCI, NIST, SOC 2, etc.) have requirements for risk assessment, making them one of the first things auditors or regulators ask for. Many companies are still using spreadsheets when it comes to performing risk assessments, which can be ineffective and insecure. Such a lack of functionality can keep a company from moving beyond assessment and into true risk management. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Mark Fulford discuss the importance of risk management, including the effectiveness of risk assessments and how BALLAST can help organizations automate the risk assessment process. Listen, and discover these key takeaways: Understanding what’s important to your organization when it comes to managing risks Reasons to consider more targeted risk assessments Why you shouldn’t just do gap assessments How to automate the risk assessment process Why not to stop at the assessment phase

Cybersecurity Sense
IIA Knoxville—Dear President Trump: How to Secure the United States & Demonstrate That Your Company Is

Cybersecurity Sense

Play Episode Listen Later Mar 12, 2018 7:36


In the information security world, we all wish we had more access to senior executives. Following that logic, if you’re responsible for security at your organization, and you are lucky enough to ride on the same elevator with a senior executive from your company, you should be prepared with your “elevator pitch” on what to say about improving the cybersecurity posture of the organization. When asked, you want to have your message fine-tuned and be able to communicate it clearly and succinctly (before the elevator reaches the parking garage).  In this podcast, LBMC Information Security’s Mark Burnette discusses his elevator pitch to President Donald Trump with podcast host Bill Dean. While Mark hasn’t ridden on an elevator with the President, he doesn’t let that stop him from finding a way to articulate what the President should be doing to address cybersecurity issues at the federal level.  Listen, and discover these key takeaways: Reasons cybersecurity initiatives at the federal government level are important Former and current administration actions on cybersecurity Reasons for establishing a national cybersecurity advisory committee The need for enforcing existing cybersecurity laws Why the ease and proliferation of cyber-attacks is too much to ignore

Cybersecurity Sense
IIA Knoxville—SOC for Cybersecurity

Cybersecurity Sense

Play Episode Listen Later Mar 5, 2018 5:53


The AICPA Cybersecurity Working Group brought to life a new type of cybersecurity examination report in 2017 known as SOC (System and Organization Control) for Cybersecurity. These reports are intended to provide a consistent approach for evaluating and reporting on an entity’s cybersecurity risk management program and give management the ability to consistently describe its cybersecurity risk management program. Additionally, the flexibility of the reports allows management to use any recognized security framework as a baseline while enabling a CPA to provide independent assurance on the effectiveness of the program’s design. In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Drew Hendrickson discuss SOC for Cybersecurity reports and what organizations and IT professionals should know about this new report and how it could help their organizations. Listen, and discover these key takeaways: A brief introduction to SOC for Cybersecurity Elements found within an SOC for Cybersecurity report The role of CPA firms in cybersecurity Differences in SOC 2 versus SOC for Cybersecurity An explanation of who needs SOC for Cybersecurity

Cybersecurity Sense
5 Reasons Why Organizations Don’t Detect a Cyber Breach

Cybersecurity Sense

Play Episode Listen Later Jan 18, 2018 9:33


Incident response consultants are often contacted by clients who are in complete shock that their systems or networks have been compromised. Many times, these clients are hoping our analysis will ultimately prove that the incident was just a “flesh wound” to their systems and that they didn’t experience an actual data breach. It’s quite common for organizations to assume that data breaches won’t happen to them, and consequently, they typically don’t have an incident response plan. Not only do organizations need an incident response plan, but they also need to test it via incident response tabletop exercises. In this podcast, LBMC Information Security’s Bill Dean shares five key reasons why organizations don’t detect cyber breaches, as well as some helpful tips for being prepared in the event of a cyber-attack. Listen, and discover these key takeaways: Reasons why organizations need to plan for a data breach and test the plan Understanding why it’s important for organizations to know where its sensitive data lives The importance of enlisting the assistance of skilled information security professionals The case in support of quality penetration testing

Cybersecurity Sense
2017 Year-End Healthcare Breach Review

Cybersecurity Sense

Play Episode Listen Later Jan 12, 2018 11:11


In comparison to previous years, 2017 was a good year as the number of healthcare records compromised was significantly down. As of December 30, there had been 341 breaches reported, affecting a little less than 5 million individuals. This compares to 327 breach reports in 2016 but with 16.6 million individuals affected. When this information is contrasted with 2015 statistics, fewer breaches (268) were reported, however more than 113 million patients were affected. So, why the significant drop in affected individuals? In this podcast, LBMC Information Security’s Mark Fulford offers some leading theories for these statistics, as well as a quick rundown of the top five healthcare data breaches from 2017. Listen, and discover these key takeaways: Out of the top five healthcare data breaches, the largest one was a result of insider activity—specifically, unauthorized access through stolen media by a now-former employee, while the remaining four were all related to ransomware. Health providers were responsible for most of 2017’s data breach reports. As compared to Payers and Business Associates, far more records were compromised at provider organizations in 2017.

Cybersecurity Sense
Law Firms are Cybersecurity Targets

Cybersecurity Sense

Play Episode Listen Later Dec 19, 2017 7:45


A recent report from cybersecurity firm, FireEye revealed that Chinese hackers have been actively targeting a shortlist of multinational law firms since at least June of 2017. This was an apparent effort to spy on lawyers and steal confidential information, proving that not only are law firms targets of nation states, but attackers are also keeping up with current news, using well-designed phishing campaigns that contain references to pertinent, high-profile U.S. news stories. Although law firm data breaches are not often in the news, they are happening at an alarming rate, and cybersecurity professionals need to be aware and equipped for knowing how to appropriately address such breaches. In this podcast, LBMC Information Security’s Bill Dean highlights some specific examples of law firm data breaches and why law firms are such large targets for cyber-thieves. Listen, and discover these key takeaways: Recent examples of law firm data breaches The efforts of hackers to use U.S. news stories and scandals in hacking Why law firms are cybersecurity targets Reasons law firms need to be prepared for potential data breaches  

Cybersecurity Sense
SOC for Cybersecurity

Cybersecurity Sense

Play Episode Listen Later Dec 12, 2017 23:15


Since business leaders and board members are not often technically-inclined, they tend to have many questions about cybersecurity. Because of this, the AICPA recently recognized the need for a new type of cybersecurity examination report and put together a task force to bring to life what’s now known as SOC (System and Organization Control) for Cybersecurity. These reports will be beneficial in giving business leaders and board members an independent assurance and solid understanding of risk management and working with third-party cybersecurity professionals. In this podcast, LBMC Information Security’s Mark Burnette and Drew Hendrickson discuss SOC for Cybersecurity reports and what organizations and IT professionals should know about this new report and how it could help their organizations. Listen, and discover these key takeaways: Why SOC for Cybersecurity reports were created Key elements found within an SOC for Cybersecurity report Differences in SOC 2 and SOC for Cybersecurity reports Ways organizations benefit from SOC for Cybersecurity reports Differences in SOC for Cybersecurity and Risk Assessments  

differences cybersecurity soc risk assessment aicpa soc system mark burnette lbmc information security
Cybersecurity Sense
Information Security Questions for SMBs

Cybersecurity Sense

Play Episode Listen Later Dec 5, 2017 10:19


A key observation that can be made within the information security industry today is that cybersecurity is not extremely difficult, it is just hard and requires long-term dedication, focus, and commitment. Considering this observation, a key question all cybersecurity professionals must ask is, “If you don’t know where you are, how do you know where you need to improve?” Knowing the answer to this question is essential for beginning or enhancing an organization’s cybersecurity program. In this podcast, LBMC Information Security’s Bill Dean discusses some information security basics that many organizations are overlooking. Bill also walks through a series of basic questions that are good to ask when beginning or strengthening a cybersecurity program. Listen, and discover these key takeaways: Information about getting started and improving a cybersecurity program Reasons that cybersecurity is not about the latest product, but rather about people, processes, and technology Why products can’t help you avoid the hard work of cybersecurity basics  

Cybersecurity Sense
Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data

Cybersecurity Sense

Play Episode Listen Later Nov 27, 2017 15:46


Often in the information security industry, professionals can be accused of spreading fear, uncertainty, and doubt with cybersecurity concerns. However, considering the implications of integrity attacks, it is essential to pay close attention to them. As more organizations move to cloud storage, user authentication compromises are increasing. If an organization has sensitive information that can be accessed from anywhere online by simply using a username and password, that information is at risk, and organizations should make an effort to make their networks more secure.   In this podcast, LBMC Information Security’s Jason Riddle and Mark Fulford discuss the growing concerns with data integrity and how to avoid being a victim of attacks.   Listen, and discover these key takeaways: Feedback heard from the cybersecurity field The need for two-factor or multi-factor authentication The ability for integrity attacks to impact financial markets How integrity attacks could be more effective than availability attacks and confidentiality attacks The need to increase cybersecurity efforts to prevent integrity risks and attacks

Cybersecurity Sense
Manufacturing and Industrial Sectors Are Cybersecurity Targets

Cybersecurity Sense

Play Episode Listen Later Nov 13, 2017 7:21


As operational technology (OT) networks are used with specialized Industrial Control Systems (ICS) to monitor and control physical processes such as assembly lines, mixing tanks, and blast furnaces, these networks have become ripe targets for adversaries. The lack of basic protections like antivirus can enable attackers to quietly perform reconnaissance before sabotaging these physical processes and compromising industrial devices. Once attackers have compromised an OT network, it is easier for them to learn how the equipment is configured and eventually manipulate it.   In this podcast, LBMC Information Security’s Bill Dean discusses how the manufacturing and industrial sectors are prime targets for cyber-attackers.     Listen, and discover these key takeaways:   Reasons we don’t often hear about industrial and manufacturing network breaches Reasons for industrial and manufacturing attacks and what attackers are looking for Reasons industrial and manufacturing sectors should be concerned How NIST’s Cybersecurity Framework Manufacturing Profile can help Information about how third-party risk assessments are beneficial to manufacturers   Subscribe to the Cybersecurity Sense Podcast on iTunes or listen to this podcast HERE. (insert link)   To learn more about LBMC Information Security or to speak to one of our trusted professionals about our services, including how to avoid manufacturing and industrial sector attacks, contact us today!  

touch point podcast
TP39 - Cyber Security Risks for Hospitals

touch point podcast

Play Episode Listen Later Nov 1, 2017 70:44


For hospitals and health systems trying to embrace the digital age, it's important to understand the pros and cons of such an approach. In this episode, hosts Chris Boyer and Reed Smith discuss a very important topic: data and cyber security risks. Tasked with protecting HIPAA and PHI, the constant pressure to keep data safe and secure is critical. Chris and Reed share ways in which, CIOs and IT departments are adapting their tools and processes to adopt a safe digital environment while meeting the pressing demand by consumers for more open and transparent digital communications. They welcome data security expert Mark Burnette from LBMC Information Security to discuss current trends and approaches hospitals are taking. Show Notes: - Patient Data Security - How Hospitals Keep Pace: http://www.fiercehealthcare.com/special-report/patient-data-security-how-hospitals-keep-pace - How Ransomware Effects Hospitals: https://healthitsecurity.com/features/how-ransomware-affects-hospital-data-security - The Rise of Cloud Computing: https://www.healthdatamanagement.com/opinion/how-the-cloud-can-break-down-silos-within-hospitals - Data Privacy as well as Data Security: https://siliconangle.com/blog/2017/10/25/data-privacy-policy-just-- important-security-measures-protecting-netappinsight/ - Texas Hospital Association Helps Hospitals with Phishing Threats: http://www.healthcareitnews.com/news/texas-hospital-association-helps-2-hospitals-get-serious-about-phishing-threats - Mark Burnette on LinkedIn: https://www.linkedin.com/in/mburnette/ - LBMC Information Security: http://www.lbmcinformationsecurity.com/ - Cybersecurity Sense Podcast on iTunes: https://itunes.apple.com/us/podcast/cybersecurity-sense/id1269195484?mt=2 Links: - Touchpoint podcast Twitter: https://twitter.com/touchpointpcast - Reed Smith Twitter: http://www.twitter.com/reedsmith - Chris Boyer Twitter: http://www.twitter.com/chrisboyer - Chris Boyer website: http://www.christopherboyer.com/ - Social Health Institute: http://www.socialhealthinstitute.com/ Sponsors: - Loyal: https://www.transparently.com/ - Influence Health: http://www.influencehealth.com/ - Binary Fountain: https://loyalhealth.com/

Cybersecurity Sense
Attacking the InfoSec Supply Chain

Cybersecurity Sense

Play Episode Listen Later Nov 1, 2017 8:17


Though not in the recent limelight, it’s no secret that espionage from nation states is happening once again. With sophisticated attacks on InfoSec supply chain companies in 2012, 2013—and as recently as the past few months—many people are left wondering who would target these specific companies? In the end, we know that despite agreements between countries, we have valuable intel within the United States that these attackers are seeking.   In this podcast, LBMC Information Security’s Bill Dean offers valuable insight on attackers who focus on the InfoSec supply chain.   Listen, and discover these key takeaways:   Information about some of the most popular InfoSec supply chain attacks Potential InfoSec supply chain attackers and what information they are looking for Possible reasons supply chain attacks may become popular again

Cybersecurity Sense
Kaspersky vs the U.S. Government

Cybersecurity Sense

Play Episode Listen Later Oct 2, 2017 9:12


For the past 20 years, Kaspersky Lab has provided deep threat intelligence and security expertise for businesses, critical infrastructure, governments, and consumers around the globe. More than 400 million users benefit from protection services provided by Kaspersky, in addition to approximately 270,000 corporate clients. Recently, Kaspersky has found itself under question from the U.S. Government regarding accusations that the company is hiding backdoors into its software to help Russia spy on high-profile users. In fact, the U.S. Government removed Kaspersky from its approved vendor list, citing spying concerns as the reason.  In this podcast, LBMC Information Security’s Bill Dean discusses Kaspersky’s current battle with the U.S Government, offering several helpful takeaways for cybersecurity professionals.

Cybersecurity Sense
Ransomware and Unintended Disclosure

Cybersecurity Sense

Play Episode Listen Later Sep 24, 2017 9:46


When an organization experiences a data breach, one would hope that a quick recovery is ideal, right? But, did you know that there are instances when a quick breach recovery can hurt an organization? For one healthcare facility, this was the case, as it fell prey to a ransomware attack. While the organization was able to quickly recover operations, it recovered so quickly that it failed to preserve needed evidence for proper forensic analysis. So, what did this organization do as a result? In this podcast, LBMC Information Security’s Bill Dean explains how quick breach recovery hurt this organization and the steps that can be taken to avoid it happening for your own organization.

Cybersecurity Sense
Risks Rising for Email Data Breaches

Cybersecurity Sense

Play Episode Listen Later Sep 14, 2017 10:40


Sadly, email data breaches continue to be an increasing problem for businesses and organizations who retain large amounts of sensitive client and customer data. In fact, more than 700 million email accounts and millions of associated passwords were recently leaked in the biggest spambot dump ever. Breaches of this scale and impact have happened to Dropbox, LinkedIn, and Adobe in the past few years. So, what is the risk to your organization? In this podcast, LBMC Information Security’s Bill Dean discusses the numerous ways these data breaches are also a risk to your organization. Take a listen, and discover these key takeaways: Information about one of the largest email data breaches that just hit the Internet Potential risks to your organization Obvious personal risks that you should address for yourself, your family, and your friends

Cybersecurity Sense
The Risks of Remote Access

Cybersecurity Sense

Play Episode Listen Later Aug 28, 2017 9:20


Remote access to networks has become commonplace in today’s IT environments, as this access is mainly used for IT support, power users, and developers. While this capability can be provided in a safe and secure manner, it can also be deployed in a manner that leaves the organization at great risk. When Remote Desktop is enabled, attackers can brute force administrator credentials, because you can’t lock out the administrator account due to excessive failed logins. With this access, an organization’s entire network could be at risk of compromise and data theft. In this podcast, LBMC Information Security’s Bill Dean discusses the direct risks associated with remote access to Windows servers. Here’s what is covered within the podcast: Security risks involved with remote access to networks Recent statistics associated with Remote Desktop attacks LBMC Information Security’s experience with remote access attacks Ways to protect your organization from remote access attacks  

Cybersecurity Sense
Attacker Dwell Time

Cybersecurity Sense

Play Episode Listen Later Aug 22, 2017 8:52


Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel. The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.  Listen in, and learn about these key takeaways: Advanced attacks will often circumvent traditional static protections. This provides the ability for extensive “dwell time” of attackers on your network. Put in place additional network controls. If malware cannot communicate out, it cannot operate. “Hunt” for previously undetected malware on your systems.

Cybersecurity Sense
Combating Insider Threats

Cybersecurity Sense

Play Episode Listen Later Aug 8, 2017 9:15


It’s true—insider threat events are typically much less frequent than external attacks. However, insider threats often pose a much higher severity of risk for organizations when they do happen. As insiders are given access to sensitive information for work purposes, there’s a great potential for them to do a tremendous amount of damage to a business if they accidentally break policy or choose to steal. Even more, it has been reported that nearly a third of all organizations still have no capability to prevent or deter an insider incident or attack.   In this podcast, LBMC Information Security’s Bill Dean addresses insider threats, while offering suggestions on how to combat them with digital forensics.   Here’s what is covered in the podcast:   Limiting the access to sensitive information to a “need to know” basis Understanding the value of digital forensics and knowing when to use it Being cautious about handling the analysis internally due to expertise

Cybersecurity Sense
Business Email Compromise: When The Threat is Internal

Cybersecurity Sense

Play Episode Listen Later Aug 8, 2017 12:00


Since January of 2015, all 50 of the United States have reported an increase in business email compromise (BEC) attacks—a 1,300 percent increase, to be exact. Even worse, organizations have reported a loss of nearly one billion dollars. With everyone now being a potential target, it’s been noted that reconnaissance, social media, and social engineering has played a crucial role, as cyber thieves monitor and learn an organization’s “system.”   In this podcast, LBMC Information Security’s Bill Dean addresses BEC attacks and offers a few solutions for how to combat business email attackers.   Listen in and you’ll learn about:   BEC in the news (modern-day Nigerian money scams) Defining BEC The impact of BEC A brief overview of BEC Protections against BEC

Cybersecurity Sense
The Value of Incident Response Table Top Exercises

Cybersecurity Sense

Play Episode Listen Later Jul 26, 2017 9:38


Are you prepared for a ransomware attack? Bill Dean, Senior Manager, LBMC Information Security, discusses a low-cost approach method to determine how well you will respond to computer cybersecurity incidents, similar to those that you are reading about in the news, by performing incident response tabletop exercises. 

TSCPA Talks
Mark Burnette

TSCPA Talks

Play Episode Listen Later Aug 2, 2016 14:27


TSCPA Talks with Mark Burnette, a partner with LBMC Information Security and a presenter at TSCPA's upcoming Cyber Security Conference.

mark burnette lbmc information security