POPULARITY
Introduction Matt Sickles is a NACHI Certified Professional Home Inspector, licensed in the state of Ohio. He brings to each inspection his experience of over 30 years in and around the building trades. His focus is on making all home buyers and sellers feel at ease while providing a level of detail that is presented in a user-friendly manner. Get In Touch With Our Guest Today If you'd like to get in touch with our guest today, click on the link below and I will send you a warm introduction: Get In Touch With Our Podcast Guest Today Podcast Sponsors MyFico: 90% of top lenders use FICO® Scores—do you know yours? Check your FICO Score at MyFico.com The Smart Home Buyer Calculator: Use our 4-in-1 super-smart calculator to make sure you know your numbers before buying your first home. Get it now at The Smart Home Buyer Calculator Listen To A Podcast Guest In Your Area If you'd like to find podcast guests for your specific location or profession just click on the link below to search for them: Podcast Guest Search Find A Great Real Estate Agent Near You If you'd like to find a great real estate agent near you, just go to this link: Real Estate Agent Near Me Awesome Resources For First-Time Home Buyers If you'd like to access other great resources for first-time home buyers just click on this link: First-Time Home Buyer Resources Let's Talk I'd love to talk to podcast listeners and get to know you all better! I can also help you answer any questions you have about buying your first home! So if you'd like to talk about that let's jump a quick call! Just schedule a time that works for you here: Schedule A Call With Laura Moreno Feedback I love receiving feedback so please, if you'd like to tell me how you'd improve the podcast, send me an email to laura@lauramoreno.com or schedule a call with me for that works for you here: Schedule A Call With Laura Moreno Share The Love If you know someone looking to buy their first home and you think this information would help them, just share it with them. They will really appreciate it. Subscribe To The Podcast Apple | Google | Spotify | Stitcher | iHeart Connect On Social Media YouTube | Instagram | Facebook | Twitter | LinkedIn
May 18, 2022: What do hackers want from healthcare? Join us for a special episode. Reverse Engineering, a Hackers Approach. https://www.linkedin.com/in/guidogrillenmeier/ (Guido Grillenmeier), Chief Technologist at Semperis and https://www.linkedin.com/in/mattsickles/ (Matt Sickles), Solutions Architect at Sirius Healthcare walk us through Semperis Purple Knight. A free tool to help you find your most dangerous vulnerabilities. AD is typically a weak point for HC organizations. 90% of attacks exploit AD. It is very difficult to gain an understanding of where your AD is at risk. Purple Knight maps those indicators to the MITRE ATT&CK Framework and provides guidance on how to fix the issues. As hackers, what defenses do we have to be concerned about? What will cause us to choose a different target? If we are detected will that just move our timeline up or will we move on? How long do we need access to the compromised AD to know if we can get to our target hack? How much time do we need in the target system? And flipping back to the other side, what can a CIO do today to ensure their health system is ready for an attack on their Active Directory? Key Points: AD is typically a weak point for HC organizations, 90% of attacks exploit AD It is very difficult to gain an understanding of where your AD is at risk You cannot secure older operating systems the same way as newer ones What is the state of active directory right now? Download https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.purple-knight.com%2F%3Futm_medium%3Dpd%26utm_source%3Dtwih%26utm_campaign%3Dss%26utm_content%3Dpk&data=05%7C01%7Cthomasl%40semperis.com%7Cbeaaa05a46754ed180af08da386f965b%7C994bd4e175044e39989148149b5eccf2%7C0%7C0%7C637884349292308349%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cdC0fGGJe7XI%2FrFBntBDKIZJb1blQCige7biI9ai5go%3D&reserved=0 (Semperis Purple Knight) now
On today’s episode we have the fabulous Matt Sickles, aka. the Hard Part. He’s used to go with a faux hawk, but has recently shifted to a hard part to minimize setup time, and he usually plays the hard part on guitar with his many bands. Including, as we have recorded here, Mr. Haircut. We got some pretty nasty improvisations this episode, and some deep, inspiring, thought provoking, raucous conversation. I wrote out a script for Matt to follow, but once again, forgot it at home… so this episode is improvised. I think my squirrel already chewed on my script for next week, so we might have to improv that one too. You are in for a treat– biscuits, grandma guitars, speed picking, and cross sticking all make an appearance in this week’s Mr. Haircut.
In this episode about identity and access management (IAM), Cherie and Matt discuss: Why it’s critical to know what “normal” looks like for your data How micro breaches can be just as damaging as major ones The importance of examining all IAM practices for improvement, not just the “broken” ones What security professionals can learn from insider threats, like the infamous Edward Snowden breach With a comprehensive security strategy, IAM technology can generate the intelligence you need to increase your understanding of broader security events and advance your overall security posture. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar 5, Data Center & Cloud Security – Many organizations continue to struggle with security implications associated with the cloud. Weaknesses in a cloud or colocation vendor’s security can have a dramatic impact on your organization’s overall security posture. Identity and Access Management: Defining the New Security Perimeter – Learn how to use incorporate IAM solutions and services to fill gaps left by the traditional security perimeter and more effectively protect your enterprise data. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.
In this episode about data center and cloud security, Cherie and Matt discuss: Securing a cloud environment versus a physical data center. The biggest cloud security misconceptions. How to manage your third-party risk. Learn more about maintaining accountability and remediating third-party risk, whether your organization uses a cloud environment, a physical data center, or a hybrid model. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Four, Application Security – Applications have become an integral part of everyday life, and they contain some of your customers’ most confidential data. Explore how the rapid pace of development is affecting application security. Cloud vs. Colocation: What’s the Difference and How Do You Find the Right Mix – Many people think of the cloud as a place and colocation as just data center space. To clear up myths, we explain the key differences between cloud and colocation. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.
In this episode about application security, Cherie and Matt discuss: The importance of third-party risk assessment. How the rapid pace of application development affects security. The importance of trust after verification. Effectively handling sensitive information is a constant challenge, and transformational technologies like the cloud bring a new set of risks along with the opportunities they provide. Developing a comprehensive security strategy is your best defense. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Three, Compliance & Governance – Compliance is essential, but it does not equal security. Learn how to help your organization become more secure and not merely compliant. Security in the Cloud: Key Considerations & Tools an IT Security Conversation in the Boardroom – Learn how key security issues and controls vary depending on the cloud model you’re using. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.
In this episode about security compliance and governance, Cherie and Matt discuss: How easy it is to be compliant without being secure. Why a comprehensive strategy is the only way to achieve successful security program governance. The paradox of measurement and how to avoid chasing red herrings so you can focus on critical data. The importance of continuous education. It’s time to stop relying on compliance checklists and work toward establishing repeatable, measurable security programs that focus on what’s mission-critical to the business. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principal consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Two, Threat & Vulnerability Management – Knowing how cyber criminals think can give you a brand new perspective on your threat and vulnerability management. How to Start an IT Security Conversation in the Boardroom an IT Security Conversation in the Boardroom – Making security a board-level priority is critical in the effort to safeguard data, contain breaches and minimize damage in an atmosphere of escalating cyber attacks. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.
In this episode about threat and vulnerability management, Cherie and Matt discuss How sometimes even the most dangerous cyber threats boil down to the simple principles of an old-fashioned con How the uptick in social engineering has affected threat and vulnerability management The importance of vulnerability assessments and the surprising security gaps they can reveal Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principal consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we’ll explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the series: The Six Pillars of Security: Pillar One, Data Protection. The Six Pillars of Security: Pillar One, Data Protection – The first episode in, “The Six Pillars of Security,” series. In this episode, our expert discusses why shifting to a comprehensive data-centric strategy is critical to securing a business, how human nature has affected the evolution of cyber attacks, and how employee education is essential to security success. 8 Steps to an Effective Vulnerability Assessment – Vulnerability assessments can be invaluable, but only if their results are weighed in the context of the business and existing security infrastructure. By analyzing assessment output with business risk in mind, and applying that knowledge to the development of a sound security strategy, you can make the most of your security budget and strengthen your overall security and compliance posture. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.
In this episode, we discuss why shifting to a comprehensive data-centric strategy is critical to securing a business, how human nature has affected the evolution of cyber attacks, and how employee education is essential to security success. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principle consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we’ll explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. According to Gemalto's Breach Level Index 2016 Report, data breaches led to almost 1.4 billion data records being compromised worldwide during 2016, an increase of 86 percent over 2015. And Verizon's 2016 Data Breach Investigations Report found that in 93 percent of cases where data was stolen, systems were compromised in minutes or less. Organizations, meanwhile, took weeks or more to discover that a breach had even occurred — and it was typically customers or law enforcement that sounded the alarm, not their own security measures. Traditional prevention and detection methods are being bypassed, and many organizations either don’t know what to do, or don’t have the right resources in place to advance their security. To keep up with highly skilled and aggressive attackers, we need to move beyond the predictable patterns of network security and static defenses that our cyber adversaries are well-attuned to. Listen to the podcast to learn more. 10 Keys to Data-Centric Security - It is no longer enough to focus our efforts on networks and endpoints. As IT changes continue to occur, organizations need to keep pace and advance their security by focusing on the data itself through the development of a data-centric security program. 7 Key Elements of a Successful Encryption Strategy - It’s imperative to remember that your encryption program — and IT security in general — is a process, not a product. Effective encryption takes time; in addition to careful consideration of data states and encryption techniques, there are seven key elements that can help you build a successful end-to-end approach. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.