#5 Third-Party Vendors VendorsSo let me get this straight… A very obvious external function is going to be labeled as an internal threat? ...Yes? OMG... Hear me out. Third-parties...
#6 Compliance/Infosec Yeah, we are getting right to it. There will be no sugarcoating over here. These departments are on the top 6 for an...
Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to...
LinkedIn: It’s Not Me, It’s You LinkedIn and I have been in a complicated relationship for close to fifteen years now. Honestly, I can’t...
Security Unfiltered Ep.7 : Microsoft Exchange Vulnerabilities - Patch ManagementWhat in the heck is going on with this Microsoft Exchange Vulnerability? 4- zero-days have been...
Security Unfiltered Ep.6 Leaving your companyHello everyone! Super glad to have had the chance to share our experience in a discussion about how and when...
Security Unfiltered Episode 5: ISC2 CertificationsHello Everyone! In this podcast, Joe and I talk about our experiences with ISC2 certifications, where they stack up with...
Hello Everyone!In this latest episode, Joe and I detail the experiences we have had across the leadership spectrum!What is a good leader? What is a...
Cloud Security & Governance PrimerCharacteristics of Cloud ComputingOn-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed...
Hello EveryoneTech Jacks checking-in. This weekend, the podcast released it's third episode entitled “Cloud Security & Governance”.In this episode we took a deeper dive into...










