CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
1
PCI Monthly Update: Latest News and Updates to Requirement 12
39:37
39:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:37
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the impact of PCI v4.0 and how organizations are adjusting. In case you missed it - Andy Kerr joined PCI Practice Partner Stewart Fey for an interactive Q&A …
…
continue reading
1
PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights
33:43
33:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:43
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
…
continue reading
1
PCI Monthly Update: Version 4.0 Countdown, Requirement 10, and QSA Insights
27:45
27:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:45
In this edition of the PCI Monthly Update, we’re counting down to the launch of PCI 4.0! We start this month's podcast with a reminder that v4.0 goes into full effect on March 31. Our focus then shifts to Requirement 10 covering logging and monitoring all access to system components and card holder data and what is changing with v4.0. This podcast …
…
continue reading
1
PCI Monthly Update: Gearing Up for Version 4.0, Mastering Requirement 9, and QSA Insights
29:44
29:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:44
In this January edition of the PCI Monthly Update, we’re on the brink of exciting changes with version 4.0 just around the corner! We start with a spotlight on the ongoing Request for Comments (RFC) period for PCI DSS v4.0, inviting insights from industry experts. Plus, we discuss the Global Content Library, showcasing insights from the 2023 Commun…
…
continue reading
1
PCI Monthly Update: December News, Deep Dive into Requirement 8, and QSA Q&A
35:56
35:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:56
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment highlighting the PCI SSC's TRA Guidance. Next, we delve into Requirement 8 of the PCI DSS, dedicated to identifying users and authenticating access to system componen…
…
continue reading
1
PCI Monthly Update: October - New SAQ Review, Focused Look at Requirement 7, and Expert QSA Insights
29:07
29:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:07
Dive into the latest in the PCI landscape with our October update. We kick off with a news segment spotlighting the new SAQ SPOC (Software PIN Entry on COTS) which includes portions of PCI DSS Requirements 3, 8, 9, and 12. Transitioning to Requirement 7, we discuss restricting access to system components and cardholder data based on business necess…
…
continue reading
1
PCI Monthly Update: September Highlights & Requirement 6 Deep Dive
31:27
31:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:27
Catch the latest news in our September "PCI Monthly Update" from Tuesday, September 26, 2023. We kick things off with key insights from the recent PCI Community Meeting. Next, we dive into Requirement 6, discussing the essence of secure software development, from processes to security vulnerabilities, web application protection, and change manageme…
…
continue reading
1
PCI Monthly Update: August Highlights & Requirement 5 Breakdown
24:57
24:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:57
Tune in to the August edition of our PCI Monthly Update. We kick off with a sneak peek into the upcoming PCI North America Community Meeting in Portland and introduce the newly launched PCI Community Job Board—a dedicated platform for security talent and job postings in the payment industry. Next, we delve into Requirement 5, shedding light on anti…
…
continue reading
1
PCI Monthly Update: July Insights & Innovations
24:05
24:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:05
Dive into the latest PCI news in our July PCI Update. This episode covers key PCI developments, an in-depth exploration of Requirement 4, and a helpful QSA Q&A. We kick off this episode by previewing the upcoming PCI Community Meeting in Portland and discuss our hosts' presentation on "Generative AI: Your New Secret Weapon or an Insider Threat?" We…
…
continue reading
Do you know the average payout organizations are hit with for every attack? William Parks and Bill Dean discuss a service dedicated to helping your organization (big or small) withstand a ransomware attack. Bill and his team are ready to help you and your organization obtain peace of mind when it comes to these advanced threats. Questions for Bill?…
…
continue reading
LBMC Shareholder Bill Dean and William Parks spend today’s episode discussing Advance Guard, a new service offering from LBMC's Security Technical Team. Learn how Advance Guard may help protect your organization's most valuable assets, save time on compliance audits, and give peace of mind about your current security stance. Want to see Bill’s “Pre…
…
continue reading
1
PCI Monthly Update: March News & Requirement 3
35:56
35:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:56
Stay up to date with the latest in PCI compliance. In this episode, William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest in PCI news, new restrictions around PAN data, and how to master Requirement 3 while preparing for PCI 4.0. Don't miss our upcoming webinar: "How to Reduce Your PCI Scope: Tips & Technology Your Organization Needs to …
…
continue reading
ChatGPT is making headlines worldwide and its impact is making a lot of business owners uncomfortable. What is ChatGPT? How will this tool change how you do business? Is ChatGPT a security risk? What to expect from ChatGPT4? William Parks interviews LBMC's Data Insights team members to discuss this controversial topic, dive into facts your organiza…
…
continue reading
William Parks takes this podcast to introduce a key member of LBMC Information Security’s Technical Services team, Daniel Nguyen. Daniel is a manager on the team with quite the insightful background. William and Daniel spend time discussing current steps to keep your organization successful in their journey to a healthier security posture. Question…
…
continue reading
1
PCI Monthly Update: January News & Requirement 1
34:55
34:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:55
Stay up to date with the latest in PCI compliance. In this episode, William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest in PCI news and how to master Requirement 1 while preparing for PCI 4.0. For any questions, feel free to reach out to us here: Kyle Hinterberg: kyle.hinterberg@lbmc.com Andy Kerr: andy.kerr@lbmc.com William Parks: wil…
…
continue reading
1
PCI Monthly Update: December News & FAQs
34:25
34:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:25
William Parks, Andy Kerr, and Kyle Hinterberg discuss the latest PCI news, share how to create and what should be covered in an executive summary for a PCI assessment, and answer a few questions from our listeners. If you’d like us to answer and address questions on our next episode, reach out to us here: Andy Kerr – andy.kerr@lbmc.com Kyle Hinterb…
…
continue reading
1
PCI SSC Community Meeting Top Takeaways
28:45
28:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:45
In this podcast, Host William Parks discusses with LBMC Information Security Senior Managers Andy Kerr and Kyle Hinterberg some of the top takeaways at this year’s PCI SSC Community Meeting. Topics discussed during this episode include changes to the “In-Place with Remediation” reporting option which was added in PCI DSS v4.0, what to do if you mis…
…
continue reading
1
Keeping Your Digital Identity Secure with Mark Burnette
47:43
47:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:43
The Internet provides access to lots of good data, useful websites, social media options, and entertainment, but unfortunately, it also poses some risks to the security and privacy of individuals. In this episode, William Parks and Mark Burnette will share some practical tips for how you can keep yourself and your family safe and secure online. You…
…
continue reading
In this episode, Host William Parks interviews LBMC Shareholder Robyn Barton about HITRUST, what it is, the relationship between HITRUST and HIPAA, and the new HITRUST i1, r2, and bC Assessments.بقلم William Parks
…
continue reading
1
AIG Cyber Mercenary Group Raises Concern
12:21
12:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:21
In this episode, Host William Parks shares the latest on the new cyber mercenary group, Atlas Intelligence Group or AIG.بقلم William Parks
…
continue reading
In this episode, Host William Parks shares ransomware awareness tips and cybersecurity best practices to keep your company safe from attacks.بقلم William Parks
…
continue reading
To celebrate Women's History Month, LBMC interviews a panel of our women cybersecurity experts on their unique career journeys, what advice they would give to women looking to work in the field, and goals for the future.
…
continue reading
In this episode, the LBMC team gives listeners insight into what to expect when interviewing for a role in information security. Learn what qualities hiring managers are looking for as you prepare for your job interview.
…
continue reading
1
Information Security Careers (Part 2)
21:48
21:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:48
Part two of our Information Security Careers podcast series. Our panel of experts share their paths to their first infosec jobs and provide advice for pursuing a career in the field.
…
continue reading
Learn how a few members of the LBMC Information Security team got started in their careers, and what you should consider when going into the field.بقلم Bill Dean
…
continue reading
1
What is the Cybersecurity Maturity Model Certification (CMMC)?
28:42
28:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:42
In this episode, Caryn Wooley joins us to discuss the Cybersecurity Maturity Model Certification (CMMC). Learn why the Department of Defense created the model to improve security for government contractors and subcontractors. Hear what you can do to start preparing for CMMC today.بقلم Bill Dean
…
continue reading
Nancy Spizzo, Senior Manager at LBMC Information Security, joins Bill Dean to talk about HITRUST and the new LBMC Information Security HITRUST Guide being released later this fall.بقلم Bill Dean
…
continue reading
In this episode Bill Dean and Stewart Fey discuss penetration testing for PCI compliance. Learn about the differences between penetration testing and vulnerability assessments, and what is needed to meet requirements for PCI compliance.بقلم Bill Dean
…
continue reading
In this episode Nancy Spizzo joins Bill Dean to discuss re-entry to the workplace. They'll discuss what items you should consider from a security and technology perspective as organizations plan to reopen their facilities.بقلم Bill Dean
…
continue reading
1
The Impact of Remote Work on IT Audits
15:46
15:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:46
In this episode, Chelsea Smith talks with Bill Dean about the impact of remote work on IT audits during the COVID-19 pandemic.بقلم Bill Dean
…
continue reading
Zoom is soaring in popularity as a large population of remote workers are using it for video conferencing. With it's surging popularity, the platform's loose security protocols made it an easy target for hackers to take advantage and disrupt calls. "Zoombombing" allowed anyone to login to unprotected links to intrude on the calls often sharing lewd…
…
continue reading
1
Not All Phishing Assessments Are Equal
16:20
16:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:20
In this episode, LBMC's cybersecurity experts discuss the topic of social engineering via phishing. Learn the difference in using phishing software solutions versus penetration testing services for your cybersecurity program.بقلم Bill Dean
…
continue reading
LBMC Cybersecurity expert, Derek Rush, joins Bill Dean as they discuss the benefits and limitations of multi-factor authentication.بقلم Bill Dean
…
continue reading
The LBMC Information Security team recaps the 2019 HITRUST conference that was held in Texas in May. The team talks about the latest news on third-party assurance, HITRUST CSF adoption and controls implementation, SOC 2 + HITRUST, and the latest initiatives in the quality sub committee.بقلم Bill Dean
…
continue reading
In this podcast, LBMC Information Security’s Mark Burnette offers a summary and perspective on the council’s insights—specifically addressing the three likely changes for the next version of the PCI DSS.بقلم Mark Burnette
…
continue reading
In this podcast, LBMC Information Security’s Bill Dean and John Dorling discuss some of the new tools available to help merchants who are trying to achieve PCI compliance.بقلم Bill Dean and John Dorling
…
continue reading
1
2018 Was Second-Most Active Year for Data Breaches
10:30
10:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:30
2018 was one of the biggest years for data breaches to date, with more than 6,500 data breaches reported throughout the year. In this podcast, LBMC Information Security’s Bill Dean dives deeper into these recent data breach statistics and why it’s important to keep investing in the hard work involved with combating cyber-attacks to prevent data bre…
…
continue reading
1
Targeted Attacks Compared to Opportunistic Attacks
8:28
8:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:28
All companies are subject to opportunistic attacks, but do you know if you are subject to a targeted attack based on the data you generate or maintain? In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.…
…
continue reading
1
Incident Response Should Be Common Sense
7:23
7:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:23
Since incident response issues are no longer just an IT issue and can often involve legal issues, it is important for organizations to develop an incident response team, seek outside expertise, and have an overall action plan in the event of an incident. In this podcast, LBMC Information Security’s Bill Dean discusses how a complex situation like i…
…
continue reading
In a previous podcast, we discussed purple-teaming as it compares to a conventional penetration test. Let’s now build on that approach, starting with the differences between attack simulation and conventional penetration tests. The methodology of attack simulation is the assumption that the network or a system will become compromised and the curren…
…
continue reading
Most penetration testers are considered “red team,” while most defenders are considered “blue team.” Thus, the irony of a conventional penetration test is that these two groups are typically pitted against each other. When the red teams and blue teams are working together, you have what’s called a “purple team.” While purple-teaming has not always …
…
continue reading
The EU’s General Data Protection Regulation (GDPR) permits users certain rights (referred to as “data subject access rights” or “DSARs” in the documentation) that organizations will need to be prepared to accommodate if they must comply with GDPR. For organizations to be prepared to respond, it’s important to have a clear understanding of DSARs bef…
…
continue reading
As organizations determine whether the E.U.’s General Data Protection Regulation (GDPR) is applicable to them, there are several important things to consider when it comes to compliance. Among those things involves preparing for and responding to personal data breaches which is not just a requirement of the GDPR; it’s a good business practice in ge…
…
continue reading
As the May 25, 2018 GDPR enforcement date fast approaches, many organizations are asking, “How does the GDPR will apply to my organization?” As the GDPR extends to U.S. organizations that offer services to or monitor behaviors of E.U. citizens, it’s important to understand how to classify your organization’s data to determine GDPR applicability. Wh…
…
continue reading
The question is not, “Will your employees will get your company hacked?” but rather “When will your employees get your company hacked?” A recent article from HITECH Answers highlights this sad reality of human-error being the most common reason for a cyber intrusion and data compromise. So, while employee actions can circumvent most every security …
…
continue reading
In a recent report from Wombat Security Technologies based on data from millions of simulated phishing attacks, it was found that 76% of organizations said they experienced phishing attacks in 2017, and nearly half of information security professionals said that the rate of attacks increased from 2016 to 2017. F-Secure also recently released resear…
…
continue reading
1
IIA Knoxville—Implementing Cloud-Managed Security
7:42
7:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:42
When cloud-managed security was first introduced, there was some concern about the levels of security as compared to the security of data on an organization’s premises. Today, security professionals have implemented the appropriate controls to help could-based data management be safe and effective. As many organizations are now embracing and migrat…
…
continue reading
No matter the industry—government, healthcare, financial, or even smaller, mom-and-pop businesses—each deal with some type of sensitive customer information, and each has decisions to make when it comes to managing risk. Most security and audit frameworks (HIPAA, ISO, PCI, NIST, SOC 2, etc.) have requirements for risk assessment, making them one of…
…
continue reading
1
IIA Knoxville—Dear President Trump: How to Secure the United States & Demonstrate That Your Company Is
7:36
7:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:36
In the information security world, we all wish we had more access to senior executives. Following that logic, if you’re responsible for security at your organization, and you are lucky enough to ride on the same elevator with a senior executive from your company, you should be prepared with your “elevator pitch” on what to say about improving the c…
…
continue reading
The AICPA Cybersecurity Working Group brought to life a new type of cybersecurity examination report in 2017 known as SOC (System and Organization Control) for Cybersecurity. These reports are intended to provide a consistent approach for evaluating and reporting on an entity’s cybersecurity risk management program and give management the ability t…
…
continue reading