Artwork

コンテンツは Cyber Crime Junkies. Host David Mauro. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Cyber Crime Junkies. Host David Mauro. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal
Player FM -ポッドキャストアプリ
Player FMアプリでオフラインにしPlayer FMう!

No Exit-When Data Back Ups Fail

58:56
 
シェア
 

Manage episode 431182546 series 3559123
コンテンツは Cyber Crime Junkies. Host David Mauro. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Cyber Crime Junkies. Host David Mauro. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly.
Summary

In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in securing an organization.
They also share a story about the impact of data loss during Hurricane Katrina and the need for proper retention policies. In this conversation, Dino Mauro and Gabe Gumbs discuss the importance of having a paper trail and making recommendations backed by evidence in cybersecurity. They emphasize the need for strategic thinking and the use of advanced threat hunters and platforms to detect and prevent breaches.
They also highlight the importance of making an internal business case for cybersecurity investments and quantifying the ROI. The conversation touches on the different impacts of breaches, the challenges faced by small businesses, and the potential for a grading system or informal evaluation of vendors based on their handling of breaches.

Chapters

  • 00:00 Introduction and Podcast

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

1. No Exit-When Data Back Ups Fail (00:00:00)

2. Gabe Gimble's Background and Journey into Technology and Cybersecurity (00:02:43)

3. The Challenges of Patching Vulnerabilities (00:04:41)

4. The Importance of Data Backup and Recovery (00:06:45)

5. The Role of the CISO in Securing an Organization (00:09:21)

6. The Impact of Data Loss during Hurricane Katrina (00:17:13)

7. The Importance of a Paper Trail in Cybersecurity (00:26:47)

8. Making Recommendations Backed by Evidence (00:29:05)

9. Making an Internal Business Case for Cybersecurity Investments (00:30:12)

10. Differentiating Between Breaches in the News and Contained Breaches (00:32:10)

11. Challenges Faced by Small Businesses in Investing in Security (00:34:09)

12. Quantifying the Impact of Breaches (00:40:06)

13. The Role of Boom and Post-Boom in Cybersecurity (00:44:08)

14. The Impact of Breaches on Small Companies (00:47:32)

15. The Potential for a Grading System for Vendor Evaluation (00:51:25)

212 つのエピソード

Artwork
iconシェア
 
Manage episode 431182546 series 3559123
コンテンツは Cyber Crime Junkies. Host David Mauro. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Cyber Crime Junkies. Host David Mauro. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly.
Summary

In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in securing an organization.
They also share a story about the impact of data loss during Hurricane Katrina and the need for proper retention policies. In this conversation, Dino Mauro and Gabe Gumbs discuss the importance of having a paper trail and making recommendations backed by evidence in cybersecurity. They emphasize the need for strategic thinking and the use of advanced threat hunters and platforms to detect and prevent breaches.
They also highlight the importance of making an internal business case for cybersecurity investments and quantifying the ROI. The conversation touches on the different impacts of breaches, the challenges faced by small businesses, and the potential for a grading system or informal evaluation of vendors based on their handling of breaches.

Chapters

  • 00:00 Introduction and Podcast

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

1. No Exit-When Data Back Ups Fail (00:00:00)

2. Gabe Gimble's Background and Journey into Technology and Cybersecurity (00:02:43)

3. The Challenges of Patching Vulnerabilities (00:04:41)

4. The Importance of Data Backup and Recovery (00:06:45)

5. The Role of the CISO in Securing an Organization (00:09:21)

6. The Impact of Data Loss during Hurricane Katrina (00:17:13)

7. The Importance of a Paper Trail in Cybersecurity (00:26:47)

8. Making Recommendations Backed by Evidence (00:29:05)

9. Making an Internal Business Case for Cybersecurity Investments (00:30:12)

10. Differentiating Between Breaches in the News and Contained Breaches (00:32:10)

11. Challenges Faced by Small Businesses in Investing in Security (00:34:09)

12. Quantifying the Impact of Breaches (00:40:06)

13. The Role of Boom and Post-Boom in Cybersecurity (00:44:08)

14. The Impact of Breaches on Small Companies (00:47:32)

15. The Potential for a Grading System for Vendor Evaluation (00:51:25)

212 つのエピソード

همه قسمت ها

×
 
Loading …

プレーヤーFMへようこそ!

Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。

 

クイックリファレンスガイド