Send us a text Join host Mike Shelah and guest Tasha Cornish, Executive Director of Cybersecurity Association, Inc., as they dive into cybersecurity legislation and initiatives planned for 2025.Tasha discusses their advocacy efforts to expand and modernize the Buy Maryland Cyber Tax Credit, making it more accessible to... more
Send us a textJoin host Mike Shelah as he sits down with Tasha Cornish, Executive Director of the Cybersecurity Association Inc., to discuss her journey from Maine to Maryland, from medicine to cybersecurity, and her mission to make cyber education more accessible. Learn about the Association's three centers of excelle... more
Send us a textIn this episode of the Cyber Savvy Podcast, host Mike Shelah interviews Amira Armond from Kieri Solutions, a Certified Third Party Assessing Organization (C3PAO), about the complexities of achieving Cybersecurity Maturity Model Certification (CMMC). Amira provides deep insights into the challenges governm... more
Send us a textIn this podcast episode, Mike Shelah interviews Amira Armond, founder of Kieri Solutions, about the Cybersecurity Maturity Model Certification (CMMC). They discuss the program's role in protecting sensitive defense contractor information and its impact on cybersecurity standards for government contractors... more
Send us a textThis episode discusses the importance of compliance frameworks like HIPAA and CMMC in cybersecurity. Cybersecurity expert Loren Larson explains how these standards help organizations secure their systems and data.The conversation covers the challenges businesses face in meeting compliance requirements, su... more
Send us a textWe are excited to announce the Cyber Savvy Podcast season 3 with our very own Mike Shelah! Mike has taken the reins delivering education to business owners and sharing what they need to know about cybersecurity. On this episode, Mike sits down with Loren Larson, cybersecurity specialist at Dell. Loren tal... more
Send us a textIn this special episode, we're marking a significant transition in our podcast's journey. With a mix of gratitude and anticipation, we bid farewell to our beloved host, Andrew Rose, and warmly welcome our new host, Mike Shelah.We cannot express enough appreciation for Andrew's dedication and passion as th... more
Send us a textIn today's episode, we will be discussing the main cyber threats against medical professionals with Scott Leister, a Dev Sec Ops engineer who has been in the MSP industry working for DTC for over 20 years.Andrew Rose began a cybersecurity awareness program in 2016 while at a major agricultural bank after ... more
Send us a textIn this podcast episode, our host Andrew and guests Monica and Pam dive into what shapes DTC's vibrant company culture, highlighting its focus on fostering collaboration, innovation, and employee empowerment. They discuss the role of "just culture," where accountability and fairness are prioritized, creat... more
Send us a textThis episode of Cyber Savvy, we are continuing our talk about Just Culture and it not only applies to the workplace, but everyday life as well.Our newest guest Pablo Breuer is a highly accomplished and decorated cyber security and information technology executive with unmatched global expertise and exempl... more
Send us a textSpecial guest Andrew Rose is an award winning CISO, Speaker, Brand Evangelist, Industry Analyst, NED & Board Advisor, CISO Mentor, Ultra runner - passionate about driving information & cyber security through a people-centric focus. He is also a board level Advisor with recognized expertise in information ... more
Send us a textIn this month's episode, we have one of our DTC experts, Scott Leister, join us in a Q&A on all thing's cyber security. Scott is a DevSecOps at DTC and shares his insights on the latest trends, challenges, and best practices in the field. Special guest Andrew Rose is an award winning CISO, Speaker, Brand... more
Send us a textJoin us for a new episode of Cyber Savvy where we explore the Henry Schein cyber attack. Our experts break down how it happened, why it matters, and what it means for healthcare security. From the breach's timeline to its broader implications, we discuss it all. We start by tracing the timeline of events ... more
Send us a textWelcome back Cyber Savvy fans! This first episode of the season recaps what was discussed in season 1 as well as what is to come for season 2, including the Henry Schein attack of October 2023. Special guest Andrew Rose is an award winning CISO, Speaker, Brand Evangelist, Industry Analyst, NED & Board Adv... more
Send us a textToday to end the season hosts Mike Urbanik and Andrew Rose welcome CISO Andrew Rose for a conversation about the future of Cybercrime and Cybersecurity in the world today. CISO Andrew speaks about the new wave of cyber-attacks, how they come about, and have changed through the years. The discussion leads ... more
Send us a textToday hosts Mike Urbanik and Andrew Rose welcome back special guest Andrew Gerner, President of R.K. Tongue to have a conversation about Data Breach. Itâs estimated that in 2022 more than 422 million US individuals were impacted by a data breach. A fair statement would be to say that this number will only... more
Send us a textSome cyber crimes are more relatable than others. Did you know that about 33% of people have been affected by identity theft crimes? Or that the majority of the exposures go unreported to law enforcement? On this episode of Cyber Savvy Mike and Andrew will be joined by a special guest that was recently af... more
Send us a textWhat do cybercriminals do with the information they may take after a successful phishing attempt? On this episode of Cyber Savvy Andrew and Mike will discuss Cyber Extortion. Victims of cyber extortion can range from individuals to small businesses, to huge corporate entities. Listen in as Mike details so... more
Send us a textIn recent decades we have seen the number of computers and mobile devices multiply greatly making phishing scams incredibly lucrative. Phishing attempts are often the first step to more invasive and damaging attacks in which individual and corporate data is compromised. Join Andrew, Mike, and special gues... more
Send us a textCybercrime-where did it all begin? It is difficult to frame the full breadth of cybercrime today without understanding the history first. Mike Urbanik has spent considerable time researching the subject and highlights for us where the roots of todayâs cyber criminals, their motivations, and their techniqu... more
Send us a textA successful cyber-attack has taken your organization/agency off-line. The FBI and CISA have been contacted. As you know, if this hasnât already impacted you (either directly or indirectly), it will. When your networks are compromised, what happens next? Who do you call?Be cyber savvy. Beginning June 13, ... more