Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

No Exit-When Data Back Ups Fail

58:56
 
Distribuie
 

Manage episode 431182546 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly.
Summary

In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in securing an organization.
They also share a story about the impact of data loss during Hurricane Katrina and the need for proper retention policies. In this conversation, Dino Mauro and Gabe Gumbs discuss the importance of having a paper trail and making recommendations backed by evidence in cybersecurity. They emphasize the need for strategic thinking and the use of advanced threat hunters and platforms to detect and prevent breaches.
They also highlight the importance of making an internal business case for cybersecurity investments and quantifying the ROI. The conversation touches on the different impacts of breaches, the challenges faced by small businesses, and the potential for a grading system or informal evaluation of vendors based on their handling of breaches.

Chapters

  • 00:00 Introduction and Podcast

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capitole

1. No Exit-When Data Back Ups Fail (00:00:00)

2. Gabe Gimble's Background and Journey into Technology and Cybersecurity (00:02:43)

3. The Challenges of Patching Vulnerabilities (00:04:41)

4. The Importance of Data Backup and Recovery (00:06:45)

5. The Role of the CISO in Securing an Organization (00:09:21)

6. The Impact of Data Loss during Hurricane Katrina (00:17:13)

7. The Importance of a Paper Trail in Cybersecurity (00:26:47)

8. Making Recommendations Backed by Evidence (00:29:05)

9. Making an Internal Business Case for Cybersecurity Investments (00:30:12)

10. Differentiating Between Breaches in the News and Contained Breaches (00:32:10)

11. Challenges Faced by Small Businesses in Investing in Security (00:34:09)

12. Quantifying the Impact of Breaches (00:40:06)

13. The Role of Boom and Post-Boom in Cybersecurity (00:44:08)

14. The Impact of Breaches on Small Companies (00:47:32)

15. The Potential for a Grading System for Vendor Evaluation (00:51:25)

212 episoade

Artwork
iconDistribuie
 
Manage episode 431182546 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly.
Summary

In this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and recovery, and the role of the CISO in securing an organization.
They also share a story about the impact of data loss during Hurricane Katrina and the need for proper retention policies. In this conversation, Dino Mauro and Gabe Gumbs discuss the importance of having a paper trail and making recommendations backed by evidence in cybersecurity. They emphasize the need for strategic thinking and the use of advanced threat hunters and platforms to detect and prevent breaches.
They also highlight the importance of making an internal business case for cybersecurity investments and quantifying the ROI. The conversation touches on the different impacts of breaches, the challenges faced by small businesses, and the potential for a grading system or informal evaluation of vendors based on their handling of breaches.

Chapters

  • 00:00 Introduction and Podcast

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Capitole

1. No Exit-When Data Back Ups Fail (00:00:00)

2. Gabe Gimble's Background and Journey into Technology and Cybersecurity (00:02:43)

3. The Challenges of Patching Vulnerabilities (00:04:41)

4. The Importance of Data Backup and Recovery (00:06:45)

5. The Role of the CISO in Securing an Organization (00:09:21)

6. The Impact of Data Loss during Hurricane Katrina (00:17:13)

7. The Importance of a Paper Trail in Cybersecurity (00:26:47)

8. Making Recommendations Backed by Evidence (00:29:05)

9. Making an Internal Business Case for Cybersecurity Investments (00:30:12)

10. Differentiating Between Breaches in the News and Contained Breaches (00:32:10)

11. Challenges Faced by Small Businesses in Investing in Security (00:34:09)

12. Quantifying the Impact of Breaches (00:40:06)

13. The Role of Boom and Post-Boom in Cybersecurity (00:44:08)

14. The Impact of Breaches on Small Companies (00:47:32)

15. The Potential for a Grading System for Vendor Evaluation (00:51:25)

212 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință