Episodes

  • Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelleemphasizes the significance of understanding where important data is stored, conductingregular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection andresponse (XDR), which combines assessment with ongoing monitoring to provide acomprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges.

    Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/

    Visit Cytellix: https://www.cytellix.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelleemphasizes the significance of understanding where important data is stored, conductingregular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection andresponse (XDR), which combines assessment with ongoing monitoring to provide acomprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges.

    Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/

    Visit Cytellix: https://www.cytellix.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Missing episodes?

    Click here to refresh the feed.

  • Garret shares his insights on the importance of identity management and authentication incybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficientto ensure the identity of a user. He pointed out that identities can be stolen or bypassedthrough various methods, and the real challenge lies in managing user privileges andkeeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management.

    Connect with Garret: https://www.linkedin.com/in/theauthguy/

    Visit YouAttest: https://youattest.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Garret shares his insights on the importance of identity management and authentication incybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficientto ensure the identity of a user. He pointed out that identities can be stolen or bypassedthrough various methods, and the real challenge lies in managing user privileges andkeeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management.

    Connect with Garret: https://www.linkedin.com/in/theauthguy/

    Visit YouAttest: https://youattest.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on theroles and operations of human beings rather than just the deployment of tools. He arguedthat cybersecurity is a human problem, and human nature must be considered whenseeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy thatintegrates processes, tools, and skills to manage risks effectively. He recommended theuse of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks.

    Connect with Jeff: https://www.linkedin.com/in/jeffmajka/

    Visit The Security Bulldog: https://securitybulldog.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on theroles and operations of human beings rather than just the deployment of tools. He arguedthat cybersecurity is a human problem, and human nature must be considered whenseeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy thatintegrates processes, tools, and skills to manage risks effectively. He recommended theuse of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks.

    Connect with Jeff: https://www.linkedin.com/in/jeffmajka/

    Visit The Security Bulldog: https://securitybulldog.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Digital Identity and Verifiable Credentials Discussion

    Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity incybersecurity and its evolution towards a decentralized model. He elaborated on theconcept of verifiable credentials, which are cryptographically protected and offer a secureand controlled way to manage personal data. Paul also mentioned his attendance at theIdent conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses.

    Connect with Paul: https://www.linkedin.com/in/drpaulashley/

    Visit Anonyme Labs: https://anonyome.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Digital Identity and Verifiable Credentials Discussion

    Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity incybersecurity and its evolution towards a decentralized model. He elaborated on theconcept of verifiable credentials, which are cryptographically protected and offer a secureand controlled way to manage personal data. Paul also mentioned his attendance at theIdent conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses.

    Connect with Paul: https://www.linkedin.com/in/drpaulashley/

    Visit Anonyme Labs: https://anonyome.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations.

    Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/

    Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/

    Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations.

    Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/

    Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/

    Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Mark Nicholls, a management consultant and CEO of the Information Professionals Group, emphasizes the growing importance of cybersecurity as a critical business risk and the need for collaboration between cyber professionals and business leaders to mitigate these risks. He highlights the challenges cyber professionals face due to isolation and the lack of support from the wider business, stressing the importance of shared responsibility in managing cybersecurity. Mark also discusses the independence and expertise of his company in providing unbiased support and advice for digital transformation, innovation, and governance. Additionally, he shared his personal interest in triathlon technology, mentioning his new triathlon bike and smart swim goggles.

    Connect with Mark: https://www.linkedin.com/in/markdnicholls/

    Visit Information Professionals Group: https://www.informpros.com.au/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Mark Nicholls, a management consultant and CEO of the Information Professionals Group, emphasizes the growing importance of cybersecurity as a critical business risk and the need for collaboration between cyber professionals and business leaders to mitigate these risks. He highlights the challenges cyber professionals face due to isolation and the lack of support from the wider business, stressing the importance of shared responsibility in managing cybersecurity. Mark also discusses the independence and expertise of his company in providing unbiased support and advice for digital transformation, innovation, and governance. Additionally, he shared his personal interest in triathlon technology, mentioning his new triathlon bike and smart swim goggles.

    Connect with Mark: https://www.linkedin.com/in/markdnicholls/

    Visit Information Professionals Group: https://www.informpros.com.au/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Aaron discusses the challenges of implementing Multi-Factor Authentication (MFA) in companies, leading to increased support tickets and associated risks. He proposes a mobile phone-based solution for identity verification using advanced features like 3D depth mapping and cryptography to enhance security and user experience, with integration for automatic self-service MFA resets. Aaron also explains the risks of deepfakes and synthetic content, and highlighted how NameTag focuses on secure, self-service MFA resets and account recovery to prevent cyber incidents.

    Connect with Aaron: https://www.linkedin.com/in/aaronpainter/

    Visit Nametag: https://getnametag.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Aaron discusses the challenges of implementing Multi-Factor Authentication (MFA) in companies, leading to increased support tickets and associated risks. He proposes a mobile phone-based solution for identity verification using advanced features like 3D depth mapping and cryptography to enhance security and user experience, with integration for automatic self-service MFA resets. Aaron also explains the risks of deepfakes and synthetic content, and highlighted how NameTag focuses on secure, self-service MFA resets and account recovery to prevent cyber incidents.

    Connect with Aaron: https://www.linkedin.com/in/aaronpainter/

    Visit Nametag: https://getnametag.com/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Philip shared his experiences as a serial entrepreneur, discusses his upcoming book, and introduced his new podcast, "Success is Podcast," which aims to highlight diverse successful individuals. He emphasizes the importance of cybersecurity for small and medium-sized businesses and expressed optimism about AI and machine learning enhancing cybersecurity measures. Philip also discusses the benefits of Textdrip, a business texting platform, noting its higher delivery and response rates and its AI capabilities for automation. Additionally, he shared his journey of writing a book about his entrepreneurial experiences, stressing the importance of expert editing and expressing his admiration for the problem-solving abilities of entrepreneurs.

    Connect with Phil: https://www.linkedin.com/in/philportman/ Visit TextDrip: https://textdrip.com/ Listen to 'Success Is': https://philportman.com/index.php/phil-podcast/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Philip shared his experiences as a serial entrepreneur, discusses his upcoming book, and introduced his new podcast, "Success is Podcast," which aims to highlight diverse successful individuals. He emphasizes the importance of cybersecurity for small and medium-sized businesses and expressed optimism about AI and machine learning enhancing cybersecurity measures. Philip also discusses the benefits of Textdrip, a business texting platform, noting its higher delivery and response rates and its AI capabilities for automation. Additionally, he shared his journey of writing a book about his entrepreneurial experiences, stressing the importance of expert editing and expressing his admiration for the problem-solving abilities of entrepreneurs.

    Connect with Phil: https://www.linkedin.com/in/philportman/ Visit TextDrip: https://textdrip.com/ Listen to 'Success Is': https://philportman.com/index.php/phil-podcast/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Today we are speaking with Cary Wright. We discuss the importance of packet capture in cybersecurity. He emphasizes the need for recording network traffic to preserve evidence for analysts to investigate cyber threats. Cary also debunks common misconceptions about cloud security, stressing the responsibility of individual organizations to protect their data.

    Connect with Cary: https://www.linkedin.com/in/caryw/

    Visit Endace: https://www.endace.com/

    Read the article: https://blog.endace.com/2024/04/14/why-you-should-care-about-fips-niap-apl/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Today we are speaking with Cary Wright. We discuss the importance of packet capture in cybersecurity. He emphasizes the need for recording network traffic to preserve evidence for analysts to investigate cyber threats. Cary also debunks common misconceptions about cloud security, stressing the responsibility of individual organizations to protect their data.

    Connect with Cary: https://www.linkedin.com/in/caryw/

    Visit Endace: https://www.endace.com/

    Read the article: https://blog.endace.com/2024/04/14/why-you-should-care-about-fips-niap-apl/

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Christian and Rick discuss cybersecurity risks related to automated medical and IoT devices, emphasizing the importance of prioritizing cybersecurity based on business maturity and risk assessment. They highlighted the critical role of emotional intelligence and effective communication in the cybersecurity industry, drawing insights from Christian's book "The Smartest Person in the Room" and his Secure Methodology training program. Christian's company focuses on securing medical devices through rigorous testing and risk analysis to prevent potential harm to patients, aiming to advance healthcare securely without impeding progress.

    Connect with Christian: https://www.linkedin.com/in/christianespinosa/

    Visit Blue Goat Cyber: https://bluegoatcyber.com/

    Check out the book: https://a.co/d/bliEf1Z

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS

  • Christian and Rick discuss cybersecurity risks related to automated medical and IoT devices, emphasizing the importance of prioritizing cybersecurity based on business maturity and risk assessment. They highlighted the critical role of emotional intelligence and effective communication in the cybersecurity industry, drawing insights from Christian's book "The Smartest Person in the Room" and his Secure Methodology training program. Christian's company focuses on securing medical devices through rigorous testing and risk analysis to prevent potential harm to patients, aiming to advance healthcare securely without impeding progress.

    Connect with Christian: https://www.linkedin.com/in/christianespinosa/

    Visit Blue Goat Cyber: https://bluegoatcyber.com/

    Check out the book: https://a.co/d/bliEf1Z

    Visit ShortArms website: https://www.shortarmsolutions.com/

    You can follow us at:

    Linked In: https://www.linkedin.com/company/shortarmsolutions

    YouTube: https://www.youtube.com/@shortarmsolutions

    Twitter/X: https://twitter.com/ShortArmSAS