Cyber Compliance & Beyond Podcast Por Kratos arte de portada

Cyber Compliance & Beyond

Cyber Compliance & Beyond

De: Kratos
Escúchala gratis

Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share their insights on the latest compliance issues. We want to hear from you! What unanswered question would you like us to tackle? Is there a topic you’d like us to discuss? Or do you just have some feedback for us? Let us know on Linked and Twitter at Kratos Defense or by email at ccbeyond@kratosdefense.com.Kratos Defense & Security Solutions Ciencia Política Política y Gobierno
Episodios
  • 17 - Cybercrime – Email Threats – Part 4/4
    Aug 5 2025

    Email remains the most common form of non-verbal communication in organizations worldwide. It’s where our professional and personal lives often collide – making it a prime target for malicious actors. While the junk mail of the digital age – spam – has mostly faded into the background, the threats haven’t gone away. In fact, they’ve grown far more sophisticated.

    Our experts explore how email threats evolved from basic to spam to today’s complex phishing campaigns, spear phishing, whaling, and business email compromise. These attacks target people first – exploiting human behavior, namely our desire to trust, be helpful, and be someone who comes through in a time of need. You will learn about:

    • The history of email threats
    • How phishing attacks weaknesses in human psychology
    • Real-world examples of phishing and spear phishing
    • Best practices organizations can adopt to reduce risk
    Más Menos
    55 m
  • 16 - The Cyber Workforce
    Jul 2 2025

    The cyber workforce is as diverse as the challenges it faces. From process designers and behavioral analysts to business strategists and communicators, cybersecurity thrives on a diversity of skill sets. It’s important to understand what it takes to join the field, especially given the current shortage of cybersecurity professionals.

    In today’s episode, we’re breaking down the misconception that cybersecurity is only for hackers and codebreakers. We’ll dive into why soft skills like communications and organizational collaboration are just as essential as technical skills. We’ll talk about how to break into the field. Spoiler alert: it’s not as hard as you might think.

    On this episode, we discuss:

    • Why the cyber workforce is broader than you might think
    • How non-technical skills are critical in a technical field
    • The importance of soft skills
    • Why cybersecurity needs process thinkers, analysts, and business minds, too

    Today’s guest is Mike Thompson. Mike brings a unique perspective to the table. Mike’s experience spans recruitment, compliance sales, and cybersecurity assessments. His journey through the field offers great insight into the many ways professionals can contribute to cybersecurity without fitting the traditional mold.

    Links:

    • FedRAMP’s R311 Requirements
    • CMMC: Ecosystem Professionals > Assessing and Certification
    Más Menos
    39 m
  • 15 - Cybercrime – Identity Management – Part 3/4
    Jun 10 2025

    Managing identities may be the most difficult and complex task facing any organization today. Often treated as an afterthought in system development, mishandling identity management can lead to serious consequences.

    Because identities aren’t just people — they’re also systems and facilities, and managing them effectively requires more than just technology. From powerful service accounts to poorly defined access controls, identity management is the frontline of doing security right.

    On this episode, we break down the following:

    • Why identity is the most important security function
    • The unique risks posed by non-human identities (service accounts)
    • How to define and prioritize assets using a risk-based approach
    • Practical strategies for managing identities and their privileges
    • Why perfection isn’t required

    Today’s guest is Terry McGraw. Terry is a retired Lieutenant Colonel from the United States Army and now serves the CEO of Cape Endeavors, Inc, with over 20 years of providing expertise in cyber security threat analysis, security architectural design, network operations and incident response across both commercial and government sectors.

    Links:

    • Fido-2 Alliance
    • Kerberoasting Attack
    • Microsoft’S Enterprise Access Model
    Más Menos
    46 m
Todavía no hay opiniones