
Cybersecurity Simplified
Cybersecurity Simplified aims to demystify cybersecurity and make it understandable to business people and managed services providers who aren’t security experts. We explore the latest cybersecurity trends, threats and news with the insight and perspective of CTO David Barton of Overwatch Managed Security by High Wire Networks.
Episodes
56 episodes
Episode 56: Is AI a Friend or Foe in Cybersecurity? Insights from The Godfather of Digital Forensics
AI fortifies cybersecurity but it also strengthens cyberthreats. How can your company tackle this double-edged dilemma? We’re asking our guest, Rob Lee, Chief of Research at the SANS Institute, the go-to leader in cybersecurity training....
•
Season 1
•
Episode 56
•
36:30

Episode 55: From Classroom to Crisis – A Firsthand Account of a K-12 Cyber Breach
When it comes to physical school safety, K-12 districts are generally well-prepared and understand the risks when planning for fires, severe weather, or lockdowns. However, the situation is different when it comes to cybersecurity.As dis...
•
Season 1
•
Episode 55
•
35:23

Episode 54: Lessons Learned – Combating the Growing K-12 Cybersecurity Crisis
With K-12 schools going digital, they’re in the crosshairs for cybercriminals. Why are they such easy prey, and what’s being done to stop it?To answer these questions, we’ve invited K-12 cybersecurity expert Doug Levin, National Director...
•
Season 1
•
Episode 54
•
29:24

Episode 53: The New Rules of Marketing – How Cybersecurity Partners Can Adapt & Win
The rules of B2B marketing have changed—traditional plays won’t cut it anymore. From AI content overload to dark social, five major disruptors are shaking up the game. Khali Henderson, Chief Content Officer at BuzzTheory, breaks down the new pl...
•
Season 1
•
Episode 53
•
30:43

Episode 52: The Roadmap to a Career in Cybersecurity
We get a lot of inquiries from our viewers about Cybersecurity, but by far one of the most frequent questions we receive is, “How do I get into the cybersecurity industry?” It’s a vast and complex field, but today’s guest is here to help serve ...
•
Season 1
•
Episode 52
•
16:26

Episode 51: The Art of Winning – AI in Global Cyber and Hybrid Warfare
Summary: In this special edition of Cybersecurity Simplified, host Susanna Song takes the global stage in Warsaw, Poland.You may not always hear about cyberattacks or feel the immediate impact, but cyberterrorism on the rise, targe...
•
Season 1
•
Episode 51
•
58:02

Episode 50: Going with the Data Flow – The Future of SIEM
SIEM has been a cybersecurity standard as far back as 2005. Its job is to collect, correlate and analyze data from disparate sources for use in risk detection and forensic investigation. Over the last two decades SIEM has evolved to...
•
Season 1
•
Episode 50
•
26:36

Episode 49: Macrotrends in Managed Cybersecurity with Jay McBain
Cybercrime is relentless and keeps cybersecurity pros on their toes looking for creative and cutting-edge solutions to secure their operations. Worldwide investment in cybersecurity is now nearly $250 billion a year. What’s ...
•
Season 1
•
Episode 49
•
25:39

Episode 48: Why You Should Care About the NIST 2.0 Launch
The National Institute of Standards and Technology, or NIST, just issued version 2.0 of its Cybersecurity Framework (CSF), which emphasizes supply chain risk management and puts the C-Suite at the heart of cybersecurity management activities w...
•
Season 1
•
Episode 48
•
22:08

Episode 47: Why Reinforce MDR with Zero-Trust Microsegmentation
Let’s imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more diffic...
•
Season 1
•
Episode 47
•
29:28

Episode 46: Beyond Prevention, Detection & Response – It’s Time for Proactive Security
When it comes to cybersecurity, most businesses focus on prevention and detection.That sounds reasonable, but today’s guest – a former CIA hacker, presidential cybersecurity commissioner and Air Force Cyber Wingman argues that approach i...
•
Season 1
•
Episode 46
•
21:55

Episode 45: The Cyber Queen’s Untraditional Rise & Mission
In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone ...
•
Season 1
•
Episode 45
•
24:13

Episode 44: Show me the Money — The Latest Ransomware Attacks Hit Las Vegas Casino Giants
Breaking News: MGM and Caesar’s are two U.S. casino giants breached in a cyberattack costing them millions of dollars a day. What can you learn from the social engineered cyberattack? How can you prevent your business from becoming the next vic...
•
Season 1
•
Episode 44
•
14:26

Episode 43: Daily Insecurities – What’s Making Cybersecurity News Headlines?
Cybersecurity threats make news headlines daily. It’s hard to keep up – unless it’s your job like it’s ours at High Wire Networks. Our team meets daily to review the top cybersecurity news headlines. Today, we’re giving a sneak peek into our da...
•
Season 1
•
Episode 43
•
26:06

Episode 42: ChatGPT and Cybersecurity – The Good, Bad & Ugly
ChatGPT is the talk of the town, dominating tech conversations around the world. But like any AI-powered tool, it brings with it the good, the bad and the ugly. Is ChatGPT a blessing or a threat? A boon for business or the bane of our existence...
•
Season 1
•
Episode 42
•
26:17

Episode 41: IoMT Security – Are Connected Devices Making Your Network Sick?
The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing your network to viruses and other threats. Our guest is Debe Gash, Senior Vice President an...
•
Season 1
•
Episode 41
•
26:19

Episode 40: Legal Compliance in the Digital Age
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-ch...
•
Season 1
•
Episode 40
•
22:28

Episode 39: Trends in Network Security
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect ...
•
Season 1
•
Episode 39
•
31:32

Episode 38: Operationalizing Cybersecurity with Mark Porter
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach. To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address ad...
•
Season 1
•
Episode 38
•
26:27

Episode 37: What is Cyber Warranty and Why it’s a Hidden Gem
Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about t...
•
Season 1
•
Episode 37
•
23:27

Episode 36: What a Defense-in-Depth Cybersecurity Strategy Entails
Can the difference between a healthy, growing managed security services business and a stagnant one lie in a simple methodology? In episode 36, we invite Ryan O'Hara, CEO of a Detroit-based MSP, to join the conversation. He shares ...
•
Season 1
•
Episode 36
•
52:59

Episode 35: The Science and Art of Forecasting Risk
Veteran Security Practitioner Rick Howard shares how Alan Turing’s ideas and Thomas Bayes' Theorem hold the key to how organizations should forecast risk. Most organizations default to heat maps relying on a low, medium, and high model. But the...
•
Season 1
•
Episode 35
•
23:44

Episode 34: Logging Back On – Helping Employees Recover From a Cyberattack
We’re all well aware that a cyberattack can take a heavy toll on an organization’s financial and reputational status, but what about the emotional toll on the employees who’ve had to work through it?Our guests today are here to talk abou...
•
Season 1
•
Episode 34
•
30:19

Episode 33: Unauthorized – How Access Will Be Defined Going Forward
“Unauthorized access” sounds like a line from the classic 1980s movie, Wargames. And you might be surprised to learn that the Computer Fraud & Abuse Act, or CFAA, was partly passed in response to that movie’s plot, as a way to thwart hacker...
•
Season 1
•
Episode 33
•
24:44

Episode 32: “A Career in Security – Where do you Start?”
It isn’t lost to us here at Cybersecurity Simplified that many of you listen and watch because you have a keen interest in cybersecurity work… you want to make that career leap from wherever you are at or pivot for those of you already in IT or...
•
Season 1
•
Episode 32
•
24:59
