Look for any podcast host, guest or anyone
Showing episodes and shows of

Redpoint Cyber

Shows

Redpoint Audio InsightsRedpoint Audio InsightsExploring vCISO PricingAre you considering hiring a virtual Chief Information Security Officer (vCISO) but unsure about the costs involved? In this episode, we break down the vCISO pricing models, including retainer fees, project-based pricing, hourly rates, fixed fees, and equity compensation. Read more: https://www.redpointcyber.com/vciso-pricing/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/ 2024-08-0501 minRedpoint Audio InsightsRedpoint Audio InsightsWhat is a vCISO & Why One Helps You Stay Within ComplianceRead more: https://www.redpointcyber.com/what-is-a-vciso-and-regulatory-compliance/ Are you finding it challenging to keep up with ever-changing cybersecurity regulations? In this episode, we go into what a vCISO is and how they help organizations maintain compliance and protect against advanced threats. Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/ 2024-08-0501 minRedpoint Audio InsightsRedpoint Audio Insights6 Benefits of an MDR SolutionDiscover how MDR solutions improve threat visibility, speeds up incident remediation, and provides access to global real-time threat intelligence. Learn about the budget predictability and continuous improvement MDR offers, helping you stay ahead in the evolving threat landscape. Read more: https://www.redpointcyber.com/benefits-of-mdr-solutions/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/ 2024-08-0201 minRedpoint Audio InsightsRedpoint Audio InsightsThe Complete SEC Cybersecurity ChecklistToday, we'll discuss the updated SEC cybersecurity disclosure requirements and what you need to include when you fill out your forms. Read the full blog: https://www.redpointcyber.com/sec-cybersecurity-checklist/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2024-03-2701 minRedpoint Audio InsightsRedpoint Audio InsightsHow to Create an Incident Response PlanIn this episode, we dive into creating a robust incident response plan to protect your organization from cyber threats. Learn the key elements of effective planning, the steps to build your strategy, and best practices for a strong cybersecurity posture. Read the full blog post: https://www.redpointcyber.com/how-to-create-incident-response-plan/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2024-02-2801 minRedpoint Audio InsightsRedpoint Audio InsightsWhat is Ransomware-as-a-Service (RaaS)?In this episode, we delve into Ransomware-as-a-Service (RaaS), a growing cyber threat enabling easy-to-execute attacks. Learn how to protect yourself against this evolving danger with insights from Redpoint Cybersecurity and practical tips for robust defense tactics. Read the full blog post: https://www.redpointcyber.com/what-is-raas/ Connect with us: Website: https://www.redpointcyber.com Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin...2024-01-3002 minRedpoint Audio InsightsRedpoint Audio InsightsWhat Is a Tabletop Exercise in Cybersecurity?Explore the importance of tabletop exercises in cybersecurity in this episode. Learn how they prepare organizations for cyber threats through strategic planning and simulated scenarios. Read the full blog: https://www.redpointcyber.com/what-is-a-tabletop-exercise-in-cybersecurity/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2024-01-2401 minRedpoint Audio InsightsRedpoint Audio InsightsWhen Should You Outsource Penetration-Testing-as-a-Service (PTaaS)?Explore the benefits of outsourcing Penetration-Testing-as-a-Service (PTaaS) in this episode. Learn how PTaaS enhances cybersecurity and the key factors to consider when choosing a provider. Read the full blog: https://www.redpointcyber.com/when-should-you-outsource-penetration-testing/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2024-01-2302 minRedpoint Audio InsightsRedpoint Audio InsightsWhat Legal Professionals Need to Know About Cybersecurity For Law FirmsExplore the vital role of cybersecurity for law firms in this episode. We delve into the risks, responsibilities, and best practices for protecting sensitive client data against cyber threats. Read the full blog: https://www.redpointcyber.com/cybersecurity-for-law-firms/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2023-12-1901 minDayOne.FMDayOne.FMExploring AI's Impact on App Security with Seth LawSeth Law is Founder and Principal Consultant of Redpoint Security, an AppSec consulting firm that focuses on code security, as well as co-host of the fantastic Absolute AppSec podcast. Seth has plenty of experience with the nitty gritty details of software development, and Cole Cornford had a great time nerding out with him about static analysis tools and code reviews. They chat about the potential for AI to improve AppSec, the unhelpful tendency to idolise big tech companies, the importance of good communication between developers and AppSec, and plenty more.Secured by Galah Cyber website 2023-12-0649 minSecured by Galah CyberSecured by Galah CyberExploring AI's Impact on App Security with Seth LawSeth Law is Founder and Principal Consultant of Redpoint Security, an AppSec consulting firm that focuses on code security, as well as co-host of the fantastic Absolute AppSec podcast. Seth has plenty of experience with the nitty gritty details of software development, and Cole Cornford had a great time nerding out with him about static analysis tools and code reviews. They chat about the potential for AI to improve AppSec, the unhelpful tendency to idolise big tech companies, the importance of good communication between developers and AppSec, and plenty more.Secured by Galah Cyber website 2023-12-0649 minRedpoint Audio InsightsRedpoint Audio InsightsWhat is a Cybersecurity Investigator & Do You Need One?Explore the crucial role of cybersecurity investigators in this episode. Learn about their investigative process, the key steps in cyber incident response, and tips for choosing the right expert for your needs. Read the full blog: https://www.redpointcyber.com/cybersecurity-investigator/ Connect with us: Twitter: https://twitter.com/redpointcyber LinkedIn: https://www.linkedin.com/company/redpoint-cyber/ YouTube: https://www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: https://www.linkedin.com/in/tab-bradshaw/2023-11-2402 minRedpoint Audio InsightsRedpoint Audio InsightsWhat’s the Difference Between EDR vs. Antivirus Software?Explore the key differences between EDR vs. antivirus software. Discover what each one is and why simple, free antivirus tools are no longer sufficient on their own. Read the full blog: https://www.redpointcyber.com/edr-vs-antivirus/ Connect with us Twitter: twitter.com/redpointcyber LinkedIn: www.linkedin.com/company/redpoint-cyber/ YouTube: www.youtube.com/channel/UCMOFALVSBSf9_aNCWRMH9Hw Tab Bradshaw on LinkedIn: www.linkedin.com/in/tab-bradshaw/ 2023-11-0802 minRedpoint Audio InsightsRedpoint Audio InsightsRedpoint Audio Insights: IntroductionIntroducing the Redpoint Audio Insights series. Get everything you love about Redpoint's online insights in an easy-to-listen-to, accessible audio series. 2023-08-2501 minADCG on Privacy & CybersecurityADCG on Privacy & Cybersecurity85 | How Incident Response Has ChangedThis week we are joined by Violet Sullivan, Vice President of Client Engagement for Redpoint Cybersecurity, and incident response expert. Violet discusses how incident response has changed over the past five years, how ransomware has changed IR plans and how companies respond to attacks, and how cyber insurance has pushed revisions to incident response. We also discuss the role incident response plays in litigation management, and what companies can do to improve their response and reduce risk.2023-02-0830 minUnauthorized AccessUnauthorized Access"Board-er" Patrol in Privacy and CyberattacksIn this episode of Unauthorized Access, Kamran and Sadia are joined by Redpoint Cybersecurity VP of Client Engagement Violet Sullivan. The three cyber experts discuss board level buy-in and how to make sure the board is prepared for a cyberattack before it happens. Violet also shares how changing the communication around these issues of cyber privacy and risk can help. 2023-01-0422 minThe Logan Bartlett ShowThe Logan Bartlett ShowEP 22: Crypto Debate with Shaun Maguire & Zach Weinberg + Interview with Papa Founder Andrew Parker(00:00) Intro(02:57) Introducing Shaun Maguire(09:52) DARPA to cyber security(15:41) Paying in Bitcoin(17:27) Wife’s family fleeing their country for safety(27:27) Crypto in autocratic nations(31:20) Middlemen(35:30) Investing in equity(36:28) Blockchain video games(37:36) Uniswap(40:33) Future use cases(42:56) Following where young people are excited(49:27) Introducing Andrew Parker(51:15) How Logan and Andrew met(55:12) Andrew’s background(57:30) Telehealth – MD Live(58:52) The idea for Papa(1:02:19) State of health insurance(1:04:12) Pals...2022-06-241h 45ADCG on Privacy & CybersecurityADCG on Privacy & Cybersecurity71 | Incident Response: Gaps That Matter and Approaches That WorkThis week we have Violet Sullivan, Vice President of Client Development for Redpoint Cybersecurity, as our guest to discuss incident response, gaps that are costly, using external resources, bottlenecks that can take time, interacting with vendors, and successful approaches to tabletops. Violet also serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LLM program where she focuses on litigation management. On the podcast, she offers tips on incident response that can help organizations manage future litigation related to the incident.2022-06-2435 min