All Episodes
Episodes
#39: Expanding the CIA Triad: Why CIAPS is the New Standard
In this episode of Cash in the Cyber Sheets, we take a deep dive into the foundational principles of information security—the CIA triad (Confidentiality, Integrity, Availability)—and explore why these are no longer...
View Episode
#38: The First Step in Building Information Security
The First Step in Information Security - Laying the Foundation for a Robust ISP
What does it take to build an effective Information Security Program (ISP) and what are the first things you need to consider when...
View Episode
#37: The Dirty 13 | MFA Issues & Best Practices
In this episode of Cash in the Cyber Sheets, we continue our Dirty 13 series by tackling one of the most overlooked yet critical security gaps: MFA (Multi-Factor Authentication). While MFA is one of the strongest...
View Episode
#36: Incident Response | Planning for the Unexpected
In this episode of Cash in the Cyber Sheets, we are joined by Bryan Barnhart from Infiltration Labs to discuss the critical importance of incident response planning. Together, we explore Bryan’s extensive experience...
View Episode
#35: The Dirty 13 | Poor Password Management Risks
From the 'Dirty 13' series, this episode tackles one of the most pervasive cybersecurity issues: poor password management. Join us as we explore the risks of sharing, reusing, and creating weak passwords—and share six...
View Episode
#34: BOI Requirements Change Again, Again
Small businesses across the U.S. are caught in a whirlwind of confusion as the Corporate Transparency Act (CTA) faces ongoing legal battles. With reporting requirements for Beneficial Ownership Information (BOI) being...
View Episode
#33: BOI Reporting Reinstated | What Businesses Must Know
In this solo episode of Cash in the Cyber Sheets, we dive deep into the reinstatement of Beneficial Ownership Information (BOI) reporting requirements under the Corporate Transparency Act (CTA). With recent legal...
View Episode
#32: The Dirty 13 | Bad Data Classification Practices
In this episode, James continues the “Dirty 13” series, tackling one of the most common and costly audit findings: poor data classification.
Without a structured approach to labeling and protecting data, organizations...
View Episode
#31: The Dirty 13 | Most Common Data Backup Failures
In this episode of our Dirty 13 series, we dive into one of the most overlooked yet critical audit findings: poor backup practices. While backups are a cornerstone of data security and business continuity, many...
View Episode
#30: Major Victory over the CTA and BOI
In this episode, we explore the recent court decision blocking enforcement of the Corporate Transparency Act’s reporting requirements. We break down what the CTA entails, why it faced legal challenges, and how this...
View Episode
#29: Building a Culture of Gratitude in Cybersecurity
In this special Thanksgiving episode of Cache in the Cyber Sheets, we take a moment to step back from the usual technical deep dives and focus on the theme of gratitude. As cybersecurity professionals, we operate in a...
View Episode
#28: The Dirty 13 | Common Physical Security Findings
In this episode of Cash in the Cyber Sheets, we dive deeper into the Dirty 13—the most common findings from information security audits. From daisy-chained power strips to sticky-note passwords, we unpack how these...
View Episode