Quality Plus Consulting - Breakfast Bytes
Technology
FTC SafeguardsRule, IRS requirements, and tax preparers
Methods to prevent business email compromise
Business survival over the next decade
PSA or ERP - paradigm and requirements analysis
Tech E&O and cyber insurance with Joe Brunsman
Implications of poor design on security - an example
Dark web monitoring and avoiding FUD decisions
The relationship between proper data handling and real risk reduction
Understanding vCISO services and why you need them
What you must do in order to prepare for a breach
Information Security, Cybersecurity, and Everyone’s Responsibility
Ripping apart cybersecurity insurance
CISO Workflows
Business Email Compromise
Vulnerability management with Felicia and Dan - Part 2
File integrity checks (hashing) versus communications or data encryption
Vulnerability management that every business decision maker needs to know about - Part 1
Signs of insufficient networking knowledge
About Password Managers
Requirements for premise hosted assets; cybersecurity, BCDR, and more
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Acquired