30 Minutes with a Hacker
Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” This series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers and industry leaders. It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant. You don’t want to miss this must-hear series.
Episodes

Friday Dec 02, 2022
You Think You’re Not a Target? Think Again!
Friday Dec 02, 2022
Friday Dec 02, 2022
Stan Rabin, CTO of Keno Kozie, joins us as our guest as we dive into the legal sector and why a hacker considers law firms, large and small, a prime target and the steps to take to protect yourself.

Monday Oct 24, 2022
The War Is In Your Backyard
Monday Oct 24, 2022
Monday Oct 24, 2022
Join us as Lewis Needham and Rick Conlee of ATEC Group discuss several of the recent breaches that have taken place in Albany, NY and how that translates across the country and globally. The war is not out there somewhere, it is in each of our backyards. It is time small companies realize their exposure and take the steps to protect themselves or face the potential catastrophic outcome.

Wednesday Sep 21, 2022
The Must Have Cybersecurity “Table Stakes” for Smaller Companies
Wednesday Sep 21, 2022
Wednesday Sep 21, 2022
It is no surprise that if you don't have effective cybersecurity, your organization is exposed to bad actors. It’s not just a matter of if, but rather when, you will suffer a major breach – the effects of which could be catastrophic. Yet, it costs money to secure your organization and you likely can't afford to do everything. Focusing in on the critical, must-have cybersecurity solutions is essential to small to midsized businesses. Join us as we discuss the essential cybersecurity "table stakes" for smaller companies, with Monreal IT.

Monday Jul 18, 2022
The Cybersecurity Skills Gap
Monday Jul 18, 2022
Monday Jul 18, 2022
Join us as we discuss the global cybersecurity skills gap, the impact it is having on businesses and what organizations can do about it.

Monday Jun 20, 2022
Monday Jun 20, 2022
Join us as we discuss the importance of creating - and testing - an effective Incident Response Plan, which can make all the difference in whether your company can survive a cyber attack. Few organization realize they are either a direct target or a pathway to a larger target, and therefore susceptible to a breach that can have a potentially catastrophic impact. Learn the steps you need to take before a breach happens.

Wednesday May 25, 2022
Important Aspects of Deploying an Effective SIEM or XDR Solution
Wednesday May 25, 2022
Wednesday May 25, 2022
Join us as we discuss one of the critical elements for having a fighting chance against hackers. We dive into important elements of deploying an effective security information and event management (SIEM) solution and compare it to extended detection and response (XDR), something continuing to gain momentum in the marketplace for cybersecurity

Tuesday Apr 26, 2022
Why Zero Trust is Critical to Effective Cybersecurity
Tuesday Apr 26, 2022
Tuesday Apr 26, 2022
Join us as we dive into one of the most critical shifts organizations can make to protect themselves against cyber attacks. Bad actors are most likely already in your network and have been, on average, for over 180 days, planning their next ransomware attack or other nefarious activity. What steps can you take to protect your organization?

Thursday Mar 10, 2022
The Most Critical Cybersecurity Vulnerability of the Last Decade
Thursday Mar 10, 2022
Thursday Mar 10, 2022
Join us as we discuss Log4j and Log4Shell, likely the greatest cybersecurity vulnerability of the past 40 years, and certainly of the last decade. This vulnerability impacts everyone using Windows, Linux, Apple (including IOS) – from large businesses to individuals, across the globe. Learn how to protect yourself against this massive threat, which unfortunately isn’t going away anytime soon.

Tuesday Jan 18, 2022
Top 7 Cybersecurity Predictions for 2022
Tuesday Jan 18, 2022
Tuesday Jan 18, 2022
Is this the year the pendulum shifts back in favor of the good guys in the fight against cybercrime, or will we see the uphill climb only increasing? Join us as we share the top cybersecurity predictions for 2022 we are seeing in the channel from a global perspective, as we gear up and prepare for what is ahead.

Monday Nov 15, 2021
Pros and Cons of Proposed Legislation to Allow ”Hacking Back”
Monday Nov 15, 2021
Monday Nov 15, 2021
Should an organization have the right to 'hack back' perpetrators who have attacked them with ransomware, malware, data theft or any other cyberattack? Should the company be able to steal their data back, or cause retribution to the entity that hacked them? Do organizations have a right to defend themselves against these bad actors? Join us as we dive into this topic and discuss the pros and cons of proposed bipartisan legislation to allow organizations to go on the offense and hack back.