
In this episode of the Safe House Initiative Podcast, host Jeff Edwards and Marc Grens, co-founder of Digital Mint, explore the intricate world of ransomware attacks and the critical steps organizations must take after a breach.
They discuss the evolution of ransomware payments, from unregulated practices to a more structured, compliance-driven process, including navigating OFAC sanctions and legal risks.
Marc emphasizes the importance of proactive cybersecurity measures, such as two-factor authentication and employee training, to prevent phishing attacks, which are a leading cause of ransomware incidents.
The conversation also highlights the psychological impact of ransomware and why many organizations only prioritize cybersecurity after an attack. Looking ahead, Marc underscores the need for ongoing vigilance as ransomware threats continue to evolve.
Don’t miss essential conversation like this! Follow the Safe House Initiative Podcast for more expert insights on cybersecurity, and tune in to stay informed and prepared in the face of ever-growing digital threats.
#Ransomware #Cybersecurity #Compliance #OFAC #DigitalMint #CyberHygiene #TwoFactorAuthentication #SafeHouseInitiative
——Edited and Produced by Trustbridge Communications.





Federal cybersecurity responsibility has shifted to the states. What happens next?
In this episode of The SafeHouse Podcast, Jeff Edwards welcomes James Saunders, Chief Information Security Officer for the State of Maryland, for a deep conversation on state-level cybersecurity, resilience, and leadership.
James walks through his path from early technical support roles to federal cybersecurity leadership and now to protecting Maryland’s digital ecosystem. He explains Maryland’s IT Master Plan, the state’s five-pillar cybersecurity strategy, and how partnerships, talent, and resilience come together in practice.
This episode offers a behind-the-scenes look at how cybersecurity decisions are made at scale, how states collaborate with one another, and why taking care of people matters as much as taking care of systems.

Kirsten Bay, CEO and co-founder of Cysurance, explains why warranties are becoming a critical layer in cyber risk management. Bay explains how AI-driven cyber certification can help organizations predict where risk is most likely to surface, prevent disruption before it becomes a claim, and protect both insureds and carriers by creating clear, defensible signals of cyber maturity.

Ryan Ettridge, CEO of CyberCert, tackles a problem many organizations struggle with – cybersecurity frameworks that look good on paper but feel overwhelming or unusable in practice.
Ryan explains how AI-driven cyber certification can help organizations predict where risk is most likely to surface, prevent disruption before it becomes a claim, and protect both insureds and carriers by creating clear, defensible signals of cyber maturity.
Chart a clear path from path from compliance to real-world readiness with fundamentals covered in this episode.

Charlotte Hooper, Co-Founder and Head of Operations at The Cyber Helpline, shares how a deeply personal experience with cyberstalking led her from policing into building one of the most practical cyber victim support models in operation today.

Keith Gologorsky, Head of Public Sector at Hack the Box, shares his personal journey from computer science graduate to government analyst, recounting pivotal moments in military operations, threat analysis, and international collaboration. The discussion explores the limitations of traditional certifications, the importance of hands-on training, and the need for regularly updated, gamified learning experiences. Keith also addresses the cybersecurity skills gap, the evolving role of AI, and offers actionable advice for organizations of all sizes: prioritize cross-training and real-world practice to build resilient teams.

Sarah Flukes, CTO at Admeritia, explains cyber decision diagrams that capture how OT/ICS environments actually operate. This podcast covers origins in water utilities, why function modeling beats asset lists, cognitive effectiveness, and how these diagrams power risk assessments, incident response, and security-by-design.