Podcasts

Thought Leadership

The SafeHouse Podcast

EPISODE 1: Cyber Risk Quantification
Jeff Edwards, Founding Member and Co-Chair of the SafeHouse Initiative interviews David Finz, First Vice President of Specialty Claims and Adam Rauf, Senior Manager of Cyber Risk both from Alliant Insurance Services. This episode focuses on CRQ (Cyber Risk Quantification) and its importance in helping organizations quantify, reveal and address cyber threats. David discuss the State of the Cyber Market while Adam discuss the benefits and challenges of risk quantification as well as free and premium options available to implement.

Edited and Produced by David Lewis
EPISODE 2: Backup: Cybersecurity’s Silent Partner
System Backup operations are often viewed as seperate from the Cybersecurity policies and procedures.  But listen to W. Curtis Preston, known in the industry as “Mr. Backup” & host of “The Backup Wrap-up” podcast, discuss with Jeff Edwards, Co-Chairman of the SafeHouse Initiative, the importance of Backup as part of your cybersecurity and operational resilience plan.  

Edited and Produced by David Lewis
EPISODE 3: The Long Tail Issues with a Cyber Incident

David Finz from Alliant Insurance Services returns to our show to discuss the long tail issues that can result from a cyber incident.  Learn how a cyber incident like Ransomware, can result in long term issues including monetary, legal and reputational harm.

Edited and Produced by David Lewis
EPISODE 4: You've been breached! Now what?

Robert Walker, Partner and Chair of the Data Privacy and Cybersecurity Practice at Lewis Brisbois joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss what you need to do in case of a Breach.  Lewis Brisbois is a Legal firm and Robert specializes in helping companies with the short and long term issues resulting from a cyber breach or attack.

Edited and Produced by David Lewis
EPISODE 5: When Cybersecurity collides with AI

Jeff Crume, IBM Distinguished Engineer, CTO IBM Security Americas, and Cybersecurity Architect joins Jeff Edwards, Co-Chair of the SafeHouse Initiative as they discusses how AI is disrupting Cybersecurity and what to expect in the future.

Edited and Produced by David Lewis
EPISODE 6: Critical Infrastructure - Successfully Navigating a Breach

Scott Grayson, CEO of the American Public Works Association (APWA) joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Cybersecurity in the Public Works industry and ways to successfully navigate a breach.

Edited and Produced by David Lewis
EPISODE 7: In Perspective: Frameworks, Standards and Regulations

Join James Hatcher, Asia Pacific Channel Manager for Lansweeper as he discusses with Jeff Edwards, Co-Chair of the SafeHouse Initiative, the meaning and importance of Cyersecurity Frameworks, Standards, and Regulations and what they mean for your business.

Edited and Produced by David Lewis
EPISODE 8: Cybersecurity includes Data Disposal & Data Privacy

Santosh Kamani, Co-Founder and CEO of CyberFIT Solutions joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss the importance of Data Privacy and proper Data Disposal to cybersecurity. An often overlooked area of cybersecurity, Data Disposal is critical to safeguarding Personally Identifiable Information (PII) and to protecting your business.

Edited and Produced by David Lewis
EPISODE 9: Never Let a Good Crisis go to Waste, Part 1

Rob Stewart, Founder and CEO of White Tuque joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, discuss his extensive experience in preparing, responding and learning from cyber events. Rob’s saying is “Never let a good crisis go to waste”, as you need to prepare for and learn from each of them.

This is the first episode of a two part series featuring the experience from White Tuque, a contributor to the SafeHouse Initiative.

Edited and Produced by David Lewis
EPISODE 10: Defending yourself against Long Game Phishing

Noted industry author and cybersecurity expert, Roger Grimes, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to defend against Long Game Phishing attacks. Learn the insidious, and disturbing nature of a Long Game Phishing attack, and how you can learn to spot and defend against them.

Edited and Produced by David Lewis
EPISODE 11: Never Let a Good Crisis go to Waste - Part 2

Building on Episode 9, Kevin Sandschafer, COO and VP of Cyber Risk and Assurance joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to better prepare and also how to respond to a cyber attack.

Edited and Produced by David Lewis
Episode 12: Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 1

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 1, Luke explores how to best Prepare your incident response process and the elements of an incident response.

Edited and Produced by David Lewis
Episode 13: Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 2

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 2, Luke explores best practices to Respond to a cyber breach. Learn the elements of a best practice Response as part of your Cyber Response Plan.

Edited and Produced by David Lewis
Episode 14: Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 3

Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 2, Luke explores best practices to Respond to a cyber breach. Learn the elements of a best practice Response as part of your Cyber Response Plan.

Edited and Produced by David Lewis
Episode 15: Joining the global fight - Cyber Resilience Centre for London

Simon Newman, CEO of the Cyber Resilience Centre for London joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to share what the CRC is doing to help businesses of all sizes and governments throughout the United Kingdom to better prepare for a cyber attack. Simon shares excellent examples of attacks that the CRC has seen and what they’ve learned from them.

Edited and Produced by David Lewis
Episode 16: The Identity Crisis Where to start in securing cloud networks

Jeff Moncrief, Field CTO and Director of Sales Engineering for Sonrai Security and SafeHouse Initiative contributor joins Jeff Edwards, Co-Chair of the Safehouse Initiative to discuss where to start in securing your cloud networks. Discover why identity is the new perimeter in securing cloud networks and what you should do now to secure yours.

Edited and Produced by David Lewis
Episode 17: Meet Roger Grimes and Data Driven Computer Defense

The Data-Driven Computer Defense – Podcast 1, Volume 1&2. Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to introduce him and his new book, A Data-Driven Computer Defense, in a series of 4 podcasts. Listen in to all 4 podcasts as Roger and Jeff dissect the key areas and lessons of his book and learn how you can better defend your business using a Data-Driven Computer Defense. In this first podcast, we introduce Roger and his background and overview the Data-Driven Computer Defense.

Edited and Produced by David Lewis
Episode 18: Data Driven Computer Defense - Root Causes

The Data-Driven Computer Defense – Podcast 2, Volume 3. Roger Grimes, noted industry author and cybersecurity expert, returns to join Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Part 1 of his book, A Data-Driven Computer Defense, which covers Chapters 1 – 4. In this Episode, Roger and Jeff explore the Root Causes of Cyber attacks.

Edited and Produced by David Lewis
Episode 19: Data Driven Computer Defense - Mental Maps and Operational Frameworks

The Data-Driven Computer Defense – Podcast 3: Volume 4: Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Part 2 (Chapters 5 – 8) in his new book, A Data-Driven Computer Defense. In this Episode, Roger and Jeff explore and discuss Mental Maps and Operational Frameworks.

Edited and Produced by David Lewis
Episode 20: Data Driven Computer Defense - Implementation Examples

The Data-Driven Computer Defense – Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.

Edited and Produced by David Lewis
Episode 21: The Pitfalls of Backups for Ransomware Business Resumption

Curtis Preston, Backup & Cyber Recovery Expert, aka “Mr. Backup” joins Jeff Edwards, Co-Chair of the SafeHouse Initiative once again to discuss things to watchout for when using backups to restore and resume business operations after a cyberattack or ransomware attack.

Edited and Produced by David Lewis
Episode 22: Managing Third Party Risk

Subject Matter Expert Jason Butler joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to manage Third Party Risk. Learn about the key issues surrounding utilizing Third Parties in your business, and how to minimize and mitigate the associated risk.

Edited and Produced by David Lewis
Episode 23: How to Avoid the Snakes of Financial Fraud

Matt Quamen, Co-Founder and President of Optimize Cyber, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss practical ways of protecting you and your business from Financial Fraud. Learn the basic things every business owner should do immediately to protect themselves from falling victim to Financial Fraud.

Edited and Produced by David Lewis

Thought Leadership

The SafeHouse Initiative Featured on the
Intel Podcast

Intel Podcast: SafeHouse Initiative (Part 1)

The first in a series of podcasts with Jake Smith and Intel Corporation Conversations in the Cloud. Listen to Dorian Naveh of Canonical and Christina Klein, MA of Lansweeper, discuss the SafeHouse Initiative and its importance to companies of all sizes, but particularly to small and medium-sized businesses. Give it a listen!

Intel Podcast:  SafeHouse Initiative (Part 2)

Part 2 of Conversations in the Cloud with Jake Smith from Intel Corporation with two more co-founding companies of the SafeHouse Initiative. Alan Gin of ZeroDown® Software is joined by David Proestos and David Lewis of Nteraction to talk about the importance of the SafeHouse Initiative and how we can help educate and counsel companies of all sizes to achi

Intel Podcast:  SafeHouse Initiative (Part 3)

Part 3 of Conversations in the Cloud with Jake Smith from Intel Corporation features another co-founding company of the SafeHouse Initiative.  Ken Morris of KnectIQ discusses Selective Trust and the expertise and solutions they bring to the SafeHouse Initiative.

Have Questions?

Whether it’s a quick inquiry or a detailed discussion, we’re here to provide the support and information you need. Your success is our priority, and we’re just a message or call away. Contact us with confidence—all of our contributors work collaboratively for your benefit—your queries are welcomed anytime.