All Episodes
Cash in the Cyber Sheets: Making Money From Being Secure & Compliant — 77 episodes
#77: The Digital Defense Playbook for Parents: How to Keep Kids Safe Online
#76: Read The Fine Print: 3 Traps That Kill Cyber Insurance Claims
#75: The Two Email DNS Gotchas Costing You Deliverability
#74: No Breach, Big Trouble: FCA Risks in Healthcare
#73: Cyber Insurance Review For Real Life
#72: False Claims Act Meets Cybersecurity Compliance
#71: Incident Response Plan Essentials
#70: Top 5 Reasons SPF, DKIM, and DMARC Fail
#69: SPF, DKIM & DMARC Explained for Small Business
#68: Cash in the Cyber Sheets - AI Policy Development
#67: Cash in the Cyber Sheets - SPF Blunders
#66: InfoSec Program Pillars | Plan, Do, Check, Act
#65: The Hidden Dangers of Personal AI in the Workplace
#64: Writing Security Policies That Work for Business
#63: Lockouts, Cold Storage Fails & Upgrade Pitfalls
#62: What a Forensics Expert Teaches About Compliance
#61: Locked Out of Life | Password Management Wake-Up
#60: AI, Terms and Conditions, and the Vendor Rodeo
#59: Domain Registrar Risks | Doing It Right Gone Wrong
#58: 16 Billion Records Breached – What Now?
#57: Common SPF Pitfalls and How to Solve Them
#56: Classify This | Why Data Classification Matters
#55: DMARC Compliance Killed the Creative… Or Did It?
#54: Why DMARC Changes in May 2025 Can’t Be Ignored
#53: What to Expect in an Information Security Audit
#52: Information Security Policy Document Example
#51: FTC Safeguards Checklist | Reporting to Leadership
#50: FTC Safeguards Checklist | Incident Response Plan
#49: FTC Safeguards Checklist | Continual ISP Improvement
#48: FTC Safeguards Checklist | Managing Service Providers
#47: FTC Safeguards Checklist | Training & Policies
#46: FTC Safeguards Checklist | Reviewing Controls
#45: FTC Safeguards Checklist | Security Controls Deep Dive
#44: FTC Safeguards Checklist | Key Security Controls
#43: FinCEN BOI Reporting Requirements Halted
#42: FTC Safeguards Checklist | Risk-Based Approach
#41: FTC Safeguards Checklist | Qualified Individual Role
#40: Breaking Barriers to Success with JASB Management
#39: Expanding the CIA Triad: Why CIAPS is the New Standard
#38: The First Step in Building Information Security
#37: The Dirty 13 | MFA Issues & Best Practices
#36: Incident Response | Planning for the Unexpected
#35: The Dirty 13 | Poor Password Management Risks
#34: BOI Requirements Change Again, Again
#33: BOI Reporting Reinstated | What Businesses Must Know
#32: The Dirty 13 | Bad Data Classification Practices
#31: The Dirty 13 | Most Common Data Backup Failures
#30: Major Victory over the CTA and BOI
#29: Building a Culture of Gratitude in Cybersecurity
#28: The Dirty 13 | Common Physical Security Findings
#27: The Dirty 13 | Backup Restore Testing Oversights
#26: The Dirty 13 | Misunderstanding MSP Security
#25: Lessons Learned from Recent Cybersecurity Audits
#24: The Dirty 13 | Poor Incident Response Planning
#23: The Dirty 13 | Supplier Risk Management Gaps
#22: The Dirty 13 | Weak Audit and Monitoring
#21: Poor Security Training Leaves Firms at Risk
#20: The Dirty 13 Risk Management Failures in CPA Firms
#19: The Dirty 13 InfoSec Fails in CPA Audits
#18: CDP in Data Backup | What You Need to Know
#17: Cash in the Cyber Sheets - Data Backup Types & Strategies
#16: Don’t Overlook These 11 Critical Data Backup Steps
#15: Business Continuity Plan Testing Methodologies
#14: Building Your Business Continuity Plan
#13: Business Continuity Planning Essential Tips
#12: CrowdStrike Global Outage | Liability Explained
#11: Encryption, the Credit System, & Door Dash
#10: Security Incident Response Policy & Planning
#9: MultiFactor Authentication (MFA)
#8: 10 Steps for a Compliant User Access & Logging Audit
#7: CDK Breach & Incident Response Management
#6: Changes in Encryption Requirements
#5: Wire Fraud Risks and How to Protect Your Business
#4: Risk Management Strategies to Stay Compliant
Business Compliance Requirements
#2: Using Inputs & Outputs to Strengthen Risk Programs
Welcome to Cash in the Cyber Sheets