MKG Marketing MKG Marketing Logo Quotation Marks

What's the Problem? with Mike Krass

Hang out with Mike Krass as he learns from cyber security experts on what problem they're facing right now.

Photo of Mike Krass

Join our weekly newsletter

Get industry news, articles, and tips-and-tricks straight from our experts.

We care about the protection of your data. Read our Privacy Policy.

What’s The Problem

Empower Women in Cybersecurity: Include Women at Every Level of Organization

Jane Frankland talks about the "leaky boat" issue, addressing how women leave tech jobs at unparalleled rates before the age of 35. Listen to Jane as she talks about her key points to attract, develop, and retain women in the world of cybersecurity industry. Also, discover how the cybersecurity field can be described as a "cruel" environment to work in by way of the Attack/Protect mindset we share.  (25 minutes)

What’s The Problem

3 Core Tenants of Zero Trust with Neal Dennis of Cyware Labs

Neal Dennis, Cyber Threat Intelligence Consultant at CyWare & Co-Host of the "Adopting Zero Trust" Podcast, joins to discuss the 3 core tenants of zero trust.  (23 minutes)

What’s The Problem

Cybersecurity Insurance "Got Ya's" for Small Business Owners

Join us for an enlightening conversation with Theresa Jones, CEO and owner of Evolve IQ as we explore the realm of small businesses and discuss vital advice on selecting the right cyber insurance policy. Discover essential tips for assessing risks, determining coverage, and establishing incident response plans, all geared toward ensuring your business is well-prepared in the digital age.  (18 minutes)

What's the Problem

Ian L. Paterson -Cybersecurity & AI with Plurilock founder Ian L. Paterson

Join us in an enlightening discussion with Ian L. Paterson, CEO of Plurilock, as we discover AI's impact on cybersecurity as it forges strategic illusions. This dynamic interplay blurs the boundary between illusion and innovation when it comes to cybersecurity and Artificial Intelligence.The integration of AI into platforms amplifies recognized security concerns in the evolving landscape.  (19 minutes)

What's the Problem

Proactive Defense for Critical Infrastructure | What's the Problem

Join us for an enlightening discussion with Yiyi Miao, Chief Product Officer of OPSWAT, as we explore proactive strategies to strengthen your defense against potential critical infrastructure incidents.  (20 minutes)

What's the Problem

Cyber Risk Economics

Jen Moll, Vice President of Strategy & Alliances at Axio, stops by to discuss the economic Impact of Cyber Risks.  (20 minutes)

What's the Problem

The Impending CMMC Compliance Deadline with Department of Defense (DoD)

Chase Richardson stops by to discuss the different levels of compliance required for contractors working with the Department of Defense (DoD).  (20 minutes)

What's the Problem

Cybersecurity in the European Union Compared to the United States

Cody Barrow, Chief Strategy Officer at EclecticIQ, stops by to compare and contrast the climate of cyber and data security in Europe versus the United States.  (20 minutes)

What's the Problem

How a Challenger Cybersecurity Company Can Navigate Their Product Into a Customers Hands

Andres Andreu, a 30-year veteran of the cybersecurity industry, joins us to discuss what CISOs truly care about during the purchasing cycle.  (17 minutes)

What's the Problem

Today's Software Supply Chain through the eyes of the AppSecDev

Derek Weeks, a 30-year veteran of the cybersecurity industry, joins us to discuss open source networks, the importance of a software bill of materials, and much more!  (20 minutes)

What's the Problem

How Cybersecurity Integration Partners Work Together

Nick Hansen joins us to discuss cybersecurity integration and how to minimize your attack surface  (15 minutes)

What's the Problem

When Policy and Enforcement Converge

Logan Wolfe of ORNA.app joins us to discuss policy and enforcement in the global cybersecurity space.  (20 minutes)

What's the Problem

How to Work with Product Marketing at a Cybersecurity Company

Salah Nassar from ZScaler joins us to discuss product marketing and the importance of connecting with your customer.  (23 minutes)

What's the Problem

Overlay Architecture: What is It and Who Cares How It Works?

Lauren Malhoit from Men & Mice joins us to discuss Overlay Architecture  (24 minutes)

What's the Problem

Data Responsibility in the World of Cybersecurity

Seth Garske from F5 Networks joins us to discuss personalization and the responsible usage of customer data.  (21 minutes)

What's the Problem

Effective CISOs: Technical vs Operational

Grant Elliott from Ostendio joins us to discuss how an effective CISO is an operational CISO. Your organization can have all the correct technical systems in place, but if you are missing proper administration, you'll always have vulnerabilities.  (18 minutes)

What's the Problem

The Future of Cloud Storage Is Blockchain

Join Thomas Beavers of Sollensys as he explains that the future of cloud storage lives on the blockchain - not Dropbox or Google Drive.  (12 minutes)

What's the Problem

Programs and Curriculum for Students to Participate in Real-World Cyber Training

Cybersecurity Specialist Selby LeBert of Textron Aviation joins us to discuss programs and curriculum for students to participate in real-world cybersecurity training.  (12 minutes)

What's the Problem

What If Cyberweapons Are Not Stored Securely?

What do we need to do to secure and protect cyberweapons? What should we do as a planet if cyberweapons get out?  (16 minutes)

What's the Problem

The Ethical Cybersecurity Marketer

Clark Barron, a Senior Demand Generation Strategist with Shippo, joins the podcast to discuss a unicorn topic: the ethical cybersecurity marketer.  (22 minutes)

What's the Problem

Procurement Being Involved in The Security Purchase Process

"Reminder: if you've already made the purchase, it's too late to incorporate a thorough OT security look."  (21 minutes)

What's the Problem

The Importance of Training on A High Functioning Security Operations Center (SOC)

Jaqueline Lundie joins us to share the importance of training working as a SOC Analyst with the US Department of Health and Human Services.  (16 minutes)

What's the Problem

Questions to Ask Security Vendors to Purchase What you Need (and no more!), featuring Alex Titze of Blue Team Alpha

Today, we are speaking with Alex Titze of Blue Team Alpha about the education gap when evaluating security products or solutions.  (16 minutes)

What's the Problem

Entry Level Security Roles for Companies such as Textron Aviation with Selby LeBert

Cybersecurity specialist Selby LeBert of Textron Aviation joins us to discuss the rise of entry-level security personnel in the world of security operations for companies such as Textron.  (19 minutes)

What's the Problem

A SOC Analysts Point of View on CISA’s Shields Up Directive

A Senior SOC Analyst takes us to the heart of the conversation around CISA shields. Will companies report breaches? Will it help the community as a whole? Listen to Elez Tupuzovic's opinion in this episode.  (18 minutes)

What's the Problem

The Journey from Line Cook to the Security Operations Center

In today’s episode, Derek Ireifej of CyberConvoy takes us on his journey from line cook to IT manager to SOC analyst.  (27 minutes)

What's the Problem

Security Operation Center (SOC) Analysts = Puzzle Makers

Menekse Saglam presents listeners with the opportunity to step into a Security Operations Center environment from the comfort of your own home.  (12 minutes)

What's the Problem

The Year(s) Long Process of Building a Security Program for your Business with Warner Moore of Gamma Force

Listen as Gamma Force CEO Warner Moore describes the common formula he uses to create cybersecurity practices within a business. “An asset that has a vulnerability and a threat has ABC amount of risk to manage.” Curious for more? Tune in to show now.  (19 minutes)

What's the Problem

Operational Technology (OT): Which Industries & Regions Lead with Oscar Ruiz

Tune in as Accenture’s Oscar Ruiz tells listeners which global regions and industries are the leaders versus the laggards in the world of Operational Technology (OT).  (25 minutes)

What's the Problem

3 States Of Data: In use, In Motion, At Rest

Exploring the concept of confidential computing - securing data in use that is vulnerable/in an unencrypted state - with Fortanix CEO Ambuj Kumar.  (15 minutes)

What's the Problem

Endpoint Security's Biggest Issue: Claiming Compliance "Out Of The Box"

Explore the “out of the box” compliance issue in the area of Endpoint Security for both the education and healthcare industries.  (11 minutes)

What's the Problem

How Long Does it Take to Train a Cybersecurity Salesperson?

How do you take someone brand new to the world of cybersecurity and turn them into a knowledgeable seller with practical, hands on experience? Join Graham Smith of IBM to hear about their Summit Training program.  (25 minutes)

What's the Problem

Incident Response Plans (IRPs). The good, the bad, the ugly.

Learn about IRP's from network security manager James William.  (15 minutes)

What's the Problem

To Demand a Ransomware Payment Or Siphon Off Your Intellectual Property?

Chandra Pandey of Seceon joins Mike Krass to discuss ransomware with respect to Intellectual Property (IP), using real-life examples from the Nvidia hack as well as the Microsoft source code hack.  (22 minutes)

What's the Problem

Deploy and De-provision Identity Management Controls for a five thousand Employee Hospital Group

Hear the Experience of Nimbus-T CEO Tom Johnson Describes Deploying and De-Provisioning Identity and Access Management Controls for a Large Hospital System.  (21 minutes)

What's the Problem

Where Are All the People to Staff Your Security Operations Center (SOC)?

There are more open roles in the security operations center than qualified people to fill them in the United States. What are we going to do about that?  (20 minutes)

What's the Problem

When Will Quantum Computing Break 256-bit Encryption?

When Will Quantum Computing Break 256-bit Encryption? Join Bob Zinga, vCISO and Head of Information Security at Directly to find out.  (21 minutes)

What's the Problem

Ransomware Threat Vectors: The Danger of Open Ports

Join Information Security Specialist Ravina Joshi to Learn About the Dangers of not cleaning up Open Ports. Think it’s not a big deal? The WannaCry incident begs to differ.  (10 minutes)

What's the Problem

Identity Breaches: It's Your Partners, Customers or Vendors Leaking Your Information

More often than not, an identity breach is the result of a partner, customer, or vendor breach. Your identity information becomes a casualty of someone else's breach.  (14 minutes)

What's the Problem

Cybersecurity in the Education System

Steve Fisher of IMS goes into great detail around the cybersecurity concerns that school systems have to face. He explains how high turnover environments produce opportunities for bad actors as well as dives into the solution: training that people actually a) take, and b) remember!  (20 minutes)

What's the Problem

How to Secure Your Organization During Employee Turnover

Jack Borchgrevink of VMware discusses vendor’s responsibility to provide support in advance of a breach as well as how to secure your organization during times of employee turnover.  (16 minutes)

What's the Problem

Case Study: An 85% Compromise Rate through Social Engineering

In this episode, Fares Mohammed joins What’s the Problem to discuss social engineering in the world of #cybersecurity. Email phishing scams about bitcoin or NFT projects all the way down to dropping flash drives in corporate offices to see who would plug them into company networked devices.  (17 minutes)

What's the Problem

Creating A New Cybersecurity Category: Phishing Detection & Response (PDR)

Mike Krass chats with Christopher Gibbons to discuss the fact that in 2022 secure email gateways (SEG’s) don’t statistically provide any more protection than you already receive with Microsoft Office 365 or Google Business applications.  (18 minutes)

What's the Problem

Speaking to “Technical” versus "Manager" Cybersecurity Buyers

This episode explores a key topic for security vendors to consider: how do I speak to a person in a Technical role versus a Business Manager role?  (13 minutes)

What's the Problem

Unwrap the Layers of Password Cracking Attacks

Join security specialist Adil Ahmed as he discusses password cracking attacks such as brute force, password spraying as well as spear phishing when a hacker has gained access to 1 (or more) of your systems to use as hop points.  (15 minutes)

What's the Problem

How to Avoid Pressure to Achieve Short Term Results at the Sacrifice of Long Term Strategy in Cyber Security

In this episode, Dani Woolf dives into the big H word: Honesty. More specifically, Dani spends time discussing how honesty and transparency around what your security product can or cannot do for the buyers organization is a critical currency to trade in and should not be taken lightly.  (17 minutes)

What's the Problem

Open Source Cyber Security to Support Finding Missing Persons

In this episode, Mike Krass chats with Matthew Buhler about his security analysis work to assist in the recovery of missing persons as well as the removal of CSAM (Child Sexual Abuse Material) from the Internet.  (11 minutes)

What's the Problem

Cyber Security for SMBs

In this episode, Mike Krass explores how Small-to-Midsize businesses are often targets of Cyber attacks with Marcela Denniston. Marcela is a security engineer, entrepreneur, and marketing leader with a background in the public and private sectors.  (20 minutes)

What's the Problem?

Phishing

In this episode, Ebony Hall, a Systems Engineer with Cambium Learning who also has an IT background in the military (U.S. Army), discusses phishing attacks in the public sector as well as for commercial organizations.  (10 minutes)

What's the Problem?

The Convergence of Cloud and Data

In this episode, Mike Krass chats with Andy Smith the Chief Marketing Officer at Laminar to discuss the problems of security buyers: the convergence of cloud transformation and data democratization.  (10 minutes)