MKG Marketing MKG Marketing Logo Quotation Marks

What's the Problem? with Mike Krass

Hang out with Mike Krass as he learns from cyber security experts on what problem they're facing right now.

Photo of Mike Krass

Join our weekly newsletter

Get industry news, articles, and tips-and-tricks straight from our experts.

We care about the protection of your data. Read our Privacy Policy.

What's the Problem

Questions to Ask Security Vendors to Purchase What you Need (and no more!), featuring Alex Titze of Blue Team Alpha

Today, we are speaking with Alex Titze of Blue Team Alpha about the education gap when evaluating security products or solutions.  (16 minutes)

What's the Problem

Entry Level Security Roles for Companies such as Textron Aviation with Selby LeBert

Cybersecurity specialist Selby LeBert of Textron Aviation joins us to discuss the rise of entry-level security personnel in the world of security operations for companies such as Textron.  (19 minutes)

What's the Problem

A SOC Analysts Point of View on CISA’s Shields Up Directive

A Senior SOC Analyst takes us to the heart of the conversation around CISA shields. Will companies report breaches? Will it help the community as a whole? Listen to Elez Tupuzovic's opinion in this episode.  (18 minutes)

What's the Problem

The Journey from Line Cook to the Security Operations Center

In today’s episode, Derek Ireifej of CyberConvoy takes us on his journey from line cook to IT manager to SOC analyst.  (27 minutes)

What's the Problem

Security Operation Center (SOC) Analysts = Puzzle Makers

Menekse Saglam presents listeners with the opportunity to step into a Security Operations Center environment from the comfort of your own home.  (12 minutes)

What's the Problem

The Year(s) Long Process of Building a Security Program for your Business with Warner Moore of Gamma Force

Listen as Gamma Force CEO Warner Moore describes the common formula he uses to create cybersecurity practices within a business. “An asset that has a vulnerability and a threat has ABC amount of risk to manage.” Curious for more? Tune in to show now.  (19 minutes)

What's the Problem

Operational Technology (OT): Which Industries & Regions Lead with Oscar Ruiz

Tune in as Accenture’s Oscar Ruiz tells listeners which global regions and industries are the leaders versus the laggards in the world of Operational Technology (OT).  (25 minutes)

What's the Problem

3 States Of Data: In use, In Motion, At Rest

Exploring the concept of confidential computing - securing data in use that is vulnerable/in an unencrypted state - with Fortanix CEO Ambuj Kumar.  (15 minutes)

What's the Problem

Endpoint Security's Biggest Issue: Claiming Compliance "Out Of The Box"

Explore the “out of the box” compliance issue in the area of Endpoint Security for both the education and healthcare industries.  (11 minutes)

What's the Problem

How Long Does it Take to Train a Cybersecurity Salesperson?

How do you take someone brand new to the world of cybersecurity and turn them into a knowledgeable seller with practical, hands on experience? Join Graham Smith of IBM to hear about their Summit Training program.  (25 minutes)

What's the Problem

Incident Response Plans (IRPs). The good, the bad, the ugly.

Learn about IRP's from network security manager James William.  (15 minutes)

What's the Problem

To Demand a Ransomware Payment Or Siphon Off Your Intellectual Property?

Chandra Pandey of Seceon joins Mike Krass to discuss ransomware with respect to Intellectual Property (IP), using real-life examples from the Nvidia hack as well as the Microsoft source code hack.  (22 minutes)

What's the Problem

Deploy and De-provision Identity Management Controls for a five thousand Employee Hospital Group

Hear the Experience of Nimbus-T CEO Tom Johnson Describes Deploying and De-Provisioning Identity and Access Management Controls for a Large Hospital System.  (21 minutes)

What's the Problem

Where Are All the People to Staff Your Security Operations Center (SOC)?

There are more open roles in the security operations center than qualified people to fill them in the United States. What are we going to do about that?  (20 minutes)

What's the Problem

When Will Quantum Computing Break 256-bit Encryption?

When Will Quantum Computing Break 256-bit Encryption? Join Bob Zinga, vCISO and Head of Information Security at Directly to find out.  (21 minutes)

What's the Problem

Ransomware Threat Vectors: The Danger of Open Ports

Join Information Security Specialist Ravina Joshi to Learn About the Dangers of not cleaning up Open Ports. Think it’s not a big deal? The WannaCry incident begs to differ.  (10 minutes)

What's the Problem

Identity Breaches: It's Your Partners, Customers or Vendors Leaking Your Information

More often than not, an identity breach is the result of a partner, customer, or vendor breach. Your identity information becomes a casualty of someone else's breach.  (14 minutes)

What's the Problem

Cybersecurity in the Education System

Steve Fisher of IMS goes into great detail around the cybersecurity concerns that school systems have to face. He explains how high turnover environments produce opportunities for bad actors as well as dives into the solution: training that people actually a) take, and b) remember!  (20 minutes)

What's the Problem

How to Secure Your Organization During Employee Turnover

Jack Borchgrevink of VMware discusses vendor’s responsibility to provide support in advance of a breach as well as how to secure your organization during times of employee turnover.  (16 minutes)

What's the Problem

Case Study: An 85% Compromise Rate through Social Engineering

In this episode, Fares Mohammed joins What’s the Problem to discuss social engineering in the world of #cybersecurity. Email phishing scams about bitcoin or NFT projects all the way down to dropping flash drives in corporate offices to see who would plug them into company networked devices.  (17 minutes)

What's the Problem

Creating A New Cybersecurity Category: Phishing Detection & Response (PDR)

Mike Krass chats with Christopher Gibbons to discuss the fact that in 2022 secure email gateways (SEG’s) don’t statistically provide any more protection than you already receive with Microsoft Office 365 or Google Business applications.  (18 minutes)

What's the Problem

Speaking to “Technical” versus "Manager" Cybersecurity Buyers

This episode explores a key topic for security vendors to consider: how do I speak to a person in a Technical role versus a Business Manager role?  (13 minutes)

What's the Problem

Unwrap the Layers of Password Cracking Attacks

Join security specialist Adil Ahmed as he discusses password cracking attacks such as brute force, password spraying as well as spear phishing when a hacker has gained access to 1 (or more) of your systems to use as hop points.  (15 minutes)

What's the Problem

How to Avoid Pressure to Achieve Short Term Results at the Sacrifice of Long Term Strategy in Cyber Security

In this episode, Dani Woolf dives into the big H word: Honesty. More specifically, Dani spends time discussing how honesty and transparency around what your security product can or cannot do for the buyers organization is a critical currency to trade in and should not be taken lightly.  (17 minutes)

What's the Problem

Open Source Cyber Security to Support Finding Missing Persons

In this episode, Mike Krass chats with Matthew Buhler about his security analysis work to assist in the recovery of missing persons as well as the removal of CSAM (Child Sexual Abuse Material) from the Internet.  (11 minutes)

What's the Problem

Cyber Security for SMBs

In this episode, Mike Krass explores how Small-to-Midsize businesses are often targets of Cyber attacks with Marcela Denniston. Marcela is a security engineer, entrepreneur, and marketing leader with a background in the public and private sectors.  (20 minutes)

What's the Problem?

Phishing

In this episode, Ebony Hall, a Systems Engineer with Cambium Learning who also has an IT background in the military (U.S. Army), discusses phishing attacks in the public sector as well as for commercial organizations.  (10 minutes)

What's the Problem?

The Convergence of Cloud and Data

In this episode, Mike Krass chats with Andy Smith the Chief Marketing Officer at Laminar to discuss the problems of security buyers: the convergence of cloud transformation and data democratization.  (10 minutes)