Reduce Cyber Risk Podcast - Cyber Security Made Simple cover art

Reduce Cyber Risk Podcast - Cyber Security Made Simple

Reduce Cyber Risk Podcast - Cyber Security Made Simple

By: Shon Gerber vCISO CISSP Cyber Security Consultant Author and Entrepreneur
Listen for free

About this listen

Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Threat, Operational Technology (OT) Security, Cyber Security Awareness Training, Cyber Security Training for Employees, Cyber Security Courses for the CISSP, and much, much more. You will receive immediate and actionable information that you can put into practice immediately to protect your business, no matter the size. Need direct and immediate assistance, Shon can also provide you with his “high touch” consulting approach with his various cyber security services.

© 2026 Reduce Cyber Risk Podcast - Cyber Security Made Simple
Economics Politics & Government
Episodes
  • RCR 165: Security and Gap Assessments for SMBs
    Feb 2 2026

    A single phish can take down an entire business, and too many small teams only discover that truth after it’s too late. We unpack how security and gap assessments give SMBs a clear, practical path to defend revenue, earn trust, and meet compliance without chasing shiny tools or boiling the ocean.

    We start with a cautionary tale: a young intruder reused stolen credentials, posted proof online, and exposed how everyday weaknesses become public and painful. From there, we translate the chaos into structure. You’ll hear the difference between a security assessment and a gap assessment, how to map your environment to NIST CSF, SOC 2, ISO 27001, HIPAA, PCI, or CMMC, and why most organizations don’t need “gold standard” everything—just strong fundamentals executed well. We outline a seven-phase plan that scales to your size, covering the twelve core domains from governance and access control to backups, incident response, vendor risk, and physical security.

    Expect concrete fixes you can start today: enable MFA on Microsoft 365 or Google Workspace, remove excess admin rights, test a full restore, patch critical systems, and publish an incident contact list. Then build momentum with a 90‑day sprint featuring EDR rollout, DKIM/DMARC hardening, phishing simulations, and an acceptable use policy. Over six to twelve months, segment networks, centralize logs, formalize vendor reviews, and write incident response plans. If you’re aiming for certifications or federal contracts, we break down when to DIY and when to bring in a fractional CISO or third-party assessor, plus how to judge partners by methodology, deliverables, and business fluency.

    By the end, you’ll know how to measure progress with real metrics—critical findings closed, MTTD/MTTR, phishing fail rates, audit results—and how assessments can reduce insurance premiums, win deals, and prevent ruinous incidents. If you’ve failed a customer questionnaire, seen premiums jump, had a near miss, or are moving into regulated markets, this is your signal. Subscribe, share with your team, and leave a review telling us the first control you’ll implement this quarter.

    Show More Show Less
    45 mins
  • RCR 164: Fractional CISO, Real Results For SMBs - Part #2
    Jan 27 2026

    Boards aren’t asking whether security matters anymore—they’re asking who can lead it and show progress fast. We dig into why the CISO seat now belongs at the executive table and how SMBs can access that leadership through a pragmatic fractional model that drives measurable results without bloating headcount.

    We lay out the red flags that waste budget—claims of “unhackable” systems, tool-first thinking with no process, and leaders who can’t translate risk into business terms. Then we get tactical: how to structure scope and cadence, set escalation paths for incidents, and build trust with a 90-day plan that starts with discovery, moves to prioritization, and delivers quick wins. Expect concrete deliverables like policies, risk assessments, remediation roadmaps, incident response plans, vendor reviews, board-ready reporting, and a clear security awareness program.

    You’ll also hear which metrics actually matter: fewer critical vulnerabilities, faster detection and response, stronger audit outcomes, improved phishing resilience, and better vendor risk scores. We unpack engagement models—retainers, project-based work, and hybrid on-call—and show how a right-sized start can scale. A real-world case study ties it together: a mid-market manufacturer invested in a fractional CISO, earned compliance certification in nine months, won a multimillion-dollar contract, and cut cyber insurance premiums. We round out with triggers for transitioning to a full-time CISO—headcount, budget thresholds, team size, regulatory demands—and a simple checklist to evaluate readiness and candidate fit.

    If you’re ready to turn security into a growth lever, this conversation gives you the blueprint: structure the engagement, measure what matters, and give your security leader access to people and decisions. Subscribe, share with your team, and leave a review to tell us which metric you’ll track first.

    Show More Show Less
    28 mins
  • RCR 163: Insider Risk, Rising Stakes and the Fractional CISO - Part #1
    Jan 19 2026

    Insider threats aren’t just moody employees swiping files anymore. Layoffs, job insecurity, remote work, and a new class of “machine insiders” powered by APIs and AI have rewritten the risk map for small and medium businesses. We unpack how human stress, compromised accounts, and over-permissive automation converge, why the old “rare rogue” model fails, and what practical guardrails actually move the needle when resources are tight.

    We share a clear blueprint for getting enterprise-grade leadership without hiring a full-time executive: the fractional CISO. You’ll hear how a part-time security leader creates a strategy you can execute, aligns controls to compliance and cyber insurance demands, and leads incident response when minutes matter. We draw on real-world experience across the Air Force red team, global enterprises, and hands-on consulting for startups to explain what a fractional CISO really does—roadmaps, vendor selection, board communication—and what they don’t do—patching, help desk, 24x7 coverage. Expect frank talk about zero trust, least privilege, behavioral analytics, and why visibility beats tool sprawl.

    Cost transparency is front and center. We compare breach math, downtime, and regulatory exposure against the price of leadership, then break down when a CISO becomes non-negotiable: handling sensitive data, facing NYDFS or HIPAA requirements, pursuing CMMC, or answering insurer questionnaires. We’ll also hand you the hiring playbook: the right questions to ask, the certifications that matter (CISSP, CISM, CRISC), and how to test a candidate’s ability to translate risk for non-technical executives. If your API has more access than your CFO and your IT team is underwater, this conversation shows a safer, saner path forward.

    If this helped you think differently about insider risk and leadership, subscribe, share with a colleague who wears too many hats, and leave a quick review—then tell us what you want covered next.

    Show More Show Less
    29 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.