Artwork

Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)

47:52
 
Share
 

Manage episode 490473169 series 3673385
Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity.

From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn:

What cyber maturity really means

Why frameworks like NIST CSF and ISO 27001 matter

How corporate culture can make or break your cybersecurity

And… how Frank may have cursed a table (seriously).

💥 Plus, find out why lying about NIST 800-171 might now get you sued by the DOJ.

🧠 Insightful. 🎯 Practical. 😂 Occasionally ridiculous.

👇 Watch, like, and subscribe — before someone clicks the wrong link.

📺 Subscribe for weekly cybersecurity content that doesn’t put you to sleep.

  continue reading

6 episodes

Artwork
iconShare
 
Manage episode 490473169 series 3673385
Content provided by LegitimateCybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by LegitimateCybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity.

From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn:

What cyber maturity really means

Why frameworks like NIST CSF and ISO 27001 matter

How corporate culture can make or break your cybersecurity

And… how Frank may have cursed a table (seriously).

💥 Plus, find out why lying about NIST 800-171 might now get you sued by the DOJ.

🧠 Insightful. 🎯 Practical. 😂 Occasionally ridiculous.

👇 Watch, like, and subscribe — before someone clicks the wrong link.

📺 Subscribe for weekly cybersecurity content that doesn’t put you to sleep.

  continue reading

6 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play