BOOK A CALL
Cash in the Cyber Sheets: Making Money From Being Secure & Compliant

Cash in the Cyber Sheets: Making Money From Being Secure & Compliant

Hosted by: James Bowers II

Shattering the myth that security and compliance are just necessary evils and profit-sucking business bottlenecks, “Cash in the Cyber Sheets” reveals how they’re actually launchpads for profit and how they lay the...

Episodes

#46: Cash in the Cyber Sheets - FTC Safeguards Checklist - Monitor, Review, & Test Controls

Season #1

Welcome back to Cash In the Cyber Sheets. This episode is a continuation of our FTC Safeguards Rule Checklist for Compliance series, and we’re diving into a part of the Safeguards Rule that too many companies overlook...
View Episode

#45: Cash in the Cyber Sheets - FTC Safeguards Checklist - Security Controls Deeper Dive

Season #1

In this episode of Cash in the Cyber Sheets, we continue our FTC Safeguards Rule Checklist for Compliance series by diving deeper into the practical implementation of security controls. Last time, we outlined the...
View Episode

#44: Cash in the Cyber Sheets - FTC Safeguards Checklist - Security Controls

Season #1

When people think of security controls, they usually picture firewalls, antivirus software, and multi-factor authentication. But truly protecting your business goes beyond just technical solutions—it requires a mix of...
View Episode

#43: Cash in the Cyber Sheets - FinCEN BOI Reporting Requirements Halted

Season #1

Regulatory compliance just took another sharp turn. The Beneficial Ownership Information (BOI) reporting requirements under the Corporate Transparency Act (CTA) have been halted—at least for now. But what does that...
View Episode

#42: Cash in the Cyber Sheets - FTC Safeguards Checklist - Risk-Based Approach

Season #1

Compliance isn’t a checkbox—it’s a strategy. This week on Cash in the Cyber Sheets, we continue our FTC Safeguards Rule Checklist for Compliance series with a deep dive into how to design your Information Security...
View Episode

#41: Cash in the Cyber Sheets - FTC Safeguards Checklist - Designating a "Qualified Individual"

Season #1

The FTC Safeguards Rule is here, and compliance isn’t optional. But where do you start? This week on Cash in the Cyber Sheets, we kick off our educational series diving deep into the FTC Safeguards Rule Checklist—one...
View Episode

#40: Cash in the Cyber Sheets - Breaking Barriers to Success with JASB Management

Season #1

In this episode of Cash in the Cyber Sheets, we sit down with Jerry Seigel from JASB Management, a seasoned expert in management training, executive coaching, and personal development. We dive into some of the biggest...
View Episode

#39: Cash in the Cyber Sheets - Expanding the CIA Triad: Why CIAPS is the New Standard

Season #1

In this episode of Cash in the Cyber Sheets, we take a deep dive into the foundational principles of information security—the CIA triad (Confidentiality, Integrity, Availability)—and explore why these are no longer...
View Episode

#38: Cash in the Cyber Sheets - The First Step in Information Security - Laying the Foundation for a Robust ISP

Season #1

The First Step in Information Security - Laying the Foundation for a Robust ISP What does it take to build an effective Information Security Program (ISP) and what are the first things you need to consider when...
View Episode

#37: Cash in the Cyber Sheets - Dirty 13 - MFA Issues & Best Practices

Season #1

In this episode of Cash in the Cyber Sheets, we continue our Dirty 13 series by tackling one of the most overlooked yet critical security gaps: MFA (Multi-Factor Authentication). While MFA is one of the strongest...
View Episode

#36: Cash in the Cyber Sheets: Planning for the Unexpected - A Deep Dive into Incident Response

Season #1

In this episode of Cash in the Cyber Sheets, we are joined by Bryan Barnhart from Infiltration Labs to discuss the critical importance of incident response planning. Together, we explore Bryan’s extensive experience...
View Episode

#35: Cash in the Cyber Sheets - Dirty 13 - Poor Password Management

Season #1

From the 'Dirty 13' series, this episode tackles one of the most pervasive cybersecurity issues: poor password management. Join us as we explore the risks of sharing, reusing, and creating weak passwords—and share six...
View Episode