- After-Shows
- Alternative
- Animals
- Animation
- Arts
- Astronomy
- Automotive
- Aviation
- Baseball
- Basketball
- Beauty
- Books
- Buddhism
- Business
- Careers
- Chemistry
- Christianity
- Climate
- Comedy
- Commentary
- Courses
- Crafts
- Cricket
- Cryptocurrency
- Culture
- Daily
- Design
- Documentary
- Drama
- Earth
- Education
- Entertainment
- Entrepreneurship
- Family
- Fantasy
- Fashion
- Fiction
- Film
- Fitness
- Food
- Football
- Games
- Garden
- Golf
- Government
- Health
- Hinduism
- History
- Hobbies
- Hockey
- Home
- How-To
- Improv
- Interviews
- Investing
- Islam
- Journals
- Judaism
- Kids
- Language
- Learning
- Leisure
- Life
- Management
- Manga
- Marketing
- Mathematics
- Medicine
- Mental
- Music
- Natural
- Nature
- News
- Non-Profit
- Nutrition
- Parenting
- Performing
- Personal
- Pets
- Philosophy
- Physics
- Places
- Politics
- Relationships
- Religion
- Reviews
- Role-Playing
- Rugby
- Running
- Science
- Self-Improvement
- Sexuality
- Soccer
- Social
- Society
- Spirituality
- Sports
- Stand-Up
- Stories
- Swimming
- TV
- Tabletop
- Technology
- Tennis
- Travel
- True Crime
- Episode-Games
- Visual
- Volleyball
- Weather
- Wilderness
- Wrestling
- Other
Effects of Compromise: Incident Recovery and Data Sharing with Michael F.D. Anaya
Starting season 2 of Logically Speaking, we welcome special guest, Michael F.D. Anaya, Founder of decodingCyber and the Global Director of Attribution at Palo Alto Networks. This episode is packed with critical information every business should know as Steve and Michael dive deep into remote cyber threats, incident response, legal ramifications of a breach, and the importance of data sharing after a compromise. After enjoying this episode, you’ll understand what your business has that threat actors covet, and how to better prepare for and respond to potential attacks.Key Takeaways from the EpisodeUnderstand threat actors and their motivations for cyber crimeLearn the effects of compromise to businesses in every industryDiscover tips on how to effectively mitigate attacksFind out why data sharing is critical after any compromise