top of page
Search


Coming Soon: Cyber Smokehouse
đ¨Â Big news! TBDCyber is dropping something huge⌠and itâs đĽ Weâre thrilled to officially announce Cyber Smokehouse , a brand-new podcast from TBDCyber  where we grill the minds, dig into the experience, and serve up the stories of leaders shaping the cybersecurity world. đď¸ Hosted by Ernie Anderson  and Graeme Payne , Cyber Smokehouse  isnât your typical cybersecurity show, itâs a place where real conversations, no-fluff insights, and the lived experience of todayâs c
Jan 281 min read


Hardening Your Microsoft 365 Tenant: A Practical Four-Pillar Approach
Setting up a Microsoft 365 (M365) tenant is often straightforward, thanks to the quick-start wizards. While ease and convenience are great, they don't always translate into strong security. When we created TBDCyber, we set up our M365 tenant in a matter of minutes. We had immediate access to all the productivity applications we needed, from Outlook to Teams. We had all the ease and convenience we needed to start operating our business, but the next question was: Are we doing
Jan 264 min read


Cybersecurity Risk Quantification: A Logical Approach
In todayâs boardrooms, cybersecurity leaders are being asked questions they were never trained to answer with confidence: How much risk are we carrying? What is the financial impact of a breach? Are we investing in the right controls? Too often, cyber risk is still communicated using subjective ratings like âhigh,â âmedium,â or âlow.â While useful at a technical level, these labels fail to support executive decision-making, budget prioritization, and risk ownership at the ent
Jan 122 min read


Outsourcing Third-Party Risk Management: Faster, Cheaper, and More Effective Vendor Risk Reduction
In todayâs interconnected business environment, organizations rely on hundreds, sometimes thousands, of third parties to deliver critical...
Sep 24, 20252 min read


Vulnerability Management shouldn't be an afterthought?
đ¨ Why do most organizations only focus on Vulnerability Management after a major incident? In this short video, TBDCyber's Jeff Caranna...
Sep 23, 20251 min read


How prepared is your organization for the unexpected?
đ§Š How prepared is your organization for the unexpected? Tabletop exercises arenât just checkbox activities. Theyâre a powerful tool for...
Sep 23, 20251 min read


How TBDCyber Supports the CISO's Agenda
đ¨ CISOs are facing more pressure than ever. Are we setting them up for success, or for burnout? In this short video (just under a...
Sep 23, 20251 min read


What is cybersecurity risk management, and why does it matter?
đ What is cybersecurity risk management, and why does it matter? In a world where threats evolve daily, cybersecurity risk management...
Sep 23, 20251 min read


Entra ID P2 Secure Your Admin Accounts Now!
đ Admin Accounts Deserve Extra Protection In this short clip, TBDCyber's Microsoft trusted advisor, Chris Goosen, explains why...
Sep 23, 20251 min read


Incident Response in Cybersecurity: A Strategic Approach
In todayâs cyber landscape, threats arenât a matter of if or when âthey are impacting organizations right now. From ransomware attacks...
Aug 26, 20252 min read


What actually makes a data security program effective?
What actually makes a data security program effective? Itâs not just about inventories or visibility dashboardsâitâs about reducing...
Jul 22, 20251 min read


OT Security: Safeguarding Critical Infrastructure in a Connected World
OT Security: Safeguarding Critical Infrastructure in a Connected World As IT and OT systems continue to converge, new cybersecurity...
Jul 22, 20251 min read


The Future of Third-Party Risk Management: AI & Automation
The Future of Third-Party Risk Management: AI & Automation Third-party risk programs are evolvingâfast. AI is no longer just a buzzword;...
Jul 22, 20251 min read


Insider Threat Management - Where to Begin?
In this short video, Justin Barnett breaks down three essential steps to help organizations build a strong foundation for their Insider...
Jul 22, 20251 min read


Is your cybersecurity program actually protecting what matters most?
Is your cybersecurity program actually protecting what matters most? In this short video, TBDCyber's Alexandra Reibel explains why a...
Jul 22, 20251 min read


Is your Security Operations Center truly prepared for todayâs evolving threats?
Is your Security Operations Center (SOC) truly prepared for todayâs evolving threats? A well-functioning SOC is more than just the latest...
Jul 22, 20251 min read
bottom of page