top of page
Search


Risk Quantification in Practice
What if your risk register could answer: "What's our probable loss, and what's the cheapest way to reduce it?" In this video, TBDCyber Senior Consultant, Alexandra Reibel walks through how risk quantification works in practice, including modeling frequency and impact as ranges, running simulations, and tying results directly to budget and control decisions. No vibes. Just data.
Mar 161 min read


Coming Soon: Cyber Smokehouse
🚨 Big news! TBDCyber is dropping something huge… and it’s 🔥 We’re thrilled to officially announce Cyber Smokehouse , a brand-new podcast from TBDCyber where we grill the minds, dig into the experience, and serve up the stories of leaders shaping the cybersecurity world. 🎙️ Hosted by Ernie Anderson and Graeme Payne , Cyber Smokehouse isn’t your typical cybersecurity show, it’s a place where real conversations, no-fluff insights, and the lived experience of today’s c
Jan 281 min read


Hardening Your Microsoft 365 Tenant: A Practical Four-Pillar Approach
Setting up a Microsoft 365 (M365) tenant is often straightforward, thanks to the quick-start wizards. While ease and convenience are great, they don't always translate into strong security. When we created TBDCyber, we set up our M365 tenant in a matter of minutes. We had immediate access to all the productivity applications we needed, from Outlook to Teams. We had all the ease and convenience we needed to start operating our business, but the next question was: Are we doing
Jan 264 min read


Cybersecurity Risk Quantification: A Logical Approach
In today’s boardrooms, cybersecurity leaders are being asked questions they were never trained to answer with confidence: How much risk are we carrying? What is the financial impact of a breach? Are we investing in the right controls? Too often, cyber risk is still communicated using subjective ratings like “high,” “medium,” or “low.” While useful at a technical level, these labels fail to support executive decision-making, budget prioritization, and risk ownership at the ent
Jan 122 min read


Outsourcing Third-Party Risk Management: Faster, Cheaper, and More Effective Vendor Risk Reduction
In today’s interconnected business environment, organizations rely on hundreds, sometimes thousands, of third parties to deliver critical...
Sep 24, 20252 min read


Vulnerability Management shouldn't be an afterthought?
🚨 Why do most organizations only focus on Vulnerability Management after a major incident? In this short video, TBDCyber's Jeff Caranna...
Sep 23, 20251 min read


How prepared is your organization for the unexpected?
🧩 How prepared is your organization for the unexpected? Tabletop exercises aren’t just checkbox activities. They’re a powerful tool for...
Sep 23, 20251 min read


How TBDCyber Supports the CISO's Agenda
🚨 CISOs are facing more pressure than ever. Are we setting them up for success, or for burnout? In this short video (just under a...
Sep 23, 20251 min read


What is cybersecurity risk management, and why does it matter?
🔐 What is cybersecurity risk management, and why does it matter? In a world where threats evolve daily, cybersecurity risk management...
Sep 23, 20251 min read


Entra ID P2 Secure Your Admin Accounts Now!
🔑 Admin Accounts Deserve Extra Protection In this short clip, TBDCyber's Microsoft trusted advisor, Chris Goosen, explains why...
Sep 23, 20251 min read


Incident Response in Cybersecurity: A Strategic Approach
In today’s cyber landscape, threats aren’t a matter of if or when —they are impacting organizations right now. From ransomware attacks...
Aug 26, 20252 min read


What actually makes a data security program effective?
What actually makes a data security program effective? It’s not just about inventories or visibility dashboards—it’s about reducing...
Jul 22, 20251 min read


OT Security: Safeguarding Critical Infrastructure in a Connected World
OT Security: Safeguarding Critical Infrastructure in a Connected World As IT and OT systems continue to converge, new cybersecurity...
Jul 22, 20251 min read


The Future of Third-Party Risk Management: AI & Automation
The Future of Third-Party Risk Management: AI & Automation Third-party risk programs are evolving—fast. AI is no longer just a buzzword;...
Jul 22, 20251 min read


Insider Threat Management - Where to Begin?
In this short video, Justin Barnett breaks down three essential steps to help organizations build a strong foundation for their Insider...
Jul 22, 20251 min read


Is your cybersecurity program actually protecting what matters most?
Is your cybersecurity program actually protecting what matters most? In this short video, TBDCyber's Alexandra Reibel explains why a...
Jul 22, 20251 min read
bottom of page