• Right of Boom: What Happens When Cybersecurity Prevention Fails
    Nov 17 2025

    If your organization treats cybersecurity as something IT "handles," you're already behind. The regulators know it. The plaintiffs' attorneys know it. And when the breach happens, your board will discover it the expensive way.

    WHY YOU SHOULD LISTEN

    Krishan Thakker, a seasoned executive legal advisor, delivers the uncomfortable truths that consultants won't tell you and vendors can't sell you:

    • Language Translation: How to speak executive language when technical severity doesn't resonate
    • Reverse Engineering Risk: Starting with worst-case scenarios (including criminal liability) to drive urgency
    • Responsibility vs. Accountability: Why these aren't the same concept and how HR must map the distinction
    • The Growth Trap: How the urge to scale fast creates predictable cycles of reactive security spending

    Stop asking your technologists to "figure it out." Start asking your legal team if you have litigation hold protocols that can activate within hours. Ask your compliance officer if responsibilities and accountabilities are clearly mapped across functions.

    Because when Krishan Thakker gets the call, these questions have already been answered n depositions, regulatory inquiries, and shareholder lawsuits.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    39 mins
  • Firefighting to Foresight: Rethinking Cyber Risk for the Real World
    Jul 18 2025

    Stanley Li speaks with veteran security executive Steve Maciejewski (aka “Steve Mack”) to unpack the harsh realities and hopeful opportunities of managing cyber risk in today’s complex digital landscape.

    Drawing from decades of experience as a CISO across public and private sectors, Steve explains why traditional compliance checklists and siloed toolsets aren’t enough. Together, they explore the cultural and operational shifts needed to move from reactive security to proactive, risk-informed governance.

    “Everyone has reports and dashboards, but most can’t explain how a breach would truly impact operations,” he said. “You need more than a SOC report or a compliance checklist. You need a business-driven risk view.”

    Listen to Learn:

    • Why running security with spreadsheets and slide decks needs to stop
    • How to bridge the boardroom-to-basement communication gap
    • The role of business impact analysis in building resilience
    • Why SMBs should think in terms of risk avoidance, transfer, or acceptance
    • What to demand from cloud providers - even when budgets are tight

    Whether you’re leading security for a fast-growing startup or a nonprofit, this conversation will deliver real-world strategies to shift your organization from cyber risk firefighting to sustainable, data-driven cyber risk governance.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    30 mins
  • Forget Your Firewalls: One Shocking Truth About Your Cyber Risk
    Jun 16 2025

    On the latest episode, hear a discussion about cyber risk management needing to look beyond IT.

    The hosts, Stanley Lee and Sean Mahoney, explore the complexities of cybersecurity, emphasizing the importance of understanding cyber risks that extend beyond traditional IT frameworks.

    They highlight the critical role of employee awareness and the need for organizations to adapt their security measures in response to evolving threats.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    58 mins
  • End Compliance Theatre: How Automation Can Save Your Business
    May 11 2025

    In this eye-opening episode of Cybersecurity Chronicles, we tackle a critical challenge facing executives today: the devastating impact of cyberattack downtime. Join Netswitch's VP Sean Mahoney, CFO Bernard Mendoza, and cyber resilience expert Steve Piggott as they move beyond "compliance theatre" to discuss why automated disaster recovery (DR) isn't just a good idea – it's essential for your business's survival and future.

    Drawing on real-world examples of crippling ransomware attacks, they break down the immense financial and operational costs of extended downtime, from lost revenue and unexpected expenses to damaged brand reputation and customer churn. Bernard Mendoza shares the stark reality of budgeting for unpredictable recovery costs, while Sean Mahoney recounts a personal survival story highlighting the chaos and expense of manual recovery efforts.

    Steve Piggott introduces the power of automated DR, explaining how platforms like Continuity Patrol can drastically reduce recovery times from days or weeks to minutes. Learn how automation frees up valuable IT resources for strategic work and provides the confidence needed for rapid, effective recovery. The discussion also covers how automated DR supports regulatory compliance and instills confidence in investors and boards.

    Tune in to understand why investing in automated disaster recovery is a proactive, strategic move that can protect your bottom line, your brand, and your competitive edge in today's volatile cyber landscape.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    31 mins
  • Will Quantum Computers Steal Your Job or Save the World an Expert Explains
    Oct 4 2024

    In this episode of Cybersecurity Chronicles, host Sean Mahoney sits down with quantum computing expert John O’Malley to talk about the world of quantum computing.

    John worked with the NIST Post Quantum Encryption Standards Committee, after having previously led Change Healthcare's Identity and Access Management (before the breach).

    They delve into the current state of quantum technology, its potential applications in various industries, and the challenges that lie ahead. From cybersecurity advancements to the future integration of quantum computing in everyday business operations, this conversation provides a comprehensive overview of how quantum computing is set to revolutionize the tech landscape.

    The topic was chosen following the recent NIST release of the long-awaited post-quantum encryption standards.

    Key Takeaways:

    1. Basics of Quantum Computing: Quantum computers use qubits that can represent both 0 and 1 simultaneously, enabling complex calculations beyond classical computers.
    2. Current and Future Applications: Quantum computing promises advancements in cybersecurity, medication development, and electric car batteries, with broader integration expected in 5-10 years.
    3. Challenges and Preparations: High power requirements and sub-zero temperatures are major hurdles. Businesses should start preparing by mapping encryption strategies and training teams.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    41 mins
  • Feeding the Gators: Why SMBs Get Hacked & Big Guys Get Away
    Jun 18 2024

    Sean Mahoney of Netswitch is joined by Wil Lassalle, of JLS, Tech to talk about a headline story and share some insights about preventing a similar event from occurring for your SMB.

    The guys explore why small businesses are more susceptible to cyberattacks than larger corporations. They talk about the perception among cybercriminals that small businesses have weaker defenses and are easier targets. Additionally, they discuss the potential unfairness of the current system, where large corporations face lighter consequences (like fines) for data breaches despite causing significant financial losses.

    Learn WHY:

    • Small businesses are more vulnerable to cyberattacks than large corporations
    • SMBs are perceived as easier targets
    • Big guys get away with just a fine

    Sean Mahoney, VP Netswitch, Inc.

    Will Lassalle, vCISO JLS, Tech

    Learn more about Security And Risk Assessments from Netswitch, Inc.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    34 mins
  • An Insider's Guide to Cracking the Cyber Compliance Code in Latin America
    Jun 6 2024

    In this episode, Will Lassalle, co-founder of Simplix, a platform designed to assist businesses in complying with cyber regulations in Latin America, discusses the challenges and opportunities surrounding cyber compliance in the region.

    We then delve into the evolving cyber regulatory landscape in Latin America, highlighting the region's efforts to catch up with global data privacy laws and cyber regulations.

    We emphasize the pressing need for businesses to enhance their cyber hygiene and mitigate the risks associated with breaches and ransomware attacks, particularly for those working with US or European companies that must adhere to their stringent requirements.

    Host: Sean Mahoney, VP Netswitch, Inc.

    Guest: Will Lassalle, Founder Simplix.io

    Show More Show Less
    39 mins
  • Cyber Resilience Secrets: A Roadmap for LatAm Businesses
    May 15 2024

    In this episode, we discuss the importance of cyber resilience and business continuity planning for businesses in Latin America. The key points covered include:

    • Latin companies increasingly targeted as entry points to larger partners/suppliers
    • Conducting thorough business impact analysis (BIA) is critical first step
    • Develop strategies/plans to maintain core functions during disruptions
    • Regularly test and update resilience plans as operations change
    • Pre-establish agreements with external support services for faster response
    • Use multi-language documentation for organizational understanding
    • Customize resilience plans to each business's unique risks/impacts/priorities
    • Investing in resilience enables innovation, efficiency, competitiveness

    We share the secrets of how to invest in cyber resilience to enable innovation, improve efficiency and become a stronger competitive company.

    Mentioned in this episode:

    Podcast Outro Bumper

    Show More Show Less
    32 mins