14 – Day Managed Security Services Trial

Complimentary Cyber Workshop

Free Dark/Deep Web Scan

FTC updates Safeguards Rule

Goliath’s Cyber (in)Sanity podcast series…

Episode 14- People, Process, and Technology (Part 3.2 of 3) with guest Dave Marcus

In the climactic finale of our three-part series “People, Process, and Technology,” Cyber (in)Sanity Podcast hosts Andrew Berkuta and Angelo Longo are joined by cybersecurity expert Dave Marcus from Intel.

This episode delves into the critical role of technology in cybersecurity, exploring emerging trends and the challenges they pose. Dave shares insights on leveraging advancements to fortify cyber defenses. The conversation underscores the necessity of proactive technological integration within cybersecurity frameworks. Listeners gain valuable predictions and recommendations for navigating the evolving threat landscape, ensuring a holistic approach to safeguarding SMBs.


Subscribe now for a dose of Cyber (in)Sanity!

Our Services

CYBER ADVISORY SERVICES

Cybersecurity risks can result in significant financial losses, reputational damage, and legal repercussions. Our Cyber Advisory Services provide comprehensive solutions to help businesses protect themselves against cyber threats.

We work closely with you to understand your security requirements and develop a customized strategy to address potential threats.

Our services include but not limited to:

  • Executive Cyber Advisory Services (vCISO as a Service)
  • Incident Response Management 
  • Risk & Compliance
  • Vulnerability Management
  • CMMC Readiness & Gap Assessment
  • Network Vulnerability & Penetration Testing
  • Web Application Security Assessments
  • PenTesting as a Service (PTaaS)
  • Wireless Security Assessments
  • Red & Purple Teaming
  • Cyber Due Diligence
  • Tabletop Exercises

Goliath 360 – MANAGED SECURITY SERVICES

Are you concerned about the increasing threat of cyber attacks and data breaches? Do you want to ensure that your business is protected from potential security risks?

Goliath 360 offers a comprehensive managed security stack that provide businesses with the peace of mind they need to focus on their core operations.

Our services include but not limited to:

  • 24/7 Security Monitoring and Analysis
  • Real-Time Threat Detection and Prevention
  • Automated Remediation
  • Analysis of Both Internal and External Traffic
  • Integrated Threat Intelligence
  • Machine Learning Based Prevention
  • Active Vulnerability Scanning
  • Ongoing Regulatory Compliance Support
  • Executive Cyber Advisory Services (vCISO as a Service)
  • Cyber Security Awareness Training
  • Password Management
  • PREVENT | DETECT | REMEDIATE

Supporting Business Needs

We provide you with high quality Cyber Advisory services to assist with company growth and regulatory compliance.

Executive Cyber Advisory Services

In just a few hours you can have a security expert on staff who can assist with compliance, threats and vulnerability management for your organization.

Risk and Compliance

Obtain Audit and Audit assessment on compliance controls for CMMC, NIST, SOC 1/2/3, PCI, GDPR and many other compliance frameworks.

DevSecOps and SecOps

We have secure blueprints to start your journey into DevSecOps and supporting cyber security teams with SecOps.

Penetration Testing

While some might consider pen tests as just a vulnerability scan meant to check the box on a compliance requirement, Goliath believes the exercise should actually be much more.

Our Executive Team

Our team of experts include former CISOs with over 25 years of experience in the IT security services industry.

dave ackley_cybersecurity framework and compliance_Goliath Cyber Security Group

Dave Ackley

CEO and Founder

Andrew Berkuta

COO / Head of Cyber Advisory Services

Angelo Longo

Head of Executive Cyber Advisory Services

Tim Rose

Chief Sales & Strategy Officer

News, Blogs & Articles

The program was established by the U.S. Department of Defense (DOD) in September 2020 to provide guidelines around security-critical data and digital assets for all entities that interact with the DOD. CMMC recently launched its 2.0 model based off the well-known NIST cybersecurity framework. The DOD’s phased rollout plan […]
At Goliath Cyber we focus on bringing in partnerships that complement our Cyber Advisory services and make an actual difference for our clients. We bridge the gap for our clients helping build a more mature cyber program while meeting regulations and requirements. This allows them to […]
healthcare_cyber
Cyberthreats continue to grow exponentially for healthcare practices, and cyber-attacks are costly. They drain financial resources, disrupt practice productivity, endanger patient privacy, and compromise care quality. Protect your patient data, practice productivity, and financial health by applying the cybersecurity best practices for healthcare practices that follow.    […]
What do you think the reaction would be from a client or partner if you could NOT answer their questions immediately and/or prove that you are following proper and protective cybersecurity requirements?  Do you think they’d lose confidence in you? Do you think they’d start questioning […]
Mortgage Brokers, Lenders & Cybersecurity_Goliath Cyber Security Group
Cybersecurity services and solutions to protect customer data and maintain FTC Safeguards Rule compliance. Is Your Company Compliant to The New FTC Rule Changes? Changes to an important Federal Trade Commission (FTC) Rule shine a light at the information security practices of mortgage brokers, lenders, and agents. […]
Everyone benefits, the CISO, the company, and the insurer when CISOs are included in cyber insurance negotiations. Generally speaking, negotiating cyber insurance policies falls to the general counsel, chief financial officer, or chief operations officer. Having the CISO at the table when negotiating with insurance companies […]
Why Your IT MSP needs a Cybersecurity partner_Goliath Cyber Security
Many small and medium-sized businesses (SMBs) turn to IT Managed Service Providers (MSP’s) for their IT needs, but often find that they do not provide the necessary cybersecurity tools, solutions, and expertise. Let’s explore some of the reasons why your MSP is most likely not be […]
The Importance of E-commerce Application Security Testing_Goliath Cyber Security Group
Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy increasingly more API interfaces, with threat actors constantly exploring more ways to exploit vulnerabilities. This is why regular testing and ongoing monitoring are necessary to […]
Many organizations have begun prioritizing cybersecurity competency at every level of seniority. A rule proposed by the SEC in April of 2022, which requires stricter qualifications for cybersecurity expertise on boards and in senior management, is tentatively scheduled to be finalized by October 2023.  As organizations across all […]
The Changing Dynamics of Cyber Insurance_Goliath Cyber Security Group
For the last couple of years, insurance companies have become increasingly careful about underwriting cyber-insurance policies, making it harder for organizations to purchase policies at an affordable price point with the coverage level needed. It’s not difficult to figure out why insurers are hesitant, cyberattacks continue […]
Cyber Insurance Coverage Checklist_Goliath Cyber Insurance Group
These days, cybercrime is rampant. More businesses than ever before, regardless of size, face various security challenges that pose major threats such as an all-out data breach. Most organizations have heard about the daunting consequences of a data breach. So it’s no surprise that cyber insurance […]
How to Effectively Manage Cybersecurity Risk_Goliath Cyber Security Group
Implementing an effective risk management program is an essential component of defending against cyberattacks. In this article, learn how to develop a cybersecurity risk management framework and why doing so should be a top priority for Cybersecurity Leaders and Organizations as a whole. What Is Cybersecurity […]