Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by One Step. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by One Step or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

S3 EP 03 Retail Under Attack: Lessons from the Largest Data Breach in History

22:51
 
Share
 

Manage episode 484167631 series 3472133
Content provided by One Step. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by One Step or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

One Step Secure IT provides a range of specialized services including Cybersecurity, Managed/Co-Managed IT, Information Security, and Compliance, that enable businesses across the country to leverage technology as a competitive advantage and prioritize business growth. Contact us today: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form
Episode Chapters:
00:00 Episode outline
00:26 Welcome Episode
00:50 Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far?
04:27 This breach exposed highly sensitive data, including partial credit card details and loyalty points, which hackers could exploit for identity theft, financial fraud, and account takeovers. How these types of stolen data specifically pose risks—not just for customers, but also for retailers?
06:02 Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses?
08:49 How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage?
16:36 What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks?
21:58 Final Thoughts and Closing
Podcast Video One Step Secure IT - YouTube
Learn about our services https://www.onestepsecureit.com/
Host by:
Scott Kreisberg - CEO & Founder of One Step

Produced by Genesis Aquino
Music Production by Michael Stevens
----
LinkedIn:
https://www.linkedin.com/company/onestepsecureit/mycompany/

Facebook:
https://www.facebook.com/OneStepSecureIT

Twitter:
https://twitter.com/onestepsecureit

  continue reading

Chapters

1. Episode outline (00:00:00)

2. Welcome Episode (00:00:26)

3. Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far? (00:00:50)

4. How these types of stolen data specifically pose risks—not just for customers, but also for retailers? (00:04:27)

5. Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses? (00:06:02)

6. How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage? (00:08:49)

7. What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks? (00:16:36)

8. Final Thoughts and Closing (00:21:58)

20 episodes

Artwork
iconShare
 
Manage episode 484167631 series 3472133
Content provided by One Step. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by One Step or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

One Step Secure IT provides a range of specialized services including Cybersecurity, Managed/Co-Managed IT, Information Security, and Compliance, that enable businesses across the country to leverage technology as a competitive advantage and prioritize business growth. Contact us today: https://www.onestepsecureit.com/beyond-cyber-contact#beyond-cyber-contact-form
Episode Chapters:
00:00 Episode outline
00:26 Welcome Episode
00:50 Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far?
04:27 This breach exposed highly sensitive data, including partial credit card details and loyalty points, which hackers could exploit for identity theft, financial fraud, and account takeovers. How these types of stolen data specifically pose risks—not just for customers, but also for retailers?
06:02 Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses?
08:49 How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage?
16:36 What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks?
21:58 Final Thoughts and Closing
Podcast Video One Step Secure IT - YouTube
Learn about our services https://www.onestepsecureit.com/
Host by:
Scott Kreisberg - CEO & Founder of One Step

Produced by Genesis Aquino
Music Production by Michael Stevens
----
LinkedIn:
https://www.linkedin.com/company/onestepsecureit/mycompany/

Facebook:
https://www.facebook.com/OneStepSecureIT

Twitter:
https://twitter.com/onestepsecureit

  continue reading

Chapters

1. Episode outline (00:00:00)

2. Welcome Episode (00:00:26)

3. Unpacking Hot Topic Cyber breach. What happened with this breach. What do we know about the breach so far? (00:00:50)

4. How these types of stolen data specifically pose risks—not just for customers, but also for retailers? (00:04:27)

5. Hot Topic, Torrid, and Box Lunch are all larger businesses, but we tend to speak to more of the SMB entrepreneur is something like this still relevant to those size businesses? (00:06:02)

6. How to minimize the risk (compliance and policies), the impact (incident response plan), and the reputational damage? (00:08:49)

7. What exactly does double extortion entail, and should businesses be concerned about even more risks in these types of attacks? (00:16:36)

8. Final Thoughts and Closing (00:21:58)

20 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play