PodcastsRank #29596
Artwork for Reduce Cyber Risk Podcast - Cybersecurity Made Simple

Reduce Cyber Risk Podcast - Cybersecurity Made Simple

TechnologyPodcastsNewsTech NewsENunited-statesDaily or near-daily
Rating unavailable
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform.  Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor.  Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats.  Shon weekly provides cyber security training topics covering: Insider Threat, Operational Technology (OT) Security, Cyber Security Awareness Training, Cyber Security Training for Employees, Cyber Security Courses for the CISSP, and much, much more.  You will receive immediate and actionable information that you can put into practice immediately to protect your business, no matter the size.  Need direct and immediate assistance, Shon can also provide you with his “high touch” consulting approach with his various cyber security services.
Top 59.2% by pitch volume (Rank #29596 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
Daily or near-daily
Episodes
193
Founded
N/A
Category
Technology
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: Under 4K / month
Canonical: https://podpitch.com/podcasts/reduce-cyber-risk-podcast-cybersecurity-made-simple
Cadence: Active weekly
Reply rate: Under 2%

Latest Episodes

Back to top

RCR 165: Security and Gap Assessments for SMBs

Mon Feb 02 2026

Listen

A single phish can take down an entire business, and too many small teams only discover that truth after it’s too late. We unpack how security and gap assessments give SMBs a clear, practical path to defend revenue, earn trust, and meet compliance without chasing shiny tools or boiling the ocean. We start with a cautionary tale: a young intruder reused stolen credentials, posted proof online, and exposed how everyday weaknesses become public and painful. From there, we translate the chaos into structure. You’ll hear the difference between a security assessment and a gap assessment, how to map your environment to NIST CSF, SOC 2, ISO 27001, HIPAA, PCI, or CMMC, and why most organizations don’t need “gold standard” everything—just strong fundamentals executed well. We outline a seven-phase plan that scales to your size, covering the twelve core domains from governance and access control to backups, incident response, vendor risk, and physical security. Expect concrete fixes you can start today: enable MFA on Microsoft 365 or Google Workspace, remove excess admin rights, test a full restore, patch critical systems, and publish an incident contact list. Then build momentum with a 90‑day sprint featuring EDR rollout, DKIM/DMARC hardening, phishing simulations, and an acceptable use policy. Over six to twelve months, segment networks, centralize logs, formalize vendor reviews, and write incident response plans. If you’re aiming for certifications or federal contracts, we break down when to DIY and when to bring in a fractional CISO or third-party assessor, plus how to judge partners by methodology, deliverables, and business fluency. By the end, you’ll know how to measure progress with real metrics—critical findings closed, MTTD/MTTR, phishing fail rates, audit results—and how assessments can reduce insurance premiums, win deals, and prevent ruinous incidents. If you’ve failed a customer questionnaire, seen premiums jump, had a near miss, or are moving into regulated markets, this is your signal. Subscribe, share with your team, and leave a review telling us the first control you’ll implement this quarter.

More

A single phish can take down an entire business, and too many small teams only discover that truth after it’s too late. We unpack how security and gap assessments give SMBs a clear, practical path to defend revenue, earn trust, and meet compliance without chasing shiny tools or boiling the ocean. We start with a cautionary tale: a young intruder reused stolen credentials, posted proof online, and exposed how everyday weaknesses become public and painful. From there, we translate the chaos into structure. You’ll hear the difference between a security assessment and a gap assessment, how to map your environment to NIST CSF, SOC 2, ISO 27001, HIPAA, PCI, or CMMC, and why most organizations don’t need “gold standard” everything—just strong fundamentals executed well. We outline a seven-phase plan that scales to your size, covering the twelve core domains from governance and access control to backups, incident response, vendor risk, and physical security. Expect concrete fixes you can start today: enable MFA on Microsoft 365 or Google Workspace, remove excess admin rights, test a full restore, patch critical systems, and publish an incident contact list. Then build momentum with a 90‑day sprint featuring EDR rollout, DKIM/DMARC hardening, phishing simulations, and an acceptable use policy. Over six to twelve months, segment networks, centralize logs, formalize vendor reviews, and write incident response plans. If you’re aiming for certifications or federal contracts, we break down when to DIY and when to bring in a fractional CISO or third-party assessor, plus how to judge partners by methodology, deliverables, and business fluency. By the end, you’ll know how to measure progress with real metrics—critical findings closed, MTTD/MTTR, phishing fail rates, audit results—and how assessments can reduce insurance premiums, win deals, and prevent ruinous incidents. If you’ve failed a customer questionnaire, seen premiums jump, had a near miss, or are moving into regulated markets, this is your signal. Subscribe, share with your team, and leave a review telling us the first control you’ll implement this quarter.

Key Metrics

Back to top
Pitches sent
11
From PodPitch users
Rank
#29596
Top 59.2% by pitch volume (Rank #29596 of 50,000)
Average rating
N/A
Ratings count may be unavailable
Reviews
N/A
Written reviews (when available)
Publish cadence
Daily or near-daily
Active weekly
Episode count
193
Data updated
Feb 10, 2026
Social followers
N/A

Public Snapshot

Back to top
Country
United States
Language
English
Language (ISO)
Release cadence
Daily or near-daily
Latest episode date
Mon Feb 02 2026

Audience & Outreach (Public)

Back to top
Audience range
Under 4K / month
Public band
Reply rate band
Under 2%
Public band
Response time band
Private
Hidden on public pages
Replies received
Private
Hidden on public pages

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
N/A
Contact available
Yes
Masked on public pages
Sponsors detected
Private
Hidden on public pages
Guest format
Private
Hidden on public pages

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
s***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch Reduce Cyber Risk Podcast - Cybersecurity Made Simple

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #29596 by pitch volume, with 11 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
Rating unavailable
RatingsN/A
Written reviewsN/A

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About Reduce Cyber Risk Podcast - Cybersecurity Made Simple

Back to top

What is Reduce Cyber Risk Podcast - Cybersecurity Made Simple about?

Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform.  Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor.  Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats.  Shon weekly provides cyber security training topics covering: Insider Threat, Operational Technology (OT) Security, Cyber Security Awareness Training, Cyber Security Training for Employees, Cyber Security Courses for the CISSP, and much, much more.  You will receive immediate and actionable information that you can put into practice immediately to protect your business, no matter the size.  Need direct and immediate assistance, Shon can also provide you with his “high touch” consulting approach with his various cyber security services.

How often does Reduce Cyber Risk Podcast - Cybersecurity Made Simple publish new episodes?

Daily or near-daily

How many listeners does Reduce Cyber Risk Podcast - Cybersecurity Made Simple get?

PodPitch shows a public audience band (like "Under 4K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch Reduce Cyber Risk Podcast - Cybersecurity Made Simple?

Use PodPitch to access verified outreach details and pitch recommendations for Reduce Cyber Risk Podcast - Cybersecurity Made Simple. Start at https://podpitch.com/try/1.

Which podcasts are similar to Reduce Cyber Risk Podcast - Cybersecurity Made Simple?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact Reduce Cyber Risk Podcast - Cybersecurity Made Simple?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.