Ready to get started? Call us at (919) 348-4912 or contact us online for a free consultation.
The Cybersecurity & Compliance Podcast
Stay ahead of the latest cybersecurity threats, compliance requirements, and technology trends with expert insights from Craig Petronella and industry-leading guests. Whether you are a CISO, IT manager, business owner, or compliance officer, this podcast gives you the knowledge you need to protect your organization and meet regulatory demands.
Expert Cybersecurity Insights, Delivered Weekly
The "Cybersecurity & Compliance" podcast is hosted by Craig Petronella, CEO and Founder of Petronella Technology Group, a cybersecurity expert with over 22 years of experience protecting businesses from cyber threats. Each episode delivers actionable insights, expert analysis, and practical advice that helps listeners navigate the increasingly complex cybersecurity and compliance landscape.
Craig brings his real-world experience protecting over 2,500 companies to every conversation, sharing the lessons learned from incident response engagements, compliance audits, and security assessments that span every major regulatory framework. Whether the topic is a breaking ransomware attack, a new CMMC requirement, or an emerging AI-powered threat, Craig provides the context and guidance that listeners need to take immediate action.
The show covers a wide range of critical topics that matter to IT professionals, business owners, and compliance officers. Regular topics include CMMC readiness and certification, NIST 800-171 implementation, HIPAA security and compliance for healthcare, ransomware prevention and incident response, AI and machine learning in cybersecurity, identity theft protection, zero-trust architecture, and the evolving regulatory landscape that affects businesses across every industry.
Each episode features a mix of solo deep-dives by Craig, interviews with industry experts and practitioners, real-world case studies drawn from PTG's client engagements (with identifying details removed), and practical how-to guidance that listeners can implement in their own organizations. The show has built a dedicated audience of CISOs, IT managers, compliance officers, managed service providers, and business owners who rely on it as a trusted source of cybersecurity intelligence and strategic guidance.
New episodes are published weekly and are available on all major podcast platforms, including Apple Podcasts, Spotify, YouTube, and Google Podcasts. Whether you prefer to listen during your commute, at the gym, or at your desk, the "Cybersecurity & Compliance" podcast fits smoothly into your schedule and keeps you informed about the threats, technologies, and regulations that impact your organization.
Popular Episodes You Should Not Miss
From deep dives into compliance frameworks to breaking analysis of the latest ransomware campaigns, these featured episodes represent some of the most popular and impactful content from the "Cybersecurity & Compliance" podcast. Start here to get a taste of what the show offers, then subscribe on your favorite platform to never miss an episode.
CMMC 2.0: What Defense Contractors Need to Know Right Now
A comprehensive breakdown of the Cybersecurity Maturity Model Certification 2.0 framework, including the key differences from CMMC 1.0, the timeline for implementation, the three maturity levels, and the specific steps that defense contractors must take to achieve certification and maintain their government contracts. Craig walks through the 110 practices required for Level 2 certification and shares practical advice for organizations that are just beginning their CMMC journey.
Ransomware in 2024: Evolving Tactics and Defense Strategies
An in-depth analysis of how ransomware gangs have evolved their tactics, techniques, and procedures in recent years. Craig examines the shift toward double extortion and triple extortion models, the rise of ransomware-as-a-service (RaaS) platforms, the targeting of critical infrastructure and healthcare organizations, and the defensive measures that organizations must implement to protect themselves. Includes real-world case studies from PTG's incident response engagements.
HIPAA Compliance: The Complete Guide for Healthcare Practices
Everything healthcare practices need to know about HIPAA compliance, from conducting a thorough security risk assessment to implementing the technical safeguards required by the Security Rule. Craig covers common compliance gaps that he encounters during PTG's healthcare client assessments, the top violations that trigger OCR enforcement actions, business associate agreement requirements, and the steps that medical practices should take to ensure they are fully compliant.
AI-Powered Cyberattacks: How to Defend Against the Next Generation of Threats
An exploration of how artificial intelligence is being weaponized by cybercriminals to launch more sophisticated and harder-to-detect attacks. Craig discusses AI-generated phishing emails, deepfake voice and video attacks used for social engineering, automated vulnerability scanning, and the use of machine learning to evade traditional security controls. He also covers how PTG's own AI tools — Penny, Eve, ComplyBot, and Joe — fight fire with fire to detect and respond to AI-powered threats.
NIST 800-171 Rev 3: Understanding the Updated Requirements
A detailed walkthrough of the updated NIST 800-171 Revision 3 requirements and what they mean for organizations that handle Controlled Unclassified Information (CUI). Craig explains the key changes from previous revisions, maps the requirements to practical implementation steps, and provides guidance on how organizations can efficiently achieve and demonstrate compliance. Essential listening for anyone in the defense industrial base or working with federal agencies.
Identity Theft Prevention: Protecting Yourself and Your Business
Craig provides a comprehensive overview of the identity theft landscape and the practical steps that individuals and businesses should take to protect themselves. Topics include monitoring and freezing credit, securing social media accounts, recognizing phishing and social engineering attempts, dark web monitoring, and the emerging threats posed by data aggregation and AI-powered identity fraud.
Available on All Major Platforms
The "Cybersecurity & Compliance" podcast is available wherever you listen to podcasts. Subscribe on your preferred platform to get new episodes delivered automatically every week. You can also watch video versions of select episodes on our YouTube channel.
Apple Podcasts
Subscribe on Apple Podcasts for automatic downloads of every new episode. Rated 5 stars by cybersecurity professionals, IT managers, and business owners who rely on the show for weekly security insights and compliance guidance.
Spotify
Follow the show on Spotify and stream episodes on demand. Whether you are at the gym, in the car, or at your desk, Spotify makes it easy to stay current on the cybersecurity topics that matter most to your organization and career.
YouTube
Watch video versions of select episodes on the Petronella Technology Group YouTube channel. Video episodes include visual demonstrations, screen shares, and on-camera interviews with expert guests that add additional context to the audio content.
Google Podcasts
Access the show through Google Podcasts for seamless integration with your Google ecosystem. Episodes are indexed and searchable, making it easy to find specific topics, compliance frameworks, or security threats that you want to learn about.
Industry Leaders & Expert Guests
The "Cybersecurity & Compliance" podcast regularly features expert guests from across the cybersecurity and technology industries. These conversations bring diverse perspectives, specialized expertise, and real-world insights that complement Craig's own deep domain knowledge and 22+ years of experience in the field.
CISO & Security Leaders
Executive Security PerspectivesChief Information Security Officers and senior security leaders from organizations across healthcare, finance, defense, and technology share their experiences navigating complex threat landscapes, building security programs from the ground up, and making the business case for cybersecurity investment to executive leadership and boards of directors.
Compliance & Audit Experts
Regulatory & Framework SpecialistsCompliance professionals, auditors, and assessors specializing in CMMC, HIPAA, NIST, SOC 2, PCI DSS, and GDPR provide insider perspectives on the regulatory requirements that organizations must meet. These guests share practical advice on preparing for audits, common compliance pitfalls to avoid, and the evolving regulatory landscape.
AI & Machine Learning Researchers
Emerging Technology PerspectivesResearchers and practitioners working at the intersection of artificial intelligence and cybersecurity discuss the latest developments in AI-powered threat detection, natural language processing for phishing detection, adversarial machine learning, and the ethical considerations surrounding the use of AI in both offensive and defensive security operations.
Threat Intelligence Analysts
Frontline Threat InsightsThreat intelligence analysts and incident responders share their frontline experiences tracking threat actors, analyzing malware campaigns, and responding to active cybersecurity incidents. These episodes provide listeners with the tactical intelligence they need to understand the threats targeting their industries and the indicators of compromise they should be monitoring.
Business Leaders & Entrepreneurs
Business-Side Security InsightsCEOs, CTOs, and business leaders share their perspectives on the business impact of cybersecurity, the challenges of balancing security investment with business growth, and the lessons they have learned from their own experiences with cyber threats, compliance requirements, and technology transformation initiatives.
Government & Policy Experts
Policy & Legislation PerspectivesGovernment officials, policy advisors, and legal experts discuss the cybersecurity policies, legislation, and executive orders that are shaping the regulatory environment for businesses. These conversations help listeners understand the policy context behind compliance requirements and anticipate future regulatory changes that may affect their organizations.
Subscribe to the Cybersecurity & Compliance Podcast
Join thousands of IT professionals, business owners, and compliance officers who stay ahead of cybersecurity threats with expert insights from Craig Petronella. Subscribe on your favorite platform and get new episodes delivered automatically every week.
Why Choose Petronella Technology Group
Petronella Technology Group has been serving businesses in Raleigh, Durham, Chapel Hill, and the Research Triangle since 2002. With more than 2,500 businesses served across a wide range of industries, PTG provides the technology expertise and cybersecurity knowledge that organizations need to operate securely and efficiently in today's threat landscape.
PTG is led by Craig Petronella, a Licensed Digital Forensic Examiner, CMMC Registered Practitioner, and MIT Certified professional. Craig's leadership ensures that every PTG engagement is grounded in technical rigor and practical experience. PTG has held Better Business Bureau accreditation since 2003 and has been featured on ABC, CBS, NBC, FOX, and WRAL as a recognized cybersecurity authority.
Whether you need managed IT services, cybersecurity protection, compliance assistance, cloud solutions, or digital marketing support, PTG delivers comprehensive technology services under one roof. PTG's approach begins with understanding your business goals and risk profile, then designing solutions that align with your budget and growth plans. PTG is located at 5540 Centerview Dr Suite 200, Raleigh, NC 27606, and serves clients throughout North Carolina and beyond.
Frequently Asked Questions
Q: What services does Petronella Technology Group provide?
PTG provides managed IT services, cybersecurity, compliance consulting, cloud solutions, digital marketing, AI implementation, and digital forensics. PTG serves as a comprehensive technology partner, allowing businesses to access enterprise-grade IT and security capabilities without building large internal teams.
Q: How long has PTG been in business?
PTG was founded in 2002 and has served more than 2,500 businesses over more than two decades. PTG has been accredited by the Better Business Bureau since 2003. The company is led by Craig Petronella, a Licensed Digital Forensic Examiner, CMMC Registered Practitioner, and MIT Certified professional.
Q: What areas does PTG serve?
PTG is headquartered at 5540 Centerview Dr Suite 200, Raleigh, NC 27606, and primarily serves businesses in Raleigh, Durham, Chapel Hill, and the Research Triangle. PTG also works with organizations across North Carolina and other states, with many services available for delivery regardless of location.
Q: How can I get started with PTG?
The easiest way to get started is to call PTG at (919) 348-4912 or visit petronellatech.com/contact-us/ to schedule an initial consultation. PTG will discuss your current technology challenges, business objectives, and budget to recommend the right combination of services for your organization.
Q: Does PTG work with small businesses?
Yes. PTG has extensive experience working with small and medium-sized businesses across many industries. PTG understands the budget and resource constraints that smaller organizations face and designs solutions that deliver maximum protection and value within realistic budgets.
Take the Next Step With Petronella Technology Group
Whether you need managed IT services, cybersecurity protection, compliance consulting, cloud solutions, or digital marketing, Petronella Technology Group is ready to help. Since 2002, PTG has served over 2,500 businesses across the Research Triangle and beyond. Contact PTG today to schedule your consultation and discover how we can help your business thrive.