Defending the Frontlines: The SC CIC 2025 Year in Review
This episode explores the 2025 achievements of the South Carolina Critical Infrastructure Cybersecurity (SC CIC) program, detailing how they proactively defend the state’s essential sectors against prevalent cyber threats
🎧 Listen to this Episode
Show Notes
The South Carolina Critical Infrastructure Cybersecurity (SC CIC) program actively defends the state's essential services from escalating digital threats like account compromise and double extortion ransomware. In 2025, the program expanded its reach to 326 participating organizations across 15 critical infrastructure sectors, offering free, proactive resources such as threat intelligence, vulnerability scanning, and readiness exercises. Join us as we explore how SC CIC equips local governments and vital facilities with the tools, grants, and training needed to stop cyberattacks before they disrupt critical daily operations.
www.breached.company/south-carolina-critical-infrastructure-cybersecurity-2025-year-in-review
Sponsors:
Packt Publishing
AI Defense in Action – Feb 21 (TODAY)
40% discount code: CISOMP40
Share this episode
Enjoying CISO Insights?
Subscribe to get new episodes delivered directly to your podcast app.
Related Episodes
Encrypted Extortion: Inside Latin America's Cybercrime Boom
This episode provides a comprehensive overview of the 2025 cybercriminal ecosystem in Latin America and the Caribbean, focusing on the surge of ransomware attacks, mobile banking trojans, and the expl...
▶️ Listen Now
The Ingredient List: Surviving the Supply Chain Crisis of 2025
As software supply chain attacks double and regulators enforce stricter transparency, we break down how CISA’s 2025 guidance and Zero Trust principles are redefining corporate resilience against threa...
▶️ Listen Now
Stop the Attack Cycle: Play Ransomware, Phishing, and the Power of MFA
This episode explores the aggressive tactics of professionalized criminal groups like Play ransomware, highlighting why layered defenses—especially strong MFA and rigorous patching—are essential for s...
▶️ Listen Now