POPULARITY
Rinki Sethi is an experienced CISO (Chief Information Security Officer) and board member in the cybersecurity industry. In this episode, she joins Oz Alashe, founder and CEO at CybSafe, and host Scott Schober to discuss security awareness training and human risk management, including effective strategies, innovative approaches, and more. BEHAVE: A Human Risk Podcast is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com.
I det andra avsnittet från Almedalsveckan har vi nöjet att välkomna ytterligare tre spännande gäster till vår cyberhörna.Först ut är Anna Thulin, CISO (Chief Information Security Officer), och Jonas Yxfeldt, IT-Team Lead, från Destination Gotland. Vi kickstartar avsnittet med en diskussion om ledarskap inom cybersäkerhet! Vilka egenskaper är viktiga att ha? Vilka är de största utmaningarna i arbetet, och var börjar man om man vill ta sig an en ledarroll i denna snabbt växande sektor?Därefter ansluter sig Per Klingvall, rådgivningschef på Stöldskyddsföreningen, för att slå hål på några seglivade myter om att de endast arbetar med fysiska lås, och vi fördjupar oss i deras plattform Säkerhetskollen.se – där allmänheten kan vända sig för rådgivning inom just cybersäkerhet! Vi passar även på att ta reda på mer om digitala lås!Ett stort och varmt tack till våra tre gäster för deras engagerande, insiktsfulla och ytterst informativa bidrag till våra samtal här i Visby! Hosted on Acast. See acast.com/privacy for more information.
This episode aims to explore the dynamics and differences between C-level positions (such as CISO - Chief Information Security Officer) and the day-to-day operations within Application Security (AppSec). The episode kicks off with an introduction to the importance of cybersecurity in today's rapidly evolving digital landscape. The hosts then introduce their guest Yoad Fekete, an industry veteran with extensive experience in both executive leadership and hands-on AppSec roles.
Coffee Power: Tecnología, Desarrollo de Software y Liderazgo
Conversamos acerca de cómo ser un CISO exitoso y te entregamos herramientas clave para ascender en tu carrera como Chief Information Security Officer. Discutimos acerca de la formación y experiencia necesarias, el valor del compañerismo en seguridad y los desafíos actuales en este campo. Analizamos desde lo básico hasta estrategias avanzadas como el doble factor de autenticación y Security by Design. Además, echamos un vistazo a cómo la Generative AI está transformando el rol de CISO, ofreciendo consejos prácticos y visiones para prepararse para el futuro de la seguridad informática ✩ CURSOS DISPONIBLES
Bate papo com Paulo Breitenvieser Filho - Brazil Regional Director -TrellixSecurity, falamos sobre processo de segurança da informação, o papel do CISO Chief Information Security Officer e os dados da recente pesquisa da Trellix onde aponta que 96% dos CISOs lutam para obter o suporte necessário para serem resilientes contra ataques cibernéticos. Conheça a MIT Technology Reviewhttps://bit.ly/MITPapoCloud Entre no grupo Papo Cloud Makers Dicas de entrevistas na área de TI - Shark IT Podcast Roteiro do episódio em:papo.cloud/262 --------------------------------------------Instagram / Twitter: @papocloudE-mail: contato@papo.cloud--------------------------------------------Ficha técnicaDireção e Produção: Vinicius PerrottEdição: Senhor A - editorsenhor-a.com.brSupport the show: https://www.picpay.com/convite?@L7R7XH
In this episode of CHATTINN CYBER, Marc Schein interviews James Kim, the Vice President and Director of Cybersecurity Strategies and Programs at City National Bank in Florida, about the roles and responsibilities of a cybersecurity professional, leveling up into a CISO (Chief Information Security Officer) role, and managing cybersecurity risks in an organization. James begins by discussing his path to his current position, attributing his success to luck, ambition, and grit. He started as a help desk technician at a bank and worked his way up over the years, focusing on risk management and developing business acumen. He realized that there was a gap between the technical aspects of cybersecurity and business, which led him to focus on improving the relationship between the two areas. He believes that this focus on developing relationships and maintaining partnerships is critical to his role and cybersecurity more broadly. James's day-to-day responsibilities involve incident reviews, working with governance, risk and compliance teams, reviewing policies and controls, managing projects, and tracking various initiatives. He enjoys the variety of tasks and the opportunity to work across the entire spectrum of cybersecurity, including governance, risk and compliance, security architecture, identity and access management, and business continuity and vendor risk management. James discusses the future of the CISO role and where he sees himself in five years. He believes that the CISO role will continue to expand in prominence, with more emphasis on managing cybersecurity risks for the organization. He concludes the conversation by advising young professionals interested in cybersecurity to know the many different aspects of the field, including governance, risk and compliance programs, cybersecurity auditing, and security engineering and analysis. He also stresses the importance of work-life balance, given the challenging and stressful nature of the work. Highlights: “We all have similar responsibilities around maintaining a robust information security or cybersecurity program, ensuring that we have proper processes, procedures in place to report incidents; and at the end of the day, having the appropriate safeguards in place to protect client information or patient information.” “If you've been kind of following along with current events, I feel that within the next five years, the CISO role will continue to expand and gain more prevalence with management and the board.” Time-Stamps: [00:50] How did James get into cybersecurity? [02:38] James's day-to-day responsibilities as a security operations manager. [04:04] Working across the entire spectrum of cybersecurity. [06:06] Where do you see the Ceo role in five years? [08:07] How to promote awareness internally and externally within the organization. [10:13] Advice for young professionals trying to enter cybersecurity. [12:14] Challenges in the future of cybersecurity. Connect with James: LinkedIn: https://www.linkedin.com/in/james7kim/
Guest: Allison Miller, Faculty at IANS [@IANS_Security] and CISO (Chief Information Security Officer) and VP of Trust at Reddit [@Reddit]On LinkedIn | https://www.linkedin.com/in/allisonmillerOn Twitter | https://twitter.com/selenakyle____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, as part of our Chats on the Road series to Black Hat USA 2023 in Las Vegas hosts Sean Martin and Marco Ciappelli chat with Allison Miller to discuss the parallels and differences between the fraud and cybersecurity teams, focusing particularly on how each measures success and handles challenges. Sean highlights the fraud team's clear metric of money, starting and ending their processes with it, and contrasts it to the security team's reliance on metrics like MTTx (Mean Time to Detect, Respond, etc.). He's curious about how the fraud team optimizes their processes and wonders if there are lessons that security teams can glean from them.Allison appreciates the methodologies of fraud teams, especially their use of sampling to understand the magnitude of problems. She explains how fraud teams utilize backend data, machine learning, AI, and statistics to discern risk factors. Then, they test these models on forward-looking data, a methodology akin to red teaming in cybersecurity. She emphasizes the importance of continuous testing to ensure confidence in their detection capabilities. A point of difference she highlights is that fraud models have a high degree of confidence due to rigorous testing, while in cybersecurity, a lot of trust is placed on tool outputs without similar rigorous testing.Marco emphasized the importance of building trust among teams. He stated that without trust, metrics could be misleading, and the overall effectiveness of processes might decline. He urged teams to ensure that they not only trust the data but also their colleagues, suggesting that this trust fosters better communication, understanding, and ultimately, results.Sean expresses his wish for the cybersecurity world to be more integrated into applications, like the fraud teams are. Allison notes that fraud teams naturally fit into transaction processes because that's where money moves. For cybersecurity, the most natural integration point would be during authentication, but it's a risky move since blocking legitimate users would significantly impair their experience. Despite the challenges, Allison sees potential in fusion between fraud and security, especially in areas like API abuse. Both teams could benefit immensely from mutual collaboration in such areas.Allison concludes that while direct involvement of security teams within applications may be a stretch, collaboration with fraud teams can still provide valuable insights. For example, in the realm of retail and payment, insights into API abuse can be a significant area for cooperative efforts between the two teams.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____ResourcesFor more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Guest: Allison Miller, Faculty at IANS [@IANS_Security] and CISO (Chief Information Security Officer) and VP of Trust at Reddit [@Reddit]On LinkedIn | https://www.linkedin.com/in/allisonmillerOn Twitter | https://twitter.com/selenakyle____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, as part of our Chats on the Road series to Black Hat USA 2023 in Las Vegas hosts Sean Martin and Marco Ciappelli chat with Allison Miller to discuss the parallels and differences between the fraud and cybersecurity teams, focusing particularly on how each measures success and handles challenges. Sean highlights the fraud team's clear metric of money, starting and ending their processes with it, and contrasts it to the security team's reliance on metrics like MTTx (Mean Time to Detect, Respond, etc.). He's curious about how the fraud team optimizes their processes and wonders if there are lessons that security teams can glean from them.Allison appreciates the methodologies of fraud teams, especially their use of sampling to understand the magnitude of problems. She explains how fraud teams utilize backend data, machine learning, AI, and statistics to discern risk factors. Then, they test these models on forward-looking data, a methodology akin to red teaming in cybersecurity. She emphasizes the importance of continuous testing to ensure confidence in their detection capabilities. A point of difference she highlights is that fraud models have a high degree of confidence due to rigorous testing, while in cybersecurity, a lot of trust is placed on tool outputs without similar rigorous testing.Marco emphasized the importance of building trust among teams. He stated that without trust, metrics could be misleading, and the overall effectiveness of processes might decline. He urged teams to ensure that they not only trust the data but also their colleagues, suggesting that this trust fosters better communication, understanding, and ultimately, results.Sean expresses his wish for the cybersecurity world to be more integrated into applications, like the fraud teams are. Allison notes that fraud teams naturally fit into transaction processes because that's where money moves. For cybersecurity, the most natural integration point would be during authentication, but it's a risky move since blocking legitimate users would significantly impair their experience. Despite the challenges, Allison sees potential in fusion between fraud and security, especially in areas like API abuse. Both teams could benefit immensely from mutual collaboration in such areas.Allison concludes that while direct involvement of security teams within applications may be a stretch, collaboration with fraud teams can still provide valuable insights. For example, in the realm of retail and payment, insights into API abuse can be a significant area for cooperative efforts between the two teams.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____ResourcesFor more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Early in the podcast, there were plenty of stories of MacAdmins who had contentious relationships with security teams. We hear less and less of that every year. It still happens, but far less. We've had guests on to tell us how platform teams can work with infosec, but today we're joined by a CISO (Chief Information Security Officer) to give some tips coming from the other direction. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: TC Niedzialkowski - LinkedIn Transcript: Click here to read the transcript (brought to you this week by Alectrona) Sponsors: Kandji Kolide Alectrona Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson
An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITAL's own Eric Brown and Gretchen discuss topics including the day-to-day grind of advocating for funding and implementing security protocols, how to prioritize security needs and access risk on a budget, reporting structure, and how to effectively impact change within an organization. Chalk full of tips, Gretchen, has expertise in communicating organizational needs to decision makers and has some priceless nuggets to share with up-and-coming CISO's and those who work under their guidance. #cybersecurity #CISO #chiefinformationsecurityofficer #careeradvice #organizational #leadership #communication #security #influence #metropolitancouncil #minnesotajudicial #pointofrisk
Guest: Dana Linnet, President and CEO of The Summit Group DCOn LinkedIn | https://linkedin.com/in/dana-linnet-5bb2a85At RSAC | https://www.rsaconference.com/experts/Dana%20Linnet____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this Chats on the Road to RSA Conference podcast episode, former US diplomat Dana Linnet speaks about her transition from diplomacy to cybersecurity, highlighting her experiences and the lessons she learned along the way.Joining hosts Sean Martin and Marco Ciappelli, Linnet offers insights into how culture plays a crucial role in addressing cyber threats. She discusses her time as a government CISO (Chief Information Security Officer) and ISSO (Information System Security Officer), which began during the early days of cybersecurity. She also discusses her involvement in establishing the NATO Cybersecurity Center of Excellence (CCOE) in Estonia after the nation experienced cyber-attacks from neighboring Russia and how important it is for governments to listen to people who know more than they do about cybersecurity.As the conversation turns to the importance of culture in cybersecurity and how human behavior is a critical factor in preventing cyber-attacks, Linnet highlights the importance of information sharing, learning from digital threats, and adapting to the ever-changing cyber landscape. The hosts and Dana also discuss personal responsibility in cybersecurity and the need for leaders to take ownership of the problem.The conversation highlights Linnet's upcoming panel at RSA Conference. Focused on the topic of leadership culture in cybersecurity, the panel will dive into the role of boards and C-suites in leading and nurturing a security-conscious culture. The panel also touches on the value of diverse backgrounds in the cybersecurity industry, the challenges of changing culture, and how companies need to address the cultural gap between what they know and what they do.Tune in to learn from Linnet's experiences and get a fresh perspective on the intersection of cybersecurity, culture, and leadership. Don't forget to follow all of ITSPmagazine's RSA Conference coverage. Be sure to share and subscribe to Redefining CyberSecurity Podcast to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | How to Create a Breach-Deterrent Culture of Cybersecurity, from Board Down: https://www.rsaconference.com/USA/agenda/session/How%20to%20Create%20a%20BreachDeterrent%20Culture%20of%20Cybersecurity%20from%20Board%20DownLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
Guest: Dana Linnet, President and CEO of The Summit Group DCOn LinkedIn | https://linkedin.com/in/dana-linnet-5bb2a85At RSAC | https://www.rsaconference.com/experts/Dana%20Linnet____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this Chats on the Road to RSA Conference podcast episode, former US diplomat Dana Linnet speaks about her transition from diplomacy to cybersecurity, highlighting her experiences and the lessons she learned along the way.Joining hosts Sean Martin and Marco Ciappelli, Linnet offers insights into how culture plays a crucial role in addressing cyber threats. She discusses her time as a government CISO (Chief Information Security Officer) and ISSO (Information System Security Officer), which began during the early days of cybersecurity. She also discusses her involvement in establishing the NATO Cybersecurity Center of Excellence (CCOE) in Estonia after the nation experienced cyber-attacks from neighboring Russia and how important it is for governments to listen to people who know more than they do about cybersecurity.As the conversation turns to the importance of culture in cybersecurity and how human behavior is a critical factor in preventing cyber-attacks, Linnet highlights the importance of information sharing, learning from digital threats, and adapting to the ever-changing cyber landscape. The hosts and Dana also discuss personal responsibility in cybersecurity and the need for leaders to take ownership of the problem.The conversation highlights Linnet's upcoming panel at RSA Conference. Focused on the topic of leadership culture in cybersecurity, the panel will dive into the role of boards and C-suites in leading and nurturing a security-conscious culture. The panel also touches on the value of diverse backgrounds in the cybersecurity industry, the challenges of changing culture, and how companies need to address the cultural gap between what they know and what they do.Tune in to learn from Linnet's experiences and get a fresh perspective on the intersection of cybersecurity, culture, and leadership. Don't forget to follow all of ITSPmagazine's RSA Conference coverage. Be sure to share and subscribe to Redefining CyberSecurity Podcast to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | How to Create a Breach-Deterrent Culture of Cybersecurity, from Board Down: https://www.rsaconference.com/USA/agenda/session/How%20to%20Create%20a%20BreachDeterrent%20Culture%20of%20Cybersecurity%20from%20Board%20DownLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
Tue, 21 Mar 2023 08:15:00 +0000 https://idgtechtalk.podigee.io/79-frauen-in-der-security-mit-anne-katrin-viehoefer 16aee15932097ae57f79f2f6c04eaa5a Der Frauenanteil in der IT-Branche ist in Deutschland aktuell immer noch relativ gering. Das gilt besonders für die IT-Sicherheit. Welche konkreten Erfahrungen machen Frauen in diesem Bereich? In unserer neuen Episode des Podcast TechTalk von Computerwoche, CIO und CSO erzählt Anne-Katrin Viehoefer, wie es ihr als Frau in der IT-Security ergeht. Sie ist kaufmännische Leiterin bei Adva Network Security und war zuvor CISO (Chief Information Security Officer) bei Adva Optical Networking. Aber hören Sie selbst… full no CISO,IT-Security,Frauen,Diversity,Frauen in der IT,Cyberwomen Computerwoche, CIO & CSO
This episode of The Tech Trek explores the field of Information Security. Host Amir Bormand sits down with Rohit Parchuri, the Chief Information Security Officer of Yext, to discuss Rohit's background, experiences, and insights concerning the world of Cyber Security. Highlights 02:09 - Amir and Rohit briefly discuss the history of the CISO (Chief Information Security Officer) role. 06:23 - Rohit explains his strategies for building out Security Information teams. 10:14 - How do Security Architects fit into the Cloud Security pipeline? 14:12 - Rohit shares his insights on dealing with human issues versus technical issues. 21:52 - How to meet the needs of your team by anticipating potential challenges that may arise later. Guest: Rohit Parchuri is an accomplished Information Security executive with an established record building, structuring, and institutionalizing Cyber Security principles and disciplines in a variety of organizational domains. He is currently leading the Cybersecurity program at Yext, a bleeding-edge AI Search platform. In this role, Rohit is responsible for building and executing Cyber Security and Compliance program. In addition to his day job at Yext, Rohit serves as a Board Advisor for a multitude of technology companies and educational institutions. As a part of these roles, he assumes the responsibility of advising on Cybersecurity matters, market penetration, and product strategy while educating and assisting in curriculum building for the Cybersecurity executive degree program/s at CSU, California. Rohit graduated from Depaul University at Chicago with a Master's degree in Computer and Network Security Assurance, specializing in Application Security. He has also achieved a Master in Business Administration degree. Originally from India, Rohit is an avid hiker and tries his hand at tennis every chance he gets. LinkedIn: https://www.linkedin.com/in/rohit-parchuri/ Twitter: https://twitter.com/rohitparchuri ___ Thank you so much for checking out this episode of The Tech Trek, and we would appreciate it if you would take a minute to rate and review us on your favorite podcast player. Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)
Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit
Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit
Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit
Apple invests in satellite infrastructure, securing cloud services, CISO role deep-dive, and more. Amazon debuts Sparrow, a new bin-picking robot arm Aiphone bug allows cyberattackers to literally open (physical) doors FLIR redesigned its thermal camera to work with any mobile device World's top chipmaker eyes Arizona for new $12 billion semiconductor plant Apple to spend $450M in satellite services for iPhone 14's Emergency SOS Amazon and Microsoft cloud leaks highlight lingering misconfiguration issues Fastly CISO Mike Johnson on the role of CISO (Chief Information Security Officer) and how it has evolved Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Mike Johnson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: Melissa.com/twit itpro.tv/enterprise nordlayer.com/twit
“I see, I sow”.. said a podcaster once about CISO position. It's now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.
Dana Mantilia joins us this month to talk about cybersecurity awareness, her incredible YouTube channel, and the ever changing role of the CISO (Chief Information Security Officer). ** Links mentioned on the show ** Connect with Dana and subscribe to her YouTube Channel https://www.linkedin.com/in/dana-mantilia/ https://www.youtube.com/c/IdentityProtectionPlanningwithDana/videos ** Watch this episode on YouTube ** https://youtu.be/AWc5g2FAwMM ** Thank […] The post Interview with Dana Mantilia and the Role of the CISO appeared first on The Shared Security Show.
Fly the Plane is how https://www.linkedin.com/in/timothychester/ (Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia), characterizes his philosophy and approach to cybersecurity readiness. Dr. Chester spoke at length about a proactive approach to information security management anchored on strategic planning, senior leadership commitment, strong teamwork, sophisticated intelligence monitoring, and robust training and testing practices. His candor and reflection made for a most interesting conversation. Time Stamps 02:07 -- What is your take on cybersecurity preparedness? How do you approach readiness? 04:49 -- What are some cybersecurity blind spots? And how do you cope with them? 09:36 -- How do you ensure that your team has the latest experience and expertise in keeping up with these different evolving attack vectors? 12:51 -- What kind of help and support can you expect from the other business units, as well as the individual stakeholders, whether it's faculty members, whether it's students, what could or should they be doing to help secure the environment? 16:02 -- Anything that you'd like to add for people who are listening in, and who feel a little frustrated or let down that they don't see that level of active commitment from top management? 20:11 -- Now, there is a lot of research out there that speaks to the importance of customized training, that speaks to the importance of role-based training, training that shouldn't be one shot, because people often don't remember the first time what they were trained in. And then another aspect that often doesn't get addressed is how do you measure training effectiveness? 22:40 -- How do you customize cybersecurity communication and make it more effective? 25:46 -- From a faculty member's standpoint, what are some cybersecurity do's and don'ts? 27:08 -- Are you happy with the cybersecurity training exercises and rehearsals that are in place? Or can we do better? 30:46 -- Does the organization have a good structure and mechanism in place to process cyber intelligence? 34:53 -- Organizations seem to be struggling when it comes to identifying and using suitable cybersecurity performance measures. What's your take on that? 36:57 -- What would be some good rewards and incentive systems to achieve the desired cybersecurity behavior? 40:37 -- What are your thoughts about CISO (Chief Information Security Officer) empowerment? 46:47 -- Any final thoughts? Memorable Tim Chester Quotes/Statements "When we say fly the plane what we simply mean is through strong teamwork and strategic planning and foresight we try to think through constantly the types of scenarios that we could be facing; and we try to plan for the little bitty factors that probably aren't a high probability of occurring but could be high-impact if they do occur." "Our human desire to basically live through rote repetition and structure that's comfortable and unchanging leads us to be creatures of habit. Creatures of habit who are following the habits and rote behaviors typically find themselves in circumstances sometimes where the plane starts flying them and the way in which they react to that plane, become wilder and wilder swings that could lead to a disaster." ------------------------------------------------------------------------------------- Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ (https://www.linkedin.com/in/dchatte/ ) Website: https://dchatte.com/ (https://dchatte.com/) Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338...
On this episode of Dark Rhino Security's Security Confidential, hosts Manoj Tandon and Kevin Casey are joined by James Azar. James Azar is a CISO (Chief Information Security Officer) that works, leads, and is dedicated to the security and business mission to ensure the continuity and fluidity of cybersecurity within the business. In his experience, James has served as CTO, CIO, and CISO but his passion is the intersection of Security and Business where innovation and out of box thinking are needed to succeed. James is the host of the cybersecurity podcast The CyberHub and CISO Talk, and a new and noteworthy privacy podcast called Goodbye Privacy. James is a public speaker and event host that hosts the annual CyberHub Summit in Atlanta and has spoken in events across the globe from CyberTech Israel, RSA, Data Connectors, and has been published in Fox, OAN, AJC, ABC, and many more publications James has served on the Board of Advisors for the NTSC and currently serves as Vice President of Programming for AFCEA Atlanta Chapter, IAC (Israeli American Council) Eitanim Mentor, and works with the Veteran community as well as supports several Non-Profits. To learn more about James Azar visit https://www.linkedin.com/in/james-j-azar/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com To view the videocast visit https://youtu.be/IWRU0WJzs2E
Wes Spencer is the CISO (Chief Information Security Officer) of Perch Security, a cybersecurity startup that was recently acquired for $80 million. We discuss what cybersecurity looks like in practice, how hacks happen, and how Perch was acquired after starting just 3 years ago. Visit Perch at PerchSecurity.com Visit us at MiddleTechPod.com Twitter Instagram Facebook LinkedIn Evan's Twitter Logan's Twitter
¿Qué tiene que ver la cerveza con el hacking? La profesión de CISO (Chief Information Security Officer) puede resultar muy estresante debido a la cantidad de procesos y medidas de seguridad que las personas que ocupan este cargo deben controlar. En este episodio de ElevenPaths Radio hablamos sobre ciberseguridad, hacking y cerveza con Gonzalo Asensio, CISO de Bankinter y socio fundador de la cervza Hackers, de CiberBeers.
Mark Houpt of DataBank shares insights related to the staggering challenges faced by a modern datacenter CISO (Chief Information Security Officer). We discuss mitigation of security threats, navigating options for colocation facility services, and the importance of a disaster recovery plan tailored specifically to your organization.
En este programa nos visitaron dos viejos amigos, Angel Pablo Avilés a.k.a “Angelucho” CSSO Chief Security & Strategy Officer de SmartHumanCapital y Jose Ramon Monleón, CISO Chief Information Security Officer de una importante empresa de telecomunicaciones. Con ellos nos adentramos en las fugas de información uno de los temas más recurrentes en los análisis de riesgos de las compañías y de patente actualidad, pues raro es el día en el que no aparece una noticia en la que se hable de que una empresa ha sufrido una fuga de información. A mi me gusta mucho referenciar esta página en la que se puede ver de forma gráfica como en los últimos 10 o 15 años las fugas de información han sido cada vez más frecuentes y en ocasiones con datos especialmente sensibles. Con nuestros invitados pudimos hablar de este problema desde el punto de vista de un proveedor de soluciones de seguridad y desde el punto de vista de una gran empresa. Con ellos dimos un repaso a las principales causas de estos fallos como pueden ser discos duros o portátiles extraviados, insiders o trabajadores desleales o descontentos, malas configuraciones de seguridad o vulnerabilidades en el software que permiten a un atacante acceder a los datos de una compañía. +info: https://psaneme.com/ +info: https://psaneme.com/2020/07/03/fugas-de-informacion/
With all the attention on COVID-19 just now there is a risk we forget one of the other emerging risks of the last few years - cyber. But of course it's still very much a threat and, in some areas, growing. Most large companies will have their own CISO (Chief Information Security Officer) but for smaller or medium sized companies it's harder to be able to assess their exposure, understand how to reduce the risk and know what insurance options are available. Kynd was only founded two years ago by Andy Thomas (CEO) and Melanie Hayes (Chief Marketing Officer) but is already establishing its as one of the companies that SMEs can turn to, and brokers use, to assess and mitigate cyberrisk. In this episode Matthew Grant talks to Andy and Melanie to find out the cyber risk facing companies, how to manage it, what Kynd is offering and how it works. Areas covered include: A quick and free test for companies to assess their areas of potential exposure Statistics from the Kynd study of 200 of the UK AIM listed companies that reveals what their own cyber vulnerabilities are The Kynd "broker buddy" system to help brokers help their clients How and why the company has been able to scale up, and find clients so quickly To find out about companies building cyber models, head over to Episode 28 with our interview with Pascal Millaire. Find out what we are up to at Instech London at www.instech.london Sign up to our newsletter for a fresh view on the world every Wednesday morning Continuing Professional Development - Learning Objectives InsTech London is accredited by The Chartered Insurance Institute (CII). By listening to an InsTech London podcast, or reading the accompanying transcript, you can claim up to 0.5 CPD hours towards the CII member CPD scheme. Complete the InsTech London Podcast Feedback Survey to claim your CPD time.
Uno de los puestos de ciberseguridad más importantes y que más relevancia ha cobrado en los últimos años es el de CISO (Chief Information Security Officer), el director de seguridad de la información. La gestión, desarrollo y coordinación de acciones para mejorar la ciberseguridad de una organización es una tarea compleja y por ello es necesaria una figura que controle estos procesos. En esta ocasión hablamos con Juan Cobo, CISO Global de Ferrovial. Hablamos sobre el día a día de alguien que ocupa este cargo, sus responsabilidades y retos y cómo el CISO es un actor especialmente relevante para crear o cambiar la cultura de ciberseguridad de las empresas.
Join April and Kim as they talk with CISO (Chief Information Security Officer), Patrick Benoit to discuss the importance of password protection, data protection, and so much more. A true "for dummies" episode as Patrick makes the topic (and importance) of Cyber Security relatable to everyone.
Candy Alexander is the President of Information Systems Security Association. Ms. Alexander has 30 years of information security experience working for various high-tech companies. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a Virtual or Fractional CISO and Executive Cyber Security Consultant assisting companies large and small to improve their security programs through effective security initiatives. Full Show Notes: https://wiki.securityweekly.com/ES_Episode138 Visit https://securityweekly.com/esw for all the latest episodes!
Candy Alexander is the President of Information Systems Security Association. Ms. Alexander has 30 years of information security experience working for various high-tech companies. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a Virtual or Fractional CISO and Executive Cyber Security Consultant assisting companies large and small to improve their security programs through effective security initiatives. Full Show Notes: https://wiki.securityweekly.com/ES_Episode138 Visit https://securityweekly.com/esw for all the latest episodes!
You can not miss this! Wes Spencer is a seasoned CISO (Chief Information Security Officer) who’s currently working at Perch Security. In this podcast, we talk about some tips and tricks for security organizations of all sizes. Wes has some invaluable information for security technology buyers, so this is a must hear! For more information […]
In deze uitzending wordt het privacyboek 'Je hebt wél iets te verbergen' besproken. Verder een interview met Dick Brandt, expert op het gebied van informatiebeveiliging. Hij legt uit wat de privacy officer kan leren van de CISO (Chief Information Security Officer). Zie voor de shownotes: www.vka.nl/privacy-podcast.