POPULARITY
How Privacy-Enhancing Technologies (PETs) can safeguard data in an AI-driven world. As organizations increasingly rely on AI, concerns around data privacy, security, and compliance grow. PETs provide a technical safeguard to ensure sensitive information remains protected, even in the most advanced AI applications. With new regulations like the EU AI Act, organizations must adopt privacy-first strategies. PETs are a critical tool to ensure AI transparency, fairness, and trust while maintaining regulatory compliance.Our guest, Jetro Wils, cybersecurity expert and researcher, breaks down how PETs help organizations de-risk AI adoption while ensuring privacy, compliance, and security.Watch now to discover how PETs can help you build digital trust and secure AI-powered innovations!KEY CONVERSION POINT 00:01:33 How would you define digital trust?00:02:32 What is Privacy Enhancing Technology?00:04:21 Why do we need PET when we have laws and principles?00:10:19 Kind of AI risk that can also be mitigated by these PETS00:15:12 How would a PET de-risk that in an AI adoption situation ABOUT GUEST Jetro Wils is a Cloud & Information Security Officer and Cybersecurity Advisor, dedicated to helping organizations operate securely in the cloud era. With a strong focus on information security and compliance, he enables businesses to reduce risk, strengthen cybersecurity frameworks, and achieve peace of mind.With 18 years of experience in Belgium's tech industry, Jetro has held roles spanning software development, business analysis, product management, and cloud specialization. Since 2016, he has witnessed the rapid evolution of cloud technology and the growing challenge organizations face in securely adopting it. Jetro is a 3x Microsoft Certified Azure Expert and a 2x Microsoft Certified Trainer (2022-2024), conducting 10-20 certified training sessions annually on cloud, AI, and security. He has trained over 100 professionals, including enterprise architects, project managers, and engineers. As a technical reviewer for Packt Publishing, he ensures the accuracy of books on cloud and cybersecurity. Additionally, he hosts the BlueDragon Podcast, where he discusses cloud, AI, and security trends with European decision-makers.Jetro holds a professional Bachelor's Degree in Applied Computer Science (2006) and is currently pursuing a Master's in IT Risk and Cybersecurity Management at Antwerp Management School (2023-2025). His research focuses on derisking AI adoption by enhancing AI security through Privacy Enhancing Technologies (PETs). He is also a certified NIS 2 Lead Implementer working toward a DORA certification. ABOUT HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts.As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com, www.punitbhatia.com, https://www.linkedin.com/in/jetrow/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Theresia ist Consultant im Bereich Cyber Security & IT Risk bei PwC. Im Stellenanzeigenpodcast sprechen wir darüber, welchen technologischen Risiken die Kunden ausgesetzt sind, ob auch ein Quereinstieg möglich ist und wieso Theresia “eine schöne Teamkultur” als PwC Benefit bezeichnet. Theresias Job klingt spannend? Hier geht's zur Stellenanzeige: ► https://t1p.de/1yz54 Wir freuen uns auf deine Bewerbung!
In this week's episode of CISO's Secret, Cyber Security Evangelist Grant Asplund hosts Aman Raheja - CISO, IT Risk & IT VMO at Humana Since 1961, Humana has been committed to helping people live healthy and happy.Their approach is simple—offer personalized care from people who care. Humana do this by listening to their members and creating solutions to help them reach the best version of themselves.CISO's Secrets Podcast is powered by Infinity Global Services (IGS).Visit CISO ACADEMY to access additional learning opportunities for C level executives
Guest: John Sapp , VP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]On Linkedin | https://www.linkedin.com/in/johnbsappjr/On Twitter | https://www.twitter.com/czarofcyber____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this episode of Redefining Cybersecurity, hosted by Sean Martin, listeners are invited to explore the complex landscape of cyber risk governance. John Sapp, a seasoned professional in risk management, emphasizes the importance of defining cyber risk from the perspective of various executives. The CIO, CFO, COO, and general counsel each own different aspects of risk within an organization, and understanding their perspectives is key to effective risk management.The conversation takes an intriguing turn as John introduces the concept of approaching cyber risk governance as a product. This involves understanding the desired outcomes, defining the requirements, and creating personas for different stakeholders. The aim is to develop a common pane of glass, a unified perspective through which each persona can access near real-time information to make informed decisions.John also underscores the importance of presenting information to various stakeholders, including the board and cyber insurance carriers, in a way that demonstrates the strength of the organization's cyber risk program. This approach has tangible benefits, such as a reduction in cyber insurance premiums based on the strength of the cyber risk program.The episode concludes with a discussion on the importance of collective decision-making in managing cyber risk. John emphasizes that it's not about presenting some information and giving somebody responsibility to make a decision, but rather about presenting information in different ways to all the different personas to spur a conversation so that the team can determine the best path forward.This episode is a must-listen for anyone interested in understanding how to approach cyber risk governance in a way that is both effective and efficient. It provides valuable insights into how to manage risk in an ever-evolving digital world.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: John Sapp , VP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]On Linkedin | https://www.linkedin.com/in/johnbsappjr/On Twitter | https://www.twitter.com/czarofcyber____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this episode of Redefining Cybersecurity, hosted by Sean Martin, listeners are invited to explore the complex landscape of cyber risk governance. John Sapp, a seasoned professional in risk management, emphasizes the importance of defining cyber risk from the perspective of various executives. The CIO, CFO, COO, and general counsel each own different aspects of risk within an organization, and understanding their perspectives is key to effective risk management.The conversation takes an intriguing turn as John introduces the concept of approaching cyber risk governance as a product. This involves understanding the desired outcomes, defining the requirements, and creating personas for different stakeholders. The aim is to develop a common pane of glass, a unified perspective through which each persona can access near real-time information to make informed decisions.John also underscores the importance of presenting information to various stakeholders, including the board and cyber insurance carriers, in a way that demonstrates the strength of the organization's cyber risk program. This approach has tangible benefits, such as a reduction in cyber insurance premiums based on the strength of the cyber risk program.The episode concludes with a discussion on the importance of collective decision-making in managing cyber risk. John emphasizes that it's not about presenting some information and giving somebody responsibility to make a decision, but rather about presenting information in different ways to all the different personas to spur a conversation so that the team can determine the best path forward.This episode is a must-listen for anyone interested in understanding how to approach cyber risk governance in a way that is both effective and efficient. It provides valuable insights into how to manage risk in an ever-evolving digital world.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
More than 90% of respondents to Kyndryl's 2023 State of IT Risk study say their organizations had IT systems or data compromised in the past two years. And 88% of the respondents feel their organization is well prepared to manage and recover from such events. Is the confidence justified, particularly given the growing diversity and frequency of IT risks?Listen as our experts discuss the risks that C-Suite executives face in preparing their organizations for the unplanned. Hear their point of view.
216: How Your Nonprofit Can Benefit from a Digital Transformation (Bob Green)SUMMARYWhat does digital transformation mean for nonprofits? In episode #216 of Your Path to Nonprofit Leadership, strategic IT expert Bob Green explains how digital transformation is a pathway for nonprofit organizations to succeed by increasing overall efficiency, facilitating donor and volunteer relationships, and improving communications to reach wider audiences. He shares how incorporating new technologies in the workplace benefits nonprofits and their employees by eliminating redundancies, automating tasks, and allowing team members to focus on work that makes the most significant impact. Bob also lays out keys to effective IT governance for nonprofit leaders. ABOUT BOBBob Green, CPA, CITP, CGMA is Lead Partner for SingerLewak's "SL Business Informatics" advisory practice. His team is retained as trusted, independent advisors to help achieve the benefits of strategic IT planning and direction for growing organizations. Their skills include comfort with complex projects around ERP, CRM and other application types, Cybersecurity and ongoing Cybersecurity Program management, IT Audit and Assurance (SOX, SOC), IT Risk, IT project rescue, and others. Bob's background combines CPA, CFO, Consulting and Technologist skills, as applied to challenges faced by many industries including non-profits of many varieties and complexities (501c3, 501c4 and 501c6) as well as entertainment, technology, government, food and beverage, medical devices and cosmetics, and others. Bob spent 8 years at PWC, later became a CFO, and is a frequent speaker and presenter at AICPA and other professionally sponsored education conferences and produces podcasts and articles regularly. In his spare time, he organizes hiking experiences, volunteers in the non-profit space and enjoys time with his family in the Los Angeles area. EPISODE TOPICS & RESOURCESWho Moved My Cheese? An A-Mazing Way to Deal with Change in Your Work and in Your Life by Spencer Johnson, M.D.Learn more about Bob and SingerLewak hereFor additional resources visit Foresight-SLBICheck out Patton's new book Your Path to Nonprofit Leadership: Seven Keys to Advancing Your Career in the Philanthropic Sector
In this episode you will hear Hamid's insights on IT Risk, and the strategies around IT Risk Management. Hamid Raja is an IT Audit, Security, Governance, Risk and Compliance Expert and a Speaker. He has 9+ years of IT security, compliance, governance, and auditing experience; 2+ years of IT process engineering skills; and 6+ years of IT operations and infrastructure experience amongst other experiences and skill sets. Currently he is working at Gulf Warehousing Company. If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.
On this episode of Today's Top Leaders, you get to hear from one of Jen's clients who discovered his personal brand while consulting with Jen. Adrian shares some insights about how he's leveraging his personal brand as a tech leader.Bio of Adrian Thibodeau:Adrian has an impressive tech leader bio (this is going to make you want to listen in to see how he's leveraging his personal brand to be a great leader!!)Adrian currently serves as a Managing Director, Global Head of Quality Engineering, for S&P Global Ratings Services. In his role, he is responsible for leading a global QA team, evolving QA strategy, advancing automation, expanding test coverage, and enriching staff development. In nearly 18 years at S&P, Adrian has filled a number of Data and Technology roles, including responsibilities in Program Management, IT Risk & Compliance, Data Operations, Data Quality, and IT Vendor Management. Adrian holds certifications of Six Sigma BPM Green Belt, TMMi Professional, and Scrum Master. He attained his BA in Economics from Boston College and an MBA of Finance and Operations Management from the NYU Stern School of Business. His personal brand statement is “Possibilities & Opportunities”.For more information about how you can become the tech leader everyone wants to work for, go to www.TodaysTopLeaders.com.See omnystudio.com/listener for privacy information.
Privacy & Compliance expert from Microsoft, Ingrid Rodriguez, joins hosts Jerich Beason& Whitney McCollum to discuss taking risk out of silos. They talk about how the entire organization needs to have understanding of the enterprise risks. Specifically, how does security & compliance fit into the enterprise risk framework? What are the situational perspectives of the C-Suite and how can those perspectives drive compliance goals? How can the CISO and legal work together and with the enterprise for compliance? They will also talk about risk appetite, the tolerance of risk by leadership, and aligning acceptance of risks with business goals. How much and how often should you communicate risks and mitigation strategy? Note: “The statements of the guest speakers and hosts in this podcast should not be construed as legal advice. They represent their views only and not those of Epiq or their respective employers.”BIOGRAPHYIngrid is an Advanced Compliance Global Black Belt with Microsoft Security Solutions Area supporting the South, Southeast of the US, and LATAM regions. In her role, Ingrid shares her enterprising multinational information and security risk management executive experience, to help customers strategize within their Risk and Compliance obligations leveraging our solutions in Compliance, Information Protection, Privacy Management, and Insider Threat management capabilities. During her 18 years tenure in IT Risk & Compliance Leadership, Ingrid designed for an innovative Global Technology Risk Management Framework, as well as a vision for tactical implementation of technology and security controls by combining a variety of data security standards such as: NIST, ISO, PCI, HIPAA, FFIEC, GDPR, to mention a few. Ingrid designed and built the first Global Technology Risk Management programs in most of her previous employers. She lead, supported and guided over 45 countries to meet US and country-level compliance and privacy needs and well as Global Standards. Ingrid is from Puerto Rico, based in Dallas, TX but soon relocating to beautiful Pensacola, FL. She is a frequent speaker on Risk Management and Compliance topics, in both languages English and Spanish, in many global, national and regional events including ISACA, Microsoft Executive Briefing Center, Fintech, Partners and many other associations and affiliations within the Privacy, Risk and Compliance industry in the US and LATAM. Ingrid received a Bachelor's Degree in Computer Engineering from the University of Puerto Rico, and also holds a Master's Degree in Sciences, Computer Sciences from the University of Phoenix. She holds various industry certifications, including CRISC, CDPSE, ITIL among others. LinkedIn: https://www.linkedin.com/in/inrodz/ Find us on LinkedIn, Twitter, Facebook, and Instagram or email us at cyberside@epiqglobal.com.
Josh Grossman has over 15 years of experience in IT Risk and Application Security consulting, and he has also worked as a software developer. He currently works as CTO for Bounce Security, where he focuses on helping organizations build secure products by providing value-driven Application Security support and guidance.In his spare time, he is very involved with OWASP. He is on the OWASP Israel chapter board, he is a co-leader of the OWASP Application Security Verification Standard project, and he has contributed to various other projects as well, including the Top 10 Risks, Top Ten Proactive Controls and JuiceShop projects. We hope you enjoy this conversation with...Josh Grossman.
In this episode we speak with Joseph Nguyen about the importance of terps, cannabis and coffee. Joey is a consultant for a large accounting and advisory firm in Center City, Philadelphia. Another one of his many hats is his role as CEO of Captain Terps Infusions, a cannabis-infused beverage company. Graduating from Temple in 2020 with a degree in Business Administration & International Business, he now hopes to better the lives of others through his diverse types of work – ranging from the art space, to IT/ Risk consulting, and cannabis. Follow Joey on Instagram: @therealjoeynguyen @captain_terps_infusions Follow Joey on Twitter: @thejoeynguyen Follow Katie on Instagram: @Ktokes_ @DoobieGay Follow Puf on Instagram: @PufPod @PufCreativ Learn more about the PufCreativ Podcast and their cannabis marketing services by visiting: https://pufcreativ.com/
The three biggest threats to business resilience are IT Risk, Compliance Risk, and Vendor Risk. Integrated Risk Management Platforms address these risks. KuppingerCole's Lead Analyst Paul Fisher has analyzed this market segment recently and he joins Matthias to talk about recent developments and the market in general.
The three biggest threats to business resilience are IT Risk, Compliance Risk, and Vendor Risk. Integrated Risk Management Platforms address these risks. KuppingerCole's Lead Analyst Paul Fisher has analyzed this market segment recently and he joins Matthias to talk about recent developments and the market in general.
A few weeks before baby CISO made his grand entrance, I hosted a live podcast with my good Friend Kevin Gowen, CISO at Synovus and Andrew Barnett, Chief Strategy Officer at Cymulate joined me to discuss how Tech and Security meet and how as partners we need to solve the latest challenges and technology evolutions to the new security challenges. Bio: Andrew Barnett A Cyber Security leader with over 15 years of experience, Andrew has built a career combining business, technical, and sales acumen. As chief strategy officer, he leads Cymulate's go-to-market partnerships, technology alliances and product strategy. Previously, Andrew was a Senior Manager in Deloitte's Cyber Risk Services Practice, leading IT Risk and Security management consulting services for Fortune 500 clients and building Deloitte's Breach and Attack Simulation solutions. Prior roles include serving as VP of Business Development at Verodin (now Mandiant Security), and Senior Director of Portfolio Programs at Optiv where he served as a technical advisor for M&A activities and co-developed security strategies for The Blackstone Group and its investment portfolio. Andrew began his career building networks for companies like McKesson and News Corp and holds his BS in Electrical Engineering from Southern Methodist University. CISO Talk is supported by these great partners please make sure to check them out: Cymulate: For companies that want to assure their security against the evolving threat landscape. Cymulate SaaS-based Continuous Security Validation automates security risk assessments end-to-end, enabling them to challenge, assess and optimize their cyber-security posture simply and continuously. Because security professionals need to know and control their dynamic environment. KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub **** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, and Other Side of Cyber James on Linkedin: https://www.linkedin.com/in/james-j-azar/ James on Parler: @realjamesazar Telegram: CyberHub Podcast Locals: https://cyberhubpodcast.locals.com ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen Here: https://linktr.ee/CISOtalk The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Marcos Marrero is an IT Risk & Information Security professional with 20+ years of experience establishing and managing IT Risk […]
Jonathan Rowbotham joins Tony on the virtual sofa in Episode #37 of the Inside Track podcast. Submit your questions If you would like to clarify anything with either Tony or Jonathan make a comment below or drop Tony an email. We will respond. About Tony Lockwood After a 25 year career delivering change and transformation, Tony launched The Transformation Leaders Hub (#TLH) in 2020. #TLH's core focus is to help members to standout from the crowd, build their network with their peers and open up new career opportunities. Tony can be contacted by email at tl@thompsonwrightpartners.com About Jonathan In his 20+ years' experience of delivering programmes targeting IT Cost and Risk for large financial services, he has on nine separate occasions enabled IT Cost reductions averaging $50m and optimised IT Risk levels resulting in significantly reduced audit issues and zero regulatory fines. His Linkedin profile is here and his #TLH profile is here About #TLH The Transformation Leaders Hub - a truly global peer to peer network for change and transformation professionals. Check it out here. w: www.thetransformationleadershub.com w: www.thompsonwrightpartners.com
Free for all listeners: The Ultimate Guide to Automatic BookkeepingOn this episode, I chat with Pat Moran, Partner, and Head of Cyber Crime and IT Forensics at PwC.Pat started his career at AIB, before moving to Arthur Anderson, where he was a Director of IT Risk and Security, right up until the global collapse of the firm, subsequent to the Enron scandal.Pat found himself in a new home over at EY, where he became a partner and eventually moved to PwC in 2016.This interview will be particularly interesting to anyone who owns their own business, as Pat talks us through what it's like, running a large client-services business, as part of a global organisation.We also talk about IT Security and the steps that business owners can take to protect themselves against cyber attacks.Pat was asked to speak at the international Ted conference in Monte Carlo, and you can watch his talk here: https://www.youtube.com/watch?v=JbF-z7btahgConnect with Pat via LinkedIn here: https://ie.linkedin.com/in/patmoran2 Irish Business Builders is brought to you by Jetbooks. Jetbooks provides online bookkeeping services for Irish Businesses. For a free 15 minute online consultation, visit www.jetbooks.ie
Welcome to Global Legal Engineer, a podcast hosted by Lexeprint. Join co-founder Daniel Garrie and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve, as they revisit the topic of vendor risk management in light of the recent SolarWinds breach. SolarWinds sells network monitoring services to many large corporations and government agencies. Earlier this year, bad actors inserted malware into a software update for one of SolarWinds’ products, Orion. This event resulted in significant network breaches of important government agencies such as the US Treasury, Department of State, and the National Nuclear Security Administration. In this episode, Daniel and David will debate the best ways to assess vendors given this major breach and the issues that may arise for small and large businesses.
Lori Sussman, Assistant Professor in the Department of Technology at the University of Southern Maine, Phyllis Woodruff, Vice President, IT Risk and Compliance at Global Payments, Inc., and Tammy Schuring, Vice President and Global Leader, Voltage Data Privacy and Protection, at Micro Focus, discusses the challenges women in tech face, how to overcome them, and how to own your superpowers.
Welcome to Global Legal Engineer, a podcast hosted by Lexeprint. Join co-founder Daniel Garrie and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve, for a discussion on the field of global legal engineering. In this episode, Daniel and David will examine what constitutes a good Legal Engineer and how the position will evolve as more complicated AIs are developed.
In this episode of CISO Talk, James Azar hosts Grae Meyer-Gleaves, CISO at Hollard Insurance joins the show to talk about the cybersecurity talent pipeline and how internal training is critical to fill cybersecurity job gaps. Grae talks about attitude, problem solving and hard work as well as sharing the complexity on the supply chain. Grae shares how education, awareness and training are creating cyber resiliency within the human workforce. Tune in to this amazing podcast and make sure to subscribe and comment Bio: Over 20 years experience across multiple industries in ICT leadership, consulting and management. Specialising in information security, risk management, business continuity, disaster recovery, infrastructure and architecture. Held senior positions with leading Global and Australian organisations such as Allianz, Fortinet, Westpac, QGC – A BG-Group business, BoQ, Data#3, Brisbane City Council and Wesley Mission Queensland. Career started with the Australian Army. Recent achievements include: • Implementation of full lifecycle threat and risk management for 3rd parties. Assessment, contracts (cyber terms) and attestation; • Establishment of an ANZ Security Operations and Intelligence Centre; • Gamified education and awareness programs including traditional supporting elements; • Leadership & management teams of people during crisis and incidents; and • Established and grown IT Risk, Compliance and Security teams & capabilities. Linkedin Profile: https://www.linkedin.com/in/graem/ CISO CONVERSATION WEBINAR SERIES: https://mailchi.mp/cyberhubpodcast/whistic-webinar The Practitioner Brief is sponsored by: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub Whistic: www.whistic.com/cyberhub Whistic Solarwinds survey: https://www.whistic.com/solarwinds **** Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast The Hub of the Infosec Community. Our mission is to provide substantive and quality content that's more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Too many companies key services go down and cannot be recovered at the speed to meet their business need, often not considering their appetite for business risk or reflecting their IT Risk stance. Consider the retailer who wants their website back up in 5 minutes and yet they have an 8 hour SLA on the hardware and a 16-hour database rebuild.The impact from outages is real and is often both human and financial. The harsh reality is that we are unable to travel, unable to access money, and even worse, hospitals cannot treat patients and we need to create real Operational Resilience.This session explores how an operational resilience strategy is used to mitigate the impact of IT disruption on the business. It will focus on the risks you need to identify in order to protect applications and data; exploring how to perform a recovery in a fast, reliable and scalable way.Discussion PointsThe basic elements of operational resilience to focus on and common deterrentsThe challenges and barriers in achieving operation resilience (e.g Multicloud, skills, security, hybrid IT)The root cause of outages with the biggest impact to businessesThe overall impact of cyber threats in terms of time, cost and reputational damageRealistic steps businesses can take to avoid being in the news about a data breachSpeakers: Lee Howard, Head of IT Security, Risk & Shared Services @ N Brown GroupFlick March, Security & Resilience Director, Europe @ IBMRaj Samani, Chief Scientist @ MCAfeeDan Burns, Head of Cyber Security Operations @ Next PLCSimon Langley, CISO @ Covea Insurance
Jim and Jeff talk with David Doret, IT Risk & Cybersecurity: IAM & PAM Manager at BNP Paribas, and founder of the Open-Measure project about the initiative and his upcoming research about measuring IAM performance. Be sure to connect and follow David on LinkedIn to be notified when his research will be made publicly available. Show Links: Connect with David Doret: https://www.linkedin.com/in/daviddoret/ Open-Measure website: https://open-measure.atlassian.net/ Ping Identity Identify 2020 Virtual Conference: https://www.pingidentity.com/en/events/identify.html Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at www.IdentityAtTheCenter.com and follow @IDACPodcast on Twitter. Brought to you by identropy.com --- Send in a voice message: https://anchor.fm/identity-at-the-center/message
Welcome to Global Legal Engineer, a podcast hosted by Law & Forensics. Join co-founder, Daniel Garrie, and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve for a discussion on managing organizational cyber risks in the context of the COVID-19 pandemic.
Welcome to Global Legal Engineer, a podcast hosted by Law & Forensics. Join co-founder, Daniel Garrie, and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve for a discussion best practices for managing cybersecurity risks while working from home. As a large portion of the US, and international, workforce continues to stay home in the midst of the COVID-19 pandemic, can you be sure your organization and sensitive data is protected?
Welcome to Global Legal Engineer, a podcast hosted by Law & Forensics. Join co-founder, Daniel Garrie, and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve for a discussion on vendor risk management in the context of the COVID-19 pandemic. Vendors and your organization's supply chain are facing greater cyber risks and vulnerabilities than ever before.
Welcome to the first of episode of Global Legal Engineer, a podcast hosted by Law & Forensics. Join co-founder, Daniel Garrie, and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve for discussion on cloud computing and the legal and ethical issues attorneys may encounter when handling sensitive information.
Welcome to Global Legal Engineer, a podcast hosted by Law & Forensics. Join co-founder, Daniel Garrie, and David Cass, VP for Cyber & IT Risk at the New York Federal Reserve for their continued discussion on cloud computing for legal professionals and what attorneys need to for managing the cloud and the associated risks involved.
With more and more data being collected via customer acquisition, funnel creation, and more, how companies are managing their data security is under higher risk, and scrutiny. On this episode Dan is joined by IT Risk & Compliance Manager at Bridgepoint Consulting, John Patrick, Kate Williams a Risk Assurance Manager at Maxwell Locke & Ritter, and Jessica Hamilton, CFO at ActiveProspect. Together they talk about how companies are using data, as well as how new laws are changing how data must be managed. From how you lead your IT team, to planning through changing regulations, tech leaders must be on top of all of it. Learn more about Bridgepoint Consulting:https://bridgepointconsulting.com/Learn more abound founding_media:https://foundingmedia.com/ See acast.com/privacy for privacy and opt-out information.
On this episode of Health Law Today, Kate Hickner is joined by Joe Compton – a director in the IT Risk and Advisory Services at Marcum accounting firm – to discuss data privacy and security in the health care space.
Den här veckan träffar Rolf Rosenvinge Louise Livijn, IT Risk specialist på Epiroc. Rolf och Louise diskuterar bl a varför det ofta är rätt att kasta sig ut även om man inte har alla svaren men också hur hon ofta tack vare sin bakgrund får agera översättare mellan säkerhet, IT och affären. I avsnittet diskuterar de också vad CISOs behöver tänka på för att få behålla unga talanger. See acast.com/privacy for privacy and opt-out information.
Tom talked with Sam about his path to CISO. As CISO for ServerCentral Turing Group (SCTG), Tom is responsible for security, governance, compliance, and maintaining a culture of security and IT Risk awareness across the entire organization. Many of his company’s clients are in regulated industries, have compliance requirements or simply take the security of their data seriously. The post S2:E2 Thomas Johnson – CISO at ServerCentral Turing Group (SCTG) appeared first on Malicious Life.
Keith O'Sullivan, SVP, IT Risk & CISO at Standard Industries sits down with Cybercrime Magazine for an interview. Sponsored by Fortinet.com
Corneliu’s tagline on LinkedIn says: “I’ll make sure you’re safe!” and he truly means it. In this episode, our guest is discussing 5 dangers of the highly advanced technological world and advice our listeners how can they proactively protect themselves and their data on the Internet. In This Episode We Discussed: From Master Degree in Veterinarian Medicine in Romania to IT security assessor in Denmark: Corneliu’s bizarre yet fascinating professional journey What is a Data Breach and how can we take more responsibility for our own data on Internet? What is the differences between phishing and vishing How to check if we are being fed with the “Fake News”? Why we should pay more attention to our passwords And many more! DISCLAIMER: Guest’s presented opinions in this episode are his personal thoughts on the topic and shall not be associated with his employer’s policy regarding IT security What's Special About Corneliu? Corneliu about Corneliu: I have worked in the IT domain for almost 10 years, gaining experience and being able to contribute with knowledge in: a wide range of ITIL processes, implementing and leading IT projects through Agile and Prince2 methodologies, Situation Management and lately IT Risk and Compliance.While my IT understanding is broad, I found myself in the last years motivated by being engaged in disaster prevention and crisis management activities, especially in the IT security area. I believe I have the calm demeanour, awareness, knowledge and first-rate communication skills required to respond appropriately to any situation that in other people would result in a high blood pressure. You can find more about my professional track and competencies by checking below, my current and previous roles.Professionally, I thrive in environments where my working partners are communicating factual, are ready to take ownership for their tasks and have at least one solution prepared for the encountered challenges. My work ethic drives me to offer at least the same level of commitment and add a dash of humour and reckless optimism whenever the situation requires it.Personally, I have committed to support and coach internationals moving to Denmark that have a hard time in finding themselves in a new culture. I am an active speaker at different local events where I use my knowledge and contacts to facilitate the access of unemployed people to the job market with a focus on the IT domain.If you believe that I can be of help to you or simply would like to have a talk and share knowledge on the topics that you find relevant on this profile, you can reach to me by sending an email to ionutpreotu@gmail.com How To Find Corneliu? Corneliu's LinkedIn
Business Connections Live - The UK's Leading Online Business TV Channel
Cyber Security And The Impact Of GDPR On this edition of Business Connections Live Steve Hyland asks Mike Osborne, Executive Chairman of Databarracks and Linda Bazant, GDPR Specialist of LRB Consult Ltd about Cyber Security And The Impact Of GDPR This hot subject is on everybody’s lips. But how will it effect the day to day running of businesses and what size business will be affected by GDPR. How to protect your business and recovery from cyber threats – in simple, non technical language and your responsibilities to report a serious breach to the Information Commissioners Office (ICO) form May 2018. An introduction to cyber security – including what it is, types of how the threat landscape is changing and why crime is moving online. How to get started with the Cyber Essentials Scheme. What to do if you get hit – how can you limit the spread of the attack and minimise damage. Your regulatory obligations – in the event of a breach (including GDPR). How to recover infected systems using backup – to minimise downtime and reduce data loss. On 25th May 2018 all organisations will have a duty to report certain types of data breach to the relevant supervisory authority and, in some cases to the individual affected by the breach in compliance with the General Data Protection Regulation also known as GDPR. A notifiable breach has to be reported to the relevant supervisory authority within 72 hours of the organisation becoming aware of it. In the light of the tight timescales for reporting a breach – it is important to have robust breach detection, investigation and internal reporting procedures in place. Failing to notify a breach when required to do so can result in a significant fine up to 10 million Euros or 2 per cent of your global turnover. Mike Osborne has a 30 year career in IT & Risk most recently as the Executive Chairman of UK specialist service provider Databarracks. During this time Mike was responsible for growing a fledgling Disaster Recovery company into one of the UK’s leading providers with revenues exceeding £50million pa and advising over 2,000 clients from SME’s to Global brands. A well known and respected industry figure and commentator, Mike is recipient of industry Lifetime Achievement & Personality of the Year Awards and is a Regional Finalist in the IOD Director Awards. Linda Bazant is a lawyer, GDPR Consultant/Trainer and Event Speaker and owner of LRB Consult Ltd who advises companies on the possible impact of the upcoming General Data Protection Regulation on their organisations. She is also the co-founder of the corporate television company, Business Connections Live TV. On this edition of Business Connections Live, Mike will explain: What DDoS, ransonmare, phishing, whaling and social engineering are How to spot the signs of the more common attacks What to do in the event of an attack (response) What you legally have to do if you have had a breach (reporting) How to improve staff awareness The three pillars of protection – Technology prevention, staff awareness/prevention and backup Linda will explain: What constitutes a Personal Data Breach What breaches you need to notify to the relevant supervisory authority When individuals have to be notified What information a breach notification must contain How to notify a breach How to prepare for breach reporting Learn the business fundamentals on how your business can achieve: Improved understanding of the threat landscape Staff understanding of what constitutes a breach Understanding how to act in the event of a breach Knowing who to call in the event of a breach Make sure you follow the regulation Robust breach detection Ensuring your business can Survive For more great information visit our Guests website or follow them on Social Media. Mike Osborne – Databarracks Website: www.databarracks.com Twitter: @databarracks Podcast: thebcpcast LinkedIn: Databarracks Linda Bazant – LRB Consult Website: Lindabazant.com Twitter: @lindabazant Blog: Conquering GDPR LinkedIn: Linda Bazant *******You Can Contact Business Connections Live****** The UK’s Leading Online Business Channel: Subscribe Here! http://businessconnectionslive.com/BC... Visit our Website http://businessconnectionslive.com Follow us on Twitter for the latest news https://twitter.com/bclbusinesstv Live Shows on Youtube Mondays Mid-day GMT https://www.youtube.com/c/businesscon... Follow us on our Google+ page https://plus.google.com/+Businessconn... Follow us on our Facebook page https://www.facebook.com/BusinessConn... You Can Contact Business Connections Live The UK’s Leading Online Business Channel: Subscribe Here! http://www.youtube.com/subscription_c... Visit our Website http://businessconnectionslive.com Follow us on Twitter for the latest news https://twitter.com/bclbusinesstv Live Shows on Youtube Mondays Mid-day GMT https://www.youtube.com/c/businesscon... Follow us on our Google+ page https://plus.google.com/+Businessconn... Follow us on our Facebook page https://www.facebook.com/BusinessConn... Find Out more about TubeBuddy https://www.tubebuddy.com/bclbusinesstv You can email the studio here studio@businessconnectionslive.com We are always looking for Industry experts… You can email the studio here studio@businessconnectionslive.com We are always looking for Industry experts…
The panel was called “The Startups Are Building Robot Lawyers” but they unanimously concluded that this is not the case. In this report from On The Road, host Laurence Colletti talks to Andrew Arruda, Shamla Naidoo, and Ed Walters about artificial intelligence and how technology is helping lawyers, not replacing them. They end their discussion with a call for open-mindedness toward and collaboration with technology in the legal industry. Andrew Arruda is the CEO and co-founder of ROSS Intelligence, the world’s first artificially intelligent attorney. Shamla Naidoo is IBM’s Vice President of IT Risk and Chief Information Security Officer. Ed Walters is the CEO and co-founder of Fastcase, an online legal research software company.
BluVector (https://bluvector.io/) . Prior to her role at BluVector, she served as general manager of IBM’s Security Services Division, charged with development and delivery of managed and professional security services to IBM clients worldwide. In addition, she served as IBM's Global CISO and VP of IT Risk. Kris is a recognized expert in the field on security, risk, compliance and governance, with appearances in Forbes, CNBC, NPR and USA Today. Within the past five years she has been recognized as 2015 SC Magazine Top 25 Security Managers, 2014 SC Magazine Power Player, 2012 Compass Award Winner by CSO Magazine, one of E-Week’s 2012 “Top Women in Information Security That Everyone Should Know”, Top 25 CTO by InfoWorld, as Top 25 Most Influential Security Executives by Security Magazine. She also holds U.S. and EU patents for Object Oriented Risk Management Models and Methods. Additionally, she is a member of numerous external boards and advisory panels, including Grotech Ventures (http://www.grotech.com/) . In this episode we discuss her start information security and risk, what worries her about the RSA conference, AI and Machine Learning - and what it means for security, emerging threats, advice for CISOs, communicating risk management, and so much more. Where you can find Kris: LinkedIn (https://bluvector.io/) Twitter (https://twitter.com/bluvector) HITBGSEC 2015 - Kristin Lovejoy - Keynote: Security vs Privacy (https://www.youtube.com/watch?v=QjD3NZvzPUM)
This month's podcast features Dave Martin, Technology and Innovation Leader, IT Risk and Cybersecurity at GE, and John Stewart, Senior VP and Chief Security and Trust Officer, Corporate Security Programs Organizations, Cisco, in conversation about the roads they took to where they are today, leading cybersecurity programs for some of the world's biggest companies.
Jack Freund, the guest of my latest podcast, is the co-author of a book with Jack Jones on quantifying risk (Measuring and Managing Information Risk: A FAIR Approach). This book was inducted into the Cybersecurity Canon in 2016. The Cyber Security Canon is a Hall of Fame for IT Security books. The founder Rick Howard has been a previous guest on this podcast. Some of the links that I really like from this episode are Jack’s presentation called “Assessing Quality in Cyber Risk Forecasting”, his most recent article in the ISSA Journal that I love called “Using Data Breach Reports to Assess Risk Analysis Quality”. You will be able to find all links and show notes at redzonetech.net/podcast This episode is sponsored by the CIO Scoreboard Major take-aways from this episode are: 1. Elevate Your IT Security Risk Communication Game using Data Breach reports to Inspire Action in the Business 2. How to use Risk Data so that the business becomes more comfortable with uncertainty 3. New Refreshing perspectives on presenting IT Security Risk to the business 4. Predicting and Forecasting likelihood and frequency of events happening into your risk analysis 5. How to Use External Data Breach Sources of competitors and non-competitors to build your risk cases. About Jack Dr. Jack Freund is a leading voice in Information Risk measurement and management with experience across many industry segments. His corporate experience includes spearheading strategic shifts in IT Risk by leading his staff in executing multimillion dollar efforts in cooperation with other risk and control groups. Jack has been awarded a Doctorate in Information Systems, Masters in Telecom and Project Management, and a BS in CIS. He holds the CISSP, CISA, CISM, CRISC, CIPP, and PMP designations. Jack's academic credentials include being named a Senior Member of the ISSA, IEEE, and ACM, a Visiting Professor, and an Academic Advisory Board member. Find transcript here How to get in touch with Jack Freund LinkedIn profile Twitter Key Resources: Jack’s personal blog and website The Risk Doctor Books/Publications Jack’s book Measuring and Managing Information Risk: A FAIR Approach inducted into the Cyber Security Canon Hall of Fame – Books every cyber security professional should read ISSA Journal Article , Feb 2016, that has links to important external data sources for risk analysis: (see page 21) Assessing Quality in Cyber Risk Forecasting Presentation Article in ISACA “Cloudy with a chance of risk” This episode is sponsored by the CIO Scoreboard, a powerful tool that helps you communicate the status of your IT Security program visually in just a few minutes. Credits: * Outro music provided by Ben’s Sound Other Ways To Listen to the Podcast iTunes | Libsyn | Soundcloud | RSS | LinkedIn Leave a Review If you enjoyed this episode, then please consider leaving an iTunes review here Click here for instructions on how to leave an iTunes review if you're doing this for the first time.
Reports that a Russian hacking ring had stolen more than a billion online credentials sent Internet users scrambling to reset their passwords. Community Health Systems, which operates 206 hospitals across the United States, announced on Monday that hackers recently broke into its computers and stole data on 4.5 million patients. Are we safe?What does the future hold?How can we protect our data? Brian Morkert, nationally respected Founder and President of AuditWest, an IT Risk and Compliance firm, gives us the scoop on the state of the industry and ways to stay one step ahead.
IT Risk and Emerging Technologies, TK Kerstetter, President, Corporate Board Member, Mary Pat McCarthy, Vice Chair, KPMG, Steven Hill, National Innovation Leader, KPMG