POPULARITY
Join Reimagining Cyber for a festive special filled with cybersecurity Christmas wishes from industry experts. Hear from Mike Echols on the importance of human error management, Ashley Jess on combating sophisticated scams with AI, Jim Routh's call for passwordless authentication and improved identity access management, Brett Thorson's plea for simplified cybersecurity products, Arun DeSouza's emphasis on IoT security, and Tammy Klotz's reflection on vigilance and proactive protection. Rob Aragao wraps up with thoughts on the convergence of identity and data, as well as the role of AI in enhancing threat detection and responses. Tune in for thoughtful reflections, expert insights, and a look back at the major cybersecurity themes of 2024.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Jim Routh, Advisory Board Member at SecurityScorecard, is a former CISO with over 30 years of leading experience at Fortune 500 companies, including American Express, Aetna, CVS Health, JPMorgan Chase, and MassMutual. In this episode, he joins host Steve Morgan to discuss cybersecurity metrics and KPIs, as well as how companies can determine security posture and reduce risk, and more. SecurityScorecard is the leading security rating company, used by more than 2,500 top companies. To learn more about our sponsor, visit https://securityscorecard.com
Guests: Jim Routh | https://www.linkedin.com/in/jmrouth/Michael Reese | https://www.linkedin.com/in/michael-w-reese/Host: Matthew RosenquistOn ITSPmagazine
Today, Steve is in conversation with Jim Routh, the former CISO of MassMutual and Aetna. Jim currently works as a consultant and serves as a member of multiple boards. This week, he and Steve talk about the varied skill-sets required of cutting edge CISO's, managing expectations of the C-Suite, the nuance between consensus and agreement, and more. Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
Today, Steve is in conversation with Jim Routh, the former CISO of MassMutual and Aetna. Jim currently works as a consultant and serves as a member of multiple boards. This week, he and Steve talk about the varied skill-sets required of cutting edge CISO's, managing expectations of the C-Suite, the nuance between consensus and agreement, and more. Mentioned in this episode: ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
The MSP space has undergone a lot of changes in the past few decades, with the emphasis on security increasing dramatically in the last 5-10 years. We discuss how ConnectWise, which builds and sells solutions to MSPs, has tackled this challenge. We'll be asking questions both from Raffael's point-of-view, selling to MSPs, but also from the customer point-of-view - small to medium businesses with a need to outsource IT and security functions. Today, we talk to Jim Routh - a retired CISO who survived the job for over 20 years! He'll be sharing some wisdom with us, like how analytics and data science can help detect malicious insiders. Also, more generally, Jim will help us understand how data-science-backed tooling can help move the security market forward and help security teams and programs mature. Segment Resources: https://www.reveal.security/resources/whitepapers/ This week in the Enterprise News: Deepwatch Announces $180 Million in Investments, VulnCheck Raises $3.2 Million to Solve Prioritization Challenge for Enterprise, Government and Cybersecurity Solution Providers, Zscaler to Acquire Israeli Startup Canonic Security, Palo Alto Q2 Fiscal Year 2023 Earnings Call, Tech's hottest new job: AI whisperer. No coding required, How data breaches affect stock market share prices, & Kenyan Innovator Creates Smart Gloves That Translate Sign Language Into Audible Speech! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw307
The MSP space has undergone a lot of changes in the past few decades, with the emphasis on security increasing dramatically in the last 5-10 years. We discuss how ConnectWise, which builds and sells solutions to MSPs, has tackled this challenge. We'll be asking questions both from Raffael's point-of-view, selling to MSPs, but also from the customer point-of-view - small to medium businesses with a need to outsource IT and security functions. Today, we talk to Jim Routh - a retired CISO who survived the job for over 20 years! He'll be sharing some wisdom with us, like how analytics and data science can help detect malicious insiders. Also, more generally, Jim will help us understand how data-science-backed tooling can help move the security market forward and help security teams and programs mature. Segment Resources: https://www.reveal.security/resources/whitepapers/ This week in the Enterprise News: Deepwatch Announces $180 Million in Investments, VulnCheck Raises $3.2 Million to Solve Prioritization Challenge for Enterprise, Government and Cybersecurity Solution Providers, Zscaler to Acquire Israeli Startup Canonic Security, Palo Alto Q2 Fiscal Year 2023 Earnings Call, Tech's hottest new job: AI whisperer. No coding required, How data breaches affect stock market share prices, & Kenyan Innovator Creates Smart Gloves That Translate Sign Language Into Audible Speech! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/esw307
Today, we talk to Jim Routh - a retired CISO who survived the job for over 20 years! He'll be sharing some wisdom with us, like how analytics and data science can help detect malicious insiders. Also, more generally, Jim will help us understand how data-science-backed tooling can help move the security market forward and help security teams and programs mature. Segment Resources: https://www.reveal.security/resources/whitepapers/ Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw307
Today, we talk to Jim Routh - a retired CISO who survived the job for over 20 years! He'll be sharing some wisdom with us, like how analytics and data science can help detect malicious insiders. Also, more generally, Jim will help us understand how data-science-backed tooling can help move the security market forward and help security teams and programs mature. Segment Resources: https://www.reveal.security/resources/whitepapers/ Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw307
It's been a mixed few weeks if you are in the ransomware game. (If you listen to this podcast we presume you are not a cybercriminal, but do get in touch if you are and leave us your full contact details).In this episode Rob and Stan look at the hacks that have made the headlines and suggest what can be done to stop it happening to you.First up for discussion is ransomware-as-a-service malware LockBit hitting ION Trading UK:“It left scores of brokers unable to process derivative trades and they had to resort to manual methods. Imagine them going back to using spreadsheets to figure out what's going on as far as their trades”LockBit threatened to publish stolen data unless a ransom was paid and ION Trading did as they were told. Rob and Stan talk about the incident and the potential repercussions.The episode also looks at a ransomware campaign targeting VMware ESXi technology:“It's a previously known vulnerability. It's been out there for two years. But the reality is that organizations have been slow in patching it. There was a general warning put out by Italy's National Cybersecurity Agency, warning about a large-scale campaign now exploiting this vulnerability. Thousands of computer servers across Europe and North America could potentially be impacted. And this context is, well if you're not going to patch, we'll take a advantage of that”But there's also been bad news for the threat actors.Rob and Stan give their take on the sabotaging of the Hive ransomware group by the FBI and other law enforcement agencies.“This take down shows that international enforcement against ransomware threat actors is increasing. I think this is a good sign. It may make it more difficult for some of these entities to target organizations in the future, but, they're still ongoing and so it's going to be difficult to truly mitigate this threat if you can't reach those that are behind it.”There are call backs to other relevant episodes of the Reimagining Cyber podcast:Episode 12, Brett Thorson, Colonial Pipeline fuels the fire: not the first, not the last, and how to protect for the futurewww.buzzsprout.com/2004238/10791017Episode 2, Jim Routh, Unconventional approaches to improve enterprise resiliencewww.buzzsprout.com/2004238/10791027Episode 27, Shawn Tuma Cyber insurance in the wake of Log4jwww.buzzsprout.com/2004238/10791001Episode 15, Shawn Tuma – So you've been hacked, now what?www.buzzsprout.com/2004238/10791014Plus the Galaxy threat actors reporthttps://publications.cyberres.com/view/679673707/Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
We're aren't recording this holiday week, so enjoy this BSW throwback episode! Main host Matt Alderman selected this episode to share as it's still relevant to the InfoSec business community today. This week, we welcome Jim Routh, Former CSO, Board member, Advisor at Virsec, to discuss The 3 Mistakes All First Time CISOs Make That No One Tells You! Show Notes: https://securityweekly.com/bsw227 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://twitter.com/securityweekly Follow us on Facebook: https://facebook.com/secweekly
We're aren't recording this holiday week, so enjoy this BSW throwback episode! Main host Matt Alderman selected this episode to share as it's still relevant to the InfoSec business community today. This week, we welcome Jim Routh, Former CSO, Board member, Advisor at Virsec, to discuss The 3 Mistakes All First Time CISOs Make That No One Tells You! Show Notes: https://securityweekly.com/bsw227 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://twitter.com/securityweekly Follow us on Facebook: https://facebook.com/secweekly
The unconventional way to build a cyber talent pipeline - featuring Jim Routh and Damon Carter
Jim Routh has a long history in technology and cybersecurity as a leader and management consultant. He was formerly a cybersecurity leader for many large companies including MassMutual, CVS Health, Aetna, and JP Morgan Chase. He is also the former Board Chair for the Health Information Sharing & Analysis Center (H-ISAC) where he served for five years and former Board member for the Financial Services Information Sharing & Analysis Center (FS-ISAC). Jim currently sits on several Boards and acts as an advisor for several cybersecurity companies and venture funds. Jim brings to the boards a vast business and technology background and is considered a digital and cyber security industry expert and thought leader. Finally, Jim is an ICIT Fellow and an Adjunct Faculty member for NYU.The Role of Cybersecurity Leaders as Educators: https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators.pdfLinkedIn: https://www.linkedin.com/in/jmrouth/ Jim Routh's Book List:Cybersecurity and Cyberwar by Singer and Friedman Dark Territory by Kaplan The Perfect Weapon by Sanger Sandworm by Greenberg The Cuckoo's Egg by Stoll Spam Nation by Krebs Future Crimes by Goodman Data and Goliath by Schneier Confront and Conceal by Sanger The Fifth Domain by Clarke America the Vulnerable by Brenner The Code Book by Singh Algorithms to Live By by Christian and Griffiths Your Government Failed You by Clarke Sting of the Drone by Clarke Countdown to Zero Day by Zetter Software Security: Building Security In by McGraw @War by Harris Fight Fire With Fire by Tarun Kingpin by Poulsen The Age of Surveillance Capitalism by Zuboff The Internet in Everything by DeNardis Senior Cyber by Schober CISO Compass by Fitzgerald This Is How They Tell Me the World Ends by Perlroth Crimedotcom by White Big Breaches by Daswani and Elbayadi Innovating in a Secret World by Srivastava Cyber Mayday by Lohrmann and Tan Navigating the Cybersecurity Career Path by Patton Tribe of Hackers by Carey and Jin The PtaaS Book by Wong CyberJutsu by McCarty Cyber Defense Matrix by Yu Shape by Ellenberg So You Want to Talk About Race by Oluo White Fragility by Diangelo Hos to Be an Antiracist by Kendi
All links and images for this episode can be found on CISO Series A CISO hears about your company's product from some other CISOs. Eager to find more information like a video demo they could watch on their own, they visit your site. They can't find anything except a prominently placed "Request a Demo" button. Fearing the marketing and salespeople who will hound them if they fill out the information, they just bail. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Jim Routh (@jmrouth1), former CISO for MassMutual and CVS/Aetna. Thanks to our podcast sponsor, Buchanan Technologies Short staffed and overworked IT groups can be overwhelmed by the massive scope of a comprehensive cybersecurity program. Buchanan Technologies makes the complex simple with our twenty-four by seven, customized, vetted strategies that identify risks, detect threats, implement security controls, and protect the confidentiality, availability, and integrity of your data. Discover more. In this episode: Why do vendors put the product demo videos behind gated walls? Tips for improving cybersecurity awareness within a large organization. The annoying pains of the vendor ecosystem. What are some really bad cybersecurity practices that need to be corrected right away?
Cybersecurity talent shortages are well documented and asking experience cybersecurity professionals to spend countless hours on routine tasks does not promote retention. The adversaries are leveraging data science to attack our enterprises and consumers, and we need to find a better way. This session explores the experience of creating over 300 models using data science, machine learning, and automated incident response to increase the security posture for a major organization. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Jim_Routh_Article.pdf Routh, J. 2019. Model-Driven Security is Making Fundamental Changes to Security Posture. In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs 163-5. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald Show Notes: https://securityweekly.com/csp48 This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Today's Guest is Jim Routh, Advisor & Investor at SYN Ventures. While stepping away from full-time CISO duties, Jim Routh hasn't slowed down. In this episode, Jim tells us what he's been doing since leaving Mass Mutual, what he looks for when engaging with new companies, why he began working with startups. He also discusses the differences between serving as the CISO of larger versus a smaller organizations, his unique hiring strategy, the greatest needs from the private sector, and as always, his toughest lesson learned.
This week, we welcome Jim Routh, Former CSO, Board member, Advisor at Virsec, to discuss The 3 Mistakes All First Time CISOs Make That No One Tells You! In the Leadership and Communications section for this week, A Chief Executive Officer's Guide to Cybersecurity, Zoom Settlement: An $85M Business Case for Security Investment, CISOs: Do you know what's in your company's products?, and more! Show Notes: https://securityweekly.com/bsw227 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://twitter.com/securityweekly Follow us on Facebook: https://facebook.com/secweekly
This week, we welcome Jim Routh, Former CSO, Board member, Advisor at Virsec, to discuss The 3 Mistakes All First Time CISOs Make That No One Tells You! In the Leadership and Communications section for this week, A Chief Executive Officer's Guide to Cybersecurity, Zoom Settlement: An $85M Business Case for Security Investment, CISOs: Do you know what's in your company's products?, and more! Show Notes: https://securityweekly.com/bsw227 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://twitter.com/securityweekly Follow us on Facebook: https://facebook.com/secweekly
Listen in for a discussion with Jim Routh, former CISO at Aetna, CVS Healthcare, and Mass Mutual, to discuss the 3 mistakes all first time CISOs make. Jim will share the lessons he learned throughout his career and how CISOs can avoid these 3 mistakes, including: 1. Setting Expectations 2. Hiring Talent 3. Retaining Employees Visit https://www.securityweekly.com/bsw for all the latest episodes!a Show Notes: https://securityweekly.com/bsw227
Listen in for a discussion with Jim Routh, former CISO at Aetna, CVS Healthcare, and Mass Mutual, to discuss the 3 mistakes all first time CISOs make. Jim will share the lessons he learned throughout his career and how CISOs can avoid these 3 mistakes, including: 1. Setting Expectations 2. Hiring Talent 3. Retaining Employees Visit https://www.securityweekly.com/bsw for all the latest episodes!a Show Notes: https://securityweekly.com/bsw227
How can we scale up the development of our collective cybersecurity talent pipeline, and what role can you play in this? How can your organization help develop talent? How can your alma mater or current university play a part in this? Hear about a model for this kind of work underway through partnerships at New York University Tandon School of Engineering. Our expert panelists: 1. Geoff Brown, CISO, City of New York, and Head of NYC Cyber Command 2. Liat Krawczyk, Assistant Vice President of the New York City Economic Development Corporation 3. Nasir Memon, Vice Dean at NYU Tandon, and Founder of NYU's Cybersecurity Program 4. Jim Routh, Former CISO at Mass Mutual, Aetna, and other enterprises 5. Joel Caminer, Sr. Director of Cybersecurity Education, NYU Tandon Resource Links: • Trend Micro special supported SCORE program: https://www.score.org/technology-resources • NYU Tandon Cybersecurity Program: https://cybersecurity-strategy-masters.nyu.edu/landing-page • SecureWorld virtual conferences: https://www.secureworldexpo.com/events The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner.
Is Data Science the Key to a Mature Security Program?In this episode of Agent of Influence, Nabil speaks with Jim Routh, a well-known security leader and current board member at various innovative early-stage cybersecurity startups. Listen to Jim’s insights on how to define and encourage innovation, build a mature security program using data science, why risk frameworks alone are not enough, security past versus security present, how the pandemic has challenged the human factor, and last but not least, his pickleball hobby.
Jim Routh, Senior Board Advisor & Former CISO in Financial Services and Healthcare, joins the podcast to talk about cybersecurity in financial services and healthcare organizations, how data protection compares between industries, and the advice he'd give to organizations setting data security strategies today.
This episode of CRO Wisdom features Jim Routh, Former Risk Leader, Mass Mutual and Aetna. In this episode hosted by Atul Vashistha, Chairman, Supply Wisdom, Jim talks about the challenges of risk management at a time when third-party risk events are rising in frequency and severity. He shares his views on the limitations of periodic assessments and why they are insufficient for today's world.Jim, an independent director at Supply Wisdom, discusses what he sees as the new frontier in supply chain risk management, based on data-science and automation as innovation catalysts. He talks about the critical importance of continuous risk monitoring across a wide risk aperture and the use of automation in enabling risk actions.
Jim Routh has built software security programs at some of the biggest brands in the world. He has served as CISO or CSO six different times in his career, always staying close to his cyber and software security roots. Jim has hung up his CISO badge and now focuses on serving on boards and advising security-focused startups. Jim's original AppSec podcast episode is our #1 listened to of all time. Having the opportunity to interact with Jim and absorb his vast wisdom and knowledge is a treat for everyone. At the end of this interview, my immediate thought was to go back and listen to this one again. Jim talks with us about the impact of DevSecOps on the CISO, security controls for a devsecops pipeline model, and “shift left” still the dominant theme for software security. We hope you enjoy this conversation with Jim Routh.
Join us for episode #2 of Reimagining Cyber, where we hear from Jim Routh, Head of Enterprise Cybersecurity at MassMutual. As a leader in the Cyber Security space for over two decades, Jim has experienced it all, from facing the Office of the Comptroller of the Currency (OCC) on his second day in his first CISO role to shifting executive mentality around risk profiles and cyber-attacksThis podcast is brought to you by Micro Focus where our mission is to deliver cyber resilience by engaging people, process and technology to protect, detect and evolve.
On this episode of What Lies Beneath, we're featuring a conversation from Interos' 2020 summit for the Financial Services Industry (FSI) featuring Meg Anderson from Principal Financial Group, Jim Routh from MassMutual, and Phil Venables from Goldman Sachs, in conversation with Kevin Mandia, CEO of FireEye. With decades of experience in digital risk, they provide lessons learned on how to integrate into C-suite and Board conversations and priorities to help improve enterprise resilience against epic business disruptions. As part of the summit, the panel discussed: The biggest supply chain risks facing companies as a result of the COVID pandemic What we worry about in the supply chain, and how to address those supply chain risks The new normal that we're all facing as we navigate through a global pandemic Some of the challenges facing those in the cybersecurity industry are facing at this point, and how they're protecting enterprise operations in the midst of it all. All guests' participation in our summit was purely as a public service and is in no way an endorsement of Interos.
About the speaker: Jim Routh is the Chief Security Officer for CVS Health and leads the Global Security function focused on cyber security for CVS Health businesses and converged security for the Aetna business division. He is former CSO for Aetna and the former Chair of the H-ISAC Board. He serves as a member of the Advisory Board of the ClearSky Security Fund. He was formerly the Global Head of Application & Mobile Security for JP Morgan Chase. Prior to that he was the CISO for KPMG, DTCC and American Express. Jim is the winner of the 2017 Evanta Breakaway Leaders Award, 2016 Security Alliance Award for Innovation, 2016 ISE Luminary Leadership Award, the Northeast and the 2014 North American Information Security Executive of the Year for Healthcare, the 2009 BITS Leadership Award sponsored by the financial industry in collaboration with NIST and the Department of Treasury.
We speak with Jim Routh about equality in security, building a diverse security culture, and much more.
We speak with Jim Routh about equality in security, building a diverse security culture, and much more.
Last week, Cybercrime Magazine took our studio on the road to the New York Institute of Technology. We sat down with Jim Routh, CSO at Aetna and Chair of the National Health ISAC, to discuss the protection of data, as well as machine learning, nation-state sponsored cybercriminal activity, criminal syndicates, hacktivist groups, threat actors, and marketing. Routh is a cybersecurity expert with over thirty-five years of experience in information technology, the last twenty of which are in cybersecurity. This is our second “Ask the CISO” interview in a series in which we interview top CISOs and CSOs from Fortune 500 and Global 2000 companies.
Jim has held a number of impressive security leadership positions at several companies including Aetna, JP Morgan Chase, and American Express. He has been a key player in the creation of some of the industry's most effective information sharing communities - the FS-ISAC and the NH-ISAC. He's also known for an uncommon approach to risk management: “Take risk to manage risk.”
George Rettas breaks down the Congressional Hearings into the Equifax Breach and special guest Jim Routh, the CSO of Aetna and Chair of the NH-ISAC gives his perspective of one of the largest breaches in history.
In today's podcast, we hear that Facebook has kicked some Russian trolls out from under its bridge. Why? Because they're Russian trolls, that's why. Facebook CEO Zuckerberg will testify about data security before a House panel next Wednesday. Privacy for the Old World, but maybe not as much for the new. The YouTube shooting may have been motivated by anger over the platform's policies. European air traffic control problems were a glitch, not a hack. Pipeline operators recovering from IT hack. Homeland Security tells the US Senate hostile intelligence services have stingrays in Washington. Panera Bread's response to its potential data exposure. Rick Howard from Palo Alto Networks on whether security platforms are putting all of your eggs in one basket. Guest is Jim Routh, CSO at Aetna, on Model-driven security and the rise of unconventional controls.
Recorded Future - Inside Threat Intelligence for Cyber Security
Jim Routh is chief security officer of Aetna, a Fortune 500 company offering health care, dental, pharmacy, group life, disability, and long-term care insurance and employee benefits. With annual revenue exceeding 60 billion dollars and nearly 50 thousand employees, there’s a lot to secure. In this episode, we explore Jim Routh’s career path, the unique challenges he faces as CSO for such a large public company, how he delegates authority and manages his time, his approach to threat intelligence, and his somewhat contrary approach to communicating risk with the Aetna board. We learn about Aetna’s move away from using Social Security numbers as identifiers, as well as their efforts to phase out traditional password-based user logins, all in the name of improving customer convenience and security. He also explains his adoption of model-driven security and the rise of unconventional controls.
Jim Routh is chief security officer of Aetna, a Fortune 500 company offering health care, dental, pharmacy, group life, disability, and long-term care insurance and employee benefits. With annual revenue exceeding 60 billion dollars and nearly 50 thousand employees, there's a lot to secure. In this episode, we explore Jim Routh's career path, the unique challenges he faces as CSO for such a large public company, how he delegates authority and manages his time, his approach to threat intelligence, and his somewhat contrary approach to communicating risk with the Aetna board. We learn about Aetna's move away from using Social Security numbers as identifiers, as well as their efforts to phase out traditional password-based user logins, all in the name of improving customer convenience and security. He also explains his adoption of model-driven security and the rise of unconventional controls.
Host Kevin Greene and guest Jim Routh, Chief Security Officer at Aetna discuss the importance of developing a software security program designed to help reduce the cost to maintain software by detecting vulnerabilities early in the software development process. Jim discuss key observed software assurance practices and lessons learned from BSIMM that impact improving software security. Jim shares his thoughts on IoT and medical device security in the healthcare industry.
Jim Routh joins the podcast to discuss selling #AppSec up the chain. Jim has built 5 successful software security programs in his career and serves as a CISO now. Jim shares his real-world experience with how to successfully sell #AppSec to senior management (as well as many other pieces of wisdom for running an AppSec [...] The post Selling #AppSec Up The Chain (S03E09) – Application Security PodCast appeared first on Security Journey Podcasts.
George Rettas breaks down the Congressional Hearings into the Equifax Breach and special guest Jim Routh, the CSO of Aetna and Chair of the NH-ISAC gives his perspective of one of the largest breaches in history.
Jim Routh of Aetna and InfoSec World joins us. In the news, Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more. Stay tuned!
Jim Routh of Aetna and InfoSec World joins us. In the news, Cisco touts next-generation firewall gear, a new decryption tool from Avast, Centrify stops breaches in real time, and more. Stay tuned!
Jim Routh is the Chief Security Officer and leads the Global Security function for Aetna. He is also the Chairman of the NH-ISAC Board, and has previously worked for JP Morgan Chase and American Express. Jim has over 30 years of experience in information technology and information security as a practitioner and management consultant, as well as a leader of technology, analytic, and information security functions for global firms. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode34 Visit http://securityweekly.com/esw for all the latest episodes!
Jim Routh is the Chief Security Officer and leads the Global Security function for Aetna. He is also the Chairman of the NH-ISAC Board, and has previously worked for JP Morgan Chase and American Express. Jim has over 30 years of experience in information technology and information security as a practitioner and management consultant, as well as a leader of technology, analytic, and information security functions for global firms. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/ES_Episode34 Visit http://securityweekly.com/esw for all the latest episodes!
Security and perimeter experts Rich Mogull, CEO and analyst at Securosis, and Jim Routh, CSO and leader of the global information security function for AETNA, sat down at RSA Conference 2016 to discuss what it takes to be successful in the information security industry, and what it's like to be on the front lines of the battle against cybercriminals.