POPULARITY
In this episode, we take a look at three interesting - and free - tools to help you manage and secure Azure and Entra ID. We take each tool for a spin and reflect on the findings and usage.(00:00) - Intro and catching up.(03:15) - Show content starts.Show links‑ ScEntra‑ azqr - Azure Quick Review‑ EntraExporter- Give us feedback!
In an era of relentless data breaches and cyber threats, cloud security governance stands as the ultimate framework balancing accessibility with ironclad protection for your cloud assets. This episode breaks down its core components, from risk assessment and advanced tech like encryption/MFA to policy enforcement, incident response, and ongoing monitoring. Explore how it aligns cloud usage with business goals, ensures compliance, and collaborates with providers while empowering teams through training.
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring?(00:00) - Intro and catching up.(04:25) - Show content starts.Show links- Agent 365 tooling servers - Mistral 3 available in Microsoft Foundry - Microsoft 365 Copilot Business - Entra ID support for RDP Connections- Ignite 2025 Next Steps- Foundry Control Plane: Where Developers Build, Operate, and Govern Every Agent Feedback - Give us feedback!
In this episode, we unpack what's new with Microsoft Defender for Cloud. During Ignite 2025, Microsoft announced that the public preview of MDC would be available shortly, and it has arrived now. We'll take a look at what changed, what didn't, and why you should care.(00:00) - Intro and catching up.(03:52) - Show content starts.Show links- Defender for Cloud Preview- Give us feedback!
In this episode, we take a look at the new Microsoft Zero Trust Assessment tool. We reflect on Zero Trust in general, its application in the Microsoft security landscape, and what this exciting tool will offer you.(00:00) - Intro and catching up.(05:00) - Show content starts.Show links- Microsoft Zero Trust Assessment tool- Demo of Microsoft Zero Trust Assessment (Merill Fernando)- Give us feedback!
Microsoft Ignite 2025 is here! We reflect on the hero announcements and what they mean for the future. Some exciting announcements were made during the first keynote, and we already had a chance to try a few of them out.(00:00) - Intro and catching up.(03:35) - Show content starts.Show links- ESPC'25 in Dublin- Microsoft Agent 365- Security Copilot announcement- Azure Copilot- Microsoft Foundry, and more here- Defender for Cloud- Give us feedback!
Send us a textThe fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don't have a big‑tech budget: continuous discovery via proxies or CASB‑like tools, real‑time monitoring through a trusted partner, and risk assessments that focus on business impact, not buzzwords. The goal isn't to slow innovation; it's to make it safe and repeatable.From there, we bring CISSP Domain 1.3 to life with five scenario‑based questions that mirror real leadership decisions. You'll hear why federated governance outperforms heavy central mandates in multinationals, how defining risk appetite is the first step before any framework, and which metrics actually prove value to a board. We draw a clear line between due care (policies, accountability, legal alignment) and due diligence (testing, verification, audits), and we show why insurance can transfer residual risk but can never replace sound governance.We also get specific about executive communication. A new CEO wants alignment, accountability, and outcomes—not weekly patch timelines. Learn how to map security objectives to corporate strategy, prioritize by business risk, and present measurable progress that earns budget and buy‑in. If you're preparing for the CISSP or leading a program under pressure, these principles help you think like a strategist and act with confidence.Want more? Explore the free resources and growing library at CISSP Cyber Training, and grab the 360 free CISSP practice questions. If this episode helps you think clearer about governance and AI, subscribe, share it with a teammate, and leave a quick review to help others find the show.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvSecurity governance represents one of the most misunderstood yet critical components of any cybersecurity program. As we explore Domain 1.3 of the CISSP exam, we unpack how proper governance creates accountability and structure that protects both your organization and your career.We begin with a startling real-world example: the "Red November" campaign, where Chinese state-sponsored hackers exploited vulnerable internet-facing appliances and VPNs across defense, aerospace, and government sectors for a full year. This sophisticated operation highlights why casual approaches to security governance leave organizations exposed to devastating attacks.Security governance isn't merely a theoretical concept – it's a practical framework that defines who's responsible for what across your security landscape. We break down the crucial roles every organization must establish: from Senior Managers who hold ultimate responsibility, to Data Owners who classify information, to Data Custodians who implement protections, and the often-overlooked role of Auditors who verify everything works as intended. Understanding these distinctions protects security professionals from becoming scapegoats when incidents occur.The real value emerges when we examine how security control frameworks like NIST CSF, ISO 27001, and CRI provide structured approaches to managing risk. These aren't one-size-fits-all solutions, but rather customizable blueprints that help you systematically identify, implement, and monitor security measures appropriate to your specific needs. Framework mapping allows you to align multiple requirements efficiently, making compliance less burdensome and more effective.Finally, we demystify the concepts of due care and due diligence – the practical actions that demonstrate you've taken reasonable steps to protect your organization. These aren't just legal defenses; they're the fundamental building blocks of a mature security program that aligns with business objectives while meaningfully reducing risk.Whether you're preparing for the CISSP exam or building a more robust security program, this episode provides the practical knowledge you need to implement effective security governance that executives will support and auditors will approve.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Host Chris Hackett explores the realities of risk and compliance with three industry experts. Joakim Sjunnesson, Group Information Security Risk Manager at ASSA ABLOY, Adrien LeClerqc, Internal Audit and Risk Manager at Spotify, and Somaia El-Gamal, Assistant Manager of Security Governance at Boubyan Digital Factory share insights into how businesses can manage risk, strengthen governance, and navigate compliance challenges. This discussion highlights the importance of security, audit, and compliance frameworks in building resilience and supporting sustainable business growth.
RSAC Conference 2025 has been full on, with cybersecurity experts from all over the world descending on San Francisco to share trends, data, and announcements.This year, ITPro has been providing both remote and on the ground coverage from the event, across talks covering topics such as AI security and threat actor methodology.In this episode, Jane speaks to Rory about some of his RSAC coverage and key takeaways from the event.Read more:RSAC Conference 2025 was a sobering reminder of the challenges facing cybersecurity professionalsRSAC Conference Day One: Vibe Is 'All In' on AI for Security“Governance is an irreplaceable role”: Microsoft Security VP on why diversity and sector expertise will keep security workers relevant in the age of agentic AIRSAC Conference day two: A focus on what attackers are doing"There needs to be an order of magnitude more effort"": AI security experts call for focused evaluation of frontier models and agentic systemsCyber defenders need to remember their adversaries are human, says Trellix research headRSAC Conference day three: using AI to do more with less and facing new attack techniques"China has almost doubled their aggression in cyber': Kevin Mandia and Nicole Perlroth warn organizations aren't waking up to growing APT threats
This episode of the InfoSec Beat podcast focused on careers in information security features a conversation between Accenture CISO Kris Burkhardt and Paul Kunas, who led our Governance, Risk, and Compliance (GRC) function for almost 10 years. Paul's career journey involved security roles at Accenture and other companies and ultimately a return to Accenture to formalize GRC for Information Security. The work spanned developing global strategies and building many programs to arrive at one common view of risk today. Activities center on various analyses to secure technology, updating strategies, validating approaches, instilling a common view and vision, and responding to new challenges.
Episode 65 features Marina Segal, a friend, former colleague, and now co-founder and CEO of her VC-backed start-up, Tamnoon (www.tamnoon.io). I first met and worked with Marina Segal at Dome9 and, subsequently, Check Point Software. Marina is a shrewd and highly experienced executive with a strong background in Security Governance, Risk, and Compliance. In this age of AI, automation, and BOTs, she and her team have created an interesting value proposition with a human touch. I hope you enjoy the discussion. *PLEASW NOTE*Correction* Midway through the broadcast I refer to CNAPP as a 'horizontal vertical' solution and I meant to say CSPM, not CNAPP. My bad. Thanks!
In this episode, I talk to Brian Wilson whose departure from the Navy was prompted by an offer that was just too good to pass up. Known throughout the Corps for his kindness, humbleness, intelligence, and hid dedication to the mission, we all thought Brian would stay until forced out. His first stint out of the Navy lasted 14 years, allowing him to combine many of the roles and skills he developed while on active duty. Just recently, Brian moved to the Institute for Security Governance in Monterey, CA. Brian is on LinkedIn. --- Support this podcast: https://podcasters.spotify.com/pod/show/tom-welsh/support
Guest: Nitin Raina, Global CISO, Thoughtworks [@thoughtworks]On LinkedIn | https://www.linkedin.com/in/nnraina/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining Cybersecurity Podcast, host Sean Martin connects with Nitin Raina, the global Chief Information Security Officer (CISO) for ThoughtWorks. The discussion centers around Nitin's innovative approaches to transforming and elevating cybersecurity, drawing from his rich experience and strategic mindset. Nitin shares his journey in cybersecurity, emphasizing the evolution of the security program under his leadership. He discusses the significance of adapting a business-centric approach to cybersecurity, breaking away from conventional, technology-focused strategies. This includes the development and successful implementation of a business security maturity model designed to align with the organization's diverse, global operations.A notable aspect of Nitin's strategy is the emphasis on leadership activation and the importance of governance in driving cybersecurity initiatives. By fostering a culture of security ownership across all levels of leadership and the broader organization, Nitin underscores the transformational shift in how cybersecurity is perceived and managed within ThoughtWorks. He highlights the collaborative efforts with different departments, such as IT operations and legal compliance, to ensure a cohesive approach to protecting the organization's 'crown jewels.' Through anecdotes and examples, Nitin illustrates the impact of these strategies on enhancing security awareness, decision-making, and operational effectiveness across the company.The conversation also touches on the technical side, discussing the role of developers within the cybersecurity landscape and the utilization of contemporary technologies and frameworks to bolster the security posture. The episode concludes with insights into the future of cybersecurity, advocating for a more integrated and business-aligned approach. Nitin's reflections on the journey and achievements of his company's cybersecurity initiatives provide valuable lessons for organizations aiming to redefine their security strategies in a rapidly evolving digital world.Key Questions AddressedHow did Nitin Raina's leadership and strategies transform the cybersecurity posture at his company?What role does leadership activation play in redefining cybersecurity across an organization?How can cybersecurity be aligned with business strategies to foster growth and innovation?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Nitin Raina, Global CISO, Thoughtworks [@thoughtworks]On LinkedIn | https://www.linkedin.com/in/nnraina/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of the Redefining Cybersecurity Podcast, host Sean Martin connects with Nitin Raina, the global Chief Information Security Officer (CISO) for ThoughtWorks. The discussion centers around Nitin's innovative approaches to transforming and elevating cybersecurity, drawing from his rich experience and strategic mindset. Nitin shares his journey in cybersecurity, emphasizing the evolution of the security program under his leadership. He discusses the significance of adapting a business-centric approach to cybersecurity, breaking away from conventional, technology-focused strategies. This includes the development and successful implementation of a business security maturity model designed to align with the organization's diverse, global operations.A notable aspect of Nitin's strategy is the emphasis on leadership activation and the importance of governance in driving cybersecurity initiatives. By fostering a culture of security ownership across all levels of leadership and the broader organization, Nitin underscores the transformational shift in how cybersecurity is perceived and managed within ThoughtWorks. He highlights the collaborative efforts with different departments, such as IT operations and legal compliance, to ensure a cohesive approach to protecting the organization's 'crown jewels.' Through anecdotes and examples, Nitin illustrates the impact of these strategies on enhancing security awareness, decision-making, and operational effectiveness across the company.The conversation also touches on the technical side, discussing the role of developers within the cybersecurity landscape and the utilization of contemporary technologies and frameworks to bolster the security posture. The episode concludes with insights into the future of cybersecurity, advocating for a more integrated and business-aligned approach. Nitin's reflections on the journey and achievements of his company's cybersecurity initiatives provide valuable lessons for organizations aiming to redefine their security strategies in a rapidly evolving digital world.Key Questions AddressedHow did Nitin Raina's leadership and strategies transform the cybersecurity posture at his company?What role does leadership activation play in redefining cybersecurity across an organization?How can cybersecurity be aligned with business strategies to foster growth and innovation?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode of What That Means, Camille gets into product security governance with Vernetta Dorsey Windsong, Director of Product Security Governance at Intel. They talk about how product security and governance practices work together, how to get started with product security governance, the challenges of implementing new practices, automation within a secure development lifecycle, the effects of AI on processes, preventing governance creep, and more. Learn more about the secure development lifecycle in Vernetta and Camille's previous conversation: https://cybersecurityinside.libsyn.com/49-what-than-means-with-camille-secure-development-lifecycle-sdl The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.
Although our paths did not cross too many times while serving in the Navy JAG Corps, Ian Wexler and I had many common career experiences, including career challenges and duty stations. Ian's last assignment on active duty was as Director, Institute for International Legal Studies in Newport, RI. Following his retirement this past fall, Ian became Director, Institute for Security Governance in Monterey, CA. DISCLAIMER: THE OPINIONS EXPRESSED BY IAN WEXLER IN THIS PODCAST ARE HIS PERSONAL VIEWS AND NOT THOSE OF THE INSTITUTE FOR SECURITY GOVERNANCE, THE DEFENSE SECURITY COOPERATION UNIVERSITY, THE DEFENSE SECURITY AGENCY, OR THE DEPARTMENT OF DEFENSE. Ian's biography can be found HERE while his LinkedIn profile can be accessed HERE. --- Support this podcast: https://podcasters.spotify.com/pod/show/tom-welsh/support
Notes:- Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines. - The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances. - Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security. - It's important to address the needs of victims of cybercrime, which is often forgotten. - The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.About our Guest:Dr. Benoît Duponthttps://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît Dupont/https://www.linkedin.com/in/benoit-dupont-9369702/ Papers or resources mentioned in this episode:Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. https://doi.org/10.1177/146680250334001Berg, J., Nakueira, S. & Shearing, C. 2014. Global Non- State Auspices of Security Governance. In: Bersot, H. & Ariigo, B. Eds. The Routledge Handbook of International Crime and Justice Studies. Routledge, 77-97Other:“Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.” pp.3.Woodbury, A. M. (1952). Ecological taxonomy. Science, 115(2992), 3-3.
Ready to fortify your organizational security? We promise to equip you with a deeper understanding of security governance principles - the backbone of any effective information security program. We highlight the pressing need for strategies that align with the mission and vision of the organization, especially in the face of the growing threat of ransomware attacks. We dissect a recent news piece that underscores the importance of safeguarding critical infrastructure. But that's not all, we also reveal the resources that'll help you ace the CISSP certification exam.Imagine having the power to create a foolproof USB policy. We guide you through the process of crafting a classification schema, handling procedures for each classification level, and constructing an impactful security awareness program. Get the inside scoop on why specialized training for your security personnel could be a game-changer. We touch upon the necessity of consistent feedback and evaluation mechanisms that can instigate continuous improvements in your security initiatives.Change can be daunting, but what if we told you that embracing security control framework mapping could be transformative? We delve into the pros and cons of security control mapping, the challenges you might face, and the various methodologies at your disposal. We'll also share practical examples of mapping NIST to ISO and HIPAA to COVID to ensure compliance with varying regulations. Navigating GDPR and the ISO 27,000 framework needn't be a nightmare anymore. If you're gearing up for the CISSP test this September, you'll have our best wishes and a wealth of invaluable information.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Jeevan Lobo has piled up an impressive amount of leadership knowledge throughout his career, and is eager to share what he learned. In this episode, he walks Matt through his role as a Cross-Functional Manager, and how he transitioned to his current position as Security and Governance Leader. In addition, he shares some tips on how to implement new processes in an organization, measure success, and get teams actively involved. Jeevan Lobo is currently the Vice President of Security and Governance in Citibank He is an ITIL Expert, and has over two decades of experience in IT. Jeevan has worked over the years across Consulting, Managed Service providers, and Captive organizations, with multiple stakeholders from all over the world, and in a wide range of industries, such as Financial institutions, Health & Life Sciences, Energy & Utilities, and Retail. His areas of expertise include Cross-Functional Leadership, Digital Transformation and Risk & Control.
What are the problems with Samuel Huntington's views about civil-military relations? Why do military coups persist in countries such as Pakistan, and what might be done to reduce their likelihood? In a study drawing upon extensive interview research in Pakistan, Cornelia Baciu argues that international organisations can help create a framework of security governance which can have a positive impact upon the political roles assumed by the military. Her 2021 book Civil-Military Relations and Global Security Governance Strategy: Hybrid Orders and the Case of Pakistan investigates the relationship between international security governance, democratic civil-military relations and the relevance of strategy, as well as of absolute and relative gains, in norms formation in hybrid orders. Highlighting caveats of the legacy of Huntington's paradigm of military professionalism, the book applies a robust methodology and data collected in four sample regions in Pakistan. It gauges the effects of international and local actors' support in the Security Sector Reform domain and examines instances of civil-military interactions and military transition. The book also analyses determinants and strategies that can influence them to demonstrate the impact of global governance in norms diffusion, as well as of absolute and relative utility gains and incentives in normative change. The author generates a new theory pertaining to international organisations and actors as determinants of transformation processes and consequently sheds new light on the issue of global security governance, especially its impact on civil-military relations and democratisation in hybrid orders. Cornelia Baciu is a researcher at the Centre for Military Studies at the Department of Political Science, University of Copenhagen. She specialises in international security organizations and conflict research. Duncan McCargo is Director of the Nordic Institute of Asian Studies and a professor of political science at the University of Copenhagen. The Nordic Asia Podcast is a collaboration sharing expertise on Asia across the Nordic region, brought to you by the Nordic Institute of Asian Studies (NIAS) based at the University of Copenhagen, along with our academic partners: the Centre for East Asian Studies at the University of Turku, and Asianettverket at the University of Oslo. We aim to produce timely, topical and well-edited discussions of new research and developments about Asia. About NIAS: www.nias.ku.dk Transcripts of the Nordic Asia Podcasts: http://www.nias.ku.dk/nordic-asia-podcast Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
What are the problems with Samuel Huntington's views about civil-military relations? Why do military coups persist in countries such as Pakistan, and what might be done to reduce their likelihood? In a study drawing upon extensive interview research in Pakistan, Cornelia Baciu argues that international organisations can help create a framework of security governance which can have a positive impact upon the political roles assumed by the military. Her 2021 book Civil-Military Relations and Global Security Governance Strategy: Hybrid Orders and the Case of Pakistan investigates the relationship between international security governance, democratic civil-military relations and the relevance of strategy, as well as of absolute and relative gains, in norms formation in hybrid orders. Highlighting caveats of the legacy of Huntington's paradigm of military professionalism, the book applies a robust methodology and data collected in four sample regions in Pakistan. It gauges the effects of international and local actors' support in the Security Sector Reform domain and examines instances of civil-military interactions and military transition. The book also analyses determinants and strategies that can influence them to demonstrate the impact of global governance in norms diffusion, as well as of absolute and relative utility gains and incentives in normative change. The author generates a new theory pertaining to international organisations and actors as determinants of transformation processes and consequently sheds new light on the issue of global security governance, especially its impact on civil-military relations and democratisation in hybrid orders. Cornelia Baciu is a researcher at the Centre for Military Studies at the Department of Political Science, University of Copenhagen. She specialises in international security organizations and conflict research. Duncan McCargo is Director of the Nordic Institute of Asian Studies and a professor of political science at the University of Copenhagen. The Nordic Asia Podcast is a collaboration sharing expertise on Asia across the Nordic region, brought to you by the Nordic Institute of Asian Studies (NIAS) based at the University of Copenhagen, along with our academic partners: the Centre for East Asian Studies at the University of Turku, and Asianettverket at the University of Oslo. We aim to produce timely, topical and well-edited discussions of new research and developments about Asia. About NIAS: www.nias.ku.dk Transcripts of the Nordic Asia Podcasts: http://www.nias.ku.dk/nordic-asia-podcast Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/political-science
What are the problems with Samuel Huntington's views about civil-military relations? Why do military coups persist in countries such as Pakistan, and what might be done to reduce their likelihood? In a study drawing upon extensive interview research in Pakistan, Cornelia Baciu argues that international organisations can help create a framework of security governance which can have a positive impact upon the political roles assumed by the military. Her 2021 book Civil-Military Relations and Global Security Governance Strategy: Hybrid Orders and the Case of Pakistan investigates the relationship between international security governance, democratic civil-military relations and the relevance of strategy, as well as of absolute and relative gains, in norms formation in hybrid orders. Highlighting caveats of the legacy of Huntington's paradigm of military professionalism, the book applies a robust methodology and data collected in four sample regions in Pakistan. It gauges the effects of international and local actors' support in the Security Sector Reform domain and examines instances of civil-military interactions and military transition. The book also analyses determinants and strategies that can influence them to demonstrate the impact of global governance in norms diffusion, as well as of absolute and relative utility gains and incentives in normative change. The author generates a new theory pertaining to international organisations and actors as determinants of transformation processes and consequently sheds new light on the issue of global security governance, especially its impact on civil-military relations and democratisation in hybrid orders. Cornelia Baciu is a researcher at the Centre for Military Studies at the Department of Political Science, University of Copenhagen. She specialises in international security organizations and conflict research. Duncan McCargo is Director of the Nordic Institute of Asian Studies and a professor of political science at the University of Copenhagen. The Nordic Asia Podcast is a collaboration sharing expertise on Asia across the Nordic region, brought to you by the Nordic Institute of Asian Studies (NIAS) based at the University of Copenhagen, along with our academic partners: the Centre for East Asian Studies at the University of Turku, and Asianettverket at the University of Oslo. We aim to produce timely, topical and well-edited discussions of new research and developments about Asia. About NIAS: www.nias.ku.dk Transcripts of the Nordic Asia Podcasts: http://www.nias.ku.dk/nordic-asia-podcast Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/world-affairs
What are the problems with Samuel Huntington's views about civil-military relations? Why do military coups persist in countries such as Pakistan, and what might be done to reduce their likelihood? In a study drawing upon extensive interview research in Pakistan, Cornelia Baciu argues that international organisations can help create a framework of security governance which can have a positive impact upon the political roles assumed by the military. Her 2021 book Civil-Military Relations and Global Security Governance Strategy: Hybrid Orders and the Case of Pakistan investigates the relationship between international security governance, democratic civil-military relations and the relevance of strategy, as well as of absolute and relative gains, in norms formation in hybrid orders. Highlighting caveats of the legacy of Huntington's paradigm of military professionalism, the book applies a robust methodology and data collected in four sample regions in Pakistan. It gauges the effects of international and local actors' support in the Security Sector Reform domain and examines instances of civil-military interactions and military transition. The book also analyses determinants and strategies that can influence them to demonstrate the impact of global governance in norms diffusion, as well as of absolute and relative utility gains and incentives in normative change. The author generates a new theory pertaining to international organisations and actors as determinants of transformation processes and consequently sheds new light on the issue of global security governance, especially its impact on civil-military relations and democratisation in hybrid orders. Cornelia Baciu is a researcher at the Centre for Military Studies at the Department of Political Science, University of Copenhagen. She specialises in international security organizations and conflict research. Duncan McCargo is Director of the Nordic Institute of Asian Studies and a professor of political science at the University of Copenhagen. The Nordic Asia Podcast is a collaboration sharing expertise on Asia across the Nordic region, brought to you by the Nordic Institute of Asian Studies (NIAS) based at the University of Copenhagen, along with our academic partners: the Centre for East Asian Studies at the University of Turku, and Asianettverket at the University of Oslo. We aim to produce timely, topical and well-edited discussions of new research and developments about Asia. About NIAS: www.nias.ku.dk Transcripts of the Nordic Asia Podcasts: http://www.nias.ku.dk/nordic-asia-podcast Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/south-asian-studies
Our guest is Terry O'Daniel, the Director of Security Governance, Risk, and Compliance at Instacart. Terry talks about building high-performing engineering-focused GRC functions. Key Takeaways: Unnecessary overhead on the engineering team Importance of focusing on operational hygiene and security risks. Risk as the common language between security and compliance. Dealing with risk and your engineering team Is shifting left, really the goal? Terry's success formula, REVEALED! Importance of having deep conversations with your engineering functions. The value of shifting left Working with your developer towards better behavior. Security and compliance checkbox must-haves Importance of knowing your risk and having implemented controls. Tips to create a good engineering cultural shift. How to do less and empower your team The ultimate job is to be the second line of defense. Security is all about context About Terry O'Daniel - https://www.linkedin.com/in/terryodaniel Terry O'Daniel leads Security Governance, Risk, and Compliance at Instacart. His specialty is building lean teams focused on applying technology to solve security engineering & GRC challenges at scale via automation and instrumentation--rather than compliance-by-spreadsheet. Before Instacart, Terry built the functions for Security Assurance at Netflix, Security & Technology Risk & Compliance at Salesforce, and GRC within Production Engineering at Yahoo! He also worked in consulting to build security strategy, vCISO, and cyber risk quantification offerings for companies in highly regulated industries. In his spare time, Terry enjoys music, fencing, martial arts, and gaming with his kids. ________ Thank you so much for checking out this episode of The Tech Trek and if you enjoyed this episode, please take a minute and leave a quick rating and review on the Apple podcast app! Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)
Fausto Lendeborg, Co-Founder & CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and prevents misconfiguration of applications of apps being developed. He also introduces concepts such as the shared responsibility model, and policy as code, and explains the importance of scaling across multi-cloud environments, and time to remediation. At the beginning of the discussion Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus. www.secberus.com