POPULARITY
In this episode, Mark Ledlow, as the guest, sits down with Ben Hosking from Panoptic Solutions at the IPSB Close Protection Conference in Nashville. They share their backgrounds, explore career transitions, and discuss the value of industry events in the executive protection field. The conversation touches on the challenges of maintaining a fearless mindset, the critical role of trust in client relationships, and the evolving demands of the security industry. Personal anecdotes bring to life their journeys from military and firefighting roles to leadership positions in corporate and high-profile security sectors.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSHandling Adversity: The podcast emphasizes adapting and persevering through challenges, pointing out that career paths often evolve through unexpected events. Networking and Building Trust: Success in executive protection often hinges on trust and established relationships. Attending conferences and creating long-term partnerships are vital. Executive Protection Landscape: The industry has shifted significantly over the years due to technology and geopolitical changes, increasing the importance of protective intelligence and comprehensive security solutions. Service and Purpose: Many professionals in the industry are driven by a sense of purpose and service, often stemming from military or law enforcement backgrounds. Overcoming Fear: Emphasizes the importance of a fearless mindset, both personally and professionally, to achieve significant growth and success.QUOTES"We're selling trust, not executive protection." "Every overnight success takes about 10 years." "Fear is the mind killer and it stops more dreams than it does physical objections." "Service is absolutely everything; purpose comes through service." "You don't know what your calling is until your thirties or forties."Get to know more about Ben Hosking through the link below.https://www.linkedin.com/in/ben-hosking/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow dives into a refreshing discussion with security experts Bruno Dias and Matt Talbot. They share their extensive backgrounds in law enforcement and recount a harrowing incident involving a school shooting. Bruno discusses the complexities and challenges of managing the aftermath, focusing on the importance of prevention and creating collaborative safety environments. The conversation expands to broader societal issues, including the impact of technology and social media on security and well-being. Both guests emphasize the need for a preventative stance and a compassionate, community-focused approach to addressing and mitigating threats.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSchool Shooting Experience: Bruno shares his firsthand experience with a school shooting and the importance of preparation and response. Prevention Over Reaction: Emphasized the need for proactive threat assessment and the importance of early reporting to prevent violence. Impact of Technology: The conversation highlighted how technology, especially social media, can be both a tool and a threat in behavioral threat assessment. Community and Compassion: Stressed the significance of community support and compassion during times of economic and social hardship. Future Predictions: Discussion on the potential increase in workplace violence and emotional wellness challenges due to economic and political changes.QUOTES"You have to do the work with fidelity...threat assessment is not about risk elimination, it's about risk reduction.""Technology can be an accelerant...it can help validate feelings, stimulate ideas, and make ideas operational.""In desperate moments, people sometimes will resort to trying to control what they can't...often in destructive ways.""We need to use technology as a force for good...it's becoming increasingly difficult for parents and schools to monitor kids' use of technology.""By simply letting people know that you have a violence prevention model, you immediately improve their sense of wellness and security."Get to know more about Dr. Bruno Dias through the link below.https://www.linkedin.com/in/brunodiaspci/Get to know more about Dr. Matt Talbot through the link below.https://www.linkedin.com/in/matt-talbot-phd-lcsw-ccfc-cfmhe-ctm%C2%AE-5a655044/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Reducing personal risk with your organisation's liability insurance Understanding the evolving risk landscape through recent case studies Creating a workplace ethos of shared accountability This episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Michela Resta, Solicitor, CYXCELhttps://www.linkedin.com/in/michelarestacyxcel/Kelly Hagedorn, Partner, ALSTON & BIRDhttps://www.linkedin.com/in/kellyhagedorn/
In this inspiring episode of The Women in the Arena Podcast, we sit down with Janet B. Nalls, Director and Chief of Staff at NetCentrics Corporation. A U.S. Air Force veteran and national security expert with over 25 years of experience, Janet shares her remarkable journey from serving as an intelligence analyst to advising top intelligence and DoD organizations.Janet opens up about her passion for mentorship, leadership, and empowering the next generation of national security professionals. She offers valuable insights into the critical areas of insider threat, counterintelligence, and strategic operations, all while reflecting on the importance of integrity, collaboration, and resilience in a demanding field.Beyond her professional achievements, Janet talks about balancing her role as a devoted mom and lifelong learner. Tune in for an authentic and motivating conversation that highlights what it truly means to lead with vision, heart, and strength.
In this episode, Mark Ledlow and Chuck Andrews discuss various topics including the economic growth in Texas, cultural differences across states, and the significance of diversifying business portfolios. The conversation touches on Chuck's experiences in law enforcement and the security industry, the evolving work ethic in younger generations, and the importance of mental toughness. They also discuss the challenges of organizing large events like Texas Night during hurricane season, the increase in school shootings versus domestic terrorism, and strategies for staying informed and proactive in an ever-changing business landscape. Tune in to gain insights from industry leaders and to understand what it takes to remain fearless amid adversity.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEconomic Growth in Texas: Discussion on the migration of financial and tech companies to Texas, contributing to its growing economy.Cultural Differences: Exploration of cultural contrasts between Texas and other states like California and New York.Relocating and Adapting: Emphasis on the importance of embracing new cultures and adapting to different environmentsWork Ethic: Reflection on the changing work ethic among younger generations compared to older ones.Diverse Experiences: Value of having diverse experiences, from law enforcement to business, in shaping a well-rounded career.School Safety and Behavior: Importance of focusing on the behavioral aspects of students to prevent school shootings, rather than just increasing security hardware.AI and Information Verification: Necessity of verifying sources in the age of AI to avoid being misled.QUOTES"Texas does remain the friendliest state in the United States.""Business is simple. Humans are simple. You just gotta take your time getting to know people.""Focus on the kids in terms of that. Invest in counseling and literally having the kids involve themselves.""With AI, you're gonna be fooled in a very big way. Big decisions are gonna be made and you'll have no idea what's going on.""Treat life in a more meaningful way; build trust and all that good stuff comes. Just gotta be patient. Play the long game."Get to know more about Charles "CHUCK" Andrews through the link below. https://www.linkedin.com/in/charlesandrewscpp/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow and Chuck Andrews, a renowned figure in the security industry known for his extensive global network and profound insights. Chuck shares his journey of building qualitative relationships, his strategies for managing a substantial LinkedIn following, and his future endeavors including a book tour across Europe. The discussion also delves into the challenges and opportunities in the security business, emphasizing the importance of trust and consistent relationship maintenance. Moreover, Chuck touches on issues like the impact of AI on business, geopolitical concerns, and the future of private equity in the industry. The episode is a rich blend of professional advice, personal anecdotes, and strategic insights pivotal for anyone looking to thrive in the security and business landscape.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdversity Management: Insights into how business leaders handle challenges and adversity.Business Optimism: There's a noticeable sense of optimism in the business community, particularly in Texas.Quality vs. Quantity in Networking: The importance of building quality relationships rather than focusing on the number of connections.Trust and Relationships: Trust is the cornerstone of effective business relationships and must be maintained through consistency and integrity.Importance of Adaptability: The need to adapt business strategies in response to changing environments and tech advancements.Upcoming Events: Details on Chuck's book tour and the impactful events he is organizing, including a cruise focused on networking.QUOTES"You ain't seen nothing yet. The next four years is gonna be a Yee-haw version to the 10th power, you watch!""Maintenance of relationships...that's where the work begins.""It's better not to own boats, planes, and trains, but it's better to have friends who have boats, planes, and trains.""Get shit done. Everybody likes to get shit done.""Trust is earned in this business. People are watching you, they're vetting you, even when they're not talking to you.""AI is going to be the biggest investment space.""You will not be able to discern the difference between fact and fiction, right and wrong...that's how dangerous artificial intelligence can be."Get to know more about Charles "CHUCK" Andrews through the link below.https://www.linkedin.com/in/charlesandrewscpp/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Episode Topic In this episode of PayPd, host Kevin Rosenquist explores the urgent and growing issue of online impersonation and digital fraud with Kate Cox, Business Development Lead at Memcyco. As cyber threats become more sophisticated, Memcyco is pioneering real-time detection technology to uncover spoofed websites and protect both businesses and their customers from fraud. Lessons You'll Learn This episode dives deep into how fake websites are created, the mechanics of phishing and spoofing attacks, and the real-time tools being used to stop fraud before it starts. You'll gain insight into the role AI plays on both sides of the cybersecurity battle—enabling cybercriminals and empowering defenders. Kate also shares how businesses can protect their users and build long-term digital trust in an increasingly risky online world. About Our Guest Kate Cox is the Business Development Lead at Memcyco, a company at the forefront of digital fraud prevention. With a strong background in cybersecurity and business strategy, Kate works closely with organizations to implement proactive fraud protection solutions. Her mission is to make the internet safer by helping companies detect and block spoof sites in real time—before the damage is done. Topics Covered The rise and risk of spoofed websites The difference between phishing and spoofing attacks How Memcyco's real-time detection technology works The role of AI in modern cybercrime Building digital trust through proactive protection Emerging threats like session hijacking and man-in-the-browser attacks
Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.
March 26, 2025 ~ The editor in chief of The Atlantic, Jeffrey Goldberg, had been inadvertently added to a group chat on the messaging app Signal, featuring some of the most senior members of the United States government, to discuss a then-imminent U.S. attack on Houthi targets in Yemen earlier this month. Former Congressman Dave Trott joins Guy, Lloyd, and Jamie to discuss the raised questions about the administration's handling of national security.
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe importance of proactive surveillance and intelligence gathering in security.Lessons learned from historical security breaches and attack plots.The significance of cultural fit and adaptability in security teams.Challenges faced by security personnel in adjusting to different operational environments.The necessity to constantly update and share intelligence within the security community.The evolving methods of threat actors and their preparedness.Fred Burton's involvement in upcoming TV and film projects based on his books.QUOTES"The scope of detail that some of these threat actors are engaged with is just frightening.""Intelligence is powerful when done correctly.""You can't run a program without intelligence today.""If you've got a good security team, trained in observation skills, you should be able to spot threat actors ahead of time.""Getting people in and out without being hassled is the kind of value add that we routinely do in this business.""It's amazing what you can do if you just try to blend in and ask questions.""Some degree of protection at public venues is essential, especially for controversial issues.""Surveillance is critical before you get the bodies out there. Get that team out there moving around snooping."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode of The New CISO, host Steve Moore sits down with Michael Mendelsohn, CISO at Majesco, to discuss his journey in cybersecurity—from his early days as a software developer to leading security for a major insurance software company.Michael shares insights into the evolving role of a CISO, the intersection of security and technology, and how curiosity and problem-solving have shaped his career. He dives into his experience building Arcus, an early security tool designed for software inventory and patch management, and how grassroots security engineering played a pivotal role in his professional growth.Other key topics include:✅ The changing landscape of cybersecurity leadership✅ The balance between open-source tools and enterprise security solutions✅ AI's impact on security automation and risk management✅ How security leaders can work effectively with legal teams✅ The importance of curiosity, adaptability, and mentorship in a security careerWhether you're a seasoned security professional or an aspiring CISO, this episode offers valuable insights into the challenges and opportunities of leading security in today's rapidly evolving digital landscape.
Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Paul John Spaulding and Tim Brown, CISO at Solarwinds, to discuss cybersecurity talent, diving into the skills gap faced by security leaders today and what can be done about it. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com
In this episode, Mark Ledlow and Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author, discuss the surrounding potential threats posed by an open border policy and the presence of terrorist cells. The discussion delves into the analytical evidence of terrorism threats linked to transnational entries, highlighting that no domestic terror acts have been documented as originating from the southern border. The conversation touches on broader security issues, including high-profile plots thwarted in the past, school shootings, and the impact of geopolitical events on domestic safety. They emphasize the importance of analytical rigor and logical decision-making in the security and protective services industry, comparing different attitudes toward personal protection across regions and discussing the implications of various security measures for high-profile individuals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSSecurity Concerns on Open Borders: Despite the high number of migrants, there has not been a domestic act of terror directly linked to transnational terrorists from the southern border.Domestic vs. Geopolitical Threats: Domestic threats such as school shootings are more frequent and concerning compared to geopolitical and international threats.Historical Predictive Failures: The U.S. has historically struggled to predict major geopolitical events, regardless of advancements in intelligence.Adaptation and Responsiveness: The executive protection industry often operates reactively, highlighting the need for better proactive measures and adequate resourcing.Regional Differences in Security Perception: Security needs and perceptions differ greatly across the U.S., with coastal regions being more open to private security compared to more self-reliant attitudes in middle America.QUOTES"To the best of my knowledge, there never has been a domestic act of terror directly linked to a transnational terrorist coming from the southern border.""Trust me, you'll be the first one to know if I uncover something that you really need to be concerned about for you or your family.""Our nation seems to always be surprised... I want to believe that we're better today at anticipating surprise, but history has shown we're not.""Most CEOs today are almost more receptive to that kind of low-key protection."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
In this episode, we sit down with Sounil Yu, Co-Founder and CTO at Knostic, a security company focusing on need-to-know-based access controls for LLM-based Enterprise AI.Sounil is a recognized industry security leader and the author of the widely popular Cyber Defense Matrix.Sounil and I dug into a lot of interesting topics, such as:The latest news with DeepSeek and some of its implications regarding broader AI, cybersecurity, and the AI arms race, most notably between China and the U.S.The different approaches to AI security and safety we're seeing unfold between the U.S. and EU, with the former being more best-practice and guidance-driven and the latter being more rigorous and including hard requirements.The age-old concept of need-to-know access control, the role it plays, and potentially new challenges implementing it when it comes to LLM'sOrganizations rolling out and adopting LLMs and how they can go about implementing least-permissive access control and need-to-knowSome of the different security considerations betweenSome of the work Knostic is doing around LLM enterprise readiness assessments, focusing on visibility, policy enforcement, and remediation of data exposure risks----------------Interested in sponsoring an issue of Resilient Cyber?This includes reaching over 16,000 subscribers, ranging from Developers, Engineers, Architects, CISO's/Security Leaders and Business ExecutivesReach out below!-> Contact Us! ----------------
Tyler Sweatt , CEO of Second Front Systems, joins host Aileen Blackon Leaders and Legends to discuss leadership, innovation, and the challengesfaced by national security leaders in today's rapidly changing environment.As the chief executive officer of Second Front Systems, Sweatt works to bridgethe gap between innovative technologies and national security organizations. In addition, he serves as a technical advisor at Pallas Advisors and a partner atthe non-profit Silicon Valley Defense Group. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Tyler Sweatt , CEO of Second Front Systems, joins host Aileen Black on Leaders and Legends to discuss leadership, innovation, and the challenges faced by national security leaders in today's rapidly changing environment. As the chief executive officer of Second Front Systems, Sweatt works to bridge the gap between innovative technologies and national security organizations. In addition, he serves as a technical advisor at Pallas Advisors and a partner at the non-profit Silicon Valley Defense Group. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Η κλιματική αλλαγή, και όχι η στρατιωτική απειλή της Κίνας, είναι το μεγαλύτερο ζήτημα ασφάλειας που αντιμετωπίζει η Αυστραλία, προειδοποιούν εμπειρογνώμονες.
9.27.2024 #RolandMartinUnfiltered: Trump 2.0's DOJ & Policing, National Security Leaders Endorse VP Harris, Project 2025 We saw what the Justice Department looked like under Trump. Tonight, a special panel will examine what a Trump 2.0 DOJ would look like. The list of those supporting Vice President Kamala Harris is growing. Over 700 National Security Leaders have Endorsed a Harris presidency. We'll talk to one of the National Security Leaders for America members. The CEO Black Economic Alliance will break down the Vice President's economic plan. New York Mayor Eric Adams makes his first court appearance on federal charges. A Michigan judge gets demoted after handcuffing a teenage girl for falling asleep in his courtroom during a field trip. We'll talk to a Law School graduate who breaks Down Project 2025 on social media. Download the #BlackStarNetwork app on iOS, AppleTV, Android, Android TV, Roku, FireTV, SamsungTV and XBox http://www.blackstarnetwork.com The #BlackStarNetwork is a news reporting platforms covered under Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.See omnystudio.com/listener for privacy information.
Alexandra Rose is the Director, Government Partnerships & Counter Threat Unit at Secureworks. In this episode, she joins host Heather Engel to discuss the value of threat intelligence for security leaders, including how it can reduce organizational risk, inform strategic decision-making, and more. Secureworks is a leader in cybersecurity, empowering security and IT teams worldwide to accelerate effective security operations. Learn more about our sponsor at https://secureworks.com.
Retired Army Major General Randy Manner of National Security Leaders for America joins Joan Esposito at the DNC to talk about his group's endorsement of Kamala Harris for president. Catch "Joan Esposito: Live, Local and Progressive" weekdays from 2:00 to 5:00 p.m. on WCPT.
Send us a Text Message.Episode Disclaimer - The views presented in this episode are those of the speaker and do not necessarily represent the views of the United States Department of Defense (DoD) or its components. Dr. Diane DiEuliis, Ph.D. is a Distinguished Research Fellow at National Defense University ( NDU - https://www.ndu.edu/ ), an institution of higher education, funded by the United States Department of Defense, aimed at facilitating high-level education, training, and professional development of national security leaders. Her research areas focus on emerging biological technologies, biodefense, and preparedness for biothreats. Specific topic areas under this broad research portfolio include dual-use life sciences research, synthetic biology, the U.S. bioeconomy, disaster recovery, and behavioral, cognitive, and social science as it relates to important aspects of deterrence. Dr. DiEuliis currently has several research grants in progress, and teaches in foundational professional military education. Prior to joining NDU, Dr. DiEuliis was Deputy Director for Policy, and served as Deputy Assistant Secretary for Policy and Planning in the Office of the Assistant Secretary for Preparedness and Response (ASPR), Department of Health and Human Services. She coordinated policy and research in support of domestic and international health emergencies, such as Hurricane Sandy, and Ebola outbreaks. She was responsible for implementation of the Pandemic All-Hazards Preparedness Act, the National Health Security Strategy, and supported the Public Health Emergency Medical Countermeasures Enterprise (PHEMCE). From to 2007 to 2011, Dr. DiEuliis was the Assistant Director for Life Sciences and Behavioral and Social Sciences in the Office of Science and Technology Policy (OSTP) in the Executive Office of the President. During her tenure at the White House, she was responsible for developing policy in areas such as biosecurity and biodefense, synthetic biology, social and behavioral science, scientific collections, and biotechnology. Dr. DiEuliis also worked to help coordinate agency response to public health issues such as the H1N1 flu. Prior to working at OSTP, Dr. DiEuliis was a program director at the National Institutes of Health (NIH), where she managed a diverse portfolio of neuroscience research in neurodegenerative diseases. She completed a fellowship at the University of Pennsylvania in the Center for Neurodegenerative Disease Research and completed her postdoctoral research in the NIH Intramural research program, where she focused on cellular and molecular neuroscience. Dr. DiEuliis is a National Merit Scholar, and has a Ph.D. in biology from the University of Delaware in Newark, Delaware. She is the author of over 70 publications. Important Episode Link - The Unique Role of Federal Scientific Collections: Infrastructure Generating Benefits, Serving Diverse Agency, published by Smithsonian Institution Scholarly Press on behalf of the Interagency Working Group on Scientific Collections - https://doi.org/10.5479/si.24559996 Support the Show.
Mark Ledlow features an in-depth discussion with a security expert, Adam Korn. They dive into the complexities of national security, focusing on nuclear threats, the protection of radiological materials, and the essential practices for securing them against potential terrorists. Discussions extend to the training of SWAT teams and responders to handle radiological threats, emphasizing the critical nature of best practices in security measures. Adam, with a background in criminal justice and international affairs, shares insights from his extensive experience at the National Nuclear administration and his current role as a security consultant. The conversation covers the convergence of physical and cybersecurity, the importance of emotional intelligence in the security industry, and the challenges and opportunities for training in the digital age. The episode also touches on the necessity for impactful onboarding and development programs that go beyond mere compliance, aiming to genuinely empower and prepare employees for safety and security challenges. Furthermore, they discuss upcoming regulations, like California's Senate Bill 553, and the pivotal role of detailed and effective training to meet and exceed such requirements.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSThe convergence of physical security and cybersecurity is essential in modern security strategies.Emotional intelligence (EQ) is crucial in security roles, aiding in de-escalation and effective communication.Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application.The importance of preparing for emerging threats like AI, which can enhance security measures when embraced effectively.Workplace violence prevention and compliance, as mandated by Senate Bill 553 in California, necessitate proactive training and policy development.QUOTES"The ideal training is in live interaction...My second most favorite is when you're having a live video session, but then again, people start to disengage because they're attached to a computer.""Effective training goes beyond check-the-box modules, requiring engaging, story-driven approaches to ensure retention and application."Get to know more about Adam Corn:LinkedIn: https://www.linkedin.com/in/adamcorn1/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
The State Department investigates an alleged breach. The FCC looks at regulating connected vehicles. A big-tech consortium hopes to mitigate AI-related job losses. Google aims to thwart cookie-thieves. SurveyLama exposes sensitive info of over four millions users. Omni Hotels & Resorts is recovering from a cyberattack. A national cancer treatment center suffers a breach. How cyber is approached on both sides of the pond. In our Industry Voices segment , George Jones, CISO at Critical Start, discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Playing the identity theft long-game. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On Industry Voices, guest George Jones, CISO at Critical Start, joins us to share thoughts on the topic "Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders." George discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Selected Reading Threat Actor Claims Classified Five Eyes Data Theft (Infosecurity Magazine) Automakers and FCC square off over potential regulations for connected cars (The Record) Big tech companies form new consortium to allay fears of AI job takeovers (TechCrunch) Amazon is cutting hundreds of jobs in its cloud computing unit AWS (NPR) Google Proposes Method for Stopping Multifactor Runaround (GovInfo Security) Google fixes two Pixel zero-day flaws exploited by forensics firms (Bleeping Computer) SurveyLama data breach exposes info of 4.4 million users (Bleeping Computer) Omni Hotels confirms cyberattack behind ongoing IT outage (Bleeping Computer) The US or the UK: Where Should You Get a Cybersecurity Job? (GovInfo Security) US Cancer Center Data Breach Impacting 800,000 (SecurityWeek) Iowa sysadmin pleads guilty to 33-year identity theft of former coworker (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Shiva Nathan, Founder and CEO of Onymos, provides insight to recent government requirements for PII protection and how security leaders can implement them.
Given the macroeconomic climate, security leaders are constantly tasked to do more with less – you're being asked to take on more responsibility and protect your organizations against increasing cyber threats while balancing evolving regulatory frameworks and third-party vendor risk management. In this episode, Tia Hopkins, Chief Cyber Resilience Officer at eSentire, and Greg Crowley, Chief Information Security Officer at eSentire, discuss the trends they are seeing from a budgetary perspective and how security leaders can build a more resilient security operation. Key topics of discussion include: Most common types of cyber threats impacting businesses (e.g., the ‘as-a-service' business model, nation-state cyberattacks, etc.) Why security leaders need to shift from a cyber risk reduction mindset to building cyber resilience mindset The two options that security leaders have to build a more resilient security operation (i.e., DIY approach vs. outsourcing 24/7 threat detection, investigation, and response capabilities) How to build alignment with finance leaders to get the cybersecurity investment you need --- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.
What are CISOs to make of recent rulings against their colleagues and increasing scrutiny from the SEC, whose new reporting rules are dnow in effect? Host Pam Kubiatowski sits down with renowned Voya Financial CISO and FinTech veteran Stacy Hughes to discuss how the new rules affect incident response, the importance of CEO support, and considerations unique to the financial industry.
In an era characterized by the profound interconnection of technology, business strategy, and people within the realm of cybersecurity, the need for leaders with transformative capabilities has never been more critical. Join us as we explore the SANS Transformational Triad, an integral framework encompassing SANS' three most advanced security courses meticulously crafted for both existing and aspiring security leaders as well as Chief Information Security Officers (CISOs). This conversation will not only equip you with cutting-edge insights but also fortify your strategic ability to navigate the complex and dynamic landscape of cybersecurity leadership.Wait Just an Infosec is produced by the SANS Institute. You can watch the full, weekly Wait Just an Infosec live stream on the SANS Institute YouTube, LinkedIn, Twitter, and Facebook channels on Tuesdays at 10:00am ET (2:00pm UTC). Feature segments from each episode are published in a podcast format on Wednesdays at noon eastern. If you enjoy the Wait Just an Infosec live, weekly show covering the latest cybersecurity trends and news and featuring world-renowned information security experts, be sure and become a member of our community. When you join the SANS Community, you will have access to cutting edge cyber security news, training, and free tools you can't find anywhere else. Learn more about Wait Just an Infosec at sans.org/wjai and become a member of our community at sans.org/join. Connect with SANS on social media and watch the weekly live show: YouTube | LinkedIn | Facebook | Twitter
In today's episode, we welcome Darren Kane, Chief Security Officer at Australia's National Broadband Network to share his thoughts on the evolving role of security in the C-suite. Join us as Darren sits down with Clarke Rodgers, Director of AWS Enterprise Strategy to discuss the differences between the CISO and CSO roles and why “dropping the I” may be the next step in the evolution of security leadership.
What challenges do aspiring cybersecurity leaders face while trying to join the field? What can current security leaders do to help them? Answer these questions and more with George Gerchow, Chief Security Officer at Sumo Logic.
What do federal guidelines say about quantum computing preparation? How do security leaders prepare for future risks? Answer these questions and more on this episode of The Security Podcasts with Greg Wetmore, Vice President of Software Development at Entrust.
The long-standing divide between tech executives and security leaders has widened of late, says VP and Principal Analyst Jinan Budge. What's behind the tension, and what can be done to fix it? Budge shares insights from her latest research this week on What It Means.
All links and images for this episode can be found on CISO Series. When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining us is our special guest, Tim Brown, CISO, Solarwinds. Thanks to our podcast sponsor, Push Security Do you have visibility of all the SaaS apps your employees are storing corporate data on? Are employees protecting all their accounts against identity-based attacks? Discover all the SaaS your employees use - including shadow apps and identities - and secure your data. Find out more at pushsecurity.com. In this episode: When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? During a major incident, which stress is more difficult to manage? Your own, or those around you? How is this everyone's concern?
In this episode, host Steve Morgan is joined by Mic McCully, Field CTO, and Jamie Smith, Product Marketing Director, at Snyk. Together, they discuss software supply chain attacks, what CISOs and security leaders need to know, and more. To learn more about our sponsor, Snyk, the developer security company, visit https://snyk.io
In this Security Leaders conversation, we're catching up with CJ Moses, Chief Information Security Officer at AWS, on the topic of vulnerability management. Join CJ and Clarke Rodgers, Director of AWS Enterprise Strategy, as they discuss basic cyber-defense strategies that have enormous impact.
There's a lot going on in the cybersecurity industry today -- new SEC incident and security program reporting requirements, the discovery of pervasive Chinese malware in critical infrastructure systems and the wild west of generative AI adoption. In this episode of CISO Talk, Jennifer Minella and Mitch Ashley discuss security topics that are top-of-mind for security leaders.
As part of our ongoing coverage on cybercrime and cybersecurity, we recently spoke to several top experts about how they see it. On this episode, Jelle Wieringa, Security Awareness Advocate at KnowBe4, is joined by Bobby Ford, Senior Vice President and Chief Security Officer at HPE; Alissa Abdullah, aka Dr Jay, Deputy CSO and Senior VP of Emerging Corporate Security Solutions at Mastercard; Bret Arsenault, CVP & CISO at Microsoft; and Devon Bryan, Global CISO at Carnival Corporation. To learn more about our sponsor, KnowBe4, visit https://knowbe4.com
Guests: Allie Mellen, Senior Analyst at Forrester [@forrester]On Linkedin | https://www.linkedin.com/in/hackerxbella/On Twitter | https://twitter.com/hackerxbellaJeff Pollard, VP & Principal Analyst at Forrester [@forrester]On LinkedIn | https://www.linkedin.com/in/jpollard96/On Twitter | https://twitter.com/jeff_pollard2____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this new episode of Redefining CyberSecurity with Sean Martin, Allie Mellen, and Jeff Pollard engage in an in-depth conversation exploring security metrics' critical role and power in the infoSec decision-making processes. Throughout the dialogue, listeners can gain an understanding of the importance of implementing relevant metrics, such as Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR), for tracking growth within cybersecurity contexts. However, there's much more to metrics than just these two figures.Both Allie and Jeff emphasize that metrics should be perceived not merely as numerical values but as valuable guideposts aiding decision-making. This perspective, attributed to the Lean Startup philosophy by Eric Ries, encourages using metrics to guide future actions, understand current decisions, or evaluate past outcomes. They stress that metrics should have a genuine purpose and contribute meaningfully rather than just providing quantitative data.Furthermore, the conversation underscores the relevance of metrics to the decision-making audience. Allie and Jeff agree that metrics should differentiate between what matters only to your team and what's necessary for strategic decisions in the broader organization. They become truly impactful by ensuring metrics support decision-making and reach the right audience, whether it's senior leadership, the security program, or the tactical metric practitioners.Storytelling's role is highlighted as vital in presenting these metrics to various stakeholders, making the data more meaningful, understandable, and actionable. The conversation extends the notion of metrics, applying concepts like readmission rates, commonly used in healthcare, to measure incident recurrence in cybersecurity.The trio also spotlights the need for a synergistic relationship between the Security Operations Center (SOC) and Vulnerability Risk Management (VRM). Such a relationship fosters improved security posture through effective incident management and prevention, with Allie reasoning that translating data into something meaningful for other business units is crucial.Touching upon individual metrics in the context of career progression, both Allie and Jeff emphasize the necessity for individuals to define their career-oriented metrics based on their personal goals and organizational expectations. This understanding can help leaders prove their program's success and influence others.The conversation ultimately underscores the importance of the right data sources for calculating meaningful metrics. Without the correct data, generating truly impactful and actionable metrics becomes impossible. Jeff cites an example of a financial organization that used a unique metric to measure insider risk, emphasizing the complexities and challenges of deriving meaningful and actionable cybersecurity metrics.There's a lot to unpack in this conversation. Listen to the entire episode so you don't miss a beat.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guests: Allie Mellen, Senior Analyst at Forrester [@forrester]On Linkedin | https://www.linkedin.com/in/hackerxbella/On Twitter | https://twitter.com/hackerxbellaJeff Pollard, VP & Principal Analyst at Forrester [@forrester]On LinkedIn | https://www.linkedin.com/in/jpollard96/On Twitter | https://twitter.com/jeff_pollard2____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this new episode of Redefining CyberSecurity with Sean Martin, Allie Mellen, and Jeff Pollard engage in an in-depth conversation exploring security metrics' critical role and power in the infoSec decision-making processes. Throughout the dialogue, listeners can gain an understanding of the importance of implementing relevant metrics, such as Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR), for tracking growth within cybersecurity contexts. However, there's much more to metrics than just these two figures.Both Allie and Jeff emphasize that metrics should be perceived not merely as numerical values but as valuable guideposts aiding decision-making. This perspective, attributed to the Lean Startup philosophy by Eric Ries, encourages using metrics to guide future actions, understand current decisions, or evaluate past outcomes. They stress that metrics should have a genuine purpose and contribute meaningfully rather than just providing quantitative data.Furthermore, the conversation underscores the relevance of metrics to the decision-making audience. Allie and Jeff agree that metrics should differentiate between what matters only to your team and what's necessary for strategic decisions in the broader organization. They become truly impactful by ensuring metrics support decision-making and reach the right audience, whether it's senior leadership, the security program, or the tactical metric practitioners.Storytelling's role is highlighted as vital in presenting these metrics to various stakeholders, making the data more meaningful, understandable, and actionable. The conversation extends the notion of metrics, applying concepts like readmission rates, commonly used in healthcare, to measure incident recurrence in cybersecurity.The trio also spotlights the need for a synergistic relationship between the Security Operations Center (SOC) and Vulnerability Risk Management (VRM). Such a relationship fosters improved security posture through effective incident management and prevention, with Allie reasoning that translating data into something meaningful for other business units is crucial.Touching upon individual metrics in the context of career progression, both Allie and Jeff emphasize the necessity for individuals to define their career-oriented metrics based on their personal goals and organizational expectations. This understanding can help leaders prove their program's success and influence others.The conversation ultimately underscores the importance of the right data sources for calculating meaningful metrics. Without the correct data, generating truly impactful and actionable metrics becomes impossible. Jeff cites an example of a financial organization that used a unique metric to measure insider risk, emphasizing the complexities and challenges of deriving meaningful and actionable cybersecurity metrics.There's a lot to unpack in this conversation. Listen to the entire episode so you don't miss a beat.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance. Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare. Check out Duality's webinar, Why Data, Privacy, & Security Leaders are Key to Growth & Innovation Impactful Moments: 00:00 - Introduction 01:09 - What is homomorphic encryption? 04:03 - Misconceptions of security and privacy 06:25 - What is Duality's mission? 10:04 - Does Google Drive use homomorphic encryption? 13:08 - What homomorphic encryption enables 22:08 - Innovations that Duality is working on 24:37 - Secure data analytics and Homomorphic encryption 31:41 - Impact of AI and LLMs on security and privacy Links: Stay in touch with Derek Wood on LinkedIn: https://www.linkedin.com/in/drwood/ Learn more about Duality Technologies: https://dualitytech.com/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
Check out this interview from the ESW Vault, hand picked by main host Adrian Sanabria! This segment was originally published on September 29, 2021. No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/vault-esw-2
In this episode of The New CISO, Steve is joined by guest Michael Meis, Associate CISO of the University of Kansas Health System.Beginning his career in the U.S. Army Signal Corp, Michael eventually transitioned into government consulting and the private sector. Today, he shares his philosophies on leadership and ownership in the cybersecurity field. Listen to the episode to learn more about his extensive technology background, the importance of inter-department friendships, and how he helps fellow service members make their professional transitions.Listen to Steve and Adam discuss how to navigate bureaucracy and adapt to corporate environments:Meet Michael (1:41)Host Steve Moore introduces our guest today, Michael Meis. Michael has been in IT and security for fifteen years and healthcare for two years. Michael met Steve a year ago during a security conference, leading to their connecting around the industry and their philosophies on leadership.Michael also reflects on his role in the military, which began with him working with radios and evolved into performing general technology support.Getting His Start (6:09)Michael was always interested in computers but initially never saw it as a career. He decided to join the military instead. However, his military recruiter encouraged him to take a tech-related job, and his security journey began. This first army signal corps job was less computer-heavy than expected, but Michael still learned a lot.Dealing With Corporate Politics (9:07)For ten years, Michael worked as a government consultant. This experience taught Michael to navigate complex bureaucratic dynamics to get past red tape.Michael highlights the importance of having solid relationships in different departments to get things done. You can determine which workplace rules to bend when you understand how things are and how your organization operates. Finding a Path (14:01)Michael expands on the importance of relationships in a corporate setting. You can leverage those relationships when needed to promote your department's agendas.The more you understand your organization's rules and politics, the less friction you will face, and the more you can build a trusted security culture. Government Challenges (22:44)Steve presses Michael on his quote, “Governance is important, but alone won't solve all of your problems.”Anyone who has worked in government understands that there are always challenges within its IT environments. Since the government has total control over its IT, Michael learned early on that more than governance is needed to perfect these systems. Collaboration is needed between parties.Excuses, Excuses (28:13)Michael shares the security community's common excuses that tend to irk him. Budget professionals can be challenging to work with from a leadership perspective. He also gets frustrated when people use a lack of training as a reason not to try something. Michael values training, but he understands that sometimes you have to take action before that formal training comes.Behavioral Norms (33:50)Michael explores the behavioral norms that came out of his military service.Learning how to function in a corporate environment is essential for people to know when leaving the military. The benefits of this experience were the rigor and structure, which can provide direction in life. On the flip side, it can be challenging to transition from that structure because you can grow dependent on it.Helping Others (39:07)As a leader, Michael tries to help other service members remove their need for a manual when making corporate transitions. That way, they can learn to embrace their...
This week, we are joined by veteran CISO and CEO of Executive Advisors Group, Matt Stamper to discuss what it is leaders in the Cyber industry should actually take away from the Joe Sullivan Trial.Matt has extensive knowledge of Incident Response and Data Privacy. I couldn't think of a better guest to have with me to have a dialog on this topic. Get full access to Infosec Sidekick at infosecsidekick.substack.com/subscribe
Guests: Sarah Freeman, Principal Cyber Engagement Operations Engineer, MITRE [@MITREcorp]On LinkedIn | https://www.linkedin.com/in/sarah-freeman-7817b121/At RSAC | https://www.rsaconference.com/experts/sarah-freemanMegha Kalsi, Director - Digital, Cybersecurity, AlixPartners [@AlixPartnersLLP]On LinkedIn | https://www.linkedin.com/in/meghakalsi/At RSAC | https://www.rsaconference.com/experts/megha-kalsiKristy Westphal, Director, Information Security and Operations, HealthEquity [@HealthEquity]On LinkedIn | https://www.linkedin.com/in/kmwestphal/At RSAC | https://www.rsaconference.com/experts/kristy-westphal____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesGiven recent changes in the financial posture in nearly every economy, many organizations are faced with challenges from rising interest rates, bank failures, and dissipating venture capital. With this, and other fiscal issues that may be surfacing, how do security leaders look at budgets differently? In this session, we'll explore:How, where — and on which technologies — are organizations spending their money earmarked for cybersecurity?How do they know they are spending the right amount of money in the right places at the right times?How do security teams organize their thoughts, plans, and budget requests — and how do they present them to executive staff — to ensure they are speaking to these fiscal challenges they face in the context of the rest of the business?____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
Guests: Sarah Freeman, Principal Cyber Engagement Operations Engineer, MITRE [@MITREcorp]On LinkedIn | https://www.linkedin.com/in/sarah-freeman-7817b121/At RSAC | https://www.rsaconference.com/experts/sarah-freemanMegha Kalsi, Director - Digital, Cybersecurity, AlixPartners [@AlixPartnersLLP]On LinkedIn | https://www.linkedin.com/in/meghakalsi/At RSAC | https://www.rsaconference.com/experts/megha-kalsiKristy Westphal, Director, Information Security and Operations, HealthEquity [@HealthEquity]On LinkedIn | https://www.linkedin.com/in/kmwestphal/At RSAC | https://www.rsaconference.com/experts/kristy-westphal____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesGiven recent changes in the financial posture in nearly every economy, many organizations are faced with challenges from rising interest rates, bank failures, and dissipating venture capital. With this, and other fiscal issues that may be surfacing, how do security leaders look at budgets differently? In this session, we'll explore:How, where — and on which technologies — are organizations spending their money earmarked for cybersecurity?How do they know they are spending the right amount of money in the right places at the right times?How do security teams organize their thoughts, plans, and budget requests — and how do they present them to executive staff — to ensure they are speaking to these fiscal challenges they face in the context of the rest of the business?____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
In today's episode we explore why positive choices are critical in conflict de-escalation. As church security leaders, it's important to understand how positive choices can be used to empower individuals to make the right decisions in potentially volatile situations. Join me as I take you through a real-life example of how giving a highly agitated person positive choices can help you de-escalate conflicts effectively. If you're interested in learning more, be sure to check out my Amazon best-selling book, "10 Powerful Strategies for Conflict De-Escalation," available here: https://a.co/d/5SEkSQ8
Greg Crowley, CISSP, CISM is the Chief Information Security Officer at eSentire. In this episode, Greg joins host Steve Morgan in the Cybercrime Magazine studios to discuss what it means to do more with less in the cybersecurity space, alongside sharing some advice for security leaders looking to reprioritize their spends, and more. To learn more about eSentire, visit https://esentire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In the leadership and communications section, Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape, Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025, How to Empower Teams, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw295
In the leadership and communications section, Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape, Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025, How to Empower Teams, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw295
Never make this mistake in the job interview process! Make sure you know how to negotiate for more money in 2023. Make sure you know to succeed in 2023 - ace the job interview, negotiate more money and change your life. Sort of time? Go to 18:48 (Never answer this question! ) Chloé Messdaghi shares her tips for job success in 2023. She also discuss the issues with Ethical Hacking and how you need to protect yourself. // MENU // 00:00 - Intro 00:31 - Chloé Messdaghi Introduction 00:37 - Advice on Where to Start 04:02 - Tribe of Hackers 04:56 - Blue Team vs Red Team 08:07 - Degrees or Certs or Both? 09:01 - Common Mistakes 11:45 - Alternative Training Paths 14:17 - How to Recognise a Good Company 17:11 - Salary vs Equity 18:48 - Salary Ranges and Negotiations 23:04 - Interview Tips 24:31 - Company Red Flags 26:25 - Hacking is Not a Crime 29:28 - 2017 Equifax Data Breach 30:07 - DJI Bug Bounty Case 33:47 - Hackers Don't wear Hoodies, They wear Capes 35:33 - Aaron Swartz Case 39:11 - Reagan Watches Wargames // CFAA 40:17 - What is the DMCA 41:16 - DMCA // Right to Repair Movement 43:23 - Are Hacker Rights Improving? 47:03 - Bug Bounty Programmes 47:27 - Closing Thoughts 49:33 - Outro // Books and courses // Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World: https://amzn.to/3EVnbVS Tribe of Hackers Blue Team: https://amzn.to/3Vt7BYy Tribe of Hackers Red Team: https://amzn.to/3OXhGdz Tribe of Hackers for Security Leaders: https://amzn.to/3B0xtmg Portswigger course: https://portswigger.net/web-security // Chloé's Social // Twitter: https://twitter.com/ChloeMessdaghi LinkedIn: https://www.linkedin.com/in/chloemess... Linktr: https://linktr.ee/chloemessdaghi // David's Social // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube Main Channel: https://www.youtube.com/davidbombal YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN... YouTube Clips Channel: https://www.youtube.com/channel/UCbY5... YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC... Apple Podcast: https://davidbombal.wiki/applepodcast Spotify Podcast: https://open.spotify.com/show/3f6k6gE... jobs cybersecurity cybersecurity jobs infosec careers 2023 best careers 2023 best jobs 2023 infosec jobs jobs 2023 hacking ethical hacking hacking jobs hack the box try hack me pico ctf htb thm cyber security career cybersecurity cybersecurity careers ceh oscp ine elearn security ejpt oscp oscp certification ctf for beginners first job cybersecurity job kali kali linux #jobs #hacking #cybersecurity
Debbie Gordon is the CEO at Cloud Range. In this episode of Cybercrime Radio, Debbie joins host Steve Morgan to discuss some of Cloud Range's most valuable content for CISOs and security leaders, including the Cloud Range Blog, FlexLabs, and more. To learn more about our sponsor, visit https://cloudrangecyber.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
3 facts about Ian Henderson: Ian has promoted over 100 security professionals to leadership positions In his 23+ years of experience, he has held many roles ranging from Security Officer to Field Operations Manager He is involved in martial arts and looking to compete in Judo tournaments In this episode: The impact of mentorships in a security career Professionalizing the industry through security networks Inclusive leadership training & selecting the right people for leadership positions What it takes to be a leader Ian's advice for young security professionals The importance of embracing company and personal values to become a leader Having different experiences can make you a stronger leader
In this episode of Cybercrime Radio, host Steve Morgan is joined by Gordon Lawson, CEO at Conceal, and Ron Gula, President and Co-Founder of Gula Tech Adventures, who is on the Board of Advisors for Conceal. Together, they discuss ‘good security,' how vulnerability scanning, penetration testing, and the practice of finding malicious implants are all part of it, and more. To learn more about our sponsor, visit https://conceal.io
高度な技倆と判断力を持つセキュリティ技術者を「トップガン人材」と呼ぶようになったのは 2010 年代前半頃だった気がする。さすがに取材メモは残っていないが、記者会見で佐々木教授かどなたかのお言葉として聞いた記憶がある。
Ian Dunlop (pictured) is the chair of the Australian Security Leaders Climate Group and leads listeners through a webinar during which they hear about the unfolding challenges of climate change. The webinar was entitled "A Nation at Risk". The Melbourne Age newspaper published an editorial today (August 8) pointing out that arrival at a position to tackle climate change will be "messy" - it says: "It's messy, but co-operation on climate is the only way forward". Other climate links are: "Can Kenya's youngest MP candidate step up the climate fight?"; "Grattan on Friday: Government win on climate legislation leaves opposition looking like a stranded asset"; "Scientists Say It's ‘Fatally Foolish' To Not Study Catastrophic Climate Outcomes"; "We're no rubber stamp on climate: Pocock, Lambie warn Labor on climate bill"; "Lest we forget Philip Sutton's Climate Emergency legacy: how we restore a safe climate"; "Why climate change hits some communities harder than others"; "China warns that its temperatures are rising faster than global average"; Enjoy "Music for a Warming World". --- Send in a voice message: https://anchor.fm/robert-mclean/message
Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_Joyce_Brocaglia_Article.pdf Brocaglia. 2019. An Insider's View of the CISO Search In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 33-35. Fitzgerald, T. CRC Press, Boca Raton, Fl. Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/ Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today. Show Notes: https://securityweekly.com/csp79
All links and images for this episode can be found on CISO Series Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gatekeepers. What can be done to improve recruiting of CISOs? Check out this post and this post for the discussions that are the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn with our guest Ty Sbano (@tysbano), CISO, Vercel. Thanks to our podcast sponsor, Thinkst Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents. In this episode: What can be done to improve CISO recruiting? Is there a disconnect between HR and what the company actually needs regarding a position? How long should the interview process take?
Debbie Gordon is the CEO at Cloud Range. In this episode of Cybercrime Radio, Debbie joins host Steve Morgan to discuss the many challenges that CISOs and security leaders are facing today, how Cloud Range is working to resolve these issues, and more. To learn more about our sponsor, visit https://cloudrangecyber.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 35: Building a Consulting Career in the Cyber Security Industry with Patrick C. MillerPub date: 2022-04-19Derek Harp is happy to have Patrick Miller joining him today for another episode in the Security Leaders series! Patrick is a well-known legend in the ICS cyber security space. He is currently the Chief Executive Officer of Ampere Industrial Security. Patrick Miller has dedicated his career to the protection and defense of critical infrastructures. As President and CEO of Ampere Industrial Security, he is a trusted independent security and regulatory advisor for industrial control systems worldwide. In addition to his role at Ampere, Mr. Miller is also the founder, director, and president emeritus of EnergySec and US. Coordinator for the Industrial Cybersecurity Center. Patrick's diverse background spans the Energy, Telecommunications, Water, Wastewater, Manufacturing, and Financial Services verticals, including key positions with regulatory agencies, private consulting firms, utility asset owners, and commercial organizations. Patrick was instrumental in the establishment of the NERC CIP standards in the US as a drafting team member and the first CIP auditor in the nation. He currently serves on or contributes to multiple NERC CIP guidance and standards drafting teams. Patrick is also an instructor for the ICS456 NERC CIP course with the SANS Institute.Patrick loves tech and the outdoors! As well as being a technologist, he is also a chef, a keen kayaker, a father, and a builder of communities! In this episode of the (CS)²AI Podcast, he tells his modern-day superhero origin story, talks about the various milestones in his professional journey, and shares valuable nuggets of advice for people from different backgrounds who would like to get into the cyber security industry. You won't want to miss this episode if you would like to make a career in cyber security, become a better security professional, or start a cybersecurity business of your own. Stay tuned for more!Show highlights:Entrepreneurship is in Patrick's blood. (3:05)Growing up in the early days of technology, Patrick was lucky enough to get the new tech as it came out. (4:15)Patrick was using cutting-edge technology to do a senior capstone biology project just before he dropped out of school to do tech. (6:32)Any kind of background can be helpful for you as a security professional. (9:00)How phone systems have advanced and transformed over the last few decades. (10:30)Patrick's first “hacking job”. (11:29)Patrick talks about when he decided to specialize in security and the point when industrial security first intersected with his journey. (13:23)Patrick discusses his stint as a regulator for WECC (Western Electricity Coordinating Council.) (17:54)Joining standards bodies in the early stage can help people break into the cyber security industry. (24:26)What motivated Patrick to start a consulting firm? (26:14)The Dawn of Energy Sec (Energy Sector Security Consortium). (32:24)Patrick shares his vision for Ampere. (35:15)Why good communication skills are essential. (38:40)What is ISAC all about, and how did Patrick instigate it? (41:40) The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Derek Harp is happy to have Patrick Miller joining him today for another episode in the Security Leaders series! Patrick is a well-known legend in the ICS cyber security space. He is currently the Chief Executive Officer of Ampere Industrial Security. (http://www.amperesec.com/ (www.amperesec.com)) Patrick Miller has dedicated his career to the protection and defense of critical infrastructures. As President and CEO of Ampere Industrial Security, he is a trusted independent security and regulatory advisor for industrial control systems worldwide. In addition to his role at Ampere, Mr. Miller is also the founder, director, and president emeritus of EnergySec and US. Coordinator for the Industrial Cybersecurity Center. Patrick's diverse background spans the Energy, Telecommunications, Water, Wastewater, Manufacturing, and Financial Services verticals, including key positions with regulatory agencies, private consulting firms, utility asset owners, and commercial organizations. Patrick was instrumental in the establishment of the NERC CIP standards in the US as a drafting team member and the first CIP auditor in the nation. He currently serves on or contributes to multiple NERC CIP guidance and standards drafting teams. Patrick is also an instructor for the ICS456 NERC CIP course with the SANS Institute. Patrick loves tech and the outdoors! As well as being a technologist, he is also a chef, a keen kayaker, a father, and a builder of communities! In this episode of the (CS)²AI Podcast, he tells his modern-day superhero origin story, talks about the various milestones in his professional journey, and shares valuable nuggets of advice for people from different backgrounds who would like to get into the cyber security industry. You won't want to miss this episode if you would like to make a career in cyber security, become a better security professional, or start a cybersecurity business of your own. Stay tuned for more! Show highlights: Entrepreneurship is in Patrick's blood. (3:05) Growing up in the early days of technology, Patrick was lucky enough to get the new tech as it came out. (4:15) Patrick was using cutting-edge technology to do a senior capstone biology project just before he dropped out of school to do tech. (6:32) Any kind of background can be helpful for you as a security professional. (9:00) How phone systems have advanced and transformed over the last few decades. (10:30) Patrick's first “hacking job”. (11:29) Patrick talks about when he decided to specialize in security and the point when industrial security first intersected with his journey. (13:23) Patrick discusses his stint as a regulator for WECC (Western Electricity Coordinating Council.) (17:54) Joining standards bodies in the early stage can help people break into the cyber security industry. (24:26) What motivated Patrick to start a consulting firm? (26:14) The Dawn of Energy Sec (Energy Sector Security Consortium). (32:24) Patrick shares his vision for Ampere. (35:15) Why good communication skills are essential. (38:40) What is ISAC all about, and how did Patrick instigate it? (41:40) Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 31: Cyber Security Start Ups and Product Creation with Eric J. ByresPub date: 2022-03-22Today, Derek Harp is excited to interview Eric J. Byres, the Founder of and Chief Technology Officer of aDolus Technology Inc., in another episode of the Security Leaders series. Eric is a pioneer in industrial cyber security. He is a technologist, entrepreneur, author, inventor, outdoor enthusiast, and sailor. Eric grew up in North Vancouver and later graduated with a Bachelor of Applied Science Degree from The University of British Columbia, focusing on geological engineering and mining operations. He is widely recognized as one of the world's top experts in the SCADA security field. As the inventor of the Tofino Security technology, Eric and his partner Joann guided the product through its evolution from an academic research project and startup to a successful acquisition by Belden Inc (NYSE: BDC). Tofino received numerous industry awards and was licensed by industry giants such as Honeywell, Schneider Electric, and Caterpillar. Today it is probably the most widely deployed ICS-specific firewall in the world. In this episode of the (CS)²AI Podcast, Eric shares his background and discusses his career trajectory. He also offers many gold nuggets of advice for listeners who would like to do a startup, launch a product, be useful for the industry later on, or use what they already have to add value to the cyber security industry. This episode is one you will not want to miss if you are looking to start your career in cyber security or considering starting a company in the cyber security space.Show highlights:Eric started his first business, making and selling root beer when he was about eight years old. He gained some valuable entrepreneurial experience doing that! (2:35)His dad bought him a Digi-Comp 1 mechanical digital computer with three bits of memory when he was about eight years old. (5:31)Eric's first job after graduating was with a small but prestigious consulting firm that designed mines. They shipped him off to Australia, South Africa, and Columbia. (7:09)After three or four years, Eric got out of mining and imbedded himself into the data communications and industrial computer markets. (8:01)Eric explains what went on in his early days in control systems. (10:36)Writing a peer-reviewed paper for the IEEE on cyber security for control systems while he was at DCIT was a turning point in Eric's career. (16:30)Eric discusses the birth of Tofino Security. (20:35)Eric talks about the challenges he faced and offers advice for listeners who would like to follow a similar career path. (22:35)Why does he feel that startups have an advantage? (25:48)Eric describes the Tofino firewall and explains what is. (26:39)Eric talks about his mentors and the advisory roles he has been in. (33:50)Eric explains how aDolus came into existence and discusses the complicated software supply chain. (36:40)What is an S-bom? How does it differ from a D-bom? (46:02)Some advice for listeners who want to start laying the tracks to be on the cutting edge of something or be of value to the cyber security industry. (52:17) Links:(CS)²AIEric Byres on LinkedInaDolus Technology Inc.Books mentioned:The Cuckoo's Egg by Cliff StollThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Today, Derek Harp is excited to interview Eric J. Byres, the Founder of and Chief Technology Officer of aDolus Technology Inc., in another episode of the Security Leaders series. Eric is a pioneer in industrial cyber security. He is a technologist, entrepreneur, author, inventor, outdoor enthusiast, and sailor. Eric grew up in North Vancouver and later graduated with a Bachelor of Applied Science Degree from The University of British Columbia, focusing on geological engineering and mining operations. He is widely recognized as one of the world's top experts in the SCADA security field. As the inventor of the Tofino Security technology, Eric and his partner Joann guided the product through its evolution from an academic research project and startup to a successful acquisition by Belden Inc (NYSE: BDC). Tofino received numerous industry awards and was licensed by industry giants such as Honeywell, Schneider Electric, and Caterpillar. Today it is probably the most widely deployed ICS-specific firewall in the world. In this episode of the (CS)²AI Podcast, Eric shares his background and discusses his career trajectory. He also offers many gold nuggets of advice for listeners who would like to do a startup, launch a product, be useful for the industry later on, or use what they already have to add value to the cyber security industry. This episode is one you will not want to miss if you are looking to start your career in cyber security or considering starting a company in the cyber security space. Show highlights: Eric started his first business, making and selling root beer when he was about eight years old. He gained some valuable entrepreneurial experience doing that! (2:35) His dad bought him a Digi-Comp 1 mechanical digital computer with three bits of memory when he was about eight years old. (5:31) Eric's first job after graduating was with a small but prestigious consulting firm that designed mines. They shipped him off to Australia, South Africa, and Columbia. (7:09) After three or four years, Eric got out of mining and imbedded himself into the data communications and industrial computer markets. (8:01) Eric explains what went on in his early days in control systems. (10:36) Writing a peer-reviewed paper for the IEEE on cyber security for control systems while he was at DCIT was a turning point in Eric's career. (16:30) Eric discusses the birth of Tofino Security. (20:35) Eric talks about the challenges he faced and offers advice for listeners who would like to follow a similar career path. (22:35) Why does he feel that startups have an advantage? (25:48) Eric describes the Tofino firewall and explains what is. (26:39) Eric talks about his mentors and the advisory roles he has been in. (33:50) Eric explains how aDolus came into existence and discusses the complicated software supply chain. (36:40) What is an S-bom? How does it differ from a D-bom? (46:02) Some advice for listeners who want to start laying the tracks to be on the cutting edge of something or be of value to the cyber security industry. (52:17) Links: https://www.cs2ai.org/ ((CS)²AI) https://www.linkedin.com/in/ericbyres/ (Eric Byres on LinkedIn) https://adolus.com/ (aDolus Technology Inc.) Books mentioned: https://amzn.to/3ublrlQ (The Cuckoo's Egg) by Cliff Stoll Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber
Many Security Leaders today are burned out from having to overcome challenges like the misalignment of cybersecurity programs with organizational strategy and answering the question of where cyber really lies within the organization. What can you do to get buy-in from the Board for your security programs? Mathew Sharp and Kyriakos “Rock” Lambros had very different starting points to their cybersecurity careers, but there is one thing they agree on: there is a dire need for CISOs to gain business knowledge to understand the business they operate in and therefore be equipped to effectively communicate security needs to the Board to garner support for their programs. The co-authors of The CISO Evolution: Business Knowledge for Cybersecurity Executives (which was recently featured in the Forbes Executive Library) share what inspired them to write the book, their personal learning journeys, and evolutions as CISOs, and answer the question: do we need more business-savvy CISOs or technology-savvy Board members? The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy. -- Show Notes and Transcript -- https://www.horangi.com/blog/the-ciso-evolution -- About Horangi Cybersecurity -- More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast About Horangi Cyber Security: https://www.horangi.com --- About the Guests -- Matthew Sharp's LinkedIn: https://www.linkedin.com/in/ciso-mba/ Kyriakos "Rock" Lambros' LinkedIn: https://www.linkedin.com/in/rocklambros/ The CISO Evolution: https://www.cisoevolution.com/
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 26: Starting Your Own Cyber Security Business with Albert RooyakkersPub date: 2022-02-15Albert Rooyakkers, the CEO and Founder of Bedrock Automation, joins Derek Harp today for another episode in the Security Leaders series. Albert is a well-known technologist in the cyber security industry. He is also an inventor, a motorhead, and a keen outdoorsman. Albert was born and raised in Canada. After finishing high school, he went to the Southern Alberta Institute of Technology to learn about instrumentation and process control. After completing his studies, he spent sixteen years working at Foxboro, where he went from Sales to Applications to Projects and eventually into management. Foxboro later became Invensys and sent Albert to the Middle East. He loved that because the Middle East is a fascinating place!Albert once described himself as a future enthusiast because the future excites him so much! In this episode of the (CS)²AI Podcast, he discusses his background, education, and career path. He talks about his early work experiences, dives into the founding of Bedrock Automation, and discusses the exciting transition to run Bedrock. He also shares some nuggets of advice for getting ahead in your career and talks about the exciting changes we can look forward to seeing in the future.If you have spent most of your career working for one or two companies and are thinking about starting a business of your own, you are sure to gain a lot from today's inspiring conversation with Albert Rooyakkers. Listen in to hear more!Show highlights:Albert worked on big projects while at Foxboro and often traveled internationally. (3:01)Albert grew up with family businesses, so he knew starting a business would involve a lot of hard work. (4:10)Why did he become a young workaholic while working in their family businesses in Canada? (5:29)Albert talks about the best and most rewarding years of his life while starting Bedrock. (7:35)What Albert believes is the most comprehensive learning experience imaginable. (8:55)Jumping from Invensys to Maxim and then jumping from Maxim to Bedrock. (9:28)Some advice for actualizing an idea or design that relates to the company you are in. (13:18)Cyber violates the premise of automation. Albert explains how we can solve that right here in the USA. (18:29)Building and maintaining relationships is vital. (25:14)Great technology moves beyond technology and becomes art. When presented in the right way, that inspires people to use it. (28:31)Some advice for overcoming challenges, growing, and evolving along your career journey. (32:57)What excites Albert about the future? (38:51) The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Albert Rooyakkers, the CEO and Founder of Bedrock Automation, joins Derek Harp today for another episode in the Security Leaders series. Albert is a well-known technologist in the cyber security industry. He is also an inventor, a motorhead, and a keen outdoorsman. Albert was born and raised in Canada. After finishing high school, he went to the Southern Alberta Institute of Technology to learn about instrumentation and process control. After completing his studies, he spent sixteen years working at Foxboro, where he went from Sales to Applications to Projects and eventually into management. Foxboro later became Invensys and sent Albert to the Middle East. He loved that because the Middle East is a fascinating place! Albert once described himself as a future enthusiast because the future excites him so much! In this episode of the (CS)²AI Podcast, he discusses his background, education, and career path. He talks about his early work experiences, dives into the founding of Bedrock Automation, and discusses the exciting transition to run Bedrock. He also shares some nuggets of advice for getting ahead in your career and talks about the exciting changes we can look forward to seeing in the future. If you have spent most of your career working for one or two companies and are thinking about starting a business of your own, you are sure to gain a lot from today's inspiring conversation with Albert Rooyakkers. Listen in to hear more! Show highlights: Albert worked on big projects while at Foxboro and often traveled internationally. (3:01) Albert grew up with family businesses, so he knew starting a business would involve a lot of hard work. (4:10) Why did he become a young workaholic while working in their family businesses in Canada? (5:29) Albert talks about the best and most rewarding years of his life while starting Bedrock. (7:35) What Albert believes is the most comprehensive learning experience imaginable. (8:55) Jumping from Invensys to Maxim and then jumping from Maxim to Bedrock. (9:28) Some advice for actualizing an idea or design that relates to the company you are in. (13:18) Cyber violates the premise of automation. Albert explains how we can solve that right here in the USA. (18:29) Building and maintaining relationships is vital. (25:14) Great technology moves beyond technology and becomes art. When presented in the right way, that inspires people to use it. (28:31) Some advice for overcoming challenges, growing, and evolving along your career journey. (32:57) What excites Albert about the future? (38:51) Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 25: Exploring Careers in the Cybersecurity Controls Niche with Fred GordyPub date: 2022-02-08Today, Derek Harp interviews Fred Gordy in another episode in the Security Leaders series. Fred is the Director of Cyber Security at Intelligent Buildings.Fred hails from Atlanta, Georgia. He is an author, musician, woodworker, technologist, travel enthusiast, and grandfather. He is also well-known as an evangelist around cyber security for building control systems and building management.Fred has worked with electronics, computers, IT, and even robotics along his career path. He had his first computer experience back in the days of basic programming in the mid-1980s when he did electronic engineering technology at college. Although his direction as an electronic engineer in technology should have been to get in on a board level, he was always more fascinated with the computer part.In this episode of the (CS)²AI Podcast, Fred tells his story, discusses his career trajectory, and talks about the highlights of his career. He shares his insights and experience and offers some helpful nuggets of advice for listeners considering a career in the controls space. If you are at the entry-level of our industry and wondering where to go next, you will not want to miss this episode! Stay tuned for more!Show highlights:Fred had the opportunity to experience control systems when doing an internship while in college. (5:01)How Fred inadvertently got exposed to computer control systems early on in his career. (6:27)Having had a computer background before moving into the world of control systems allowed him to speak both languages. It helped him a lot in his career. (8:15)Fred sees a career role emerging that will require individuals to know the full range of IT and OT. They need to understand computers and control systems. (9:01)Fred discusses the work that Intelligent Buildings does in the commercial real estate industry. (13:03)How buildings intersected with his career path. (14:22)For Fred, there is nothing quite as exhilarating as having the power, capability, and know-how to make a massive piece of equipment work in concert with hundreds of other devices. (15:55)Everything Fred has done in his life has in some way built upon itself. It's why he encourages listeners to draw on all their experiences, no matter how small they might seem. (17:40)Fred talks about overcoming challenges. (21:40)When he started his career, he knew little about what he was doing. He attributes his success to the mentors who helped him, encouraged him, and ignited his inner fire. (28:00)Fred discusses ways to get people in different areas of the building-control space to work better together. (36:18)Fred believes that the path for people in the controls industry will become easier now, since the advent of the MSI (Master System Integrator). (44:38)The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Known as the CISO Whisperer, Yael Nagler is trusted by CISOs because of her ability to ‘read the room' and to navigate corporate culture. She leads Yass Partners which delivers tools used by Security Leaders to amplify their impact. Over the course of her 20+ year career, Yael architected a framework for understanding the management operating system of organizations and explains it in ways security professionals understand and can operationalize.Yael begrudgingly admits that she has over 20 years of experience that spans startup and enterprise tech companies (Priceline, SAP-Ariba), as well as Financial Services (JP Morgan, BlackRock) and recently Health Tech. She has played leadership roles through corporate crises, acquisitions and divestitures as well as business growth and transformations. Over the course of her career, her roles continually increased in scope and responsibility. She's built and led teams across Information Security, Tech Risk, Procurement, Financial Planning and Analysis and Consulting. She attributes her success to having quickly figured out how to navigate each management operating system and understanding what was necessary to be successful. Yass Partners has quickly become the trusted partner for many enterprise and high impact CISOs and Security Programs. Yael is a contributor to the World Economic Forum's 2022 Global Cyber Outlook and is a frequent guest speaker to leadership circles and various industry roundtables. She is actively engages in various Security & Women Executive Networks and is an investor and advisor to a variety of technology and cybersecurity start-up companies.Here's a glimpse of what you'll learn:Yael Nagler's career trajectoryWhat Yael learned from early supportive bossesWhat the acronym DEAL stands forHow Enron taught Yael how to handle crises effectivelyWhat situational awareness is and how it plays into hiringKey components of cybersecurityHow important cybersecurity is in 2022How to assess your risk threshold and what to expect from your boardIn this episode….Yael Nagler was born internationally but grew up in the United States and graduated from Cornell University where she studied hotel management. After graduating she started working at Priceline and from that beginning, she entered a 20+ year career spanning startup and enterprise tech companies as well as financial services. The breadth of her experience and ability to understand what clients and employers alike need while navigating corporate culture have led her to wonderful success.Currently head of Yass Partners, Yael is a cybersecurity leader with solid advice for all CEOs and corporate executives. She has a keen insight into what strengths led her through her career journey and how to develop situational awareness in every workplace. She and Martin discuss the experience and understanding that each company and challenge offered her as well as how she effectively communicates her knowledge to the benefit those working with her.In this episode of What CEOs Talk About, host Martin Hunter and Yael Nagler link situational awareness to cybersecurity and explore how understanding the fears, needs, and motivators for employees and clients alike assists in defining risk and mitigating it. Yael explains three key components in developing effective cybersecurity strategy and breaks down the reasons behind the need in a simple but memorable analogy.Sponsor for this episode...This episode is brought to you by URGEO.URGEO is the Latin for urge: A strong desire to drive change, stimulate thought, incite feeling, and encourage action. Martin Hunter and his team provide liberation for the CEO and Board of a company through their fractional COO services.URGEO's fractional COO services help to move you through growing pains so that your company can flourish and improve its profits.They have worked with a multitude of companies in SaaS, CPG, mining, and transportation, from start-ups to large multinational corporations. They specialize in helping companies avoid roadblocks and stay on the right strategic and operational track for growth.If you are a visionary and want an integrator to get everything done for you, then you need to get in touch with URGEO today.To learn more about their services, visit https://www.URGEO.com or email them directly at info@urgeo.com
Control System Cyber Security Association International: (CS)²AI
Today, Derek Harp interviews Fred Gordy in another episode in the Security Leaders series. Fred is the Director of Cyber Security at Intelligent Buildings. Fred hails from Atlanta, Georgia. He is an author, musician, woodworker, technologist, travel enthusiast, and grandfather. He is also well-known as an evangelist around cyber security for building control systems and building management. Fred has worked with electronics, computers, IT, and even robotics along his career path. He had his first computer experience back in the days of basic programming in the mid-1980s when he did electronic engineering technology at college. Although his direction as an electronic engineer in technology should have been to get in on a board level, he was always more fascinated with the computer part. In this episode of the (CS)²AI Podcast, Fred tells his story, discusses his career trajectory, and talks about the highlights of his career. He shares his insights and experience and offers some helpful nuggets of advice for listeners considering a career in the controls space. If you are at the entry-level of our industry and wondering where to go next, you will not want to miss this episode! Stay tuned for more! Show highlights: Fred had the opportunity to experience control systems when doing an internship while in college. (5:01) How Fred inadvertently got exposed to computer control systems early on in his career. (6:27) Having had a computer background before moving into the world of control systems allowed him to speak both languages. It helped him a lot in his career. (8:15) Fred sees a career role emerging that will require individuals to know the full range of IT and OT. They need to understand computers and control systems. (9:01) Fred discusses the work that Intelligent Buildings does in the commercial real estate industry. (13:03) How buildings intersected with his career path. (14:22) For Fred, there is nothing quite as exhilarating as having the power, capability, and know-how to make a massive piece of equipment work in concert with hundreds of other devices. (15:55) Everything Fred has done in his life has in some way built upon itself. It's why he encourages listeners to draw on all their experiences, no matter how small they might seem. (17:40) Fred talks about overcoming challenges. (21:40) When he started his career, he knew little about what he was doing. He attributes his success to the mentors who helped him, encouraged him, and ignited his inner fire. (28:00) Fred discusses ways to get people in different areas of the building-control space to work better together. (36:18) Fred believes that the path for people in the controls industry will become easier now, since the advent of the MSI (Master System Integrator). (44:38) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership)
Welcome to the Sales Bluebird podcast!If you are a seller or sales leader at a B2B startup, especially if it is a cyber security company, you are in the right place.We want your questions and topic suggestions for future episodes. Send them to andrew@unstoppable.do or send me a voice/video at https://zipmessage.com/unstoppableThis episode covers 6 reasons why CISOs and other senior leaders buy from startups.We know it is not the easy option for them so what drives them to want to work with an early-stage company?Please like, subscribe and review this podcast. It is the best way to get the word out.Sign up for the Sales Bluebird email - it's good actionable stuff - salesbluebird.comWant to chat about your cyber security startup and your sales strategy, hit me up at andrew@unstoppable.doSupport the show (http://www.unstoppable.do)
Security leaders must have strong business acumen if they want to be successful. Otherwise, they are destined to the child's table within the leadership ranks at their organization. Security programs must align the organization's most important business objectives. This is a fact that all successful security leaders must understand. In this episode of Tuesday Morning Grind, Matthew and Christian discuss business topics that every security leader needs to know to successfully serve their organization – and how business is directly linked into cybersecurity. Book Recommendation: CISO Evolution by Matthew Sharp (https://www.cisoevolution.com/) About risk3sixty: risk3sixty is a security, privacy, and compliance consulting firm that helps high growth technology organizations build, manage, and assess security and privacy programs. Offering services related to SOC 2, ISO 27001, PCI DSS, HITRUST, Virtual CISO, Privacy Programs (GDPR, CCPA, etc.), Penetration Testing, and a GRC Platform built for cloud technology companies, Phalanx. You can learn more about risk3sixty at www.risk3sixty.com.
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 21: A Non-Linear But Rewarding Career Path In Cybersecurity with Chris BlaskPub date: 2022-01-12Today, we have another podcast in the Security Leaders interview series. In this episode, Derek Harp talks to Chris Blask, the Global Director of Industrial and IoT Security at Unisys. Chris is a man of many talents! He is an entrepreneur, an inventor, an evangelist, and a visionary. He has been involved in many different projects for work, for fun, and sometimes a mix of both. Chris was the inventor of one of the first firewall products. In addition, he built a multibillion-dollar firewall business at Cisco System, co-founded an early SIEM vendor, wrote the first book on SIEM, founded an information-sharing center for critical infrastructures, and advised both public and private organizations across the world in every sector. In his role at Unisys, Chris created the Operational Technology and IoT security practices, which he also leads. He also invented the Digital Bill of Materials (DBoM) structure and established the Unisys Marine Living Research Center. He currently chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts.Chris is very well known, and his resume is outstanding! He has been involved in many different projects and initiatives. In this episode of the (CS)²AI Podcast, he shares some valuable nuggets from his vast experience! He tells his superhero origin story, talks about the non-linear way he got to where he is today, sheds light on his current role as a leader in the cybersecurity industry, and discusses his philosophy around problem-solving. Chris frequently changed course throughout his career journey. If you are in the early part of your career and thinking of making some changes down the line, you really won't want to miss this episode! Be sure to stay tuned for more!Show highlights:Technology was a thread that ran all along Chris's career path. (5:51)While growing up, Chris always loved taking things apart to figure out how they worked. (8:16)Moving on after every change he made in his life and education. (10:57)The history and appreciation of art have had as much to do with Chris's success as learning to program in Cobol. (12:46)Chris explains how he started teaching people about different aspects of technology and how that led to his first job in OT with General Electric. (13:16)Chris enabled himself to do mobile video conferencing to save his company millions of dollars. (15:28)Chris explains how the security aspect of his career came into play. (21:00)Creating and releasing the BorderWare Firewall Server. (25:46)History has proved that there will always be a point in the future when every problem will get solved. (27:24)Chris has been into cybersecurity for the last 28 years. He talks about all the companies with which he was involved. (31:56)Chris talks about the genesis of firewalls. (34:05)Learning to talk the right language, to move up in the world of technology. (39:17)How mentorship has played out in Chris's career. (43:20)Chris shares a strategy for anyone currently in OT or cybersecurity. (51:34)Chris talks about the changes he sees happening with OT and cybersecurity in the future. (58:37)Links:(CS)²AI Unisys The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Today, we have another podcast in the Security Leaders interview series. In this episode, Derek Harp talks to Chris Blask, the Global Director of Industrial and IoT Security at Unisys. Chris is a man of many talents! He is an entrepreneur, an inventor, an evangelist, and a visionary. He has been involved in many different projects for work, for fun, and sometimes a mix of both. Chris was the inventor of one of the first firewall products. In addition, he built a multibillion-dollar firewall business at Cisco System, co-founded an early SIEM vendor, wrote the first book on SIEM, founded an information-sharing center for critical infrastructures, and advised both public and private organizations across the world in every sector. In his role at Unisys, Chris created the Operational Technology and IoT security practices, which he also leads. He also invented the Digital Bill of Materials (DBoM) structure and established the Unisys Marine Living Research Center. He currently chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts. Chris is very well known, and his resume is outstanding! He has been involved in many different projects and initiatives. In this episode of the (CS)²AI Podcast, he shares some valuable nuggets from his vast experience! He tells his superhero origin story, talks about the non-linear way he got to where he is today, sheds light on his current role as a leader in the cybersecurity industry, and discusses his philosophy around problem-solving. Chris frequently changed course throughout his career journey. If you are in the early part of your career and thinking of making some changes down the line, you really won't want to miss this episode! Be sure to stay tuned for more! Show highlights: Technology was a thread that ran all along Chris's career path. (5:51) While growing up, Chris always loved taking things apart to figure out how they worked. (8:16) Moving on after every change he made in his life and education. (10:57) The history and appreciation of art have had as much to do with Chris's success as learning to program in Cobol. (12:46) Chris explains how he started teaching people about different aspects of technology and how that led to his first job in OT with General Electric. (13:16) Chris enabled himself to do mobile video conferencing to save his company millions of dollars. (15:28) Chris explains how the security aspect of his career came into play. (21:00) Creating and releasing the BorderWare Firewall Server. (25:46) History has proved that there will always be a point in the future when every problem will get solved. (27:24) Chris has been into cybersecurity for the last 28 years. He talks about all the companies with which he was involved. (31:56) Chris talks about the genesis of firewalls. (34:05) Learning to talk the right language, to move up in the world of technology. (39:17) How mentorship has played out in Chris's career. (43:20) Chris shares a strategy for anyone currently in OT or cybersecurity. (51:34) Chris talks about the changes he sees happening with OT and cybersecurity in the future. (58:37) Links: https://www.cs2ai.org/ ((CS)²AI) https://www.unisys.com/ (Unisys) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership)
Control System Cyber Security Association International: (CS)²AI
Today, Derek Harp is excited to have Jaco Benadie, the Executive Director of KPMG Malaysia, joining him on the show for another episode in the series on Security Leaders. Jaco is a well-known leader and problem-solver in the world of cybersecurity. He has a great attitude and is always willing to do whatever he can to make things happen. He is a barbeque and sports fanatic who loves watching the Rugby World Cup! With over fifteen years of experience in the cybersecurity field, in both Information Technology and Operational Technology, Jaco leverages his IT and engineering skills and experiences to design, develop and implement controls to support the protection of critical computing systems from cyber threats. Jaco has become an expert in dealing with every level of customer management in OT, IT, and cyber security. He has often worked as a subject matter specialist for complex remediation activities. He has also acted as a mediator to resolve tensions between IT and OT. In this episode, Jaco tells his superhero story. He peels back the layers to let us in on the personal side of his life and career. He talks about his different work experiences after graduating from university and explains how hard he had to study to move into cybersecurity. He also talks about guidance and mentorship and explains what motivated him to leave KPMG to do rigorous safety training with Shell. Jaco encourages anyone considering a career change to go ahead and do it, regardless of how old you are! You will not want to miss this episode if you are thinking about breaking into the field of cybersecurity! Show highlights: As a young boy, Jaco spent the best years of his life in Namibia with his grandfather, who was a farmer. (2:40) Although he graduated with a B.Com degree in marketing, Jaco has never worked in that field. (4:52) Jaco shares one of the most valuable career lessons he learned while working as a door-to-door salesman. (7:55) While on a working holiday in the UK, Jaco was offered a permanent position as a Physical Security Manager. That was where he got introduced to the world of cybersecurity for the first time. (10:14) Jaco did not have a technical background, so starting his journey into cybersecurity involved a steep learning curve. (14:09) Jaco talks about how hard he had to study to break into the cybersecurity industry. (17:48) The kind of guidance, mentorship, and exposure Jaco would have liked to have while breaking into the cybersecurity industry. (21:18) What he does to encourage the junior associates in his team to engage with him and ask questions. (24:22) Jaco explains why you don't have to be a technical expert to have a key role in cybersecurity programs. (26:33) How he got introduced to KPMG, took a side-step, and started working there as an assistant manager. (30:58) Jaco talks about what he learned from the rigorous safety training he did with Shell before returning to KPMG. (36:05) Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber
Podcast: Control System Cyber Security Association International: CS2AIEpisode: 18: Changing Careers to Leverage Cybersecurity Opportunities with Jaco BenadiePub date: 2021-12-21Today, Derek Harp is excited to have Jaco Benadie, the Executive Director of KPMG Malaysia, joining him on the show for another episode in the series on Security Leaders. Jaco is a well-known leader and problem-solver in the world of cybersecurity. He has a great attitude and is always willing to do whatever he can to make things happen. He is a barbeque and sports fanatic who loves watching the Rugby World Cup!With over fifteen years of experience in the cybersecurity field, in both Information Technology and Operational Technology, Jaco leverages his IT and engineering skills and experiences to design, develop and implement controls to support the protection of critical computing systems from cyber threats.Jaco has become an expert in dealing with every level of customer management in OT, IT, and cyber security. He has often worked as a subject matter specialist for complex remediation activities. He has also acted as a mediator to resolve tensions between IT and OT.In this episode, Jaco tells his superhero story. He peels back the layers to let us in on the personal side of his life and career. He talks about his different work experiences after graduating from university and explains how hard he had to study to move into cybersecurity. He also talks about guidance and mentorship and explains what motivated him to leave KPMG to do rigorous safety training with Shell.Jaco encourages anyone considering a career change to go ahead and do it, regardless of how old you are! You will not want to miss this episode if you are thinking about breaking into the field of cybersecurity!Show highlights:As a young boy, Jaco spent the best years of his life in Namibia with his grandfather, who was a farmer. (2:40)Although he graduated with a B.Com degree in marketing, Jaco has never worked in that field. (4:52)Jaco shares one of the most valuable career lessons he learned while working as a door-to-door salesman. (7:55)While on a working holiday in the UK, Jaco was offered a permanent position as a Physical Security Manager. That was where he got introduced to the world of cybersecurity for the first time. (10:14)Jaco did not have a technical background, so starting his journey into cybersecurity involved a steep learning curve. (14:09)Jaco talks about how hard he had to study to break into the cybersecurity industry. (17:48)The kind of guidance, mentorship, and exposure Jaco would have liked to have while breaking into the cybersecurity industry. (21:18)What he does to encourage the junior associates in his team to engage with him and ask questions. (24:22)Jaco explains why you don't have to be a technical expert to have a key role in cybersecurity programs. (26:33)How he got introduced to KPMG, took a side-step, and started working there as an assistant manager. (30:58)Jaco talks about what he learned from the rigorous safety training he did with Shell before returning to KPMG. (36:05)The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Today, Derek Harp is happy to have Robin Berthier, the CEO, and Co-founder of Network Perception, joining him as his guest for this episode in the Security Leaders series! Robin took a piece of technology out of a university research study and, together with some others, built a company around it. Network Perception is a startup committed to designing and developing highly-usable network audit solutions. Robin grew up in Brittany, in the North-West region of France. He attended the first French school dedicated to cybersecurity. In addition to being an entrepreneur, Robin is also a researcher, technologist, and problem-solver. In his free time, he enjoys rock climbing and movies. He has even tried his hand at producing and directing movies! In this episode of the (CS)²AI Podcast, Robin shares his backstory and discusses his career journey. He talks about becoming a research scientist, designing specification-based intrusion detection systems for smart energy delivery systems, and transitioning from a researcher to an entrepreneur. He also talks about mentorship and offers some nuggets of advice for entrepreneurs. You won't want to miss this episode if you are interested in finding out about the practical applications of the theoretical work done in academic research. Stay tuned for more! Show highlights: Robin talks about where his passion for breaking and protecting systems began. (1:37) The more Robin worked with computers, the more he became fascinated with the notion of feeling the universe. (2:33) In the early 2000s, the French government created the resources to train the next-generation workforce in computers and cybersecurity. (3:30) Robin discusses his first dedicated open-source project. (7:51) In addition to cybersecurity, Robin was also interested in information visualization. (9:41) How he moved from doing post-doctoral work to becoming a research scientist. (11:12) How Robin got into designing specification-based intrusion detection systems for smart energy delivery systems. (15:07) Recognizing an opportunity for university-based research to become a company. (17:46) Transitioning from being a researcher to becoming an entrepreneur and the challenges that went along with that. (23:18) What Robin would do differently if he had to start his entrepreneurial journey over. (28:58) Some advice for entrepreneurs. (31:20) Why you should never burn bridges or feel afraid of reaching out to others. (36:55) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership)
“This landscape is changing and it comes to a point where I honestly believe CSOs are going to be some of the highest paid professionals in the future. And it's already heading in that direction. Over the last few years, we've seen a lot of change already, but this is going to be one of the most highest paid jobs in business because it will get to a point that you're not going to be able to pay people enough money to take on this amount of risk.” — Emily Health-------Episode Timestamps:*(2:40) - How Emily and Jason met*(3:10) - Emily's first security job *(4:10) - Emily's current role at DocuSign*(5:15) - Segment: Taboo Topics*(6:35) - Paying ransom or not paying ransom*(8:00) - Other rapid growing risks that people aren't aware of *(10:35) - Segment: Deep Dive*(12:15) - Careers are jigsaw puzzles *(15:05) - Differences and similarities between United Airlines and DocuSign*(17:35) - The “Trust” portion of Emily's DocuSign title explained *(21:25) - How the pandemic affected Docusign and Emily's role*(26:50) - Segment: Feeling vulnerable *(27:55) - Emily's thoughts on gut made decisions vs. data/biased made decisions *(31:25) - Why CSOs are leaving their jobs *(37:40) - What retirement looks like for Emily*(39:30) - Segment: Into the Future *(42:40) - Segment: Quick Hits LinksEmily's LinkedInEmily's TwitterJason Clark's LinkedInwww.netskope.com
This week, we welcome Renee Tarun, Deputy CISO at Fortinet, to discuss Fight Fire With Fire: Proactive CyberSec Strategies for Security Leaders! In the Leadership and Communications section for this week: CISOs: Approach the board with precision, simplicity, Layoffs Taught Me To Never Make 3 Powerful Leadership Mistakes, 6 zero trust myths and misconceptions, & more! Show Notes: https://securityweekly.com/bsw237 Segment Resources: https://www.barnesandnoble.com/w/fight-fire-with-fire-renee-tarun/1139924071 Visit https://securityweekly.com/fortinet to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Renee Tarun, Deputy CISO at Fortinet, to discuss Fight Fire With Fire: Proactive CyberSec Strategies for Security Leaders! In the Leadership and Communications section for this week: CISOs: Approach the board with precision, simplicity, Layoffs Taught Me To Never Make 3 Powerful Leadership Mistakes, 6 zero trust myths and misconceptions, & more! Show Notes: https://securityweekly.com/bsw237 Segment Resources: https://www.barnesandnoble.com/w/fight-fire-with-fire-renee-tarun/1139924071 Visit https://securityweekly.com/fortinet to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
With today's expanding attack surface, constantly evolving threat landscape, and growing cyber skills gap, cybersecurity leaders need actionable advice from seasoned peers more than ever. Renee along with a diverse group of accomplished experts in cybersecurity has created a book of collective learnings that brings together years of experience so that anyone in the field can leverage this insight in the face of the cyber threats and “fires” of today and tomorrow. This interview will focus on some of the takeaways and learnings. Segment Resources: https://www.barnesandnoble.com/w/fight-fire-with-fire-renee-tarun/1139924071 This segment is sponsored by Fortinet. Visit https://securityweekly.com/fortinet to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw237
With today's expanding attack surface, constantly evolving threat landscape, and growing cyber skills gap, cybersecurity leaders need actionable advice from seasoned peers more than ever. Renee along with a diverse group of accomplished experts in cybersecurity has created a book of collective learnings that brings together years of experience so that anyone in the field can leverage this insight in the face of the cyber threats and “fires” of today and tomorrow. This interview will focus on some of the takeaways and learnings. Segment Resources: https://www.barnesandnoble.com/w/fight-fire-with-fire-renee-tarun/1139924071 This segment is sponsored by Fortinet. Visit https://securityweekly.com/fortinet to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw237
Extreme agility. Always have a strategy. Focus on the basics instead of “shiny objects.“ Earlier this year, our panelists summed up what they learned in 2020 with these nuggets of wisdom – along with some unexpected positives – and what drove their security mindsets for 2021. Now, we've invited them back to share more […]
No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Segment Resources: RevolutionCyber - www.revolutioncyber.com Juliet is speaking at InfoSec World 2021, register now and save 20%: https://securityweekly.com/isw2021 Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw244
No Man is an Island. Neither can a security program exist without interconnections and strong relationships to the rest of the business. Yet, over and over again I meet Security Leaders that thrive on designing security fiefdoms with large moats, and one bridge that they roll down only when they intend to roll out a new technology, initiative or need budget authority. There is no amount of authority or power that can provided to a CISO that makes he or she immunized against the need for communication, collaboration and diplomacy with peers, users and Senior Executives. Segment Resources: RevolutionCyber - www.revolutioncyber.com Juliet is speaking at InfoSec World 2021, register now and save 20%: https://securityweekly.com/isw2021 Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw244
There are plenty of ways for a leader to measure success – productivity, growth of a department, increased team moral, you name it! But in the case of this episode's guest, he always has one metric in the back of his mind: how many people under his leadership have eventually worked their way up to become CISOs. In this episode, Microsoft CISO Bret Arsenault sits down with TikTok CSO, Roland Cloutier. Together they speak about how Roland's career in the military granted him the discipline to excel in the world of cybersecurity and the leadership skills to provide opportunities for those around him to find just as much success. In This Episode You Will Learn: Why convergence of an organization's tech teams is crucial for lasting security Why value chain risk assessment is critical in understanding and protecting your business How Roland considers his role as a driving force in the culture of security Some Questions We Ask: How do you identify future demands when growing your team and workforce? What facets of Roland's military training carried over into his role as CSO at TikTok? How has the role of CISO changed in the past decade? Resources: Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Say it with Charts Roland Cloutier's LinkedIn Bret Arsenault's LinkedIn Related: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
What's Keeping Security Leaders Up at Night? DDoS, Ransomware, 5G, and Security EmploymentIn this episode of Agent of Influence, Nabil speaks with Michael “Kaz” Kaczmarek, head of product management for Neustar's Security Solutions business unit. They discuss how his engineering background has supported him in cybersecurity, the nature of creativity and problem solving, the rise of ransom-related DDoS attacks, how 5G and the hybrid workforce are causing a shift in attack patterns, considerations for paying a ransom, cybersecurity staffing challenges, best practices for securing smart home devices, and a memorable dining experience at minibar in D.C.
The Top Entrepreneurs in Money, Marketing, Business and Life
As the CEO of Living Security, Ashley has been the driving force behind the company’s rapid growth. Since its founding in 2017, Living Security has raised more than $20 million for growth and product development and accelerated revenue growth for three consecutive years. Ashley is also continually working to build a diverse and inclusive organization around the belief that the team should reflect the community at large. An adaptable problem solver, Ashley is thoughtful and transparent in her approach to running the company and working with clients toward a singular goal: reduce risk by making people a security asset instead of a liability.
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, shares his tip of the day to create a culture of appreciation. On today's show we're joined by Kim Hefferman, Shawn Carter, Sarah Miller and Dustin Banks. Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Keshawn Williams, Sergio Angelucci, Brad Stewart, Fayez Bilal, Martin Green, Noreen Milne, Todd Milne, Paul Greenwood and Rolynn Snow. Organizations Represented: North York General Hospital, Paragon Protection, The Valley Health System, Allied Universal, GardaWorld
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, shares his tip of the day to create a culture of appreciation. On today's show we're joined by Scott Hemingway, John Oast, Brendan Riley, Radford Garrison, Lenton Bailey and Kelvin Owens. Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Shane Miller, Mike Arlage, Marvin Lands, Frank Taromina, David Freeman, Carl Hoops, Peter Huey and Jose Mendez. Organizations Represented: Signature Healthcare, Geisinger Health System, Lowell General Hospital (Circle Health), MultiCare Health System and Truman Medical Centers
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, shares his tip of the day to create a culture of appreciation. On today's show we're joined by Paul Allena, Chris Murray, Joe Magana, Bryan Bailey, Karminder Ghai and Derek Bailey Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Andy McCarthy, IAHSS Organizations Represented: Capital Health, GardaWorld, Norton Healthcare, Sturdy Memorial Hospital, William Osler Health System, Paladin Security
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, share his tip of the day to create a culture of appreciation. In between Sarah and Chris Healthcare Security Leaders recognize their teams, individual contributors and share what they're doing to celebrate our Healthcare Heroes. On today's show we're joined by Mark Reed, Lisa Terry, Michael Millard and Gisclerc Morisset. Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Sam Obregon, Michael Bowman, Eric Pierce, Bryce Dean, William Marcisz, Justin Norred, Paul Dague and Sheryl Williams Organizations Represented: Martin Luther King Jr Community Hospital, Allied Universal, Tennova Healthcare, AdventHealth and Capital Health
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, share his tip of the day to create a culture of appreciation. In between Sarah and Chris Healthcare Security Leaders recognize their teams, individual contributors and share what they're doing to celebrate our Healthcare Heroes. On today's show we're joined by Rocky Carmouche, Eric Clay, Charles Boshaw, Josh Childers, Ray Hitchcox, Harving Parra and Mike Hodges Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Roman Aguirre, Mason Feinartz, Kevin Bissoondyal, Dennis Jocko, Carey Latasa, Ross Elia, Rick Mahoney and Juan Rivera Organizations Represented: HHS, Memorial Hermann, Paladin/PalAmerican Security, King's Daughters Medical Center, CHI Memorial, Allied Universal, CHOC Children's and Piedmont Athens Regional
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, share his tip of the day to create a culture of appreciation. In between Sarah and Chris Healthcare Security Leaders recognize their teams, individual contributors and share what they're doing to celebrate our Healthcare Heroes. On today's show we're joined by Scott Levy, Anjanette Hebert, Daniel Hunnisett, Dan Yaross, Dave Gadoury and Robert Gibson. Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Chad Cameron, Omnigo Organizations Represented: Mayo Clinic, Paladin/PalAmerican Security, Altru Health, Nationwide Children's Hospital, Chatham-Kent Health Alliance, University of Kansas Medical Center
This week on The Healthcare Security Cast we are celebrating our Healthcare Heroes for IAHSS Healthcare Security and Safety Week. Canada's Recognition Expert, Sarah McVanel shares her recognition tip of the day and Chris Littlefield of Beyond Thank You, share his tip of the day to create a culture of appreciation. In between Sarah and Chris Healthcare Security Leaders recognize their teams, individual contributors and share what they're doing to celebrate our Healthcare Heroes. On today's show we're joined by Roy Williams III, Lisa Terry, Chad Rioux, Zachary Chambers, Eddie Sorrells, Mark Moore, Ryan Clarke, Rodney Sanders, Martin Green and Nelson Price. Thanks you to our sponsors: 3D Network Technology, Genetec, The Change Execution Group and 360 LIFE TRANSFORMATIONS Special Mentions: Vince Marcandali, Joe Donnelly, Brittani Matthews, Joe Willis, Randy DiYulio, Aundray Toney, Harry Tullis, George Dowling, Brian Siladke, Kyle Matlock, Karisha Perkins, Angela Shegog, Bobby Harris
Businesses are looking for specific leadership skills from their CISOs. In this episode we are talking about some of the traits that Jeff has identified in his research of thousands C-Level job descriptions, and by interviewing hiring managers.
When it comes to access control, guest Lee Odess has done it all. He boasts more than 18 years' experience starting, building and leading businesses in the security and IOT industry and is now the founder and CEO of Group337 and the brains behind Inside Access Control. His map of where organisations sit in the physical access control industry recently went viral. In today's episode, Blair asks Lee about the thought process behind this now infamous infographic, and his thoughts on the future of user credentials. They discuss how the lack of ownership within organisations have led to ineffective, siloed security frameworks and look at ways organisations can streamline their org charts moving forward. They also explore touchless authentication methods, such as facial recognition, hand waving and eye reading, and the importance of understanding the use cases and value propositions of different authentication methods and biometric modalities. CREDITS Host: Blair Crawford, Co-founder and Managing Director, Daltrey Guest Host: Lee Odess, CEO, Group337 and Inside Access Control Producer: Dan McHugh WANT MORE IDENTITY NEWS? Read our blog and subscribe to our newsletter www.daltrey.com.au/blog/ Follow us on LinkedIn www.linkedin.com/company/daltrey/ Follow us on Twitter #IdentityToday twitter.com/DaltreyID LET'S CHAT If you have press inquiries, a listener question or want to be a guest on the show, email us at hello@daltrey.com See omnystudio.com/listener for privacy information.
In this digital economy, online fraud detection systems are a necessary component in any security architecture and augment the basic application protection capabilities offered by a web application firewall and identity management solutions. Cyber security leaders need to know more about fraud management solutions. In this episode you'll hear key 45 solution providers operating in this space. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/future-of-cybersecurity/message
Show Notes: https://justinfimlaid.com/1-thing-i've-learned-about-successful-security-leaders/ Sponsor: https://www.nuharborsecurity.com Contact Me: https://justinfimlaid.com/contact-me/ Twitter: @justinfimlaid LinkedIn: https://www.linkedin.com/in/jfimlaid/ I traveled to 7 cities this week. It was a little intense to say the least. Luckily I had some awesome company with me which made the trip a little easier. While in Austin I was listening to the cover band the Spazmatics and I was talking to a friend about the Pwned Podcast. We were kicking around ideas for content, so out of Austin Texas, this weeks question - what is single commonality I see amongst successful security leaders. One commonality I see among successful security leaders. It's their ability to build relationships within a security organization. They are able to get their peers and other folks in the organization to pick up the security gauntlet to enable the security program. They are also able to get their organizational cohorts to self select the correct security decisions when no one else is looking. I was pretty fortunate early in my career that someone much smarter than me taught me about the "Not invented here" stance by many people. The idea of Not Invented Here is someone's general resistance to an idea because it wasn't their own, and they no matter what believe their ideas are better. From Wikipedia "The reasons for not wanting to use the work of others are varied, but some can include a desire to support a local economy instead of paying royalties to a foreign license-holder, fear of patent infringement, lack of understanding of the foreign work, an unwillingness to acknowledge or value the work of others,jealousy, or forming part of a wider turf war. As a social phenomenon, this philosophy can manifest as an unwillingness to adopt an idea or product because it originates from [somewhere else]." From What I learned from this is sometimes arguing with someone who has this not invented here stance matters less because it's while you may win the argument now, that same person will try to prove in the long term while you were wrong and look to sabotage, perhaps indirectly, your success. I digress a little bit, but my point is that successful relationship builders can see the bigger picture don't get meyered down in petty arguments of singular facts. Rather concensus, and doing things together as a team, is the most important thing. As I look back over my career, I can clearly connect some realtionship dots. One thing I always did was take care of the vendors who took the time to visit me. See when I was a CISO, I lived in northern VT, and get anyone to leave Boston to make a 3 hour drive was amazing. Now, I wasn't always a buyer, but One thing I would always do is make it worth their drive by taking them out to dinner, spending time with people, learning about their personal life. Nothing lasts forever - and when I left my job, it was those vendor realtionships that helped me start NuHarbor Security. Now I'm on the Vendor side, I realized the Vendor community is a WAY WAY bigger network than security professionals who perform security within a company. The vendor network is big and they talk to everyone. They're an amazing network to draw on if you ever needed help. I often see security professionals treat the vendor community fairly harsh, and vise versa. But really, we're all fighting the same battle and we have a lot of commonalities. If we accept that we're better together. So my answer this week to what is a single commonality I see amongst successful security leaders. It's their ability to build long-term relationships with internal cohorts as well as develop external partnerships with outside organizations. These are the individuals I see excel in the their carrer.