Business Of Security 公開
[search 0]
もっと

Download the App!

show episodes
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
In this podiobook: Every one of us is engaged in a quest in this life. The quest is why we get up early in the mornings or very late at night and leave the safety of our homes and families. We venture out into a world where the rules are different then the rules we grew up with. We find that the rules are different than the ones we were taught in school. We get into our cars. We hail taxi cabs. We walk in the rain. We take trains and buses. We navigate security lines at crowded airports. In ...
 
Loading …
show series
 
In this episode, guest Drew Spaniel walks us through the new law passed in late 2020, The IoT Cybersecurity Improvement Act of 2020 (HR 1668), and how if will affect not just US federal government procurement, but IoT device manufacturers, and consumers as well. The Act calls for IoT devices to be secured by manufacturers based on NIST guidance and…
 
In this episode, guest John Prokap discusses the cyber security needs of small and mid-sized businesses, and if and when they need to hire a CISO. His discussion with hosts Malcolm and Chad covers: Why SMBs absolutely need a security program How and when to hire a vCISO, and when it's time to hire a full-time CISO How industry associations can help…
 
In this episode, we feature our guest Miguel El Lakkis. Miguel recently transitioned from News Corp to Cantor Fitzgerald and in this process he describes the method commonly used by CISO's to properly transition a security program to a successor. We discuss the various aspects of a security program that may change over time and how to address const…
 
In this episode we discuss the process of recruiting, identifying culture fit and managing trust with a remote workforce and how these components impact the security profile of a company. The discussion begins with identifying an appropriate recruiting process for a remote workforce and measuring the appropriate candidates to hire in a remote workf…
 
In this episode we invite special guests Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology (https://icitech.org), James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology (https://www.microchip.com) and Paul Phillips, Principal Embedded Solution Engineer, Micr…
 
In this episode we invite special guests Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology (https://icitech.org) and James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology (https://www.microchip.com). In this episode we dive into the unique aspects of IoT Se…
 
On this episode of the podcast Benny Lakunishok, Co-Founder of Zero Networks, join Malcolm Harkins and Chad Boeckmann to explore the industry's continuous adoption and adaption of prevention -> detection -> prevention technologies. The group dives into the maturity of machine learning and where the industry is overall as well as how adoption of new…
 
In this episode, Malcolm Harkins and Chad Boeckmann speak with John Brennan, Partner at YL Ventures. This episode provides a perspective of how venture capital firms are reacting to and supporting their cybersecurity portfolio companies during an unprecedented pandemic in our modern time. In this episode we discuss trends of security teams and John…
 
In this episode Chad Boeckmann interviews Adam Stone about the new California Consumer Privacy Act of 2018 (CCPA). The discussion leads off with the comparison of GDPR to CCPA some similarities and differences between the two. The latter half of the interview dives into a role-play of scoping a business for CCPA compliance. Adam guides our listener…
 
Kristin Judge brings a very interesting background in counseling, teaching, public service and leadership to drive cybersecurity awareness and learning to the masses. Ron Woerner and Kristin have a conversation about the qualities of a good leader and how this can translate into driving change and awareness across the cyber security landscape. Kris…
 
Bob Zukis, CEO of Digital Directors Network and Professor at USC Marshall School of Business, took time out of his busy schedule to talk about cyber risk and board awareness with Chad Boeckmann on this episode. Bob discusses the results of a panel survey from the NACD (National Association of Corporate Directors) annual summit in Washington DC rela…
 
Ron Woerner connects with Joyce Brocaglia, CEO of Alta Associates and Founder of Executive Women's Forum. Joyce covers the importance of investing in one's own career and how to grow into a leadership CISO role to gain the proverbial "seat at the table" with the business. Further discussion leads to describing the importance and approach to buildin…
 
If you have written off your local library you may be underestimating the true value it can deliver that "automatically" brings you privacy. Take a journey on this very special episode to uncover the treasures The New York Public Library holds and also specific privacy rules around the use of any library's resources. Bill Marden is our guest and he…
 
Information security poverty line - Ron and George discuss the segment of teams who can succeed and those are are handicapped. Diving deeper George uncovers his current project for a book he is writing titled "9 Habits to Be Cyber Secure". Ron inquires with George about cultivating good habits for a community of professionals. As an industry we ten…
 
Are you ready? This is an action packed, information filled episode with Allan Alford the CISO for Mitel. Allan covers 4 key points to achieve GDPR "alignment" and takes us through the journey of accomplishing these four key phases as a CISO. Towards the latter half of the episode we dive into evolution of relationship between privacy and security …
 
Chris Hadnagy joins Ron Woerner on this season 2 episode 6 titled Hacking the Human. A master of social engineering, Chris starts the episode with real-world scenarios that interesting and entertaining based on real-life social engineering exercises he has conducted. Further in the episode Chris shares valuable insight into understanding people and…
 
Ben Rothke joins Ron Woerner on this episode to discuss Ben's experience that lead to his book titled Computer Security: 20 Things Every Employee Should Know (McGraw-Hill). Ben addresses the question "what has changed in 20 years" and also reviews some best practices that are very relevant today. Focusing security on the data is where the conversat…
 
Adam Shostack is the author of the book titled Threat Modeling: Designing for Security (Wiley, 2014). He also is a co-author of The New School of Information Security (Addison-Wesley, 2008). Adam is a veteran in the cyber security industry having spent over eight years with Microsoft where he focused on threat model tools and techniques. In this ep…
 
What is DevSlop you ask? Tanya Janca take us through the landscape of DevSecOps (application security in a DevOps environment) and compares this to more traditional approaches to security and application development lifecycles. Tanya addresses the requirements for a success lifecycle process no matter the model and takes us through how to be succes…
 
Robert Baldi joins Ron Woerner on the Business of Security Podcast Series for a discussion about Cyber Security Audit and using the audit capability as a way to leverage change and enhance overall security performance. Robert discusses using a mathematical formula for risk and translating this back into the investments for a Board discussion. Colla…
 
Chad Boeckmann and Ron Woerner discuss the theme of Season 2 podcast, upcoming guests and also share some of their own experiences over many years in the cyber security industry. Topics include the important skills the industry still needs and where the emphasis should be for upcoming professionals. We also discuss the definition of "Security Groun…
 
Aaron Pritz of Aaron Pritz & Associates (www.aaronpritz.com) sits down and talks with us about cyber security in healthcare and common threads from the May 2018 Spring Summit of NH-ISAC. This conversation evolves into data breach management, incident response readiness. This discussion goes into managing risk as an ongoing activity to maintain appr…
 
Barry sits down with us and discusses his long tenure in the industry as a CISO for government entity to a CISO for a healthcare entity. The conversation transforms into how similar security challenges are across all industries. For CISO's to be effective it is important to learn the business of business. We dive into the variables of presenting to…
 
Robert Wood, CSO at SourceClear (acquired recently by CA Veracode), speaks about becoming an empathetic security leader for the business. Exploring context for different perspectives across the business given a variety of responsibilities and stakeholders across an enterprise landscape.Business of Security/Robert Wood, CSO による
 
Sitting down at Target Field in Minneapolis patiently waiting for the season to kick in full speed we caught up with Jason Meszaros of the Minnesota Twins Baseball Club. There is a lot of content packed into this episode including IoT, Big Data, Security Intelligence and enhancing business value through innovation. The examples set by Jason in this…
 
Sharon Smith from C-Suite Results speaks about her experience providing security leadership to companies and lessons learned through these interactions. The discussion evolves from presenting meaningful information for business leaders to negotiating a CISO's reporting structure prior to accepting the job offer. You won't want to miss this engaging…
 
We connect with Christophe Veltsos, Cyber Risk Strategist for Prudent Security on the current curriculum of cyber security in colleges and universities. How to groom up and coming CISO's and what a successful CISO in the future looks like. Together we delve into healthy skepticism for Boards and the C-Suite and why this is healthy level of skeptici…
 
We continue our dialogue around cyber security response and dive deep into crisis communications when dealing with a negative cyber event. Loren Dealy Mahler speaks with us about her experience managing multiple audiences with her work on Capitol Hill and how this translates into the private sector. We dig into the importance of planning and also t…
 
In EP#3 we speak with Charlie Langdon, CEO of Vault Data a cognitive software company. Charlie has tenure from companies such as GE, NEC, Active Voice and is an author and advisor. In this episode we hear a CEO's perspective on managing cyber risk and relate this to how Equifax executives could have handled the breach. We also explore how security …
 
We begin the conversation with Wayne Sadin (who is an NACD Board Governance Fellow) about his role at Affinitas Life. Wayne offers both a technology leadership perspective as well as a Board of Director perspective on cyber risk and cybersecurity. Wayne introduced us to the concept of a QTE (Qualified Technology Expert). Wayne brings to us a much n…
 
In this inaugural episode of Business of Security, we caught up with Alex Wood at the Minneapolis SecureWorld Conference. Alex is the Chief Information Security Officer of Pulte Financial and co-founder of podcast Colorado=Security. Alex shares with us how he got into the industry, his thought process and approach to managing security within an org…
 
Security Business owners that use social media have to do more than just “be on” social media networks in order grow their business. There are so many ways in which to use the tool of Social Media. There is more to social media than casually chatting with friends or sharing news items ad infinitum. In this podcast episode, I share several ways in w…
 
Social media is a driving force when used effectively for all types of business including security and executive protection services. You’ve identified your goals, found your market, you are sharing and creating valuable content for potential customers, marketing your products and services. You’re interacting with comments and monitoring what is be…
 
Social Media success for your business is not overly complicated. Here are few steps that I recommend you act upon to use social media as a tool for your security business. Social Media success begins with knowing who you are, what you do, and who you do it for. The post Social Media Success for Your Security Business appeared first on Strategic Ma…
 
Be Smart on Social Media In this podcast, I talk off the cuff, with no notes, on how security service providers (EP, Bodyguards, event security, etc.) should be smart when using social media for their business. I spend a lot of my time on Google to observe how well, or not, security services providers use […] The post BoS Podcast – Be Smart When Us…
 
In this episode I’ll answer an email from a podcast listener, we’re I’m heading to this week and why, and share my thoughts on exceeding expectations. First up the email a received last week from Chris Kirkland: If you have any questions about marketing, social media, website design or comments about the podcast please send […] The post Business of…
 
On to the main topic of Twitter tips and tools. It’s still amazing to me that I can connect and engage with folks I don’t know from Adam, and chat about subjects that I am passionate about. Like social media, internet marketing and the security industry. I think that Twitter is misunderstood and has received this […] The post Business of Security P…
 
In this podcast I’ll be sharing my feedback on the ASIS expo, from which I just returned and a pretty hard hitting, tough love kind of business talk on giving people what they want for free. ASIS, or A-S-I-S, stands for the American Society for Industrial Security, and for the last 60 years the society […] The post Business of Security Podcast – Gi…
 
Introduction to the Podcast I’ve been in and for the most part around the security business for close to 20 years. I In 2008 I started my company to help EP and security businesses with web design, internet marketing and over the last few years social media. I want to help security businesses succeed through […] The post 013 – Stop Being Stupid on …
 
In this podcast, I go on a rant about Marketing by Innuendo. Faking it until you Make it with fake photos and content will only get you so far. I really try to provide useful and critical information to help you do your job better but this is something I needed to share with the EP community. The post 012 Business of Security Podcast – Marketing by…
 
When I was creating notes for this podcast and planning out these steps, I got curious as to what others would say so I asked “What would be the first step to branding and social media marketing success?” in Google + community Social Media Professionals and on a LinkedIn post by Joe Pulizzi who was sharing “Why Most […] The post Ten Steps to Brandi…
 
-In this episode: The most important and seemingly simplest concept in Welcome to the Beehive. Even if you have all of the above lessons down, you can't find your own success without believe. This lesson teaches you how to assess your level of belief, as well as teach
 
-In this episode: In business, change is the only constant and you have to be ready to deal with it. People and organizations who fail to address change are doomed. Having the power of anticipation means that you know how to deal with change before it affects your bus
 
-In this episode: Do you think you're done with learning? You're never done. The best business people are constantly seeking out new ways to get information that will provide them with an edge. This lesson teaches you the importance of learning and provides the inform
 
-In this episode: How do you know where you're going if you don't know where you are? Smart business people learn to evaluate regularly in order to make sure they are on course for success. Learn how to constantly evaluate your situation and you can learn to keep your
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login