BSWEpisode173

From Security Weekly Wiki
Jump to navigationJump to search

Business Security Weekly Episode #173 - May 11, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. Interview - Lessons for Cybersecurity From a Pandemic - 03:00 PM-03:30 PM


Visit https://securityweekly.com/redseal for more information!


Announcements

  • Join us at InfoSecWorld 2020 - June 22nd-24th now a fully virtual event! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code!
  • Join the Security Weekly Mailing List by visiting securityweekly.com/subscribe and clicking the button to join the list! We will be starting to roll out our public Discord channel in the next week or so and our mailing list subscribers will get the first invites!

Description

The coronavirus has focused the world’s attention on disease spread like never before. This discussion will draw out some of the parallels that can inform how we do our work in cybersecurity, and that are helpful in communicating with the people who pay the bills. All the new vocabulary around “social distancing”, “contact tracing”, and “flattening the curve” is useful for our discussions in cybersecurity.

To learn more about RedSeal, visit: https://securityweekly.com/redseal



Guest(s)

Mike Lloyd

Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-optimizing networks. Mike served as principal architect at Cisco on the technology used to overlay MPLS VPN services across service provider backbones. He joined Cisco through the acquisition of Netsys Technologies, where he was the senior network modeling engineer. Mike holds a degree in mathematics from Trinity College, Dublin, Ireland, and a PhD in stochastic epidemic modeling from Heriot-Watt University, Edinburgh, Scotland.


Hosts

2. News - 5 Tactical Steps, 5 CISO Priorities, and Communicating "Why" - 03:30 PM-04:00 PM


Announcements

  • We are looking for high-quality guest suggestions for all of our podcasts to fill our Q3 recording schedule! Submit your suggestions for guests by visiting securityweekly.com/guests and submitting the form! We review suggestions monthly and will reach out to you once reviewed!
  • Learn how penetration testing reduces risk in our next live webcast with Core Security (a Help Systems Company). Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand.

Description

In the leadership and communications section, Top 5 Tactical Steps for a New CISO, Good Leadership Is About Communicating “Why”, 5, ok maybe only 4, CISO Priorities During the COVID-19 Response, and more!


Hosts

Jason Albuquerque's Content:

Articles

Matt Alderman's Content:

Articles

  1. Know the Business’s Operational Surfaces
  2. Know Your Business’s Assets
  3. Know Your Control Portfolio
  4. Know Your Resources
  5. Know Your ‘Must-Haves’ and Your ‘Nice-to-Haves’
  1. Hold regular weekly or biweekly webinars where you talk to them about different safety tips, different things to be aware of that are both for their work life, but also their personal life
  2. Offer 'office hours' to make a security Genius Bar available and encourage people to join your security team on video conferences to address problems or concerns
  3. Make sure that you don't end up having employees storing your data out of regulatory compliance on thumb drives, portable hard drives and personal cloud instances
  • Good Leadership Is About Communicating “Why” - In an ongoing crisis, clear communication is more important and more difficult than when things seem normal. But if we present without addressing our audience’s core questions of what, how, and why, we’ll sow more confusion than we bring clarity. But we must also start with why. Here are three strategies to help you get to the heart of the why in your next presentation:
  1. Ask some good what questions
  2. Follow up with because
  3. State alternate perspectives
  1. Secure remote users
  2. Identify risk as quickly as possible
  3. Work nimbly
  4. Stay vigilant and educate against new phishing techniques

Paul Asadoorian's Content:

Articles