From Security Weekly Wiki
Jump to navigationJump to search

Business Security Weekly Episode #183 - August 04, 2020

Subscribe to all of our shows and mailing list by visiting:

1. SWVHSC: How Security Spending Overlooks the Biggest Risk of All - 07:00 PM-07:30 PM


  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting and clicking the button to join the list!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting and completing the form! We review suggestions monthly and will reach out to you once reviewed!


Global spending on cyber security totals over $100 billion per year, with no upper limit in sight as adversaries remain successful at compromising even well-resourced organizations. Why do adversaries remain successful despite advances in security technologies and risk frameworks? As it turns out, an often-overlooked architecture from 30 years ago is a common thread among many successful attacks. By re-thinking the ubiquitous web browser and its connection to the internet, CIOs and CISOs can nearly eliminate their internet risk surface, provide users the tools and access they need, and free up incident responders to focus on more advanced threats.

This segment is sponsored by Authentic8.

Visit to learn more about them!

To download your copy of "The Billion Dollar Security Blanket" by Matt Ashburn, visit:


Matt Ashburn

Former CIA Cyber Security Officer, and National Security CISO at the White House - National Security Engagement Lead, Authentic8 Engagement Lead, focusing on engagement with national security customers. Prior to Authentic8, Matt served as a CIA officer focusing on cyber issues, including a detail serving on the National Security Council as the Chief Information Security Officer and Special Advisor to the National Security Advisor, leading technical expertise, risk reduction strategies, and policy for national security systems.


2. SWVHSC: "The Failure of Risk Management" - 07:30 PM-08:00 PM


  • Visit to see what we have coming up! Learn about Rapid7’s Findings from the National Internet Cloud Exposure Report on August 13th and How to Create and Run a Conference, from the geniuses behind Layer8 Conference and Wild West Hackin Fest on August 19th! Our next technical training on August 27th will teach you about BootHole, SIGRed and SMBleed…Best Practices To Prioritize And Remediate Now! Or visit to view our previously recorded webcasts!


A ground shaking exposé on the failure of popular cyber risk management methods. This book is the first of a series of spinoffs from Douglas Hubbard’s successful first book, How To Measure Anything: Finding the Value of “Intangibles” in Business.

Learn more on how to quantify risk in terms of dollars and cents in order to build better "business impact" decision makers, visit:


Doug Hubbard

Doug is about building better "business impact" decision-makers for big, risky decisions. He is an award-winning author who sold over 150,000 copies of his 4 different books in eight different languages. Doug offers his global client base of Fortune 500 companies, federal and state governments, the United States military, and major non-profits including the United Nations training and consulting revolving around his quantitative methodology, called Applied Information Economics (AIE).