Difference between revisions of "BSWEpisode141"

From Security Weekly Wiki
Jump to navigationJump to search
Line 3: Line 3:
 
== Episode Audio ==
 
== Episode Audio ==
  
<!--<div align="center">
+
<div align="center">
 
{{#widget:SoundCloud
 
{{#widget:SoundCloud
|id=543346953
+
|id=672106832
 
|width=75%
 
|width=75%
 
|height=100
 
|height=100
Line 12: Line 12:
 
}}
 
}}
 
</div>
 
</div>
-->
+
 
 
== Hosts ==
 
== Hosts ==
 
{{Template:Matt}}
 
{{Template:Matt}}

Revision as of 15:07, 28 August 2019

Recorded August 26, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Tony Howlett, SecureLink

    Tony Howlett is the CISO at SecureLink

    Mr. Howlett is a published author and speaker on various security, compliance, and technology topics. He has served as a Technical C-level at various companies since 1994. He is currently the CISO of SecureLink, a vendor privilege access management company based in Austin. He is also Vice President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He holds various certifications including certified AWS Solutions Architect, CISSP, GNSA and a B.B.A in Management Information Systems.

    Segment Topic:
    Managing 3rd Party Risk

    Segment Description:
    IT and data breaches are going up every year and a large portion of them involve vendors or other third parties with access to enterprise networks and systems. Mr. Howlett will review the current state, examine a couple of high profile vendor related breaches for lessons learned and talk about best practices to limit 3rd party risk.



    Leadership Articles

    1. When something bad happens, you must first decide if an apology is even warranted — sometimes apologizing is not the best strategy.
    2. If an apology is warranted, companies must then answer three key questions to properly craft a response:
      1. Do we tell the truth?
      2. On whose behalf are we acting?
      3. How do our actions benefit those who trust us?
    1. Identifying the Role You Play - There are two types of team members:
      1. Passive enablers are typically unaware of what’s happening.
      2. Active enablers do see what is happening but fail to take action.
    2. Taking Action - Passive enablers need to be visible with their teams to see what is going on. Active enablers need to speak up.
    3. Fostering Cultural Health - When leaders communicate clearly and actively demonstrate what will not be tolerated, employees understand that their concerns will be heard and taken seriously.
    1. They pick the right person
    2. They’re clear about what the person is responsible for and how much autonomy they have
    3. They make sure that team members have the resources they need to do the job
    4. They establish checkpoints, milestones, and junctures for feedback so that they neither micromanage nor under-lead.
    5. They encourage new, creative ways for team members to accomplish goals
    6. They create a motivating environment
    7. They tolerate risks and mistakes, and use them as learning opportunities



    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+