Recorded August 26, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Interview: Tony Howlett, SecureLink
Mr. Howlett is a published author and speaker on various security, compliance, and technology topics. He has served as a Technical C-level at various companies since 1994. He is currently the CISO of SecureLink, a vendor privilege access management company based in Austin. He is also Vice President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He holds various certifications including certified AWS Solutions Architect, CISSP, GNSA and a B.B.A in Management Information Systems.
Managing 3rd Party Risk
IT and data breaches are going up every year and a large portion of them involve vendors or other third parties with access to enterprise networks and systems. Mr. Howlett will review the current state, examine a couple of high profile vendor related breaches for lessons learned and talk about best practices to limit 3rd party risk.
- THE ELEMENTS OF A GOOD COMPANY APOLOGY - To win back lost trust, it’s important to grasp a fundamental truth about apologies:
- When something bad happens, you must first decide if an apology is even warranted — sometimes apologizing is not the best strategy.
- If an apology is warranted, companies must then answer three key questions to properly craft a response:
- Do we tell the truth?
- On whose behalf are we acting?
- How do our actions benefit those who trust us?
- Are You Enabling a Toxic Culture Without Realizing It? - A strategy to help organizations identify how to prevent toxic cultures from taking hold:
- Identifying the Role You Play - There are two types of team members:
- Passive enablers are typically unaware of what’s happening.
- Active enablers do see what is happening but fail to take action.
- Taking Action - Passive enablers need to be visible with their teams to see what is going on. Active enablers need to speak up.
- Fostering Cultural Health - When leaders communicate clearly and actively demonstrate what will not be tolerated, employees understand that their concerns will be heard and taken seriously.
- 8 Ways Leaders Delegate Successfully - eEight practices of leaders who delegate successfully:
- They pick the right person
- They’re clear about what the person is responsible for and how much autonomy they have
- They make sure that team members have the resources they need to do the job
- They establish checkpoints, milestones, and junctures for feedback so that they neither micromanage nor under-lead.
- They encourage new, creative ways for team members to accomplish goals
- They create a motivating environment
- They tolerate risks and mistakes, and use them as learning opportunities
- There’s No Shame in Working on Vacation - If it’s a choice, a little work can be a joy.
- MetLife names head of global technology, expects new tech to disrupt business models