Difference between revisions of "BSWEpisode148"

From Paul's Security Weekly
Jump to: navigation, search
Line 29: Line 29:
 
= Leadership Articles =
 
= Leadership Articles =
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
*[https://hbr.org/2019/10/the-two-big-reasons-that-digital-transformations-fail The Two Big Reasons That Digital Transformations Fail]
+
*[https://hbr.org/2019/10/the-two-big-reasons-that-digital-transformations-fail The Two Big Reasons That Digital Transformations Fail] - Digital Transformation is the future of business, which is why we've spent over $100B between 2016 and 2018.  But the expected results fail to materialize.  Why?
*[https://medium.com/the-post-grad-survival-guide/how-to-know-what-to-prioritize-at-work-19f3ba647e08 How to Know What to Prioritize at Work]
+
# Unspoken disagreement among top managers about goals
*[https://searchsecurity.techtarget.com/feature/DevSecOps-model-requires-security-get-out-of-its-comfort-zone DevSecOps model requires security get out of its comfort zone]
+
# A divide between the digital capabilities supporting the pilot and the capabilities available to support scaling it
*[https://hbr.org/podcast/2019/10/leaving-comfort-zones Leaving Comfort Zones]
+
*[https://medium.com/the-post-grad-survival-guide/how-to-know-what-to-prioritize-at-work-19f3ba647e08 How to Know What to Prioritize at Work] - 5 Strategies to Help You Focus on the Right Things:
*[https://www.ciodive.com/news/3-things-cios-should-discuss-with-the-ceo-to-optimize-cybersecurity/564951/ 3 things CIOs should discuss with the CEO to optimize cybersecurity]
+
# Choose your Tasks Proactively, Don’t Let Them Choose You
*[https://www.ciodive.com/news/meet-the-cios-of-today-resumes-vary-while-scope-widens/565005/ Meet the CIOs of today: Resumes vary while scope widens]
+
# Pick the Tasks that are Important, not just Urgent
*[https://www.ciodive.com/news/gartner-how-to-succeed-as-a-cio-with-a-non-it-background/564409/ Gartner: How to succeed as a CIO with a non-IT background]
+
# Choose the Tasks that are related to your GOALS
 +
# Choose the tasks that make other things on your To-Do list OBSOLETE, FASTER or EASIER
 +
# If you are still unsure what to focus on, pick the task that makes you the most UNCOMFORTABLE
 +
*[https://searchsecurity.techtarget.com/feature/DevSecOps-model-requires-security-get-out-of-its-comfort-zone DevSecOps model requires security get out of its comfort zone] - Three tips from a software developer turned security consultant:
 +
# 'A light touch'
 +
# Risk-based security strategy
 +
# DevSecOps chops
 +
*[https://hbr.org/podcast/2019/10/leaving-comfort-zones Leaving Comfort Zones] -
 +
*[https://www.ciodive.com/news/3-things-cios-should-discuss-with-the-ceo-to-optimize-cybersecurity/564951/ 3 things CIOs should discuss with the CEO to optimize cybersecurity] -
 +
# Adjust IT governance according to the business
 +
# Business-driven quantitative risk measurement
 +
# Business collaboration first; then, compliance comes naturally
 +
*[https://www.ciodive.com/news/meet-the-cios-of-today-resumes-vary-while-scope-widens/565005/ Meet the CIOs of today: Resumes vary while scope widens] -
 +
*[https://www.ciodive.com/news/gartner-how-to-succeed-as-a-cio-with-a-non-it-background/564409/ Gartner: How to succeed as a CIO with a non-IT background] -
 
<br>
 
<br>
 
{{Template:SocialMedia}}
 
{{Template:SocialMedia}}

Revision as of 12:49, 21 October 2019

Recorded October 14, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Our next webcast is February 13th with Sri Sundaralingam, Vice President, Product and Solutions Marketing at ExtraHop where we will discuss Cloud Native Network Detection and Response! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.


    Interview: Merlin Namuth

    Merlin Namuth
    is a Consultant.
    Merlin Namuth is a former CISO. Namuth has over 24 years of IT experience with the last 21 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine University where he also guest lectures. Merlin serves on the Board of Directors at iEmpathize, a nonprofit organization focused on educating people about human trafficking. He has presented at several conferences, including RSA both domestically and internationally.

    Segment Topic:
    CISO Role and Experience


    Leadership Articles

    1. Unspoken disagreement among top managers about goals
    2. A divide between the digital capabilities supporting the pilot and the capabilities available to support scaling it
    1. Choose your Tasks Proactively, Don’t Let Them Choose You
    2. Pick the Tasks that are Important, not just Urgent
    3. Choose the Tasks that are related to your GOALS
    4. Choose the tasks that make other things on your To-Do list OBSOLETE, FASTER or EASIER
    5. If you are still unsure what to focus on, pick the task that makes you the most UNCOMFORTABLE
    1. 'A light touch'
    2. Risk-based security strategy
    3. DevSecOps chops
    1. Adjust IT governance according to the business
    2. Business-driven quantitative risk measurement
    3. Business collaboration first; then, compliance comes naturally


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+