Difference between revisions of "BSWEpisode151"

From Paul's Security Weekly
Jump to: navigation, search
Line 36: Line 36:
 
= Leadership Articles =
 
= Leadership Articles =
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
* [https://www.ciodive.com/news/5-questions-with-ciscos-ciso/566408/ 5 questions with Cisco's CISO]
+
* [https://www.ciodive.com/news/5-questions-with-ciscos-ciso/566408/ 5 questions with Cisco's CISO] - There is no easy answer for securing a global workforce of 75,000+ employees, including Cisco.  Steve Martino, SVP and CISO at Cisco, discusses how to protect a distributed remote workforce without compromising the integrity of a secure network.  The interview focuses around 5 questions:
* [https://searchcio.techtarget.com/cio-role The CIO role, from IT operator to business strategist]
+
** What kind of pressure is Cisco facing with securing products and working with cross-company teams?
* [https://www.ciodive.com/news/less-than-one-quarter-of-companies-are-innovation-leaders-report-says/566583/ Less than one-quarter of companies are innovation leaders, report says]
+
** How do you prepare an organization for the inevitable — that bad events are going to happen? How do you insure against that with different stakeholders, whether that's customers, shareholders or even just internal business units?
* [https://www.computerweekly.com/feature/Making-the-case-for-integrated-risk-management Making the case for integrated risk management]
+
** How did your security strategy at Cisco take shape and what were your priorities when you started? How have they evolved over time?
* [https://www.computerweekly.com/news/252473394/Gartner-The-time-is-right-to-make-IT-a-boardroom-issue Gartner: The time is right to make IT a boardroom issue]
+
** What was the process of implementing technology to make remote work viable? What was the timeline? And what were the perceived vs. real risks you dealt with implementing it across such a large workforce?
* [https://www.ciodive.com/news/gartner-tech-trends-2020-automation-multiexperience-democratization/565876/ Gartner's strategic tech trends for 2020: Part 1, augmenting skills]
+
** What keeps you up at night in terms of security and threats, and how do you see those evolving?
* [https://www.ciodive.com/news/gartner-tech-trends-edge-cloud-blockchain/566490/ Gartner's strategic tech trends for 2020: Part 2, computing moves to the edge]
+
* [https://searchcio.techtarget.com/cio-role The CIO role, from IT operator to business strategist] - The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today, including:
 +
** CIO role in driving digital transformation today
 +
** Qualities of high-performing CIOs
 +
** How does the CIO role differ from other technology roles in the C-suite?
 +
** What's next for the CIO?
 +
* [https://www.ciodive.com/news/less-than-one-quarter-of-companies-are-innovation-leaders-report-says/566583/ Less than one-quarter of companies are innovation leaders, report says] - Less than one-quarter of organizations "qualify" as innovation leaders, according to a Harvard Business Review Services survey of more than 1,000 executives across industries 1,000 international consumers.
 +
* [https://www.computerweekly.com/feature/Making-the-case-for-integrated-risk-management Making the case for integrated risk management] - Security experts discuss how an integrated approach to risk and governance can be effectively managed
 +
* [https://www.computerweekly.com/news/252473394/Gartner-The-time-is-right-to-make-IT-a-boardroom-issue Gartner: The time is right to make IT a boardroom issue] - In many businesses, IT is regarded as an internal service provider and cost centre. Gartner says now is the best time for CIOs to make IT strategic
 +
* [https://www.ciodive.com/news/gartner-tech-trends-2020-automation-multiexperience-democratization/565876/ Gartner's strategic tech trends for 2020: Part 1, augmenting skills] - Here are the "people-centric" advancements IT decisions makers need to follow:
 +
# Hyperautomation
 +
# Multiexperience
 +
# Democratization
 +
# Human augmentation
 +
# Transparency and traceability
 +
* [https://www.ciodive.com/news/gartner-tech-trends-edge-cloud-blockchain/566490/ Gartner's strategic tech trends for 2020: Part 2, computing moves to the edge] - Here are the advancements in technology IT decision makers need to watch out for:
 +
# Empowered edge
 +
# Distributed cloud
 +
# Autonomous things
 +
# Practical blockchain
 +
# AI security
  
 
<br>
 
<br>
 
{{Template:SocialMedia}}
 
{{Template:SocialMedia}}

Revision as of 14:11, 11 November 2019

Recorded November 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Mike Shema
    is the Product Security Lead of Square.

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Our next webcast is February 13th with Sri Sundaralingam, Vice President, Product and Solutions Marketing at ExtraHop where we will discuss Cloud Native Network Detection and Response! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.


    Interview: Brendon Macareg, Signal Sciences

    Brendon Macareg
    is the Sr. Director of Product Marketing of Signal Sciences.
    Brendon Macareg leads product marketing for Signal Sciences, which protects the web presence of the world's leading brands. Prior to Signal Sciences, Brendon led product marketing for CrowdStrike Services, the incident response and professional services division of CrowdStrike Inc. Prior to CrowdStrike, Brendon spent several years at Symantec leading product marketing efforts for both the Norton consumer brand of information security products and Symantec's enterprise mobility and endpoint management solutions. Prior to Symantec, Brendon managed online product development across a variety of verticals from event ticketing to travel and consumer-facing technology companies.

    Segment Topic:
    Developing an Effective AppSec Security Program

    Segment Description:
    Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover:
    • Prioritize visibility into the most critical attack types
    • Develop appsec metrics and KPIs
    • Methods to prompt safe coding by default
    • How to be your org's security champion


    Leadership Articles

    • 5 questions with Cisco's CISO - There is no easy answer for securing a global workforce of 75,000+ employees, including Cisco. Steve Martino, SVP and CISO at Cisco, discusses how to protect a distributed remote workforce without compromising the integrity of a secure network. The interview focuses around 5 questions:
      • What kind of pressure is Cisco facing with securing products and working with cross-company teams?
      • How do you prepare an organization for the inevitable — that bad events are going to happen? How do you insure against that with different stakeholders, whether that's customers, shareholders or even just internal business units?
      • How did your security strategy at Cisco take shape and what were your priorities when you started? How have they evolved over time?
      • What was the process of implementing technology to make remote work viable? What was the timeline? And what were the perceived vs. real risks you dealt with implementing it across such a large workforce?
      • What keeps you up at night in terms of security and threats, and how do you see those evolving?
    • The CIO role, from IT operator to business strategist - The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today, including:
      • CIO role in driving digital transformation today
      • Qualities of high-performing CIOs
      • How does the CIO role differ from other technology roles in the C-suite?
      • What's next for the CIO?
    • Less than one-quarter of companies are innovation leaders, report says - Less than one-quarter of organizations "qualify" as innovation leaders, according to a Harvard Business Review Services survey of more than 1,000 executives across industries 1,000 international consumers.
    • Making the case for integrated risk management - Security experts discuss how an integrated approach to risk and governance can be effectively managed
    • Gartner: The time is right to make IT a boardroom issue - In many businesses, IT is regarded as an internal service provider and cost centre. Gartner says now is the best time for CIOs to make IT strategic
    • Gartner's strategic tech trends for 2020: Part 1, augmenting skills - Here are the "people-centric" advancements IT decisions makers need to follow:
    1. Hyperautomation
    2. Multiexperience
    3. Democratization
    4. Human augmentation
    5. Transparency and traceability
    1. Empowered edge
    2. Distributed cloud
    3. Autonomous things
    4. Practical blockchain
    5. AI security


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+