Difference between revisions of "BSWEpisode160"

From Security Weekly Wiki
Jump to navigationJump to search
Line 17: Line 17:
 
* https://medium.com/swlh/3-habits-for-improving-municipal-ransomware-defense-c4bd027cad7c?source=friends_link&sk=1e72bb7660d379063d24d3347970f0bd
 
* https://medium.com/swlh/3-habits-for-improving-municipal-ransomware-defense-c4bd027cad7c?source=friends_link&sk=1e72bb7660d379063d24d3347970f0bd
 
* https://medium.com/@michael_figueroa/higher-ed-needs-a-cybersecurity-intervention-4eeff14c3bb8?source=friends_link&sk=0777c81ed84bef5ebe6698865761be2e
 
* https://medium.com/@michael_figueroa/higher-ed-needs-a-cybersecurity-intervention-4eeff14c3bb8?source=friends_link&sk=0777c81ed84bef5ebe6698865761be2e
 +
<br>
  
 
= Leadership Articles =
 
= Leadership Articles =

Revision as of 16:40, 27 January 2020

Recorded January 27, 2020 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Michael Figueroa

    Michael Figueroa
    is an Independent Executive Security Advisor

    Michael is a security community thought leader with over 20 years of experience in business, government, and non-profit organizations designing security programs, building information sharing collaborations, and advising state and federal government executives. He has worked with organizations across market sectors spanning the size spectrum from large enterprises to early-stage startups.

    Segment Topic:
    CISO Challenges in a Changing World

    Segment Description:
    Michael discusses the challenges of CISOs and the differences between large enterprises and small businesses. As the role of the CISO continues to change, so do the requirements for both large enterprise and small business CISOs. We discuss the balance of communications. leadership, ownership, governance, and the board.

    Segment Resources:


    Leadership Articles

    1. Board members find cybersecurity risk an existential threat - According to a study from UC Berkeley's Center for Long-Term Cybersecurity (CLTC) and consulting firm Booz Allen Hamilton:
      1. Members of board of directors find cybersecurity risk to be a "fundamental hazard to the continued existence of the enterprise"
      2. Board members see cyber risk as "no longer confined to a set of operational decisions to be left solely in the hands of IT management"
      3. But board members say they don't have the information and processes in place to provide effective governance when it comes to cyber risk
    2. When Community Becomes Your Competitive Advantage - While communities generate tangible value for businesses — such as content, events, online advocacy and marketing, technology production, customer support, and education — it is the intangible value that members derive from the experience that makes these environments truly “sticky.” Successful communities have seven key elements:
      1. A shared purpose and values.
      2. Simple, easily accessible value consumption.
      3. Simple, easily navigable value creation.
      4. Clearly defined incentives and rewards.
      5. Carefully crafted accountability.
      6. Healthy, diverse participation driven by good leadership.
      7. Open, objective, governance and evolution.
    3. The Little Things That Make Employees Feel Appreciated - If managers could make a far broader group of employees feel appreciated, the benefits would be considerable. Here's what they need to do:
      1. Touch base early and often.
      2. Give balanced feedback.
      3. Address growth opportunities.
      4. Offer flexibility.
      5. Make it a habit.
    4. Don't Stay in Your Lane: The Secret to Developing Your Career - Want to get the most you can out of your career? Learn what self-advocacy looks like.
      1. Own your voice.
      2. Raise your hand.
      3. Find a mentor or sponsor.
    5. TRUST IS AT THE CORE OF SOFTWARE MARKETING - Of course, trust doesn't stop with marketing. Slimy sales practices provokes distrust. Shoddy product quality erodes trust. Slow or opaque customer support also erodes trust. Every interaction with a customer is an opportunity to engender or erode trust.
    6. Chipotle, Target CISOs: Repurpose talent for cyber - "I'm as likely to hire somebody with an economics degree as I am with computer science. Economics is about finding patterns in the data," said Dave Estlick, CISO of Chipotle.


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+