Difference between revisions of "BSWEpisode165"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
 
(21 intermediate revisions by 3 users not shown)
Line 1: Line 1:
''Recorded February 17, 2020 at G-Unit Studios in Rhode Island!''
 
  
== Episode Audio ==
+
<!-- 
 +
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 +
-->
 +
= Business Security Weekly Episode 165 - 2020-03-09 =
  
 +
==Episode Audio==
  
== Hosts ==
+
<!-- 
{{Template:Matt}}
+
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
{{Template:JasonA}}
+
-->
{{Template:Paul}}
+
 
<br>
+
<p>[https://securityweekly.com Business Security Weekly Episode 165]</p>
  
 
== Announcements ==
 
== Announcements ==
{{Template:Announcements}}
+
<!-- 
 +
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 +
-->
 +
<p>
 +
 
 +
<ul style="margin-left: 50px;">
 +
 +
<li>Register for our upcoming webcasts and virtual trainings by visiting securityweekly.com selecting the webcast/training drop down from the top menu bar and clicking registration. In our next webcast with Gravwell, we will cut through the marketing buzzwords and teach you about collecting & analyzing logs in hybrid cloud environments.</li>
 +
 +
<li>We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!</li>
 +
 +
<li>Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!</li>
 +
 +
<li>OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!</li>
 +
 +
<li>We’re looking forward to attending SecureWorld Boston, March 25th & 26th at the Hynes Convention Center. The 16th annual conference brings together New England’s InfoSec community for training, collaboration, and networking. This year’s theme is “Animal Defenses of the Animal Kingdom.” Security Weekly listeners save $100 off their registration for a full Conference Pass. Go to www.secureworldexpo.com and register using the discount code SECURITYWEEKLY.</li>
 +
 +
</ul>
 +
 
 +
</p>
 +
= Topic - Categorization of Information Security  =
 +
<!-- 
 +
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 +
-->
 +
{|style="width: 100%;margin: auto; " cellpadding="10"
 +
 
 +
|<center>{{#ev:youtube|ekA7otzGUWw }}</center>
 +
 
 +
|-
 +
|<p>'''Description:'''<br><br> How we breakdown the categories in information security. We look at the major areas of infosec and how they relate to your security programs and the vendors/technologies in each category. Our category breakdown will be used to label each segment we produce and allow subscribers to select categories of interest!</p>
 +
 
 +
 
 +
 
 +
|}
 +
 
 +
 +
==[https://twitter.com/@Jay_Albuquerque Jason Albuquerque]'s Content: ==
 +
[[Image:Jason_Albuquerque-0.jpg|50px|thumb|left]]
 
<br>
 
<br>
 +
{{Template:BSW165TopicJason Albuquerque}}
 +
 +
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
 +
[[Image:MattAlderman-0.png|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165TopicMatt Alderman}}
 +
 +
==[https://twitter.com/@securityweekly Paul Asadoorian]'s Content: ==
 +
[[Image:Paul_Asadoorian-0.png|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165TopicPaul Asadoorian}}
 +
  
= Interview: Richard Clarke, Good Harbor Security Risk Management, LLC =
+
= News - CISOs ready to move, How CISOs manage stress, and more!  =
[[File:RichardClarke.jpg|right|250px|thumb|<center>'''[https://richardaclarke.net/ Richard Clarke]'''is the Chairman and CEO at [https://www.goodharbor.net/ Good Harbor Security Risk Management, LLC]</center>]] Dick Clarke is the founder and CEO of Good Harbor Cyber Security Risk Management, and advises leaders in the public and private sectors on all issues of cybersecurity and crisis management. Clarke served in the White House on the National Security Council under President George H.W. Bush, President Bill Clinton, and President George W. Bush for an unprecedented ten years, as its chief counterterrorism expert and then as Special Advisor to the President on Cyber Security. In his role as the nation’s "Cyber-Czar," Clarke developed the country’s first National Strategy to Defend Cyberspace. Since leaving government, Clarke has authored or co-authored nine books, including the international bestseller, "Against All Enemies," and his latest with Robert Knake, "The Fifth Domain."<br><br>'''Segment Topic:'''<br>Corporate governance and a culture of security<br><br>'''Segment Description:'''<br>Myriad technologies facilitated unprecedented connectivity hackers can leverage, and increasingly sophisticated actors, including state-sponsored groups, are engaging in cyberspace in ways for which have not prepared. Richard Clarke, former U.S. national coordinator for security, infrastructure protection and counterterrorism, argues that those significant risks are still manageable ones, and provides concrete steps that can be taken toward cyber resilience. In conversations with leading scientists, government officials, and corporate executives, the prevailing consensus is that we are capable of defending ourselves as individuals, as organizations, and as a nation, but that our cyber security remains contingent on the a consensus that it is worth prioritizing.
+
<!-- 
 +
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 +
-->
 +
{|style="width: 100%;margin: auto; " cellpadding="10"
 +
 
 +
|<center>{{#ev:youtube|UmgJIJIpmI0 }}</center>
 +
 
 +
|-
 +
|<p>'''Description:'''<br><br> In the leadership and communications section, CISOs who leave after 2 years may not finish what they start, Most CISOs ready to move jobs if something better comes along, A New Framework for Executive Compensation, and more!</p>
 +
 
 +
 
 +
 
 +
|}
 +
 
 +
 +
==[https://twitter.com/@Jay_Albuquerque Jason Albuquerque]'s Content: ==
 +
[[Image:Jason_Albuquerque-0.jpg|50px|thumb|left]]
 
<br>
 
<br>
 +
{{Template:BSW165NewsJason Albuquerque}}
 +
 +
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
 +
[[Image:MattAlderman-0.png|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165NewsMatt Alderman}}
 +
 +
==[https://twitter.com/@securityweekly Paul Asadoorian]'s Content: ==
 +
[[Image:Paul_Asadoorian-0.png|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165NewsPaul Asadoorian}}
 +
  
= Leadership Articles =
+
= Fullaudio - None  =
 +
<!-- 
 +
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 +
-->
 +
{|style="width: 100%;margin: auto; " cellpadding="10"
  
 +
|-
 +
|<p>'''Description:'''<br><br> This week, we discuss how we breakdown the categories in Information Security. We look at the major areas of Infosec and how they relate to your security programs and the vendors/technologies in each category. Our category breakdown will be used to label each segment we produce and allow subscribers to select categories of interest! In the Leadership and Communications segment, CISOs who leave after 2 years may not finish what they start, Most CISOs ready to move jobs if something better comes along, A New Framework for Executive Compensation, and more!
 +
 +
Visit https://www.securityweekly.com/bsw for all the latest episodes!
 +
 +
Follow us on Twitter: https://www.twitter.com/securityweekly
 +
Like us on Facebook: https://www.facebook.com/secweekly</p>
 +
 +
 +
 +
|}
 +
 +
 +
==[https://twitter.com/@Jay_Albuquerque Jason Albuquerque]'s Content: ==
 +
[[Image:Jason_Albuquerque-0.jpg|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165FullaudioJason Albuquerque}}
 +
 +
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
 +
[[Image:MattAlderman-0.png|50px|thumb|left]]
 +
<br>
 +
{{Template:BSW165FullaudioMatt Alderman}}
 +
 +
==[https://twitter.com/@securityweekly Paul Asadoorian]'s Content: ==
 +
[[Image:Paul_Asadoorian-0.png|50px|thumb|left]]
 
<br>
 
<br>
{{SocialMedia}}
+
{{Template:BSW165FullaudioPaul Asadoorian}}

Latest revision as of 17:25, 24 March 2020

Business Security Weekly Episode 165 - 2020-03-09

Episode Audio

Business Security Weekly Episode 165

Announcements

  • Register for our upcoming webcasts and virtual trainings by visiting securityweekly.com selecting the webcast/training drop down from the top menu bar and clicking registration. In our next webcast with Gravwell, we will cut through the marketing buzzwords and teach you about collecting & analyzing logs in hybrid cloud environments.
  • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
  • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
  • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
  • We’re looking forward to attending SecureWorld Boston, March 25th & 26th at the Hynes Convention Center. The 16th annual conference brings together New England’s InfoSec community for training, collaboration, and networking. This year’s theme is “Animal Defenses of the Animal Kingdom.” Security Weekly listeners save $100 off their registration for a full Conference Pass. Go to www.secureworldexpo.com and register using the discount code SECURITYWEEKLY.

Topic - Categorization of Information Security

Description:

How we breakdown the categories in information security. We look at the major areas of infosec and how they relate to your security programs and the vendors/technologies in each category. Our category breakdown will be used to label each segment we produce and allow subscribers to select categories of interest!



Jason Albuquerque's Content:

Jason Albuquerque-0.jpg


Template:BSW165TopicJason Albuquerque

Matt Alderman's Content:

MattAlderman-0.png


Template:BSW165TopicMatt Alderman

Paul Asadoorian's Content:

Paul Asadoorian-0.png


Template:BSW165TopicPaul Asadoorian


News - CISOs ready to move, How CISOs manage stress, and more!

Description:

In the leadership and communications section, CISOs who leave after 2 years may not finish what they start, Most CISOs ready to move jobs if something better comes along, A New Framework for Executive Compensation, and more!



Jason Albuquerque's Content:

Jason Albuquerque-0.jpg


Template:BSW165NewsJason Albuquerque

Matt Alderman's Content:

MattAlderman-0.png


  • THE GREAT CEO WITHIN - If you’re looking for a primer on many of the responsibilities of being a startup CEO, read The Great CEO Within by Matt Mochary.
  • CISOs who leave after 2 years may not finish what they start - The average tenure for a CISO is about 2.1 years, according to research from Korn Ferry. The information security industry has a 0% unemployment rate, competition for talent is unrelenting — even in the C-suite. "Unless you sit in a role for an extended period of time, you don't know that the next transition is coming," said Dave Estlick, CISO of Chipotle.
  • Most CISOs ready to move jobs if something better comes along - The shortage of skilled security pros is creating an active recruitment market, with over 80% of CISOs saying they would consider a new role if approached. The research analysed responses from 500 senior security practitioners and CISOs working at businesses with over 500 heads around the world and found that only 7% of US CISOs were not actively looking or willing to consider a change of employment, compared to 11% in APAC and 16% in the UK and Ireland.
  • How 4 CISOs handle stress on the job - Nearly 90% of CISOs say they are under moderate or high stress, according to a Nominet survey. Here’s how 4 CISOs handle stress:
  1. Andy Kim, CISO at Allstate, approaches cybersecurity like an automobile assembly line. His team pulls in the metaphorical steering wheel, air bags, brakes and seat belts. "Security just happens because it is part of the product delivery, like air bags and brakes," he said.
  2. A good CISO knows they "will never get risk to zero" and security is a distributed effort throughout an organization, says Greg Touhill, former US Federal CISO. "Never over-promise and under-deliver."
  3. "It's important for any high stress role to be able to step away and take time off. Time off does not mean you are tethered to your phone every waking minute," said Jadee Hanson, CISO at Code42. "I am talking about real time off, where you can step away from work and recharge, gain perspective, and come back refreshed to tackle the countless problems that will always be there."
  4. While public relations may be less forgiving, industry recognizes a CISO's performance is quantified beyond a singular event. "Developing a strong team, building relationships, growing trust with key stakeholders and the ability to align executive leadership is key to success”, says Dave Estlick, CISO at Chipotle.
  • Innovation requires radical choices - “Risk is where innovation occurs”, says Margaret Heffernan, author of Uncharted: How to map the future together. She says start with a “Blank canvas” and instil family values in the business.
  • A New Framework for Executive Compensation - The Evolution to a New Standard in Long-Term Incentive Pay:
    • Mission/purpose-driven
    • Stakeholder-centric
    • Stakeholder outcome-focused
    • Financial and nonfinancial goals
    • End-to-end cycles, using the same outcome measures for each cycle
    • Goals that improve: (1) at a set amount over prior cycle and (2) relative to peer performance

Paul Asadoorian's Content:

Paul Asadoorian-0.png


Template:BSW165NewsPaul Asadoorian


Fullaudio - None

Description:

This week, we discuss how we breakdown the categories in Information Security. We look at the major areas of Infosec and how they relate to your security programs and the vendors/technologies in each category. Our category breakdown will be used to label each segment we produce and allow subscribers to select categories of interest! In the Leadership and Communications segment, CISOs who leave after 2 years may not finish what they start, Most CISOs ready to move jobs if something better comes along, A New Framework for Executive Compensation, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly



Jason Albuquerque's Content:

Jason Albuquerque-0.jpg


Template:BSW165FullaudioJason Albuquerque

Matt Alderman's Content:

MattAlderman-0.png


Template:BSW165FullaudioMatt Alderman

Paul Asadoorian's Content:

Paul Asadoorian-0.png


Template:BSW165FullaudioPaul Asadoorian