Difference between revisions of "BSWEpisode179"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
(Added By Paul's Craptastic PPWorks Code)
 
(One intermediate revision by the same user not shown)
Line 79: Line 79:
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
-->
 
-->
 +
 +
<center>{{#ev:youtube|-LMQyqeox10 }}</center>
  
  
Line 93: Line 95:
 
=== Description ===
 
=== Description ===
  
In the leadership and communications section, Profile of the Post-Pandemic CISO, Time to rethink business continuity and cyber security, Protecting Remote Workers’ Productivity and Performance, and more!
+
In the Leadership and Communications section, Profile of the Post-Pandemic CISO, Time to rethink business continuity and cyber security, Protecting Remote Workers’ Productivity and Performance, and more!
  
  

Latest revision as of 20:57, 6 July 2020

Business Security Weekly Episode #179 - July 06, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. Interview - An Honest Conversation About "Response" - 03:00 PM-03:30 PM


Visit https://securityweekly.com/ for more information!


Announcements

  • We are looking for high-quality guest suggestions for all of our podcasts to fill our Q3 recording schedule! Submit your suggestions for guests by visiting securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!
  • With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best - host virtual podcasts! I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 - August 6, 2020. To reserve your slot now, visit: securityweekly.com/summercamp2020

Description

It's time to come out and say it: "response" means something different to every category in cybersecurity. Yet, it's broadly used with little industry definition. In endpoint detection and response (EDR) systems, "response" refers to a prescriptive set of actions that can be taken with little to no human intervention. For example, if suspicious activity occurs on a device, that device can be automatically quarantined by the EDR tool. In network detection and response, "response" is more broad. The network is too vast and interconnected for blunt responses and therefore requires more surgical precision and investigation.

To request a demo with ExtraHop, visit: https://securityweekly.com/extrahop



Guest(s)

Juan Canales

Juan Canales, Sr Security Professional. Mr. Canales is a leading Sr Security Professional with more than 20 years of experience in computer, network and information security. He has worked in high-tech, manufacturing, financial and health care verticals. Mr. Canales has served as NetApp's and VMware CxO Advisory Board Member. He currently plays the role of Senior Manager of Enterprise Security and Architecture. As an Enterprise Security Architect, he has helped organizations build their IT Cloud strategy and roadmaps.

Matt Cauthorn

Matt Cauthorn is responsible for all security implementations and leads a team of technical security engineers who work directly with customers and prospects. A passionate technologist and evangelist, Matt is often on site with customers working to solve the complex and mission-critical business problems that Fortune 1,000 and global 2,000 companies face. After years spent helping customers tap into the value offered by network-based analytics, Matt has been able to bring fresh thinking to security threat detection. Prior to ExtraHop, Matt was a Sales Engineering Manager at F5 and before that he started his career in the trenches as a practitioner where he oversaw application hosting, infrastructure, and security for five international data centers.


Hosts

2. News - Post-Pandemic CISO, 5 Threats to Resilience, and Time to Rethink Cyber Security - 03:30 PM-04:00 PM


Announcements

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list!
  • In our first July webcast, you will learn how to stitch and enrich flow data for security with VIAVI Solutions! Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

Description

In the Leadership and Communications section, Profile of the Post-Pandemic CISO, Time to rethink business continuity and cyber security, Protecting Remote Workers’ Productivity and Performance, and more!


Hosts

Jason Albuquerque's Content:

Articles

Matt Alderman's Content:

Articles

  • Profile of the Post-Pandemic CISO - So how has the role of the CISO and security management changed in recent months? And what new responsibilities will CISOs be expected to keep in the pandemic's aftermath? Security experts share their insights.
    • More Emphasis on Physical Security May Become the Norm
    • A Focus on Mental Health Is Now Essential
    • If They Weren't Before, CISOs Must Zero in on Business Strategy
    • The Attack Surface Must be Redefined
  • 5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience - With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures, including:
    • No accountability for the crown jewels for the company.
    • Cybersecurity budgets aren’t revised for current threatscapes.
    • Conflicts of interest when CISOs report to CIOs and the IT budget wins.
    • The mistake of thinking cloud platforms’ Identity and Access Management (IAM) tools can secure an enterprise on their own.
    • The mistake of thinking cloud platforms’ Identity and Access Management (IAM) tools can secure an enterprise on their own.
  • Time to rethink business continuity and cyber security - Business continuity and cyber security remain largely in separate silos, but changes in the IT and cyber threat landscapes mean there is an urgent need for organisations to alter their approach. To support a broader, recovery-focused, integrated and aligned approach to BCM and cyber security, organisations need to act in three key areas:
    • Planning – Restructure BCM and cyber security teams to ensure greater integration and collaboration in terms of operations, processes, procedures, responsibilities, and technology investments.
    • Technology – Plan for the worst in terms of detection, response, recovery and improvement of both security and continuity capabilities.
    • Policy – Implement and enforce stringent privileged access management (PAM) controls to help enforce a policy of least privilege.
  • Remote working set to remain but so do management challenges - According to a survey of 2,200 businesses globally, including 500 in the UK, by global recruitment firm Robert Walters, there is a mixed signal on remote vs. onsite workforce plans...
    • 49% of UK companies are currently planning how to return staff to offices. Almost half (49%) are planning a staggered return to the office for their workforces, based on health risks and 46% based on how critical their roles are.
    • 87% of employees said they would like more opportunities to work from home after they return to the workplace, and 21% said they would like to work from home permanently.
    • But businesses concerns might mean this is not possible with a total of 64% concerned over employee productivity, and 57% of senior leadership at preferring traditional ways of working.
  • Protecting Remote Workers’ Productivity and Performance - What do we need to watch out for to preserve the health and viability of our remote employees?
    • Beware Virtual Distance, including physical distance; operational distance, including such conditions as poor internet connections and technical problems; and affinity distance that prevents deeper connections from developing.
    • Make Personal Connections, especially supervisors and colleagues to invest time in getting to know more about each other.
  • 10 essential negotiation tactics CISOs should know - CISOs are constantly in negotiations, whether it’s to draw up vendor contracts, developing strategy with C-suite colleagues or drafting workplace requirements with newly hired direct reports. Here are 1- tactics to help you with these negotiations:
    • Recognize it’s a negotiation, not a debate
    • Build trust
    • Envision what you want
    • Discern the other side’s needs
    • Prepare
    • Put aside assumptions, learn to listen
    • Trade against your logic
    • Think through different potential scenarios
    • Keep emotions in check
    • Don’t aim to win

Paul Asadoorian's Content:

Articles