The Business of Security-logo

The Business of Security

Technology Podcasts

This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.

Location:

United States

Description:

This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.

Language:

English

Contact:

9525440234


Episodes
Ask host to enable sharing for playback control

#46 - Identity Orchestration and the Hidden Costs of Cybersecurity with Eric Olden, CEO at Strata Identity

9/6/2023
As a CISO, could you be hemorrhaging cash without even knowing? Tune in to our discussion with Eric Olden, CEO of Strata, as we cast a spotlight on the potential costs of not tightening your cybersecurity, especially during cloud migration. We expose the financial pitfalls of operating outdated software, managing infrastructure, and rewriting applications. Plus, we offer you a secret weapon - identity orchestration, a smart solution that can save you money and elevate your security. Seize this chance to explore a realistic method to measure the cost of neglecting your cybersecurity and discover how you can strategize for expenses related to cloud transition. Benefit from Eric's insights about the power of third-party research in generating a Total Economic Impact report for informed strategic decisions. Be ready for a paradigm shift as we tackle the issue of demonstrating ROI and fostering customer adoption of identity orchestration. This episode promises to shake up your understanding of cloud security and identity orchestration, inspiring fresh strategies for a safer, more cost-effective business Host: Josh Bruyning

Duration:00:28:41

Ask host to enable sharing for playback control

#45 - The CISO is Not the Hero of the Story with Jeff Wheatman

7/5/2023
Dive deep with us into the fascinating world of storytelling as it intersects with cybersecurity. We're debunking common myths and shedding light on the transformative power of organizational archetypes. Jeff Weatman leads the discussion, challenging the stereotypical portrayal of the CISO as the central hero of cybersecurity. In a captivating twist, Jeff Weatman proposes that the CISO, instead of being the typical hero, plays the role of the wise old sage, a vital yet supporting character. He intriguingly identifies the actual heroes as the CEO, CFO, Board Members, Customers, and Partners. Get ready to rethink cybersecurity dynamics and recognize the true champions of this digital battlefield. A strategic thought leader with extensive expertise in security and cyber risk management, Jeffrey Wheatman is regarded as a foremost expert in guiding public sector clients and Fortune 500 companies in connection with their cybersecurity and risk management programs. Jeffrey’s history of working with clients to plan, grow, and transform their cyber risk management programs has been instrumental in ensuring organizations' continued viability and health as they define short- and long-term expansion plans. Under Jeffrey’s guidance, board and C-level leaders are fortified with the best practice solutions to realize exceptional performance outcomes. In his current capacity as SVP, Cyber Risk Evangelist at Black Kite, Jeffrey has been tasked with raising awareness of the enterprise-wide risk impacts of third-party risk, both in the digital and traditional supply chain and supporting the strategic vision of the executive leadership team and investors. Most recently, Jeffrey acted as a VP, Advisor with Gartner, the global strategic advisory firm, where he worked with clients to build and improve their security programs, assess risk, focus on reporting on program status, metrics, performance management, stakeholder engagement, executive communication, and bridging the connection between technology and security risk.

Duration:00:45:51

Ask host to enable sharing for playback control

#44 - Continuous Process Improvement with Nick Means

5/3/2023
Nick Means has been leading software engineering teams for more than a decade in the healthtech and devtools spaces. His focus is on building distributed organizations defined by their cultures of high trust and autonomy. He’s also an international keynote speaker, having shared his unique brand of storytelling with audiences around the world. He works remotely from Austin, TX, and spends his spare time going on adventures with his wife and kids, running very slowly, and trying tobrew the perfect cup of coffee.

Duration:00:24:23

Ask host to enable sharing for playback control

#43 - Partnering with Business Leaders to Build Your Security Program from Scratch

3/22/2023
In this episode, we have a very special guest joining us to discuss the essentials of building a cybersecurity program from scratch. Allan Alford, the founder of Allan Alford Consulting, brings a wealth of experience and a unique perspective to the table. Since launching his boutique cybersecurity consulting practice at the end of 2019, Allan has been dedicated to helping organizations efficiently implement and manage security programs and projects. With a focus on long-term relationships and custom solutions, Allan's approach ensures that each client's unique needs are met with the highest level of expertise. But that's not all! Allan Alford Consulting also offers coaching services for aspiring and new CISOs, helping them navigate the ever-changing landscape of cybersecurity leadership. In today's episode, Allan will share his insights on the fundamentals of building a robust cybersecurity program, the importance of understanding an organization's unique needs, and how to forge strong partnerships with business leaders. Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:26:14

Ask host to enable sharing for playback control

#42 - CIS Controls for Business with Valecia Stocchetti

12/9/2022
The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. Join us as we discuss the impact that CIS Controls can have on your small to medium business. We dive into the mission of the Center for Infromation Security, membership, CIS Critical Controls, CIS Implementation Groups and much more! Hosts: Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:38:36

Ask host to enable sharing for playback control

#41 - Investing in Supply Chain Solutions with Marcus Bartram

11/3/2022
Marcus Bartram is a General Partner at Telstra Ventures, a San Francisco-based VC firm that invests in mid-stage tech companies. He's on the founding team and has led investments in cybersecurity companies like CrowdStrike, Auth0, Anomali, Cequence, CloudKnox, Cofense, CyberGRX, Elastica, vArmour, and Zimperium. Hosts: Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:25:28

Ask host to enable sharing for playback control

#40 - Mind the Tech Gap with Dr. Nikki Robinson

9/23/2022
In this episode of The Business of Security, we discuss Dr. Robinson's upcoming book, Mind the Tech Gap, and how to manage the problem of low to non-existent collaboration between IT and Security teams. This conversation covers tools and techniques for creating a rich, collaborative environment for organizations in order to achieve security goals. Guest: Dr. Nikki Robinson, Security Architect at IBM, Adjunct Professor at Capital Technology University Hosts: Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com) Mind the Tech Gap: Robinson, Nikki: 9781032206165: Amazon.com: Books

Duration:00:43:09

Ask host to enable sharing for playback control

#39 - Don't Fire the CISO, with Quentyn Taylor

8/3/2022
Top Tips for getting into the security industry and future proofing your strategy. This podcast will focus on Quentyn’s long career in cyber security and how working for the same company for a long period of time years has enabled him to build resilience and always think years ahead when executing a strategy. Quentyn has a wealth of knowledge experience in both the IT and information security arenas and has driven Canon’s strategy to highlight the importance of document security and help business customers to minimize their security risk. Host Josh Bruyning, Solution Engineer @TrustMAPP Guest: Quentyn Taylor, Senior Director, Information Security and Global Response @Canon Europe Sponsored by: TrustMAPP

Duration:00:36:21

Ask host to enable sharing for playback control

#38 - Succession Planning, with John Checco

6/15/2022
In this episode, guest John Checco, Resident CISO at Proofpoint, makes a compelling case for CISO succession planning. As John takes us through his journey as a CISO, we learn how companies factor skills, background, and strengths into their short to long-term succession plans. The average estimated tenure of a CISO is only 26 months. 85% of surveyed CISOs say they are now looking for another role or would consider an opportunity if presented. Unless you take aggressive retention action, it is only a matter of time before you are recruiting again. We discuss the tenets of succession planning, how to find a successor, and what transferring ownership entails. John gives us deep insight into relationship handoffs, which often involve organizations and personnel, both internal and external. We identify a successor's essential qualities, including leadership skills, organization ability, knowledge and experience, and cultural fit. In addition to primary skills, we discuss secondary skills such as project management, administrative competence, and background diversity. Guest: John Checco, Resident CISO @Proofpoint Hosts: Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:38:58

Ask host to enable sharing for playback control

#37 – Leveraging Information Sharing To Protect Your Organization, with Bill Nelson

5/4/2021
In this episode, guest Bill Nelson, CEO of the Global Resiliency Federation (GRF), talks about the GRF’s mission to help organizations in myriad industries share critical security threat information so they can all better defend themselves. Bill lays out the history of GRF – how it emerged from the work he did at FS-ISAC, where he grew membership from 170 banks to 7,000. Bill led a team that was tasked with helping other industries set up their own security information sharing programs, based on what FS-ISAC was doing, leading to the creation of ISACs and ISAOs for legal, oil & gas, retail, energy, and healthcare. You’ll also learn how the Uniform Commercial Code, article 4, in its description of “commercially reasonable” security, and who’s financially liable after a breach, drove banks to take security controls like anomaly detection, MFA, and DDoS prevention a lot more seriously. GRF’s newest security information exchange, K12SIX, aims to protect K-12 schools, which have become the newest targets for ransomware, with attacks ballooning from 10 per year just a few years ago to more than 400 in 2020, and ransoms increasing from $20k to an astonishing $40M. Guest: Bill Nelson, CEO of Global Resilience Federation (GRF) Host: Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:34:28

Ask host to enable sharing for playback control

#36 – Sorting out CISOs, Deputy CISOs, BISOs, and vCISOs, with Will Klusovsky

4/14/2021
Join Chad and special co-host Allan Alford for an enlightening conversation with Wil Klusovsky, Global Cybersecurity Strategy, Governance, Risk & Compliance (SGRC) Offering Lead at Avanade. The three of them take on the sometimes confusing realm of CISOs, Deputy CISOs, Business ISOs, and virtual CISOs. In this episode, hear about: Guest: Wil Klusovsky, Global Cybersecurity Strategy, Governance, Risk & Compliance (SGRC) Offering Lead at Avanade Hosts: Allan Alford, CTO & CISO, TrustMAPP Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:35:00

Ask host to enable sharing for playback control

#35 – Business Resiliency with Gus Thompson

3/25/2021
Join Chad and Malcolm as they chat with Gus Thompson, Consulting Managing Director at TruDoss, about business resilience. In this episode, hear about: Guest: Gus Thompson, Consulting Managing Director at TruDoss Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:27:00

Ask host to enable sharing for playback control

#34 – SaaS Security Made Simple with Ben Johnson

2/3/2021
In this episode, guest Ben johnson, co-founder and CTO of Obsidian Security, discusses how he got into cybersecurity (after seeing the movie "Enemy of the State"), got into US intelligence, got tired of the polygraphs, and ultimately ended up co-founding Carbon Black. It's a fascinating journey! Today, Ben is focused on continuous security monitoring of SaaS environments, and figuring out how a security team can protect their organization's SaaS accounts that they don't even have access to! Guest: Ben Johnson, Co-Founder and CTO, Obsidian Security Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:39:16

Ask host to enable sharing for playback control

#33 – IoT Security in the US Federal Government with Drew Spaniel

1/7/2021
In this episode, guest Drew Spaniel walks us through the new law passed in late 2020, The IoT Cybersecurity Improvement Act of 2020 (HR 1668), and how if will affect not just US federal government procurement, but IoT device manufacturers, and consumers as well. The Act calls for IoT devices to be secured by manufacturers based on NIST guidance and cybersecurity best practices. From the Congessional Budget Office: "Under H.R. 1668, NIST also would publish standards for federal agencies, contractors, and vendors to systematically report and resolve security vulnerabilities for IoT devices. Each agency’s chief information officer would be required to ensure compliance. OMB would establish federal standards for that coordinated reporting process that are consistent with NIST’s standards and guidelines." Guest: Drew Spaniel, Lead Researcher, ICIT (Institute for Critical Infrastructure Technology) Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:41:21

Ask host to enable sharing for playback control

#32 – Do SMBs Need a CISO? – John Prokap, CISO

12/21/2020
In this episode, guest John Prokap discusses the cyber security needs of small and mid-sized businesses, and if and when they need to hire a CISO. His discussion with hosts Malcolm and Chad covers: Recoil in horror as John, Malcolm, and Chad share stories from their pasts, including: users with one-character passwords, RSA auth tokens zip-tied to forklifts, and how one company had more domain admins that IT staff. Guest: John Prokap, former CISO at HarperCollins Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:31:04

Ask host to enable sharing for playback control

#31 - Miguel El Lakkis, CISO - Transitioning CISO Responsibilities

11/10/2020
In this episode, we feature our guest Miguel El Lakkis. Miguel recently transitioned from News Corp to Cantor Fitzgerald and in this process he describes the method commonly used by CISO's to properly transition a security program to a successor. We discuss the various aspects of a security program that may change over time and how to address constants to avoid duplication of efforts. The CISO responsibilities should be managed like a relay race not a marathon to make for a smoother transition now and into the future. Malcolm offers up another approach where the focus is on talent management and always identifying a successor for each role within the security program. I guarantee you will learn something new in this episode! Guests: Miguel El Lakkis, CISO, Cantor Fitzgerald Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:32:40

Ask host to enable sharing for playback control

#30 - Hiring and Securing a Remote Workforce - Lucinda DuToit, VP of HR, Digineer

10/1/2020
In this episode we discuss the process of recruiting, identifying culture fit and managing trust with a remote workforce and how these components impact the security profile of a company. The discussion begins with identifying an appropriate recruiting process for a remote workforce and measuring the appropriate candidates to hire in a remote workforce scenario. We also dive into how this remote work environment has opened up a potentially broader skillset that previously may not have been available for open opportunities. Lucinda defines for us Trust in the Workforce: Capability, Reliability, Intent and answers the question of which of these three criteria is coachable. Malcolm discusses the security implications and and how these things have not changed a whole lot while determining where specific controls may have failed and the importance of continually managing expectations for security and applying awareness while reinforcing training. Further the discussion dovetails into how effective security performance management provides the transparency of these controls. Guests: Lucinda DuToit, VP of Human Resources, Digineer Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic Chad Boeckmann, Founder/CEO, TrustMAPP Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:38:46

Ask host to enable sharing for playback control

#29 - Emerging Trends in IoT Cyber Security Regulation - Drew Spaniel, ICIT and James Russell, Paul Phillips of Microchip Technology

9/15/2020
In this episode we invite special guests Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology (https://icitech.org), James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology (https://www.microchip.com) and Paul Phillips, Principal Embedded Solution Engineer, Microchip Technology. We also hear from privacy expert Kirk Nahra, Partner and Co-Chair of Privacy and Cybersecurity Practice at WilmerHale. This second episode in a multi-part series is packed full of information and trends related to IoT cybersecurity regulation and emerging practices. We hear from experts on the Europe and UK regulations as well as garner perspective from Kirk Nahra who lends insight from a legal and privacy standpoint on consumer best practices for IoT cybersecurity regulation. Topics covered include: Guests: Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology Paul Phillips, Principal Embedded Solution Engineer, Microchip Technology Special Commentary by: Kirk Nahra, Partner and Co-Chair of Privacy and Cybersecurity Practice at WilmerHale. Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic(https://www.linkedin.com/in/malcolmharkins/) Chad Boeckmann, Founder/CEO, TrustMAPP(https://www.linkedin.com/in/chadboeckmann/) Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:35:35

Ask host to enable sharing for playback control

#28 - Culture of IoT Cyber Security - Drew Spaniel, ICIT and James Russell, Microchip Technology

7/21/2020
In this episode we invite special guests Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology (https://icitech.org) and James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology (https://www.microchip.com). In this episode we dive into the unique aspects of IoT Security and how the culture of security is so critical across engineering teams who previously designed and built systems that were not connected to internet services. With a new shift and massive influx in IoT devices, specifically concentrated in the industrial IoT market, understanding the culture of security - specifically IoT security is more important now than ever. This episode covers: Guests: Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic (https://www.linkedin.com/in/malcolmharkins/) Chad Boeckmann, Founder/CEO, TrustMAPP (https://www.linkedin.com/in/chadboeckmann/) Sponsor: TrustMAPP (https://trustmapp.com)

Duration:00:34:18

Ask host to enable sharing for playback control

#27 - Benny Lakunishok, CEO, Zero Networks - Sine Wave of Prevention, Detection and Response

6/17/2020
On this episode of the podcast Benny Lakunishok, Co-Founder of Zero Networks, join Malcolm Harkins and Chad Boeckmann to explore the industry's continuous adoption and adaption of prevention -> detection -> prevention technologies. The group dives into the maturity of machine learning and where the industry is overall as well as how adoption of new technologies is imperative to maintain adequate risk posture over time while serving the best interests of business. Guest: Benny Lakunishok, Zero Networks (LinkedIn) Hosts: Malcolm Harkins, Chief Security and Trust Officer, Cymatic (https://www.linkedin.com/in/malcolmharkins/) Chad Boeckmann, Founder/CEO, TrustMAPP (https://www.linkedin.com/in/chadboeckmann/)

Duration:00:41:46