13 episodes

There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable.

Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.

Attributive Security Martin Hopkins, Maurice Smit

    • Business
    • 5.0 • 1 Rating

There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable.

Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.

    Blindsided by an Unknown Unknown

    Blindsided by an Unknown Unknown

    With hindsight, declaring a risk an unknown unknown is often no more than an admission of a lack of foresight, a lack of imagination. How many risks that are actually realised were really inconceivable in advance? Risk identification is a process that is resource constrained, and reasonably so. But with more time, more perspectives, more insights, more intelligence the chances are you'd have identified the risk. Perhaps to do so would have not been cost effective; or you may have decided to limit analysis and not successfully managed an outlier risk. But to declare it an unknown unknown (after the fact) is rejecting an opportunity to learn. Is it not fatalistic to shrug one's shoulders and say "How could I have known"?
    In this episode we discuss Unknown Unknowns, along with their bedfellows Known Knowns, Known Unknowns and Unknown Knowns, and their place in the identification and management of business risks.

    • 36 min
    The World is in Flux, Are You Ready to Adapt?

    The World is in Flux, Are You Ready to Adapt?

    The last two years have seen changes that few were prepared for. In the aftermath we can argue whether it was a black swan, grey rhino, or octarine unicorn event but ultimately once the overture is done what matters is your ability to adapt to the new world order. Even if you had a specific plan in place, as such events unfold the situation will likely evolve in unpredictable directions.
    Over time, change external to your sphere of control is inevitable. Some changes are large shocks that affect nations, regions or the entire world. Some only affect certain industries or a subset of business in an industry. While mitigating and planning response to known, but uncertain, events is important it is also important to avoid assumptions about future states and to build organisational structures and processes that can adapt no matter what comes over the horizon.
    In this episode, we discuss being Adaptable and Adaptive. Listen to our conversation to hear our thoughts on the maybe subtle but important differences between these very similar terms.

    • 39 min
    Risk Management is a Game of Snakes AND Ladders

    Risk Management is a Game of Snakes AND Ladders

    Is your risk management one-sided, designed to minimise the likelihood and negative impacts of uncertain events. How is the uncertainty of events with positive business impacts managed? Not by the security team or using the same risk management framework, right?
    Threats and opportunities both rely on uncertainty. Add factors including likelihood (or frequency) and impact to either and you derive a risk. A risk that can be influenced by actions you take and external factors you don't control. While some terminology will likely need to be revised (for example we don't want to mitigate upside risks, we want to promote them) can we not manage all risk using the same framework?
    In this episode we talk about Balanced Risk. A holistic view on risk and risk management. One that considers both threats and opportunities, with risk treatment driven by business goals and tempered by risk appetites. Risk treatments that are rarely simple and may affect multiple risks and themselves introduce new risks. Reimagine risk management not as minimising (downside) risk, but as gaining confidence in achieving business goals.

    • 38 min
    Supply Chain Risk (with Vincent Thiele)

    Supply Chain Risk (with Vincent Thiele)

    News of business impacts from the realisation of cyber risks is all around us. Many of the largest breaches in recent years have involved one or more suppliers in some way. Few will be unaware of Sunburst/Solorigate, and many will have been directly impacted or know people that have been. But it is not just your direct suppliers, or your technology supply chain, that can suffer from a cyber attack that impacts you, as is clear to many following the Colonial Pipeline attack. Do you know who your suppliers suppliers are? Are you gaining any assurance of the cyber security of your non-technology suppliers? Are you assessing during on-boarding only or monitoring over time?
    In this episode Martin and Maurice are joined by Vincent Thiele to discuss Supply Chain Risk. How can you identify threats and manage risks originating from the whole graph of your suppliers, their suppliers, ...? Where should you concentrate your efforts and what can you do to meaningfully measure the security posture of suppliers?

    • 47 min
    Privacy: Security's New Clothes?

    Privacy: Security's New Clothes?

    The desire for privacy is nothing new, but societal expectations have certainly come a long way since the middle ages. Over the last two decades many have seen additional rights enshrined in law. Businesses increasingly face sanctions for not respecting the privacy of those they associate with.
    Businesses have privacy related risks, they are required to protect personal data. But they also have security risks - are the approaches to mange these not broad enough to cover privacy, or could they not be readily expanded to do so?
    If you were asked to draw a Venn diagram of security and privacy on the back of a beer mat (remember those?), what would it look like? Is privacy a subset of security? Is there a large intersection, a small intersection, or maybe even none?
    In this episode Martin and Maurice discuss privacy and how it relates to security. Is privacy materially different to risk-driven security? Do you need different teams with different frameworks to deliver privacy and security?

    • 39 min
    Certifications - Value or Vanity

    Certifications - Value or Vanity

    The information security field is awash with certifications. To an outsider many job adverts, in what is increasingly a sellers market, are full of impenetrable acronyms. But who do all these https://pauljerimy.com/security-certification-roadmap/ (certifications) serve? Is the content relevant and do they effectively demonstrate knowledge, capability, and desire to learn? Are they a part of the supposed skills gap rather than its solution?
    In this episode Martin and Maurice discuss the value of certifications and different ways in which we can assess and discover knowledge, skills and practitioner capability in our industry.

    • 35 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Business

Steven Bartlett
TED Audio Collective / Youngme Moon, Mihir Desai, & Felix Oberholzer-Gee
This is Money
Tim Ferriss: Bestselling Author, Human Guinea Pig
HBR Presents / Muriel Wilkins
Rob Bence and Rob Dix from The Property Hub