Выпусков: 175

SC Media, and our sponsor Spirion, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.

CISO Stories Podcast (Audio‪)‬ SC Media

    • Технологии

SC Media, and our sponsor Spirion, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.

    That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174

    That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174

    As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting essential information. Good data governance processes are essential for effective security.
    This segment is sponsored by Spirion. Visit https://cisostoriespodcast.com/spirion to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-174

    • 29 мин.
    Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173

    Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173

    Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and never will lead to better outcomes, yet this is all everyone is talking about. The trifecta of fear (we fear it, we don't understand it, we know we must have it) is used effectively by vendors to drive an ever-increasing wedge into IT budgets, even as the actual utilization ratio of security tools is precipitously low (my estimate is 5%). Frustration abounds, the CISO job is a revolving door, and nobody's happy. Now the regulators are getting involved in all the wrong ways (see the recent SEC action against Tim Brown) - and it's entirely our fault.
    This segment is sponsored by Spirion. Visit https://cisostoriespodcast.com/spirion to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-173

    • 25 мин.
    Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172

    Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172

    The terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. Join us as we discuss why these gaps occur and what needs to be done to secure OT.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-172

    • 28 мин.
    The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

    The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

    For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar of traditional IT processes. For critical infrastructure, we are hooking up legacy systems to larger networks. Industrial control systems, that were never designed to be attached to the Internet, are now exposed to a wide array of new threats and attacks. Aside from those risks, digital sensors can be attached to almost anything these days, making everything "smart". And with the ability for sensors to also be controllers the risks levels are rising quickly.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-171

    • 28 мин.
    The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

    The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

    Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intellectual property theft: • Financial losses: Ransomware attacks can cripple operations and demand hefty payments. Manufacturing is a lucrative target for Ransomware. • There is little tolerance for downtime. • Difficulty in managing OT environments (different skillsets) • Increasing connectivity between IT and OT due to digital transformation Incidents such as the well documented Colonial Pipeline attack along with other manufacturing companies like Dole, and Brunswick continue to highlight the growing threat landscape for OT security in manufacturing.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-170

    • 30 мин.
    Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

    Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

    The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either continue functioning or can recover quickly when faced with cybersecurity attack.
    This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!
    Visit https://cisostoriespodcast.com for all the latest episodes!
    Show Notes: https://cisostoriespodcast.com/csp-169

    • 31 мин.

Топ подкастов в категории «Технологии»

Радио-Т
Umputun, Bobuk, Gray, Ksenks, Alek.sys
Запуск завтра
libo/libo
Podlodka Podcast
Егор Толстой, Стас Цыганов, Екатерина Петрова и Евгений Кателла
Накликали беду
БОГЕМА
Lex Fridman Podcast
Lex Fridman
Веб-стандарты
Сообщество «Веб-стандарты»

Вам может также понравиться

CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Cyber Security Headlines
CISO Series
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Defense in Depth
David Spark
Risky Business
Patrick Gray
CyberWire Daily
N2K Networks