100 avsnitt

A podcast that takes a deeper look at today’s most important issues in cyber security, and beyond.

Security Insights securityinsights

    • Teknologi

A podcast that takes a deeper look at today’s most important issues in cyber security, and beyond.

    Cyber on demand: filling the skills gap?

    Cyber on demand: filling the skills gap?

    The cybersecurity skills gap is a problem that won't go away.
    Worldwide, there are close to 3.5 million vacancies in the industry. The problem seems to be worsening, not least because we are all doing more business online.
    And moves to recruit and retain more staff, as well as to widen the talent pool, take time.
    In the immediate term this leaves CISOs with gaps to fill. One option is outsourcing. Another is to use “on demand” cyber specialists. But how do these options work with building larger and more effective in-house teams?
    Do they go hand in hand, or are the two measures likely to conflict?
    In the second of the second of our three part series looking at the evolution of the CISO role, we speak to Victoria Parker, advisory professional services manager at Orange CyberDefense.
    We discuss how external experts can help organisations secure their environments now - but how CISOs still need to invest in their own teams, and that critical talent pipeline.

    • 29 min
    Chief Business Security Officers: a CISO's new ally?

    Chief Business Security Officers: a CISO's new ally?

    What is a chief business security officer, and what do they do?
    IT and data security are increasingly important. But so too are physical security and resilience.
    The chief business security officer, though, is a fairly new addition to the security team.
    Over the next three episodes of the Security Insights podcast, we’ll look at the changing role of the CISO, the role interim or outsourced security professionals can play in plugging the skills gap.
    We’ll cover the role of interim and virtual CISOs, and whether outsourcing parts of security can make up for a growing skills gap.
    But first, we ask Anaïs Beaucousin, Chief Business Security Officer at ADP International, about her role, the threats and risks she manages, and what is needed to make the most of a broader security team.

    • 31 min
    Ransomware: should payments be banned?

    Ransomware: should payments be banned?

    Ransomware now accounts for the vast majority of cyber attacks.
    But regulators and law makers are increasingly concerned about the money being paid out to ransomware groups -- often, it is used to fund further crime.
    Should paying ransoms be banned? Would a ban improve security, or make matters worse? And what steps can organisations take, to cut the risk of falling victim to a ransomware attack in the first place?
    Our guest this week is Ian Thornton Trump, CISO at Cyjax. He believes that calls to ban ransomware are misplaced; a ban gives firms fewer options when it comes to responding to an attack. And fines for paying ransoms is further punishing victims of cybercrime.
    He discusses the development of ransomware, why it is so dangerous, and how to counter it with Stephen Pritchard.

    • 29 min
    Cloud security: an identity problem

    Cloud security: an identity problem

    In this episode, we look at why a lack of robust identity controls are one of the biggest causes of cloud security failures.
    Cloud operators, at least the larger ones, now have robust security in place. But that security is there, first and foremost, to protect their business. The "shared responsibility model" means that users are responsible for their data and applications.
    The problem, as our guest this week identifies, is that senior managers fail to understand that point, and expect the cloud to fix everything.
    It won't, and as Jennifer Cox, member of the global engineering team at Tenable, and director for Ireland of Women in Cybersecurity, warns "it always makes me a bit nervous when people think that something is foolproof".

    • 36 min
    The end of passwords?

    The end of passwords?

    Are passwords now a security risk? And if they no longer work, what should replace them?
    In this episode, we speak to https://www.linkedin.com/in/johncapps/ at VIDA Digital Identify, and Ev Kontsevoy, CEO of infrastructure access firm Teleport.
    They argue that relying on "secrets" and data to prove identity no longer guarantees security. Alternatives, including zero trust, hold out a lot of promise. But moving to zero trust needs the whole organisation behind it -- it's as much about culture as technology.

    • 37 min
    Critical National Infrastructure: changing threats

    Critical National Infrastructure: changing threats

    How are the threats to critical national infrastructure evolving, and how do we counter them?
    And are we seeing a shift from attacks based on data and ransomware, towards disruption.
    In this episode, we welcome back a previous guest, Trevor Dearing.
    Trevor is Director of Critical Infrastructure at Illumio.
    Trevor’s work is increasingly focused on resilience, and helping organisations to survive and recover from attacks.
    We discuss how organisations in the CNI space need to improve their ability to react to, and survive, a cyber attack.
    After all, a failure to do so could cause widespread economic and social disruption.
     

    • 29 min

Mest populära poddar inom Teknologi

AI Sweden Podcast
AI Sweden
Lex Fridman Podcast
Lex Fridman
SvD Tech brief
Svenska Dagbladet
The TED AI Show
TED
Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC