Welcome to the Chief of Cybersecurity Podcast hosted by Dewayne Hart where we provide learning and discuss relevant information concerning the cybersecurity workforce, business development, and best practices. You can find more information for SEMAIS at www.semais.net and a list of authored publications at www.dewaynehart.com
Security Compliance and Risk Management – Why Are They Failing?
The technology industry engages challenges and concerns when compliance and risk management initiatives are developed. This podcast session brings into attention and outlines why security compliance and risk management programs are failing; and what tradeoffs, security processes, and solutions are required to ensure both are successful.
Everyone Is Trying To Protect Themselves - Are You Doing The Same?
The technology industry engage challenges and concerns when compliance and risk management initiatives are developed. This podcast session brings into attention and outlines why security compliance and risk management programs are failing; and what tradeoffs, security processes, and solutions are required to ensure both are successful.
Information Privacy, information sharing and individual responsibility
The Information Privacy podcast session focus on how privacy, safeguards, and information sharing operate as a collective methodology to protect personal, business, and critical information. Listeners gain the informational advantage at understanding protection schemes, security measures, and individual responsibility when engaging information privacy.
This podcast session brings into existence of how having a cybersecurity mindset resolves industry problems by being cyber-focused. It provides a chance for listeners to see how their engagement and thinking process is either successful or failing best-security practices. Information relating to the inclusive culture, risk-based-thinking, hackers mindset, and situational awareness are highlighted.
This podcast session provides an overview and discussion into learning the basic functions and use of cybersecurity. Listeners gain a first-hand opportunity to see how cybersecurity operates and ideas to protect personal information. The discussion points address cybersecurity history, sectors that use its programs, and the importance of individual responsibility.