1 hr 5 min

Squality‪!‬ Great Security Debate

    • Technology

Recently, Brian, Dan and Erik had the great fortune to do a live version of the podcast at the monthly meeting of the SIM Detroit Chapter (https://chapter.simnet.org/detroit/home). At the close of that discussion, the comment was raised as to whether or not security should be used as a competitive advantage by businesses. The topic seemed perfect for The Great Security Debate, so here we are. In this episode, we cover:
Can security be used as a business differentiator?SHOULD security be used as a business differentiator?If security is added too deeply into the sales cycle does it incentivise the wrong behaviours just to make a sale?How can we quantify the value of security in the purchasing process when it is not easily attributable to direct cost saving or value?How do closed systems compare to open systems with regard to security?How does the rise of customer trust as a key organisational focus indicate the use of security as a business differentiator?Do the fears that using security as a differentiator means that the collaborative nature and history of security will disappear?
We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to https://bit.ly/gsdyoutube and watch, subscribe and "like" the episodes.
Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.

Thanks for listening!
Support The Great Security Debate
Links:
SEC Proposes Cybersecurity Rules for Public CompaniesTISAX: Information security for the automotive industry | TÜV SÜDFailure mode and effects analysis - WikipediaBridgestone Americas confirms ransomware attack, LockBit leaks dataQuantitative Information Risk Management | The FAIR InstituteDawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat: Carlin, John P.: 9781541773837: Amazon.com: BooksSaudi Aramco facing $50 million cyber extortion over leaked dataLeaked Conti files reveal life inside ransomware gang • The Registera...

Recently, Brian, Dan and Erik had the great fortune to do a live version of the podcast at the monthly meeting of the SIM Detroit Chapter (https://chapter.simnet.org/detroit/home). At the close of that discussion, the comment was raised as to whether or not security should be used as a competitive advantage by businesses. The topic seemed perfect for The Great Security Debate, so here we are. In this episode, we cover:
Can security be used as a business differentiator?SHOULD security be used as a business differentiator?If security is added too deeply into the sales cycle does it incentivise the wrong behaviours just to make a sale?How can we quantify the value of security in the purchasing process when it is not easily attributable to direct cost saving or value?How do closed systems compare to open systems with regard to security?How does the rise of customer trust as a key organisational focus indicate the use of security as a business differentiator?Do the fears that using security as a differentiator means that the collaborative nature and history of security will disappear?
We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to https://bit.ly/gsdyoutube and watch, subscribe and "like" the episodes.
Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.

Thanks for listening!
Support The Great Security Debate
Links:
SEC Proposes Cybersecurity Rules for Public CompaniesTISAX: Information security for the automotive industry | TÜV SÜDFailure mode and effects analysis - WikipediaBridgestone Americas confirms ransomware attack, LockBit leaks dataQuantitative Information Risk Management | The FAIR InstituteDawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat: Carlin, John P.: 9781541773837: Amazon.com: BooksSaudi Aramco facing $50 million cyber extortion over leaked dataLeaked Conti files reveal life inside ransomware gang • The Registera...

1 hr 5 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Deep Questions with Cal Newport
Cal Newport
Dwarkesh Podcast
Dwarkesh Patel
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times