CISO Tradecraft® G Mark Hardy & Ross Young
-
- Technology
-
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a CISO. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
-
#179 - The 7 Broken Pillars of Cybersecurity
In this episode of CISO Tradecraft, host G. Mark Hardy discusses seven critical issues facing the cybersecurity industry, offering a detailed analysis of each problem along with counterarguments. The concerns range from the lack of a unified cybersecurity license, the inefficiency and resource waste caused by auditors, to the need for a federal data privacy law. Hardy emphasizes the importance of evaluating policies, prioritizing effective controls, and examining current industry practices. He challenges the audience to think about solutions and encourages sharing opinions and additional concerns, aiming to foster a deeper understanding and improvement within the field of cybersecurity.
Transcripts: https://docs.google.com/document/d/1H_kTbCG8n5f_d1ZHNr1QxsXf82xb08cG
Chapters
00:00 Introduction
01:28 Introducing the Seven Broken Things in Cybersecurity
02:00 1. The Lack of a Unified Cybersecurity License
06:53 2. The Problem with Cybersecurity Auditors
10:09 3. The Issue with Treating All Controls as High Priority
14:12 4. The Obsession with New Cybersecurity Tools
19:23 5. Misplaced Accountability in Cybersecurity
22:38 6. Rethinking Degree Requirements for Cybersecurity Jobs
26:49 7. The Need for Federal Data Privacy Laws
30:53 Closing Thoughts and Call to Action -
#178 - Cyber Threat Intelligence (with Jeff Majka & Andrew Dutton)
In this episode of CISO Tradecraft, hosts G Mark Hardy and guests Jeff Majka and Andrew Dutton discuss the vital role of competitive threat intelligence in cybersecurity. They explore how Security Bulldog's AI-powered platform helps enterprise cybersecurity teams efficiently remediate vulnerabilities by processing vast quantities of data, thereby saving time and enhancing productivity. The conversation covers the importance of diverse threat intelligence sources, including open-source intelligence and insider threat awareness, and the strategic value of AI in analyzing and prioritizing data to manage cybersecurity risks effectively. The discussion also touches on the challenges and potentials of AI in cybersecurity, including the risks of data poisoning and the ongoing battle between offensive and defensive cyber operations.
The Security Bulldog: https://securitybulldog.com/contact/
Transcripts: https://docs.google.com/document/d/1D6yVMAxv16XWtRXalI5g-ZdepEMYmQCe
Chapters
00:00 Introduction
00:56 Introducing the Experts: Insights from the Field
02:43 Unpacking Cybersecurity Intelligence: Definitions and Importance
04:02 Exploring Cyber Threat Intelligence (CTI): Applications and Strategies
13:11 The Role of AI in Enhancing Cybersecurity Efforts
16:43 Navigating the Complex Landscape of Cyber Threats and Defenses
19:07 The Future of AI in Cybersecurity: A Balancing Act
22:33 Exploring AI's Role in Cybersecurity
22:50 The Practical Application of AI in Cybersecurity
25:08 Challenges and Trust Issues with AI in Cybersecurity
26:52 Managing AI's Risks and Ensuring Reliability
31:00 The Evolution and Impact of AI Tools in Cyber Threat Intelligence
34:45 Choosing the Right AI Solution for Cybersecurity Needs
37:27 The Business Case for AI in Cybersecurity
41:22 Final Thoughts and the Future of AI in Cybersecurity
-
#177 - 2024 CISO Mindmap (with Rafeeq Rehman)
This episode of CISO Tradecraft features a comprehensive discussion between host G Mark Hardy and guest Rafeeq Rehman, centered around the evolving role of CISOs, the impact of Generative AI, and strategies for effective cybersecurity leadership. Rafeeq shares insights on the CISO Mind Map, a tool for understanding the breadth of responsibilities in cybersecurity leadership, and discusses various focal areas for CISOs in 2024-2025, including the cautious adoption of Gen AI, tool consolidation, cyber resilience, branding for security teams, and maximizing the business value of security controls. The episode also addresses the importance of understanding and adapting to technological advancements, advocating for cybersecurity as a business-enabling function, and the significance of lifelong learning in information security.
Cybersecurity Learning Saturday: https://www.linkedin.com/company/cybersecurity-learning-saturday/
2024 CISO Mindmap: https://rafeeqrehman.com/2024/03/31/ciso-mindmap-2024-what-do-infosec-professionals-really-do/
Transcripts: https://docs.google.com/document/d/1axXQJoAdJI26ySKVfROI9rflvSe9Yz50
Chapters
00:00 Introduction
00:57 Rafeeq Rehman: Beyond the CISO MindMap
04:17 The Evolution of the CISO MindMap
08:30 AI and the Future of Cybersecurity Leadership
11:47 Embracing Change: The Role of AI in Cybersecurity
14:16 Generative AI: Hype, Reality, and Strategic Advice for CISOs
22:32 Navigating the Future Job Market with AI
22:53 Framing AI for Specific Roles
24:12 Harnessing Creativity with Generative AI
25:14 Consolidating Security Tools for Efficiency
28:31 Evaluating Security Tools: A Deep Dive
32:21 Cyber Resilience: Beyond Incident Response
35:51 Building a Business-Focused Security Strategy
39:39 Maximizing Business Value Through Security
43:15 Looking Ahead: Focus Areas for the Future
43:53 Concluding Thoughts and Future Predictions -
#176 - Reality-Based Leadership (with Alex Dorr)
In this episode of CISO Tradecraft, host G Mark Hardy welcomes Alex Dorr to discuss Reality-Based Leadership and its impact on reducing workplace drama and enhancing productivity. Alex shares his journey from professional basketball to becoming an evangelist of reality-based leadership, revealing how this approach helped him personally and professionally. They delve into the concepts of SBAR (Situation, Background, Analysis, Recommendation) for effective communication, toggling between low self and high self to manage personal reactions, and practical tools like 'thinking inside the box' to confront and solve workplace issues within given constraints. The conversation underscores the importance of focusing on actionable strategies over arguing with the drama and reality of workplace dynamics, aiming to foster a drama-free, engaged, and productive work environment.
Alex Dorr's Linkedin: https://www.linkedin.com/in/alexmdorr/
Reality-Based Leadership Website: https://realitybasedleadership.com/
Transcripts: https://docs.google.com/document/d/1wge0pFLxE4MkS6neVp68bdz8h9mHrwje
Chapters
00:00 Introduction
00:57 Alex Dorr's Journey from Basketball to Leadership Expert
03:54 The Core Principles of Reality-Based Leadership
06:20 Understanding the Human Condition in the Workplace
09:19 Tackling Workplace Drama with Reality-Based Leadership
11:58 The Power of Positive Energy Management
17:42 Navigating Unpreferred Realities and Finding Impact
19:44 Reality-Based Leadership in Action: Techniques and Outcomes
23:12 The Importance of Skill Development Over Perfecting Reality
24:32 The Challenge of Employee Engagement
25:49 Secrets to Embracing Reality and Taking Action
25:58 Leadership vs. Management: Navigating Workplace Dynamics
28:28 Empowering Employees with the SBAR Framework
34:04 Addressing Venting and Negative Behaviors
36:17 Developing People: The Core of Leadership
37:50 Choosing Happiness Over Being Right
40:15 Integrating New Leadership Models and Making Them Stick
46:24 Concluding Thoughts and Contact Information -
#175 - Navigating NYDFS Cyber Regulation
This episode of CISO Tradecraft dives deep into the New York Department of Financial Services Cybersecurity Regulation, known as Part 500. Hosted by G Mark Hardy, the podcast outlines the significance of this regulation for financial services companies and beyond. Hardy emphasizes that Part 500 serves as a high-level framework applicable not just in New York or the financial sector but across various industries globally due to its comprehensive cybersecurity requirements. The discussion includes an overview of the regulation's history, amendments to enhance governance and incident response, and a detailed analysis of key sections such as multi-factor authentication, audit trails, access privilege management, and incident response. Additionally, the need for written policies, designating a Chief Information Security Officer (CISO), and ensuring adequate resources for implementing a cybersecurity program are highlighted. The podcast also offers guidance on how to approach certain regulatory mandates, emphasizing the importance of teamwork between CISOs, legal teams, and executive management to comply with and benefit from the regulation's requirements.
AuditScripts: https://www.auditscripts.com/free-resources/critical-security-controls/
NYDFS: https://www.dfs.ny.gov/industry_guidance/cybersecurity
Transcripts: https://docs.google.com/document/d/1CWrhNjHXG1rePtOQT-iHyhed2jfBaZud
Chapters
00:00 Introduction
00:35 Why Part 500 Matters Beyond New York
01:48 The Evolution of Financial Cybersecurity Regulations
03:20 Understanding Part 500: Definitions and Amendments
08:44 The Importance of Multi-Factor Authentication
14:33 Navigating the Complexities of Cybersecurity Regulations
20:23 The Critical Role of Asset Management and Access Privileges 25:37 The Essentials of Application Security and Risk Assessment
31:11 Incident Response and Business Continuity Management
32:36 Concluding Thoughts on NYDFS Cybersecurity Regulation -
#174 - OWASP Top 10 Web Application Attacks
In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain each of the OWASP Top 10 risks in detail, such as broken access control, injection flaws, and security misconfigurations. Through examples and recommendations, listeners are equipped with the knowledge to better protect their web applications and ultimately improve their cybersecurity posture.
OWASP Cheat Sheets: https://cheatsheetseries.owasp.org/
OWASP Top 10: https://owasp.org/www-project-top-ten/
Transcripts: https://docs.google.com/document/d/17Tzyd6i6qRqNfMJ8OOEOOGpGGW0S8w32
Chapters
00:00 Introduction
01:11 Introducing OWASP: A Pillar in Cybersecurity
02:28 The Evolution of Web Vulnerabilities
05:01 Exploring Web Application Security Risks
07:46 Diving Deep into OWASP Top 10 Risks
09:28 1) Broken Access Control
14:09 2) Cryptographic Failures
18:40 3) Injection Attacks
23:57 4) Insecure Design
25:15 5) Security Misconfiguration
29:27 6) Vulnerable and Outdated Software Components
32:31 7) Identification and Authentication Failures
36:49 8) Software and Data Integrity Failures
38:46 9) Security Logging and Monitoring Practices
40:32 10) Server Side Request Forgery (SSRF)
42:15 Recap and Conclusion: Mastering Web Application Security
Customer Reviews
So informative and logically organized
This podcast has been instrumental in transforming how I think about cyber and business risk. There’s not a lot of other podcasts that I’ve seen or heard from that enables you to go wider or deeper in your understanding. Thank you for the effort y’all put into these and what you’re doing for our community.
Critical Information for Our Critical Infrastructure
The nature of the internet makes it incumbent on every organization to prevent intrusions, be they foreign or domestic. Corporate cybersecurity is not a business concern. It is a national Security concern.
For this reason, the information conveyed in this podcast should be on every cybersecurity professional’s listening list , from CISO to entry level security associateS just beginning their career.
There is no unimportant person when it comes to cybersecurity. Anyone who uses a computer connected to the internet can reign down catastrophe on an organization. It is up to cybersecurity personnel to prevent that from happening. G. Mark Hardy seems almost chosen to be the one that helps corporations stay safe.
It doesn’t hurt that he has a calm, reassuring, voice that conveys a message that this is doable, and that you are the one who can do it.
A great resource for those in the cyber world
This is such a great casual podcast for those looking to work their way into management in the cyber world. I recommend this to anyone who is interested!!