40 min

I Have So Little. Just Let Me Control Access to the Mail Server CISO Series Podcast

    • Technology

All links and images for this episode can be found on CISO Series
How dangerous is it for a cybersecurity professional to pull a G-d complex with the email server just because they didn't like the way one salesperson behaved?
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Jadee Hanson (@jadeehanson), CIO/CISO, Code42.
Thanks to our podcast sponsor, Code42.

As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more.
In this episode:
Is it alright to block a vendor because one salesperson is persistent and annoying?
How can one go about creating a cybersecurity report card?
Is it just inevitable that your staff is going to eventually violate policies?
How to determine a delicate balance between a complete non-tolerance policy versus complete tolerance?

All links and images for this episode can be found on CISO Series
How dangerous is it for a cybersecurity professional to pull a G-d complex with the email server just because they didn't like the way one salesperson behaved?
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Jadee Hanson (@jadeehanson), CIO/CISO, Code42.
Thanks to our podcast sponsor, Code42.

As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more.
In this episode:
Is it alright to block a vendor because one salesperson is persistent and annoying?
How can one go about creating a cybersecurity report card?
Is it just inevitable that your staff is going to eventually violate policies?
How to determine a delicate balance between a complete non-tolerance policy versus complete tolerance?

40 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Deep Questions with Cal Newport
Cal Newport
Dwarkesh Podcast
Dwarkesh Patel
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times