87 episodes

It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.

Security and Compliance Weekly (audio‪)‬ Security Weekly

    • News
    • 4.7 • 6 Ratings

It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly.

    Blinky Lights - SCW #87

    Blinky Lights - SCW #87

    This week, we welcome Johanna Baum, CEO, Founder at Strategic Security Solutions, to talk about Activism v. Hacktivism! "Hacktivism" is a controversial term with several meanings. The word was coined to characterize electronic direct action as working toward social change by combining programming skills with critical thinking. But just as hack can sometimes mean cyber crime, hacktivism can be used to mean activism that is malicious, destructive, and undermining the security of the Internet as a technical, economic, and political platform.
     
    Show Notes: https://securityweekly.com/scw87
    Visit https://www.securityweekly.com/scw for all the latest episodes!
     
    Follow us on Twitter: https://www.twitter.com/securityweekly
    Like us on Facebook: https://www.facebook.com/secweekly

    • 1 hr 15 min
    Chocolate Bar Bounty - SCW #86

    Chocolate Bar Bounty - SCW #86

    This week, we welcome Jim Henderson, Insider Threat Mitigation Training Course Instructor & Consultant at Insider Threat Defense Group, Inc., to discuss Insider Threats Overview - Going Beyond The Norm!
     
    Show Notes: https://securityweekly.com/scw86
    Visit https://www.securityweekly.com/scw for all the latest episodes!
     
    Follow us on Twitter: https://www.twitter.com/securityweekly
    Like us on Facebook: https://www.facebook.com/secweekly

    • 1 hr 17 min
    We Love Your Dog - SCW #85

    We Love Your Dog - SCW #85

    This week, we welcome Christopher Bulin, Founder & CEO at Proven PCI, to talk about The Truth Behind the Payments! SMB needs to understand the importance of being PCI compliant and that just because the verbiage on a website says the vendor is compliant, doesn't make the merchant compliant. Just because it says it from a service provider standpoint, asking for a copy of their AOC is critical. If your merchant service provider is guiding you through the SAQ, or telling you to just check yes or no, they are coercing you into falsifying documents which is a breach of your agreement.
     
    Show Notes: https://securityweekly.com/scw85
    Segment Resources: https://www.linkedin.com/pulse/what-matters-moreyour-vendor-relationship-your-client-bulin/?published=t
     
    Visit https://www.securityweekly.com/scw for all the latest episodes!
    Follow us on Twitter: https://www.twitter.com/securityweekly
    Like us on Facebook: https://www.facebook.com/secweekly

    • 1 hr 11 min
    Homework - SCW #84

    Homework - SCW #84

    This week, we welcome Tim Callahan, SVP, Global CISO at Aflac, to talk about From Compliance to Resiliency: The Evolution of InfoSec! Because only maintaining compliance is not enough to protect your business from the ever-evolving threat landscape, in this session, we will consider the intersection and codependence of compliance with security, maturity, defensibility and resiliency. An effective and maturing program must also align to a Control Framework so that you can measure its effectiveness and ensure appropriate decisions are made that enable business requirements and protect the security, integrity, and availability of information and technology. All of this must happen through the lens of defensibility which is an essential consideration when making risk decisions. And finally, we will look at what makes a business cyber-resilient. The cyber-strong resilient company has the ability to quickly adapt to disruptions while maintaining continuous business operations, and safeguarding people, assets, and overall brand equity.
     
    Show Notes: https://securityweekly.com/scw84
    To find out more and register with your Security Weekly discount code, visit: https://securityweekly.com/isw2021
     
    Visit https://www.securityweekly.com/scw for all the latest episodes!
    Follow us on Twitter: https://www.twitter.com/securityweekly
    Like us on Facebook: https://www.facebook.com/secweekly

    • 1 hr 23 min
    Exception to the Rule - SCW #83

    Exception to the Rule - SCW #83

    This week, we welcome Naomi Buckwalter, Founder & Executive Director at Cybersecurity Gatebreakers Foundation, to discuss Gatekeeping in Cybersecurity! The “cybersecurity skills gap” is a myth. There is no skills gap. There are tens of thousands of amazing, highly intelligent, passionate people around the world looking to break into cybersecurity, but they never get the chance. Hiring managers and gatekeepers are simply unwilling to train and mentor the next generation of cybersecurity professionals, and this hurts our profession immensely. We’re fighting an asymmetric war, in which one bad actor can attack multiple companies and industries. We simply don’t have enough defenders and good guys in the trenches, and we need more fighters. The more fighters we have, the better chance we have at winning.
     
    Show Notes: https://securityweekly.com/scw83
    Segment Resources: https://cybersecuritygatebreakers.org
    Visit https://www.securityweekly.com/scw for all the latest episodes! 
     
    Follow us on Twitter: https://twitter.com/securityweekly
    Follow us on Facebook: https://facebook.com/secweekly

    • 58 min
    Time Lord - SCW #82

    Time Lord - SCW #82

    This week, we welcome Matthew Erickson, Vice President of Solutions at SpiderOak Mission Systems, to discuss Protecting Comm. & Collaboration in Contested Environments! Protecting digital communication and collaboration is critical to both our military and private sector industries in driving mission success. Our ability to secure the local and remote systems we rely on to share and operationalize sensitive and confidential information to and from even the most remote location is vital to national security and our economy. Unfortunately, our adversaries know this and are dedicated to infiltrating, exfiltrating, and disrupting this flow of information.
     
    Show Notes: https://securityweekly.com/scw82
    Visit https://securityweekly.com/spideroak to learn more about them!
    Visit https://www.securityweekly.com/scw for all the latest episodes!


     
    Follow us on Twitter: https://twitter.com/securityweekly
    Follow us on Facebook: https://facebook.com/secweekly

    • 1 hr 8 min

Customer Reviews

4.7 out of 5
6 Ratings

6 Ratings

Cinderhaze ,

Hard hitting questions! Great guests!

Great host, great discussions - meaty security discussions will satisfy you and leave you wanting more!

Top Podcasts In News

Listeners Also Subscribed To