45 episodes

This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.

The Business of Security Unknown

    • Technology
    • 4.4 • 9 Ratings

This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.

    #43 - Partnering with Business Leaders to Build Your Security Program from Scratch

    #43 - Partnering with Business Leaders to Build Your Security Program from Scratch

    In this episode, we have a very special guest joining us to discuss the essentials of building a cybersecurity program from scratch.
    Allan Alford, the founder of Allan Alford Consulting, brings a wealth of experience and a unique perspective to the table. Since launching his boutique cybersecurity consulting practice at the end of 2019, Allan has been dedicated to helping organizations efficiently implement and manage security programs and projects. With a focus on long-term relationships and custom solutions, Allan's approach ensures that each client's unique needs are met with the highest level of expertise.
    But that's not all! Allan Alford Consulting also offers coaching services for aspiring and new CISOs, helping them navigate the ever-changing landscape of cybersecurity leadership.
    In today's episode, Allan will share his insights on the fundamentals of building a robust cybersecurity program, the importance of understanding an organization's unique needs, and how to forge strong partnerships with business leaders.

    Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP

    Sponsor:
    TrustMAPP (https://trustmapp.com)

    • 26 min
    #42 - CIS Controls for Business with Valecia Stocchetti

    #42 - CIS Controls for Business with Valecia Stocchetti

    The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.

    Join us as we discuss the impact that CIS Controls can have on your small to medium business. We dive into the mission of the Center for Infromation Security, membership, CIS Critical Controls, CIS Implementation Groups and much more!

    Hosts:
    Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP

    Sponsor:
    TrustMAPP (https://trustmapp.com)

    • 38 min
    #41 - Investing in Supply Chain Solutions with Marcus Bartram

    #41 - Investing in Supply Chain Solutions with Marcus Bartram

    Marcus Bartram is a General Partner at Telstra Ventures, a San Francisco-based VC firm that invests in mid-stage tech companies. He's on the founding team and has led investments in cybersecurity companies like CrowdStrike, Auth0, Anomali, Cequence, CloudKnox, Cofense, CyberGRX, Elastica, vArmour, and Zimperium.

    Hosts:
    Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP

    Sponsor:
    TrustMAPP (https://trustmapp.com)

    • 25 min
    #40 - Mind the Tech Gap with Dr. Nikki Robinson

    #40 - Mind the Tech Gap with Dr. Nikki Robinson

    In this episode of The Business of Security, we discuss Dr. Robinson's upcoming book, Mind the Tech Gap, and how to manage the problem of low to non-existent collaboration between IT and Security teams. This conversation covers tools and techniques for creating a rich, collaborative environment for organizations in order to achieve security goals.  

    Guest:
    Dr. Nikki Robinson, Security Architect at IBM, Adjunct Professor at Capital Technology University

    Hosts:
    Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP

    Sponsor:
    TrustMAPP (https://trustmapp.com)

    Mind the Tech Gap: Robinson, Nikki: 9781032206165: Amazon.com: Books

    • 43 min
    #39 - Don't Fire the CISO, with Quentyn Taylor

    #39 - Don't Fire the CISO, with Quentyn Taylor

    Top Tips for getting into the security industry and future proofing your strategy. This podcast will focus on Quentyn’s long career in cyber security and how working for the same company for a long period of time years has enabled him to build resilience and always think years ahead when executing a strategy.

    Quentyn has a wealth of knowledge experience in both the IT and information security arenas and has driven Canon’s strategy to highlight the importance of document security and help business customers to minimize their security risk.


    Host
    Josh Bruyning, Solution Engineer @TrustMAPP

    Guest:
    Quentyn Taylor, Senior Director, Information Security and Global Response @Canon Europe

    Sponsored by:
    TrustMAPP

    • 36 min
    #38 - Succession Planning, with John Checco

    #38 - Succession Planning, with John Checco

    In this episode, guest John Checco, Resident CISO at Proofpoint, makes a compelling case for CISO succession planning. As John takes us through his journey as a CISO, we learn how companies factor skills, background, and strengths into their short to long-term succession plans.

    The average estimated tenure of a CISO is only 26 months.  85% of surveyed CISOs  say they are now looking for another role or would consider an opportunity if presented. Unless you take aggressive retention action, it is only a matter of time before you are recruiting again. We discuss the tenets of succession planning, how to find a successor, and what transferring ownership entails.

    John gives us deep insight into relationship handoffs, which often involve organizations and personnel, both internal and external. We identify a successor's essential qualities, including leadership skills, organization ability, knowledge and experience, and cultural fit. In addition to primary skills, we discuss secondary skills such as project management, administrative competence, and background diversity.

    Guest:
    John Checco, Resident CISO @Proofpoint

    Hosts:
    Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP

    Sponsor:
    TrustMAPP (https://trustmapp.com)

    • 38 min

Customer Reviews

4.4 out of 5
9 Ratings

9 Ratings

Bandido ,

Serious topics with serious individuals…please loose the sound effects.

Great resource on information security with thought leaders with great insight from individuals in the industry. Please do loose the sound effects as you are discussing serious topics with serious individuals, I'm certain it delays production for an unnecessary attempt at making it fun/funny.

pruittaz ,

Great Content Poor Audio

I love the content it’s extremely useful to me as a Business Information Security Officer. However the audio quality leaves something to be desired. Keep up the good work though.

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
The New York Times
NPR
Jack Rhysider
Ben Gilbert and David Rosenthal

You Might Also Like