Authenticate This! The Cybersecurity Leadership Podcast

iC Consult
Authenticate This! The Cybersecurity Leadership Podcast

“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats. “Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.

集數

  1. The Hard Truth About Security Leadership with Corey Kaemming of Valvoline Inc.

    2月26日

    The Hard Truth About Security Leadership with Corey Kaemming of Valvoline Inc.

    On this episode, Corey Kaemming, Sr. Director of Information Security at Valvoline Inc., joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works — and what doesn’t — in building a strong security program. Key Takeaways: (06:36) Corey’s leadership philosophy is rooted in listening first and building trust. (10:58) Early mentorship conveys the importance of preparation and empathy. (13:07) Identity security touches every part of the business and drives operations. (18:49) Breaking into identity security requires hands-on experience and adaptability. (23:59) Security leaders must communicate in ways that resonate with executives. (27:47) Running security for a company's divestiture requires trust and precision. (30:44) People resist security changes, but tying them to business outcomes helps. (37:38) Too many identity tools create complexity and strain resources. (42:29) Security isn’t a one-time fix — it demands constant attention and updates. (53:56) Zero trust is widely used but often misunderstood in execution. Resources Mentioned: Corey Kaemming - https://www.linkedin.com/in/corey-kaemming/ Valvoline Inc. - https://www.linkedin.com/company/valvoline/ Evanta - https://www.evanta.com/ Signal - https://signal.org/ Retail & Hospitality ISAC (RH-ISAC) - https://rhisac.org/ Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.  For more information, visit ic-consult.com. #Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement

    57 分鐘
  2. Humanizing Identity in the Cybersecurity Space with Aaron Lentz and Tim York

    1月29日

    Humanizing Identity in the Cybersecurity Space with Aaron Lentz and Tim York

    On this inaugural episode, hosts Aaron Lentz and Tim York explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration. Key Takeaways: (02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises. (06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively. (12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance. (17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs. (20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies. (25:42) Onboarding delays can erode trust and impact organizational culture. (27:46) The best CISOs focus on influencing internal culture alongside implementing tools. Resources Mentioned: Aaron Lentz - https://www.linkedin.com/in/aaron-lentz/ Tim York - https://www.linkedin.com/in/tim-york-b80b23a/ Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode.  For more information, visit ic-consult.com #Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement

    33 分鐘

簡介

“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats. “Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.

若要收聽兒少不宜的單集,請登入帳號。

隨時掌握此節目最新消息

登入或註冊後,即可追蹤節目、儲存單集和掌握最新資訊。

選取國家或地區

非洲、中東和印度

亞太地區

歐洲

拉丁美洲與加勒比海地區

美國與加拿大