21 episodes

State of Security, by Access Point Consulting, brings together seasoned experts in the fields of security consulting, regulatory compliance, and security operations. Whether you’re a business leader, IT professional, or security enthusiast, this podcast offers valuable insights and actionable advice.

Learn more at accesspointconsulting.com ( https://www.accesspointconsulting.com/?utm_campaign=eg-state-of-security&utm_content=description&utm_medium=podcast&utm_source=podcast ).

State of Security Access Point Consulting

    • Business
    • 5.0 • 1 Rating

State of Security, by Access Point Consulting, brings together seasoned experts in the fields of security consulting, regulatory compliance, and security operations. Whether you’re a business leader, IT professional, or security enthusiast, this podcast offers valuable insights and actionable advice.

Learn more at accesspointconsulting.com ( https://www.accesspointconsulting.com/?utm_campaign=eg-state-of-security&utm_content=description&utm_medium=podcast&utm_source=podcast ).

    SOS9 - Applications for Cyber Threat Intelligence in SMBs (with Evie Manning & Michael Rush)

    SOS9 - Applications for Cyber Threat Intelligence in SMBs (with Evie Manning & Michael Rush)

    Summary
    In this episode of State of Security, Geoff Hancock discusses cyber threat intelligence with guests Mike Rush and Evie Manning. They define cyber threat intelligence as data that is collected, processed, and analyzed to understand threat actors, their motives, targets, and behaviors. They emphasize the importance of making intelligence actionable and highlight the different levels of threat intelligence, from strategic trends to tactical actions. The guests also discuss the impact of cyber intelligence on supply chain security and how it can be used to proactively protect businesses. They stress the need for collaboration and communication between different cybersecurity disciplines and the importance of relevant and contextual data in cyber intelligence.
    Takeaways
    Cyber intelligence is data that is collected, processed, and analyzed to understand threat actors, their motives, targets, and behaviors.Making intelligence actionable is key, as it allows organizations to make informed decisions and take proactive measures to resolve issues and prevent future attacks.Cyber threat intelligence encompasses a broad range of information, from strategic trends to tactical actions, and helps organizations identify relevant threats and prioritize their security efforts.Cyber intelligence plays a crucial role in supply chain security, as it helps organizations identify and mitigate risks in their supply chain and protect their customers.Collaboration and communication between different cybersecurity disciplines, such as vulnerability management, incident response, and threat hunting, are essential for effective cyber intelligence.Small and medium businesses can start building their cyber intelligence capabilities by conducting an internal assessment of their assets, risks, and vulnerabilities, and then seeking relevant and contextual data from trusted sources.Chapters
    00:00 Introduction to Cyber Intelligence
    04:38 Different Levels of Threat Intelligence
    07:28 Cyber Intelligence in the Context of Small and Medium Businesses
    10:43 The Importance of Supply Chain Security
    26:52 Building Cyber Intelligence Capabilities for Small and Medium Businesses

    • 30 min
    SOS8 - Building a Resilient GRC Program (with Rick Leib & Susan Woyton)

    SOS8 - Building a Resilient GRC Program (with Rick Leib & Susan Woyton)

    Summary
    This episode focuses on governance, risk, and compliance (GRC) and how organizations can strengthen their GRC programs.
    Key recommendations include:
    Ensure executive buy-in and support for GRC initiatives.Review and update policies, procedures, and documentation regularly.Implement continuous monitoring and improvement of GRC processes.Incorporate GRC elements into contracts with third parties.Conduct regular internal and third-party risk assessments.Provide security awareness training to employees.Consider the impact of AI on GRC, but maintain a human element in the process.Chapters
    00:00 Introduction
    03:21 The Importance of Resilient GRC
    08:33 Challenges and Failures in GRC
    25:58 Executive Buy-In and Documentation
    30:38 Continuous Monitoring and Improvement
    35:24 Strengthening GRC Programs

    • 36 min
    SOS7 - [LIVE] How to Be Proactive About Operational Resilience and Incident Response (with Rick Leib & Jeff Ulanet)

    SOS7 - [LIVE] How to Be Proactive About Operational Resilience and Incident Response (with Rick Leib & Jeff Ulanet)

    Summary
    During HIMSS24 in Orlando, Access Point highlighted the importance of operational resilience and incident response in healthcare. Led by Geoff Hancock, the session addressed the increase in data breaches and the need for proactive cyber resilience. Panelists emphasized the shift to proactive cybersecurity, the role of AI and machine learning, key elements of an incident response plan, and collaboration between teams. Executives were noted for their oversight during breaches, and the evolving role of the C-suite in prioritizing cyber resilience was emphasized. Effective communication to the C-suite and board of directors, along with balancing innovation with privacy and compliance, were also discussed.
    Takeaways
    Operational resilience and incident response are crucial in the healthcare industry due to the increasing number of data breaches.A proactive approach to cybersecurity is necessary, with a focus on having a plan and being able to withstand and manage through an attack.AI and machine learning play a role in cybersecurity, but there is a need for continuous testing and governance to prevent manipulation of outcomes.Key elements of a healthcare organization's incident response plan include team collaboration, incident classification, detection and analysis tools, recovery and retention strategies, and involvement of executives.Collaboration between the CISO, engineering, and IT teams is crucial for creating a strong security posture.Executives in hospital administration play a role in providing oversight and managing through a breach.The C-suite's understanding and prioritization of cyber resilience are evolving.Budgeting and prioritization are important for implementing effective cybersecurity measures.Effective communication and reporting to the C-suite and board of directors are essential.Balancing the adoption of innovative technologies with patient privacy and regulatory compliance is a challenge.Chapters
    00:00 Introduction and the Need for Proactive Cyber Resilience
    06:22 Understanding the Operational Side of Cyber Resilience
    09:10 Key Elements of a Healthcare Organization's Incident Response Plan
    24:27 Collaboration between CISO, Engineering, and IT for Strong Security
    26:54 The Evolving Role of the C-Suite in Understanding Cyber Resilience
    29:51 Budgeting and Prioritization for Effective Cybersecurity
    33:13 Effective Communication and Reporting to the C-Suite and Board
    36:08 Balancing Innovation and Patient Privacy in Healthcare

    • 47 min
    SOS6 - [LIVE] Interviewing Healthcare IT Leaders at HIMSS24 (with Mitchell Powell)

    SOS6 - [LIVE] Interviewing Healthcare IT Leaders at HIMSS24 (with Mitchell Powell)

    Summary
    The principal themes in this conversation revolve around the importance of network vulnerability, data security, and the impact of emerging technologies in healthcare cybersecurity. The healthcare IT leaders we interviewed emphasize the need to find a balance between secure platforms and user-friendly environments. They also highlight the challenges of interfacing with external organizations and complying with government regulations. Other key topics include the integration of AI in healthcare, the importance of data protection, and the role of networking and Wi-Fi security. Overall, the conversation emphasizes the critical role of cybersecurity in maintaining patient confidence and protecting sensitive healthcare data.

    Takeaways
    Network vulnerability is a significant concern in healthcare cybersecurity.Finding a balance between secure platforms and user-friendly environments is crucial.Interfacing with external organizations and complying with government regulations are ongoing challenges.The integration of AI in healthcare requires careful consideration of data protection.Networking and Wi-Fi security play a vital role in maintaining cybersecurity.Data security is essential to maintain patient confidence and protect sensitive healthcare information.
    Chapters
    00:00 Introduction
    06:31 Balancing Security and User-Friendly Environments
    11:31 Challenges of Interfacing with External Organizations
    12:48 The Role of AI in Healthcare and Data Protection
    13:43 Networking and Wi-Fi Security

    • 14 min
    SOS5 - Practical Insights on Incident Response (with Brian Weidner & Chris Skinner)

    SOS5 - Practical Insights on Incident Response (with Brian Weidner & Chris Skinner)

    Summary
    In this conversation, Geoff Hancock interviews Brian Weidner and Chris Skinner about incident response. They discuss the importance of building strong relationships with the C-suite and legal department, as well as the value of having a trusted incident response company on retainer. They also touch on the challenges of incident response in the critical infrastructure sector and the potential impact of new reporting requirements proposed by DHS. The conversation explores the recently released NIST incident response document and the need for organizations to tailor their incident response plans to their specific needs. The guests emphasize the importance of preparation, communication, and continuous improvement in incident response.

    Takeaways
    Building strong relationships with the C-suite and legal department is crucial for effective incident response.Having a trusted incident response company on retainer can streamline the response process.New reporting requirements proposed by DHS may add additional burden to organizations already dealing with regulatory reporting.The recently released NIST incident response document provides valuable guidance for organizations, but it should be tailored to each organization's specific needs.Preparation, communication, and continuous improvement are key elements of successful incident response.
    Chapters
    00:00 Introduction and Importance of Relationships
    19:08 New Reporting Requirements and Collaboration with Government Agencies
    32:24 The Value of the NIST Incident Response Document

    • 43 min
    SOS4 - A CISO's Guide to Effective Communication

    SOS4 - A CISO's Guide to Effective Communication

    Summary
    Geoff Hancock joined Allan Alford on The Cyber Ranch Podcast to discuss effective communication strategies for CISOs. They emphasize the importance of prioritizing clarity in communication, using strategic storytelling, and practicing crisis communication. They also highlight the significance of engaging stakeholders proactively, leveraging data in decision-making, and bolstering leadership presence. Additionally, they discuss the value of emphasizing followership and establishing a feedback loop. The conversation concludes with a discussion on using tools and strategies for effective communication, such as the NIST Cybersecurity Framework and the concept of a management operating system.
    Chapters
    00:00 Introduction
    03:51 Strategic storytelling
    08:25 Crisis communication
    11:42 Engaging stakeholders proactively
    13:37 Leveraging data in decision-making
    16:28 Bolstering leadership presence
    25:34 Establishing a feedback loop
    31:24 Using tools and strategies for effective communication

    • 36 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Business

The Ramsey Show
Ramsey Network
REAL AF with Andy Frisella
Andy Frisella #100to0
Planet Money
NPR
Money Rehab with Nicole Lapin
Money News Network
The Prof G Pod with Scott Galloway
Vox Media Podcast Network
PBD Podcast
PBD Podcast