Ransomware? Why’d It Have to Be Ransomware? (Live in San Francisco)
May 28, 2024
auto_awesome
Guest Steve Zalewski discusses topics such as open source challenges, cybersecurity hiring, and sales knowledge. They debate on privacy invasion vs. embarrassment, cybersecurity quiz, and mastering interviews. The podcast also explores company security, risk management, and mentorship in cybersecurity.
CISOs should focus on protecting people from social engineering attacks and align security measures with business success.
CISOs may utilize point solutions for emerging technologies lacking comprehensive security solutions or specialized skills.
The operationalization of software bill of materials (SBOM) faces challenges in supply chain complexities, requiring wider collaboration and industry standards implementation.
Deep dives
Demonstrating Value to the Business
Demonstrating value to the business as a CISO involves focusing on protecting people from social engineering attacks and ensuring security measures do not hinder productivity. By aligning security efforts to protecting the brand, employees, and supply chain, CISOs can articulate how security safeguards contribute to the company's success.
Considerations for Point Solutions
CISOs may opt for point solutions in areas where emerging technologies lack comprehensive security solutions from traditional vendors or where specialized skills are needed in the team. For instance, focusing on new technologies like cloud security initially required investing in a variety of point products that addressed specific vulnerabilities.
Software Bill of Materials (SBOM) Efficacy
In the current state, software bill of materials (SBOM) efforts face challenges in operationalizing due to complexities in supplier chains and lacking universal adoption. The effectiveness of SBOMs relies on achieving visibility across supply chains through interoperable lists of software components, a process that needs wider collaboration and industry standards implementation to enhance its efficacy.
Jealousy Among CISOs
Expressing jealousy in a light-hearted manner, one CISO mentions being envious of a retired colleague for living a life post-retirement that seems appealing. Another CISO expresses admiration for a mentor CISO and aspires to pay forward the knowledge gained to enhance the security community, indicating a form of professional jealousy driven by respect and a desire for continuous improvement.
Preference in Cyber Attacks: APT vs. NSA
Given the choice between being attacked by an Advanced Persistent Threat (APT) or the National Security Agency (NSA), one CISO prefers the NSA due to predictability in actions compared to the uncertainties of an APT attack. The rationale centers on the ability to anticipate the NSA's potential actions and outcomes over the unknown strategies posed by an APT.
Are companies taking the air out of the open source balloon?
What’s broken about cybersecurity hiring?
Do we need minimum requirements for cybersecurity knowledge in sales?
Thanks to our podcast sponsors, Devo, Eclypsium & NetSPI
Devo replaces traditional SIEMs with a real-time security data platform.
Devo’s integrated platform serves as the foundation of your security operations and includes data-powered SIEM, SOAR, and UEBA. AI and intelligent automation help your SOC work faster and smarter so you can make the right decisions in real-time.
Eclypsium is helping enterprises and government agencies mitigate risks to their infrastructure from complex technology supply chains. Our cloud-based and on-premises platform provides digital supply chain security for software, firmware and hardware in enterprise infrastructure. Get started today at eclypsium.com/spark.
NetSPI ASM continuously scans your external perimeter to identify, inventory, and reduce risk to both known and unknown assets. It blends scanning methodology with our consultants' human intelligence to identify previously undiscovered data sources and vulnerabilities so you can remediate what matters most.
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode