CISO Perspectives (public)

N2K Networks
undefined
Aug 8, 2022 • 22min

Orchestrating the security stack around the Hash Table.

Orchestrating the security stack is a cybersecurity first principle strategy.Our security stack has grown unwieldy. The complexity breeds vulnerability. Orchestration may be our only hope. Rick reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools. The Hash Table identifies data governance and policy strategy as a crucial first step. They also talk about the first principles of speaking with the C-suite, as well as the darkside of automation and orchestration.With Rick Howard, the CyberWire’s CSO and Chief Analyst, joined by Bob Turner, the Fortinet Field CISO for Education, and Kevin Magee, the CSO for Microsoft Canada, discuss orchestration as a first principle strategy.Cybersecurity professional development and continued education.You will learn about: SOAR/SIEM and SASE for large scale orchestration, data governance, the three components of a good SASE platform, data materiality and gap analyses, the dark side of automationCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more orchestration and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Aug 1, 2022 • 21min

Orchestrating the security stack and cybersecurity first principles.

Orchestrating the security stack is a cybersecurity first principle strategy.Our security stack has grown unwieldy. The complexity breeds vulnerability. Orchestration may be our only hope. Rick reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools.Cybersecurity professional development and continued education.You will learn about: SOAR/SIEM and SASE for large scale orchestration, data governance, the three components of a good SASE platform, data materiality and gap analyses, the dark side of automationCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more orchestration and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jul 25, 2022 • 24min

Enterprise backups around the Hash Table.

Enterprise backups as a cybersecurity first principle strategy.This session covers the riveting topic of enterprise backup schemes to improve resilience. Rick discusses the value of data backups, workflow models, recent ransomware trends, and platforms for each use case. The Hash Table provides tangible enterprise backup strategies that encompass centralized, decentralized, and DevSecOps techniques, business continuity and disaster recovery plans, and engaging the Executive team in crisis scenarios and recovery training. In data backups, nothing is easy, but Rick breaks it down to first principles and makes it understandable.With Rick Howard, the CyberWire’s CSO and Chief Analyst, joined by Jerry Archer, the Sallie Mae CSO, and Jaclyn Miller, the CISO for NTT, discuss enterprise backups as a first principle strategy.Cybersecurity professional development and continued education.You will learn about: backup tools and platforms, workflow responsibilities and models, disaster recovery and business continuity plans, backups as a tool to improve resilienceCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more enterprise backups and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jul 18, 2022 • 18min

Enterprise backups and cybersecurity first principles.

Enterprise backups as a cybersecurity first principle strategy.This session covers the riveting topic of enterprise backup schemes to improve resilience. Rick discusses the value of data backups, workflow models, recent ransomware trends, and platforms for each use case. In data backups, nothing is easy, but Rick breaks it down to first principles and makes it understandable.Cybersecurity professional development and continued education.You will learn about: backup tools and platforms, workflow responsibilities and models, disaster recovery and business continuity plans, backups as a tool to improve resilienceCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more enterprise backups and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jul 11, 2022 • 24min

Enterprise encryption around the Hash Table.

Enterprise encryption is a cybersecurity first principle strategy.Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion.With Rick Howard, the Cyberwire’s CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy.Cybersecurity professional development and continued education.You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion.CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more encryption and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jul 4, 2022 • 24min

Enterprise encryption and cybersecurity first principles.

Enterprise encryption is a cybersecurity first principle strategy.Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion.Cybersecurity professional development and continued education.You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion.CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more encryption and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jun 27, 2022 • 29min

CxO professional development.

Rick Howard, the CyberWire’s CSO and Chief Analyst, is joined by Hash Table members Gary McAlum, former USAA CSO, and Dawn Cappelli, the Rockwell Automation CISO, to discuss CxO professional development. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jun 20, 2022 • 24min

How to buy security products.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Helen Patton, CISO for Duo Security’s Advisory, and Nikk Gilbert, CISO for the Cherokee Nation Businesses, to discuss how to buy security products. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jun 13, 2022 • 26min

New CISO responsibilities: supply chain.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Ann Johnson, Microsoft’s Corporate VP on Security, Compliance, & Identity, and Ted Wagner, the SAP National Security Services CISO, t0 discuss supply chain as a new CISO responsibility. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Jun 6, 2022 • 24min

New CISO responsibilities: identity.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Jerry Archer, Sallie Mae's CSO, and Greg Notch, the National Hockey League's CISO, to discuss identity as a new CISO responsibility. Learn more about your ad choices. Visit megaphone.fm/adchoices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app