DiscoverCyber Security Effectiveness Podcast
Cyber Security Effectiveness Podcast
Claim Ownership

Cyber Security Effectiveness Podcast

Author: Mandiant Security Validation

Subscribed: 57Played: 2,456
Share

Description

Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cyber Security Effectiveness Podcast.
112 Episodes
Reverse
What do you get when you combine a surging demand for cybersecurity experts with one of the largest plastics, chemicals, and refining companies in the world? In this first episode of the Cybersecurity Effectiveness Podcast, host Brian Contos sits down with Dave Bang, the man in charge of IT Security Architecture at a multi-national chemical company, and gets his take on the industry’s attitude toward prioritizing security, current processes, and personal experience with their team in ensuring success.  
In the spirit of Ada Lovelace Day coming up on October 9th, host Brian Contos chats with Verodin security analyst Ashley Zaya about her role on the Behavior Research Team (BRT) and the perspective she brings to the industry. Ashley reflects on her career in InfoSec thus far and the experiences she gained working in Boeing's fast-paced SOC. Ashley also shares valuable advice for women entering the field and one of her favorite movie soundtracks jam out to.
Brian Contos straps in with Dave Ockwell-Jenner of SITA, the world's leading air transport IT and communications specialist. Having worked in IT and aviation for about 25 years, Dave explains what makes the air transportation industry unique, perspectives that executives have toward cybersecurity, and the challenges and opportunities that analysts face as they navigate today’s threats.
Cylance Chief Security and Trust Officer Malcolm Harkins reflects on his core leadership philosophies and the processes he implements to cultivate a professional culture of excellence. Malcolm’s background in economics and finance offers a unique perspective on the cybersecurity landscape. He walks us through his transition from working as the Chief Security & Privacy Officer at the multinational corporation, Intel, to joining the cutting-edge cybersecurity start-up, Cylance.
In this episode, host Brian Contos reconnects with an old friend and colleague, Dr. Ulf Lindqvist, who is the Senior Technical Director of SRI International’s Computer Science Laboratory. Ulf reflects on some of SRI’s most notable technology accomplishments, elaborates on the security industry movement spurred from past work with Logic Group, and predicts the future of IoT devices.
Security analyst and outdoors enthusiast Tim Waldo examines the lingering effects of malware attacks like WannaCry in the healthcare sector and exposes disturbing trends that are putting patient data at risk to future outbreaks. Tim offers precise steps that organizations can take to dramatically improve the technologies and policies safeguarding sensitive information.
Cyber threat research is not all created equal – especially in the realm of Security Instrumentation. Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization’s defenses with improved durability and efficiency in mind.
The Cybersecurity Effectiveness Podcast is kicking off the New Year with a forward-thinking episode featuring JASK CEO and Co-Founder Greg Martin. Hear his predictions about the key cybersecurity challenges that organizations will be facing in 2019. Learn about the ground-breaking developments in AI and SOC automation enabling security teams to combat the rising sophistication of cyber attacks at a super-human level.
The industry-wide talent shortage makes it challenging to attract and retain top cybersecurity talent — analysts often operate understaffed and overwhelmed by the ever-growing volume of alerts to sort through. Kevin Morrison, CISO at PulteGroup, Inc. examines his culture-centric approach to structuring cybersecurity staff, maximizing skill-set efficiencies, and aligning the success of his program to core business objectives.
While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks within IoT devices. Technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and his recommendations for avoiding the costly consequences of a data breach.
In a security professional’s career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey and explains how his choices have reflected who he is as a mentor, peer, father, husband, and author, encouraging listeners to appreciate what they have now.
Host Brian Contos sits down with cybersecurity veteran William (Bill) Crowell, former Deputy Director of the NSA and current partner at Alsop-Louie Partners, to get a picture of the major threat landscape changes over the past 15 years. While phishing attacks, advanced persistent threats (APTs), and breach monetization become more sophisticated each day, CIOs and board members must turn their focus to implementing proper network segmentation. 
According to Terry Ray, SVP and Fellow at Imperva (previously Chief Technology Officer), practices and safety around data privacy and the cloud, though slowly improving, still leave much to be desired. He and Brian Contos discuss the concept of absolute security and why businesses benefit more from calculating acceptable risk based on their unique critical assets.
Sometimes the most interesting careers emerge from the remnants of another passion. MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization. She and Brian Contos talk proactivity, cracking down on communication, and key focus points for response teams.
As CISO for Ohio State University, Helen Patton has an acute vision for students and professors who are passionate about cybersecurity. While undergraduate university programs are succeeding in many areas, they are hindered by a lack of structure and guidance from the industry as a whole. She explains how to create a valuable student internship experience that offers diverse and relevant practical experience.
From the Ground Up

From the Ground Up

2019-05-2123:58

Brian Contos chats with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team. From Ed’s perspective, decision-making board members must be equipped with continuous data and have instincts that come from experience, but that can be a challenging balance to find.
Seasoned cybersecurity veteran Richard Seiersen, former SVP & CISO at LendingClub and current CEO & Co-Founder of Soluble.ai, attributes success in any career to two things: metrics and measurement. He shares his contagious passion for security, the qualities of top engineers, his latest book, and more.
Mark Weatherford, Global Information Security Strategist at Booking Holdings and former CISO of the State of California and Colorado, has over twenty years of executive-level leadership experience in some of the world’s most important organizations. He and Brian Contos discuss misconceptions of cloud security, issues in the supply chain, and evaluating all areas of your cybersecurity environment.
Amazing new developments in machine learning and artificial intelligence automate testing, reporting, and workflow. However, Lisa Huff, VP of NA Pre-Sales Engineering at Exabeam, explains its true value as a tool – not a catch-all solution. She and Brian talk customer success, newly introduced security roles, and more.  
Investing in the CISO

Investing in the CISO

2019-07-1615:51

Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, recaps the short timeline of quality assurance in manufacturing and argues for the same approach it to cybersecurity as a core function of the business. Do investors and CISOs aligning their digital strategies accordingly and where exactly does ownership lie if, and when, the unexpected happens?
loading
Comments 
Download from Google Play
Download from App Store