DiscoverSecurity Economy
Security Economy
Claim Ownership

Security Economy

Author: Katelyn Ilkani

Subscribed: 7Played: 58


Whether you want to be or not, you are now part of the security economy. Your personal and professional data has value; do you know who has it? Your data may even have a life of its own on the dark web; what does that mean? You are one of four billion people who use the internet globally. Every time you do so, you risk your personal and professional data being stolen. The internet was never built for privacy and security; those are add-ons. The world wide web wasn't used for commercial purposes until 1992. Before then, it had just been a collaboration tool between government researchers and the higher education community. The web was built for openness and collaboration - not security. Now in 2020, Gallup's data shows that Americans worry more about cyber crime than any other crime, and 71% worry about their personal data being hacked. How did we get here? Why are hackers so successful? If the world's largest companies can get hacked, what does that mean for small and medium businesses - and for you?In this podcast, we will investigate the trends driving cyber security into the future and explore the impacts to your personal privacy and security. Listen in every other week to a new piece of the puzzle of how human behavior, technology, and money are intersecting to make you more, or perhaps less, secure.
18 Episodes
In this episode I'll discuss how we can improve alignment between cybersecurity and the line of business with Dan Blum, based on his latest book, Rational Cybersecurity for Business. 
What if the privacy conversation has only just begun? Companies everywhere have been grappling with GDPR and CCPA, while states all across the United States have been advancing their own unique privacy regulations.How do companies cope with all of these different requirements that are frequently thrown on the shoulders of their security teams? Cyber security experts are largely not privacy experts, much less able to keep track of the quickly changing privacy landscape. What should be prioritized? What new regulations could be coming that could throw a wrench in the plans?Hear from Joe Dehner, an attorney and international privacy expert at Frost, Brown, Todd. Joe shares his thoughts with us on what we need to be paying attention to in the privacy discussion.
Howard Ross joins Katelyn Ilkani to discuss his work on unconscious bias. Howard has recently been in the news; you may have heard him mentioned on Tucker Carlson. His diversity training this summer at the Treasury Department started a domino effect of events, culminating in President Trump banning diversity training at the Federal government.Listen to this episode to hear Howard's thoughts on diversity in the workforce and the role of unconscious bias. Howard answers questions directly from the cyber security community on how to address unconscious bias, including confirmation bias. 
Dr. Shriram Krishnamurthi, Professor of Computer Science at Brown University, joins Katelyn Ilkani to discuss the art and science of programming securely. Shriram shares with us his thoughts on why secure coding is so important and the direction that Computer Science programs, as well as current programmers, are taking. He discusses how we can be realistic but optimistic about resolving the tension between taking the time to code securely - while also shipping code quickly. Hear his predictions for the future of secure coding and advice for information security professionals interested in this space.
Manufacturing is notorious for having lax cyber security controls. But what about critical manufacturing sectors that make nuclear reactors, airplanes, or foundational components of skyscrapers? They have it all together, right?Maybe not. In this episode, Katelyn Ilkani interviews Paul Powers, the CEO of Physna. Paul discusses an often overlooked component of manufacturing security: securing the CAD drawings.If a cyber attacker could make one small, undetected change to a CAD design, it could lead to catastrophic failure of the object being designed - and it may not be detected until the object has been manufactured and is in use.Let's find out more in this episode of Security Economy.
Why is it so hard to get organizations to invest in cyber security staff and technology? Do we fundamentally have a problem quantifying and mitigating risk? Hear from Andy Ellis, the Chief Security Officer at Akamai Technologies and find out.
Do you know what to do if your business is impacted by a critical cyber security incident? Have you seen the huge increase in COVID-19 scams impacting businesses all across the US?Let's hear from Johnny Lee at Grant Thornton. You will leave this episode with food for thought and a better appreciation for the importance of quick, expert incident response.
Are you struggling to get your company to listen to your cyber security ideas? When you try to talk about security with your colleagues, do their eyes glaze over? Listen to this episode to find out how to use proven strategies to get anyone to listen to you! Dr. Mark Goulston shares his in-depth research with us on how to lower psychological barriers and get heard.Dr. Goulston is the author of Just Listen: Discover the Secret to Getting Through to Absolutely Anyone, and he distills his research into actionable tips that you can start using today.
In this episode explore the impacts of COVID-19 on cyber security startups and funding. Hear from Ron Gula, the former co-founder and CEO of Tenable Network Security, and now the co-founder of Gula Tech Adventures, a cyber security venture capital firm. 
Hear from Dr. Anna Lysyanskaya, a renowned cryptographer and professor at Brown University. Anna has worked directly with Google and Apple on how to use bluetooth low energy in our cell phones to enable contact tracing at scale with privacy in mind. She shares her thoughts on the privacy preserving methods used to develop the new APIs that Google and Apple just released and what you need to know about the technology. Support this podcast
In this episode, Katelyn Ilkani, explores the parallels between malware and pandemics with Gabrielle Hempel. Support this podcast
Katelyn Ilkani and Dr. Kirk Borne discuss how behavioral analytics work, and how they are applied in cyber security. Dr. Borne also discusses the future of behavioral analysis. Support this podcast
Katelyn Ilkani interviews Dr. Gleb Tsipursky about the importance of behavioral economics in cyber security. Topics covered include how your gut instincts, intuition, and cognitive biases work, why social engineering is so successful, and what COVID-19 could mean for cyber security planning over the next five years. Support this podcast
How do you lead your organization and teams in times of uncertainty? What does it mean to be a cyber leader? Listen in to hear how Thomas Koulopoulos frames the importance of cyber leadership in these turbulent times. He describes how to future proof your company for cyber security threats and think strategically about your own cyber leadership. Support this podcast
Linn Freedman, Chair of the Privacy and Cybersecurity Team at Robinson+Cole and an Adjunct Professor at Brown University, joins Katelyn Ilkani to discuss how privacy laws impact cybersecurity decisions. Learn about GDPR, CCPA, and other privacy laws, plus how the rise of ransomware is impacting businesses. Hear Linn's top tips to keep your business secure and what to do in the event of a data breach. Support this podcast
Katelyn introduces Security Economy and why you should listen in! Support this podcast
Katelyn and Matthew Rosenquist discuss the cyber security skills gap and emerging AI-based cyber security threats. Learn what the talent shortage is all about and how we can address it. Hear about upcoming AI based threats and what you need to be prepared to defend against. Support this podcast
Katelyn and Jane explore the diversity problem in cyber security and why it makes us all less safe. Support this podcast
Download from Google Play
Download from App Store