Cybersecurity Effectiveness Podcast

back to podcasts
Showing episodes tagged with:
People and Process
April 16, 2019

Safety Through Segmentation

Category One
episode guest:
Bill Crowell

Brian Contos sits down with cybersecurity veteran William (Bill) Crowell, former Deputy Director of the NSA and current partner at Alsop Louie Partners, to get a picture of the major threat landscape changes over the past 15 years. While phishing attacks, advanced persistent threats (APTs), and breach monetization become more sophisticated each day, CIOs and board members must turn their focus to implementing proper network segmentation.

30
minutes
view episode
April 2, 2019

Blurring the Line Between Black and White

Category One
episode guest:
Raj Samani

In a security professional’s career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey and explains how his choices have reflected who he is as a mentor, peer, father, husband, and author, encouraging listeners to appreciate what they have now.

24
minutes
view episode
March 27, 2019

A Case for Prioritizing Cybersecurity: A Litigator’s Perspective

Category One
episode guest:
IJay Palansky

While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. Technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and his recommendations for avoiding the costly consequences of an attack.

16
minutes
view episode
January 22, 2019

A Culture-Centric Approach to Managing Cyber Talent

Category One
episode guest:
Kevin Morrison

The industry-wide talent shortage makes it challenging to attract and retain top cybersecurity talent — analysts often operate understaffed and overwhelmed by the ever-growing volume of alerts to sort through. Kevin Morrison, CISO at Pulte Group, Inc. examines his culture-centric approach to structuring cybersecurity staff, maximizing skill-set efficiencies, and aligning the success of his program to core business objectives.

18
minutes
view episode
back to podcasts
Follow:
Subscribe:
join the list
X
Business Need
technology
company
resources
blog