Ryan Morrison, better known on Reddit and the internet as "Video Game Attorney," and co-hosts Austin Hoffman and Ali Rothman, take a hard look at how the law will react to the fast growth in technology. Will we need consent to sleep with a robot? Will our organs be government property? Come in and find out.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
2020 WEBBY AWARD WINNER Rookie doesn't know much about his family business--but then again neither does the American Public. Nevertheless, he is tasked with suddenly leading the secret government agency in charge of covering up all political scandals, and his first assignment is the biggest scandal since watergate! With a clever idea, Rookie must come into his own and fight off the evil Agent X in order to save the bureau and protect the country from ruin! With a score teeming with energetic ...
…
continue reading
Welcome to Sidley’s The Restructuring Room podcast. Join us as we discuss with prominent industry figures and practitioners the trending bankruptcy, restructuring, and insolvency topics in today’s global business news, as well as those cases that have shaped bankruptcy law and practice. The Restructuring Room is hosted by partners Tom Califano and Genevieve Weiner, and managing associate Juliana Hoffman, Restructuring lawyers from the international law firm Sidley Austin LLP.
…
continue reading
Hot Takes with Kamryn A. is a christian podcast that discusses 'juicy content' that is not commonly talked about in church. Subjects, that when talked about, usually result in one being cancelled or made fun of. On this podcast, Kamryn and friends will be talking about controversial subjects such as finances, community, addictions, and so much more. This podcast is meant to take you on a deep dive of God's word and help you better understand the Bible, teaching you a biblical perspective on ...
…
continue reading
This podcast takes listeners coast to coast in discussion with National Board Certified Teachers who offer their advice and insights into the process. Each episode is an exploration into the amazing journey that these teachers have undertaken to get nationally board certified. We hope this podcast acts as a tool for prospective candidates for the National Board Certification while answering questions and concerns that candidates may have.
…
continue reading
Standing Room Only! is a podcast and sketch comedy show created and hosted by Dave Beckett, Nick Heitmann and Cory Minckler. Based in NYC, SRO! features and interviews interesting locals and comedians, while crammed inside of a tiny 3' by 3' recording studio. Our time in the studio, or as we like to call it: "The Comedy Snuggle Box", is spent riffing and elaborating on random sketch comedy premises created by those within. Shortly after, a favorite sketch idea is chosen, which is then writte ...
…
continue reading
1
Aaniin! Tan-A Hoffman on Indigenous Education, Language Revitalization, and the Power of National Board Certification
37:40
37:40
Spela senare
Spela senare
Listor
Gilla
Gillad
37:40
Join us for an inspiring conversation with Tan-A Hoffman, an Anishinaabe language and culture teacher from Michigan's Upper Peninsula. Tan-A shares her passion for Indigenous education, her journey to becoming a National Board Certified Teacher, and her advocacy for culturally responsive teaching. In this episode, you'll hear about: The importance …
…
continue reading
1
The Past Is Never Wasted (FT. Luke Flickinger)
31:08
31:08
Spela senare
Spela senare
Listor
Gilla
Gillad
31:08
Av Kamryn A.
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Spela senare
Spela senare
Listor
Gilla
Gillad
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Spela senare
Spela senare
Listor
Gilla
Gillad
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
1
Do You Know You're Awesome? (FT. Austin Laughman & Joe Fort)
23:12
23:12
Spela senare
Spela senare
Listor
Gilla
Gillad
23:12
Av Kamryn A.
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Spela senare
Spela senare
Listor
Gilla
Gillad
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Spela senare
Spela senare
Listor
Gilla
Gillad
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Spela senare
Spela senare
Listor
Gilla
Gillad
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Spela senare
Spela senare
Listor
Gilla
Gillad
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
…
continue reading
1
Noraa Ranset - Elementary School Teacher - Murray, Kentucky
18:32
18:32
Spela senare
Spela senare
Listor
Gilla
Gillad
18:32
Join us for an inspiring conversation with Noraa Ransey, a National Board Certified Teacher with over 20 years of experience in the classroom. Noraa shares her journey as an educator, the challenges and rewards she's encountered, and her unwavering commitment to her students and public education. In this episode, you'll learn about: Noraa's passion…
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Spela senare
Spela senare
Listor
Gilla
Gillad
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Spela senare
Spela senare
Listor
Gilla
Gillad
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Spela senare
Spela senare
Listor
Gilla
Gillad
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Spela senare
Spela senare
Listor
Gilla
Gillad
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Spela senare
Spela senare
Listor
Gilla
Gillad
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Spela senare
Spela senare
Listor
Gilla
Gillad
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Spela senare
Spela senare
Listor
Gilla
Gillad
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Spela senare
Spela senare
Listor
Gilla
Gillad
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Ricardo L. Calderon - High School World Languages Educator - Kuwait
30:38
30:38
Spela senare
Spela senare
Listor
Gilla
Gillad
30:38
In this special National Board Conversations episode, host Edward Santiago sits down with Ricardo Calderon, an inspiring educator with a truly global perspective. Originally from Panama, Ricardo achieved National Board Certification in World Languages and has since taught in a variety of settings across the globe—from rural North Carolina to New Yo…
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Spela senare
Spela senare
Listor
Gilla
Gillad
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Spela senare
Spela senare
Listor
Gilla
Gillad
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:59
30:59
Spela senare
Spela senare
Listor
Gilla
Gillad
30:59
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:57
30:57
Spela senare
Spela senare
Listor
Gilla
Gillad
30:57
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
Toni Dixon-McFarland - Educator, Author, and Double Dutch Dynamo
17:44
17:44
Spela senare
Spela senare
Listor
Gilla
Gillad
17:44
Join us for an inspiring conversation with Toni Dixon-McFarland, a National Board Certified Teacher, published author, and 40+ Double Dutch Club member. Toni's diverse experiences and unwavering commitment to education and community service make her a true trailblazer. In this episode, we'll explore Toni's journey from her early work in child devel…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Spela senare
Spela senare
Listor
Gilla
Gillad
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Spela senare
Spela senare
Listor
Gilla
Gillad
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:08
25:08
Spela senare
Spela senare
Listor
Gilla
Gillad
25:08
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:06
25:06
Spela senare
Spela senare
Listor
Gilla
Gillad
25:06
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:08
41:08
Spela senare
Spela senare
Listor
Gilla
Gillad
41:08
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:03
41:03
Spela senare
Spela senare
Listor
Gilla
Gillad
41:03
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:02
26:02
Spela senare
Spela senare
Listor
Gilla
Gillad
26:02
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:00
26:00
Spela senare
Spela senare
Listor
Gilla
Gillad
26:00
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:58
26:58
Spela senare
Spela senare
Listor
Gilla
Gillad
26:58
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Show N…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:56
26:56
Spela senare
Spela senare
Listor
Gilla
Gillad
26:56
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Visit …
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Spela senare
Spela senare
Listor
Gilla
Gillad
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Spela senare
Spela senare
Listor
Gilla
Gillad
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Spela senare
Spela senare
Listor
Gilla
Gillad
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Spela senare
Spela senare
Listor
Gilla
Gillad
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Spela senare
Spela senare
Listor
Gilla
Gillad
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Spela senare
Spela senare
Listor
Gilla
Gillad
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
1
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
30:46
30:46
Spela senare
Spela senare
Listor
Gilla
Gillad
30:46
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
…
continue reading
1
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
30:46
30:46
Spela senare
Spela senare
Listor
Gilla
Gillad
30:46
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
…
continue reading
1
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
31:24
31:24
Spela senare
Spela senare
Listor
Gilla
Gillad
31:24
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
…
continue reading
1
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
31:24
31:24
Spela senare
Spela senare
Listor
Gilla
Gillad
31:24
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
…
continue reading
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Spela senare
Spela senare
Listor
Gilla
Gillad
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
…
continue reading
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Spela senare
Spela senare
Listor
Gilla
Gillad
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
Candidate Conversations - Keke Powell - Austin, Texas
24:41
24:41
Spela senare
Spela senare
Listor
Gilla
Gillad
24:41
Candidate Conversations by the National Board is a chance to speak with educators who are currently on their National Board journey. Danielle Brown, NBCT, continues our school year-long journey with Keke Powell! She is a second-grade teacher in Texas and is super fun and engaging! In this episode, we catch up with Keke after submission and how she …
…
continue reading
1
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
29:10
29:10
Spela senare
Spela senare
Listor
Gilla
Gillad
29:10
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Show Notes: https://c…
…
continue reading
1
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
29:10
29:10
Spela senare
Spela senare
Listor
Gilla
Gillad
29:10
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Visit https://cisosto…
…
continue reading
1
CISO and the Board: Demonstrating value and relevant metrics - Max Shier - CSP #178
30:34
30:34
Spela senare
Spela senare
Listor
Gilla
Gillad
30:34
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Visit https://cisostori…
…
continue reading