06/14/22--I Have So Little. Just Let Me Control Access to the Mail Server.

I Have So Little. Just Let Me Control Access to the Mail Server.

CISO Series
  • On this week's episode of CISO Series Podcast we look at creating a cybersecurity report card and also examine the inevitability of staff eventually violating a policy somewhere along the lines.

  • Cyber Security Headlines you need to know include an AI researcher being placed on leave for claiming LaMDA sentience, the Celsius network shuts down withdrawals, and Travis CI leaking credentials.

  • And please join us THIS FRIDAY for our live final episode of the competitive pitch podcast series, Capture the CISO!

CISO Series Podcast

I Have So Little. Just Let Me Control Access to the Mail Server.

I Have So Little. Just Let Me Control Access to the Mail Server

Andy Ellis, operating partner, YL Ventures and I welcome sponsored guest Jadee Hanson CIO/CISO, Code42 to discuss:

  • Is it alright to block a vendor because one salesperson is persistent and annoying?

  • How can one go about creating a cybersecurity report card?

  • Is it just inevitable that your staff is going to eventually violate policies?

  • How do you determine a delicate balance between a complete non-tolerance policy versus complete tolerance?

Thanks to our podcast sponsor, Code42

Code42

10-second security tip...

"When you see an employee put company data at risk, don't assume it was done maliciously. Remind yourself that collaboration tools of today make this an easy mistake to make and adopt the practice of conducting empathetic investigations when dealing with these types of scenarios." --Jadee Hanson, CIO/CISO, Code42

Listen to full episode of

Eager to listen to just "What's Worse?!"

We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.

Check out:

on

CISO Series Podcast

on

Defense in Depth

Overheard on Defense in Depth 

"The trick is that so many companies have documentation debt. Having documentation debt means you don’t have your processes. Everybody is not on the same page. They don’t know their roles, where they begin, where they end. If we think about incident response, to have successful incident response we’ve got to have very clear scope of duties and when there’s a hand off in a communication, etc.… And I think the training is no different." --Rich Lindberg, CISO, JAMS

Listen to full episode of

Cyber Security Headlines 

Top headlines for Tuesday, June 14, 2022:

  • AI researcher placed on leave for claiming LaMDA sentience

  • Celsius network shuts down withdrawals

  • Travis CI leaking credentials

to this episode.

or subscribe to the daily newsletter.

Join the LIVE "Week In Review" for

Cyber Security Headlines

this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering

.

or subscribe to the daily newsletter.

Thanks to our Cyber Security Headlines sponsor, Datadog

Datadog

Super Cyber Fridays!

Capture the CISO Finals - This Friday, June 17th, 2022

Capture the CISO Final

Please join us for this live final episode of the competitive pitch podcast series, Capture the CISO, with your host Johna Till Johnson, CEO, Nemertes. It's happening this Friday [6-17-22] at the normal time we regularly do 

Our judges for the final episode will be:

  • Yaron Levi, CISO, Dolby Laboratories

  • John Overbaugh, CISO, Alpine Software Group

The four contestants in the final episode will be:

  • Ivan Tsarynny, CEO, Feroot

  • Vladimir (Vladi) Sandler, CEO, Lightspin

  • Leonid Belkind, co-founder and CTO, Torq

  • Aviv Grafi, founder and CTO, Votiro

Check out the contestants, our shows, links to subscribe to the podcast, and all the vendors demo videos on the 

.

We welcome active discussion and debate about all vendor contestants.