[08-09-22]--When Good Decisions Go Bad

When Good Decisions Go Bad

CISO Series
  • On this week's episode of CISO Series Podcast we examine what happens when good decisions go bad.

  • Cyber Security Headlines you need to know include the Treasury sanctions Tornado Cash mixer, Slack leaked hashed passwords, and a Zero day used in Twitter hack.

  • And join us in a few weeks for our next Super Cyber Friday "Hacking Cyber Risk Management."

CISO Series Podcast

When Good Decisions Go Bad

When Good Decisions Go Bad

Andy Ellis, operating partner, YL Ventures and I welcome guest (and winner of Season 1 of Capture The CISO) Aviv Grafi, founder and CTO, Votiro to discuss:

  • We welcome the winner of Capture The CISO How did they prepare in terms of making the demo and for appearing on the show? And what advice would they give for contestants in season 2?

  • What do employers look for or ask in an interview that would lead them to hire and promote someone into a CISO role in their company?

  • How can cybersecurity professionals  improve their  decision making over time?

Best advice for a CISO

"The biggest mistake I ever made in security, that was a while ago when I just built one of the first systems, and I said, "You know what? I will set up those permissions later. For the meanwhile, let's have it open for all." --Aviv Grafi, founder and CTO, Votiro

Listen to full episode of

Want to skim a past episode?

We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.

Check out:

 on

CISO Series Podcast

on

Defense in Depth

Overheard on Defense in Depth 

"The whole point of all the cyber security to date has been data cannot protect itself, so you have to put all these layers around it, use controls around it, and everything else....The question is not what we have to do, it’s how it can be done. The one common denominator, the one center point that is agnostic to all platforms, all control types, all applications is the data layer itself. So, we can make the data that smart that it knows who it’s allowed to work for, when it’s allowed to work for them, on what devices, with what applications. When the data is that center point and you make it that smart, now everything becomes a compact construct. And this goes wherever the data goes. So, you have that kind of capability, and you have the how really summed up." --Elliot Lewis, CEO, Keyavi

Listen to full episode of

Cyber Security Headlines 

Top headlines for Tuesday, August 9, 2022:

  • Treasury sanctions Tornado Cash mixer

  • Slack leaked hashed passwords

  • Zero day used in Twitter hack

to this episode.

or subscribe to the daily newsletter.

Join the LIVE "Week In Review" for

Cyber Security Headlines

this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering

.

or subscribe to the daily newsletter.

Thanks to our Cyber Security Headlines sponsor, Edgescan

Edgescan

Super Cyber Fridays!

Hacking Cyber Risk Management

Hacking Cyber Risk Management

Join us in a few weeks for our next "Super Cyber Friday."

Our topic of discussion will be

“Hacking Cyber Risk Management: An hour of rethinking how we normally manage cyber risk, and how we can do it better.”

It all begins at 1 PM ET/10 AM PT on Friday, September 9, 2022 with guests Saket Modi, CEO, Safe Security, and a special guest. We'll have fun conversation and games, plus at the end of the hour (11 AM PT/2 PM ET) we'll do our meetup.

Thanks to our Super Cyber Friday sponsor, Safe Security

Safe Security