“Bad” Security Practices That Really Aren’t All that Bad

“Bad” Security Practices That Really Aren’t All that Bad

CISO Series
  • On this week's episode of CISO Series Podcast we ask what are some things that get a bad rap, but are actually quite secure?

  • Cyber Security Headlines you need to know include Thai activists hit with NSO Pegasus, TikTok CSO steps down, and Albania shuts down government sites after cyberattack.

  • And please join us for this week's Super Cyber Friday "Hacking Third-Party Integrations."

CISO Series Podcast

“Bad” Security Practices That Really Aren’t All that Bad

“Bad” Security Practices That Really Aren’t All that Bad

Mike Johnson and I welcome guest Carla Sweeney, vp information security, Red Ventures to discuss:

  • Is a CISO really an architect of choices, for themselves and the other business leaders?

  • Why and how can controls impose friction or drag on business velocity?

  • What are the types of questions you ask when you're referencing a resume and what are some examples of really impressive responses?

  • What are some things that get a bad rap, but are actually quite secure?

Thanks to our podcast sponsor, Protegrity

Protegrity

What I love about cyber security...

"There is never, ever a dull moment. Even when you might love a dull moment, there is never a dull moment." --Carla Sweeney, vp information security, Red Ventures

Listen to full episode of

Eager to listen to just "What's Worse?!"

We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.

Check out:

 on

CISO Series Podcast

on

Defense in Depth

Overheard on Defense in Depth 

"It’s usually you as the candidate need to be clear about your expectations. Because the market is so hot for security leaders right now, it can swing wildly. Then again talking to some of my friends that do recruiting for this space, often an organization has no idea what the market rate for a senior executive, especially for a CISO. So, a lot of times they’ll have a big range, and you need to say where you are in that range." -- Geoff Belknap, CISO, LinkedIn

Listen to full episode of

Cyber Security Headlines 

Top headlines for Tuesday, July 19, 2022:

  • Thai activists hit with NSO Pegasus

  • TikTok CSO steps down

  • Albania shuts down government sites after cyberattack

to this episode.

or subscribe to the daily newsletter.

Join the LIVE "Week In Review" for

Cyber Security Headlines

this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering

.

or subscribe to the daily newsletter.

Thanks to our Cyber Security Headlines sponsor, 6clicks

6clicks

Super Cyber Fridays!

Seven Explanations for the Need to Secure Third-Party Integrations

Hacking Third-Party Integrations

It’s hard to truly explain the importance third-party applications have on our security. But, Alon Jackson, co-founder and CEO, Astrix Security does it deftly. In fact, I threw at him lots of bizarre ways to explain it and he handled all of them. Securing third-party integrations is not easy.

This is though but a tease for this Friday’s, July 22nd, 2022, Super Cyber Friday event where we’ll be discussing “Hacking Third-Party Integrations: An hour of critical thinking about securing apps that talk to other apps.”

The whole event starts at 1 PM ET/10 AM PT.

Joining me and Alon will be Olivia Rose, CISO, vp of IT and security, Amplitude.

Thanks to our Super Cyber Friday sponsor, Astrix Security

Astrix Security