- CISO Series Newsletter
- Posts
- Best Techniques for Stealing Data
Best Techniques for Stealing Data
Best Techniques for Stealing Data
How Would I Go About Stealing Your Data?
At Security BsidesSF I asked attendees, “How would I go about stealing your data?” A handful said I couldn’t, which is probably true since I’m not a hacker, yet we were surrounded by security professionals and hackers who probably could pull off stealing personal data.For the rest of the video, subjects offered some real tips on stealing data. What I learned is that everyone, even wise security professionals, are susceptible to getting their data stolen. It’s all about how badly do you want it.
Special thanks to this Endgame for sponsoring this video.
Endgame makes military-grade protection as easy as anti-virus. Their converged endpoint security platform is transforming security programs – their people, processes and technology – with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before damage and loss. To learn more visit www.endgame.com.
This week's episode of Defense in Depth
CISO Burnout
On this episode of Defense in Depth:
Co-host Allan Alford, CISO of Mitel, and our guest Gary Hayslip, CISO of Webroot, discuss the following:
You have to come to an acceptance that a security program that's at 90 percent is good enough.
Accept that you will never reach the end of the tunnel. You'll never have a perfect defense.
The CISO's role is that of a change agent and depending on the depth of your relationship, you may get push back.
Don't underestimate the impact you're trying to make on the business culture. Organizations can only change in increments. Stressing that will generate stress in you, the security professional.
Since security touches every department and you need to engage with every department, you will deal with a lot of personalities.
In addition to dealing with all the departments, you won't have authority over them, but you will be perceived as accountable for their security issues. The business needs to own security and its relevant risk.
Don't fall into impostor syndrome where you chronically feel you're doing a bad job.
Accept small wins. Break up huge projects into smaller chunks and celebrate those wins.
Special thanks to this week's Defense in Depth podcast sponsor, Praetorian.
As a professional services company, Praetorian helps enterprise customers solve complex cybersecurity problems. We are the security experts.
SUBSCRIBE TO BOTH PODCASTS
Go ahead and click on any of these links to subscribe to the podcast feed of your favorite podcast catcher.
If you're already a subscriber, THANK YOU! If you like either or both shows, please tell all your friends on social media and write a review on iTunes.