- CISO Series Newsletter
- Posts
- Why CISOs Avoid the Dreaded “Request a Demo” Button
Why CISOs Avoid the Dreaded “Request a Demo” Button
Why CISOs Avoid the Dreaded “Request a Demo” Button
Welcome to this week's newsletter!
On this week's episode of CISO Series Podcast we ask why vendors fail to get engagement on their product demo videos, sometimes seemingly through self-sabotage.
Cyber Security Headlines you need to know include a scaling back on DOD cyber authority by the White House, Crypto losses up almost 700% in 2022, and a Cadbury easter egg scam.
On this week's Super Cyber Friday we think about risk reduction and how to use simulated attacks can help.
CISO Series Podcast
Why CISOs Avoid the Dreaded “Request a Demo” Button
Andy Ellis, operating partner, YL Ventures and I welcome guest/sponsored guest Jim Routh, former CISO for MassMutual and CVS/Aetna, to discuss:
Why do vendors put the product demo videos behind gated walls?
Tips for improving cybersecurity awareness within a large organization.
The annoying pains of the vendor ecosystem.
What are some really bad cybersecurity practices that need to be corrected right away?
.
Thanks to our podcast sponsor, Buchanan Technologies
Biggest mistake I ever made in security...
"
The biggest mistake in security was actually following and meeting stakeholder expectations. Specifically the board and the senior leadership team. The natural thing for a CISO to do is be a subject matter expert and say, 'These are the top risks. We have to manage the top risks. We have to do these things.' That causes the board or the senior leaders to default to what I’m presenting. What I should be doing is facilitating. Facilitators have to demonstrate neutrality to get to consensus. Consensus has resiliency all over it. If you don’t have consensus, your decisions fragment. Biggest mistake I ever made as a CISO, and nobody ever told me about this." --Jim Routh, former CISO for MassMutual and CVS/Aetna
Listen to full episode of
Want to jump to a great segment?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
Overheard on Defense in Depth
"The idea was I can prevent exploitation of a known defect by keeping an eye on what’s happening on the system. Now they want to call it virtual patching but to me it’s not virtual patching. I mean, the term, I understand it’s used. It’s used the same way as Attack Surface Managementand a lot of others. So, it’s a great concept, it’s been around for quite some time." --Ody Lupescu, CISO, Ethos Life
Listen to full episode of
Cyber Security Headlines
Top headlines for Tuesday, April 5, 2022:
Cadbury easter egg scam
White House may scale back DOD cyber authority
Crypto losses up almost 700% in 2022
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
tomorrow and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, Code42
Super Cyber Fridays!
6 Explanations of Risk Reduction in Just 90 Seconds
Here I am with Guy Bejerano, CEO, SafeBreach as he deftly explains risk reduction from my off-the-wall scenarios. This is just a taste of the savvy responses you’ll get from him and our other guest, Peter Liebert, CISO, LiveOmic
Why not join us this Friday, April 8th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Risk Reduction: An hour of critical thinking about actions we should take to lower risk.”
Thanks to our Super Cyber Friday sponsor, SafeBreach