- CISO Series Newsletter
- Posts
- What Does It Cost to Prove Security Is Working?
What Does It Cost to Prove Security Is Working?
What Does It Cost to Prove Security Is Working?

On this week's episode of CISO Series Podcast we look at how to prove the worth of a security program.
Cyber Security Headlines you need to know include: Windows downloads blocked in Russia and Chrome extensions can be used for fingerprinting.
And please join us for a very special episode of Super Cyber Friday (Tuesday Edition).
CISO Series Podcast
What Does It Cost to Prove Security Is Working?

Andy Ellis, operating partner, YL Ventures and I welcome guest John McClure, CISO, Sinclair Broadcast Group to discuss:
What’s your best indicator that your security program is actually improving?
We examine certifications and separate myth from reality for those trying to get into cybersecurity and also for more seasoned professionals.
What security flaw often gets overlooked?
How does one go about asking for a team building budget for a remote team?
Thanks to our podcast sponsor, Keyavi

What I love about cyber security...
"
Yeah, I think what I love most is really the challenge, how quickly the field is moving. Every day is a different challenge. It’s very different from some other fields where you’re really competing against yourself every day. With cyber, you’ve got somebody on the other side of the keyboard, sometimes halfway around the world, that you got to outthink and play an interesting game of chess with." --John McClure, CISO, Sinclair Broadcast Group
Listen to full episode of
Can't listen at the moment?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
on
CISO Series Podcast
on
Defense in Depth
Overheard on Defense in Depth
"We developed something we call our personal trust stance and have used that each year. We use it with the interns when they come in, we use it routinely throughout the year with our employees and reinforce – now’s a good time to take an inventory of your assets, your access, and the assurances you have in place for your personal stuff. Do you have MFA set up? Are you making sure you’re changing your passwords and that they’re long and unique and complicated? Are you putting controls in place so that there’s limitations on what transfers can be made from your financials? Making sure that people are thinking about that, this is how it applies personally, and it’s easier to then think about why that is also important in the office." -- Lisa Kubicki, trust and security, training and awareness director, DocuSign
Listen to full episode of
Cyber Security Headlines
Top headlines for Tuesday, June 21, 2022:
Windows downloads blocked in Russia
The importance of receipts
Chrome extensions can be used for fingerprinting
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, Optiv

Super Cyber Fridays!
Join us for a special episode of Super Cyber Friday (Tuesday Edition)...

Please join us for a very special
Super Cyber Friday (Tuesday edition)
on June 28th, 2022 during Living Security's "Breaking Security Awareness" virtual conference.
Our discussion will be
"Hacking the Boardroom: How CISOs and Security Program Owners can better approach and get more buy-in from the board"
.
It all begins at 1 PM ET/10 AM PT on Tuesday, June 28, 2022 during Living Security's
"Breaking Security Awareness"
virtual conference. Go to livingsecurity.com and click the top of the screen to join us.