- CISO Series Newsletter
- Posts
- Decommission Our Legacy Tech or Just Shut Down the Business?
Decommission Our Legacy Tech or Just Shut Down the Business?
Decommission Our Legacy Tech or Just Shut Down the Business?
On this week's episode of CISO Series Podcast we examine the widespread problem of legacy equipment and the impact it can have on organizations.
Cyber Security Headlines you need to know include Costa Rica declaring a state of emergency after Conti attacks, Nvidia cryptomining limiter defeated, and ransomware causes a college to close permanently.
On this week's Super Cyber Friday we examine security complexity and think about how to consolidate and simplify a security program.
CISO Series Podcast
Decommission Our Legacy Tech or Just Shut Down the Business?
Andy Ellis, operating partner, YL Ventures and I welcome guest TJ Mann, CISO, Children's Mercy Kansas City to discuss:
How legacy technology impedes business agility?
Are we doing anything better to deal with legacy technology?
Is there anything that can be done at the purchase point to understand how you'll sunset equipment and technology?
And we ask whether or not our industry is willing to take the time and effort to hire and train the talent they so desperately want and need.
Thanks to our podcast sponsor, CYREBRO
Best advice I ever got in security...
"
Your data is your most valuable asset. Be careful who you share with your data with, and what data points do you share. Because the likelihood is that those data points are being scraped to get into your accounts from an unauthorized access perspective. And if you haven’t turned on two-factor authentication on your accounts then you should do that immediately because the old practice of using security questions to which all the answers that you’re posting on social media sites about your friend’s birthday, or the first car you owned are being used to get into your accounts, which you should protect with MFA or two-factor authentication today. " --TJ Mann, CISO, Children's Mercy Kansas City
Listen to full episode of
Want to jump to a great segment?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
Overheard on Defense in Depth
"Everybody gets the concept. We’re going to get problems addressed earlier. We’re going to reduce rework. We’re going to reduce the load on the QA team, the security team, the production team. But mostly I think if you really talk to developers and you really talk to software people in general they’ll say “shift left” is really just doing it right the first time, the way we should have been doing it to start with. There’s a lot more about we have to look at the tooling. We have to look at the efficiency. Listening to some of your previous podcasts, there’s a great conversation on speed versus efficiency, versus effectiveness. And I think that has to come into play – that we have to build up this whole thing." -Mike Gorman, head of security and compliance, NetFoundry
Listen to full episode of
Cyber Security Headlines
Top headlines for Tuesday, May 10, 2022:
Costa Rica declares state of emergency after Conti attacks
Nvidia cryptomining limiter defeated
Ransomware causes college to close permanently
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, Datadog
Super Cyber Fridays!
8 Explanations of Complexity in Two Minutes
Hats off to David Richardson, vp, product, Lookout who deftly and quickly offers up multiple definitions of security complexity. It’s all a tease for this Friday’s, May 13th, 2022, Super Cyber Friday. Topic will be “Hacking Complexity: An hour of critical thinking about how to consolidate and simplify a security program.”
It all starts at 1 PM Eastern/10 AM Pacific. At the end of the hour [2 PM Eastern/11 AM Pacific] we’ll switch gears to our meetup where everyone will get a chance to chat face to face.
Joining David and me for this discussion will be Sonja Hammond, CISO at National Veterinary Associates.
Thanks to our Super Cyber Friday sponsor, Lookout