The Latest Unnecessary Stats on Marginal Security Threats

The Latest Unnecessary Stats on Marginal Security Threats

CISO | Security Vendor Relationship Series

This week's podcast episode

The Latest Unnecessary Stats on Marginal Security Threats

The Latest Unnecessary Stats on Marginal Security Threats

What you'll learn:

On this week's podcast, co-host Mike Johnson, CISO of Lyft, and our sponsored guest Yaniv Bar-Dayan, CEO, Vulcan Cyber, discuss the following:

  • Leaders must earn respect daily. Since anyone, regardless of title, can command respect, you can't rely on your title alone to do the job for you. Leaders must consistently build trust so that employees always look to them first for help. 

  • Don't lose trust as you grow. A fast-growing company can be susceptible to leaders losing visibility in employees and vice versa. To avoid falling into that trap, startups can encourage criticism and commit to transparency.

  • There's a reason we keep recommending you focus on the basics. Many of the most common security problems result from poor configurations. In addition, security vendors, in an effort to sell their product, often push potential buyers to focus on marginal security events.

  • Vulnerability management needs to be a company-wide issue. Vulnerability management is far from a solved problem. This dreaded task is often relegated to security where it should be managed as a normal business practice.

  • Enterprises need to learn how to work with startups. Large companies often work at a snail's pace, which does not work well for a startup that needs to prove its value quickly and constantly. Understanding there's plenty of value in security startups, some of the largest companies have divisions purposefully setup to shorten the time to proof of concepts (POCs).

Vulcan Cyber-Remediate vulnerabilities

Special thanks to this week's podcast sponsor, Vulcan Cyber

Vulcan Cyber is your automated vulnerability remediation solution. Put an end to manual-only patch management and reduce vulnerability risk with a cloud-based solution that bridges the vulnerability remediation gap. Automate and orchestrate the vulnerability remediation process with Vulcan Cyber.

Kelly Shortridge, Independent Analyst, on security team failures

Best Responses to "12 Specific Techniques to Build Relationships with CISOs"

Best Responses to "12 Specific Techniques to Build Relationships with CISOs"

This is my feedback to your feedback to my article

Each time I write an article, readers leave awesome comments. I pull out my favorite ones and make a video.

If you're trying to improve your relations with CISOs or heck any security professional,

.

LIKE THESE MEMES?

We just started publishing quotes from podcast guests.Take a look at the one above and the two below. We've started distributing these snackable security tidbits all over social media. And guess what, you could sponsor them. We have a version of the memes that includes your company branding.Interested? Just connect with me on LinkedIn or REPLY to this email.

Mike Johnson, CISO of Lyft, on security enabling the business

Best moments from "We Turn Our Backs on Cybersecurity Rock Stars"

Best moments from "We Turn Our Backs on Cybersecurity Rock Stars"

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, 

: We don't need InfoSec rockstars, what it takes to enable the business, and who's to blame when a security program fails.

Kelly Shortridge, Independent Analyst, on InfoSec rock stars

SUBSCRIBE TO THE PODCAST

Got a podcast catcher? Search for "CISO" and chances are you'll find the CISO/Security Vendor Relationship Podcast. If it doesn't come up, go ahead and click on any of these links to subscribe to the feed.

If you're already a subscriber, THANK YOU! If you like the show, please tell all your friends on social media and write a review on iTunes.