- CISO Series Newsletter
- Posts
- How Many Forms of ID Do I Need to Buy This Gift Card?
How Many Forms of ID Do I Need to Buy This Gift Card?
How Many Forms of ID Do I Need to Buy This Gift Card?
On this week's episode of CISO Series Podcast we ask what are the areas where we should focus on improving the security user experience for non-security people?
Cyber Security Headlines you need to know: L3Harris scuttled plans to buy NSO Group, Myanmar plans to roll out Chinese facial recognition tech, and researcher unlocks and starts Hondas remotely.
And please join us for this week's Super Cyber Friday "Hacking Compliance."
CISO Series Podcast
How Many Forms of ID Do I Need to Buy This Gift Card?
Andy Ellis, operating partner, YL Ventures and I welcome guest Ariel Weintrab, CISO, MassMutual to discuss:
What areas should we focus on improving the security user experience for non-security people?
Does it get easier at the top? What factors do you think result in the workload being tougher or easier for a CISO?
How can radical transparency help and where can it backfire?
What can we do to avoid poisoned systems and how can we tell if our systems have been poisoned?
Thanks to our podcast sponsor, PlexTrac
10-sec security tip...
"
The key to cyber resiliency is agility. The threat actors that we're up against are changing their techniques faster than we're changing our own controls. So, why are we so afraid to change the projects and implementations that we've already started? Our threat actors aren't afraid to change theirs." --Ariel Weintraub, CISO, MassMutual
Listen to full episode of
Want to jump to a great segment?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
on
CISO Series Podcast
on
Defense in Depth
Overheard on Defense in Depth...
"Day in and day out the riskiest piece today is the human element, and they’re using that against because, why, a few things. We’re moving fast. We’re in an environment right now where we don’t use checks and balances around data that we receive or information we receive to make an informed decision. Look, right or wrong, it’s just because we’re people. We do that. We make mistakes. The question is is how much assumable risk are we willing to make." -- John Ayers, vp of advanced detection and response office of the CTO, Optiv
Listen to full episode of
Cyber Security Headlines
Top headlines for Tuesday, July 12, 2022:
L3Harris scuttled plans to buy NSO Group
Myanmar plans to roll out Chinese facial recognition tech
Researchers unlocks and starts Hondas remotely
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, Edgescan
Super Cyber Fridays!
7 Explanations of Security Compliance in Just 90 Seconds
Do you find explaining compliance to others a tad confusing? Then you MUST watch this video of Dr. Heather Buker, global CTO, 6clicks deftly take on my challenging questions as to how to explain security compliance from multiple different viewpoints.
This is all a tease for the Super Cyber Friday event we’re having THIS Friday, “Hacking Compliance: An hour of critical thinking of how to simplify and scale complicated and often manual processes.”
REGISTER for the 7-15-22 event.
Joining me and Heather for this discussion will be Christina Shannon, global CISO, Catalina USA.
It all starts at 1 PM Eastern/10 AM Pacific. At the end of the hour [2 PM Eastern/11 AM Pacific] we’ll switch gears to our meetup where everyone will get a chance to chat face to face.
Thanks to our Super Cyber Friday sponsor, 6clicks