Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

CISO Series

CISO/Security Vendor Relationship Podcast

Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

Mike Johnson and I welcome guest, Ira Winkler, CISO, Skyline Technology Solutions, to discuss:

  • Best techniques for interviewing cybersecurity consultant candidates.

  • Fujifilm refused to pay ransomware demand, restored from backup. Be like Fujifilm.

  • What to do with people who ask for your password and signon – and those who comply.

  • The importance of securing inter-organization Slack and Teams channels.

Thanks to our podcast sponsor, Varonis

Thanks to our episode sponsor, Varonis

Overheard on CISO/Security Vendor Relationship Podcast 

“If you think about single sign-on products, where they say, ‘we do integration’ and then they charge you, so they can replicate that fee across multiple customers. I think it's just really bad practice.” - Andy Ellis, operating partner, YL Ventures

Listen to full episode of "

."

Cyber Security Headlines 

Top headlines for Tuesday, August 24, 2021:

  • Apple started scanning iCloud mail for CSAM in 2019

  • Facebook reportedly held back Q1 transparency report

  • Razer mouse has serious Windows security flaw

Listen to this episode. Subscribe to the podcast or subscribe to the daily newsletter.

Thanks to this week's headlines sponsor, Privacy.com

Thanks to this week's headlines sponsor, Privacy.com

Join us this Friday [08-27-21] for "Hacking User Adoption"

Join us this Friday [08-27-21] for "Hacking User Adoption"

Our discussion will be 

"Hacking User Adoption: An hour of critical thinking about improving acceptance and usage of new technology."

It all begins at 10 AM PT/1 PM ET on Friday, August 27, 2021 with guests Bojan Simic, CEO, HYPR, and Will Gregorian, head of security and IT operations, Rhino. We'll have fun conversation and games, plus at the end of the hour (11 AM PT/2 PM ET) we'll do our meetup (AKA "cybersecurity speed dating").

Thanks to our video chat sponsor, HYPR

Thanks to our video chat sponsor, HYPR

Overheard on Defense in Depth 

“[As a new CISO] what you really have is 48 hours to talk to your staff and figure out who you can trust and who you can't and, based on that, start making some decisions. If you can't trust your staff go for a pen test” - Steve Zalewski, co-host, Defense in Depth

Listen to full episode of "

."