
All Episodes
Episodes
Mission-Centric Risk Metrics
Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I'll discuss a framework you can use.
1. Identify the system's environment (production,...
View Episode
Expanding Cyber Risk Beyond IT
Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banking divisions may also be in charge of...
View Episode
Three Cybersecurity Checkups
Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organization, I suggest the following three...
View Episode
Cybersecurity - A Core Business Risk
Do you believe these are business challenges?UpskillingLow morale or quiet quittingHiring and talent retentionKeeping up with technology and toolsIf so, why aren’t you considering cybersecurity as a core business...
View Episode
A Worthy Mention - Antivirus Software
Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage;...
View Episode
Greater than Cybersecurity
Greater than CybersecurityWhen we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories with emotions and ideas attached, one...
View Episode
Protective Techology
Protective TechnologyThe last item I want to mention under the Protect function that supports the attack surface reduction and limits the cyber events' impact on your systems is “protective technologies.” Remember,...
View Episode
Information Protection - Processes & Procedures
Ideally and preferably, your cybersecurity program should follow established policies, standards, and procedures. These documents will govern all organization members, including staff, vendors, volunteers, and anyone...
View Episode
Protect - Data Security
Data SecurityThe third of the six critical cybersecurity categories I presented previously is “data security.” An organization's most valuable asset is data; hackers seek data sources to steal from businesses,...
View Episode
Protect - Awareness and Training
Securing and protecting your organization also takes a village to make happen, so cybersecurity awareness and training become very important; there’s so much technology can do to protect against phishing and its...
View Episode
Education
The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for work – to help them get better...
View Episode
Addressing the Highest Risks Podcast
Addressing the Highest RisksAs we conclude the risk assessment and governance process, the last part will deal with the organization's highest risks, not the highest vulnerability, but rather the highest risks. This...
View Episode