BSW #152 | SC Media
Application isolation, Training

BSW #152

November 19, 2019

 

 

CISOs left in compromising position as organisations tout cyber robustness, Why Your Organization Needs an Innovation Ecosystem, How businesses can accelerate innovation, The Highest Performing Teams Have These 4 Mindsets, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

The Highest Performing Teams Have These 4 Mindsets

  1. 71% said that their organization uses their security posture as a selling point, despite their lack of confidence in the security stack.
  2. 34% percent of CISOs said that they were only somewhat or slightly confident their organization’s final choice of security solutions.
  3. Only 17% of those questioned said that the array of technology making up their security stack was completely effective.
  • Why Your Organization Needs an Innovation Ecosystem – The Bosch Accelerator Program provides a structured way for internal innovation teams to systematically validate the viability of their business ideas. Here’s how it works:
    • Leaders and innovation managers select cohorts of 25-30 teams from all over the world that work together for 6-12 months.
    • Teams receive an initial funding of approximately €120,000 and get three months to test whether their business-model ideas could scale.
    • Depending on the results, teams can obtain an additional budget of €300,000 or more.
  • How businesses can accelerate innovation – To compete in the digital age, businesses will need to work quicker, partner where appropriate and upskill staff.
  • How To Get More Out Of Your Team
  • The Highest Performing Teams Have These 4 Mindsets – High performance teams are defined by four key mindsets:
  1. Teams Need Clarity Above All Else
  2. Teams Embrace Conflict in Order to Grow
  3. Teams Thrive on Trust
  4. High Performance Teams Lead Themselves

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

Scott Petry is the CEO of Authentic8. Scott Petry has been using the cloud to disrupt the information security market for nearly 20 years. He founded Postini in 1999, which pioneered the cloud-delivered service model for email security and content compliance. After Postini was acquired by Google, Scott remained as Director of Product Management for Google Enterprise. In 2010, he co-founded Authentic8, a secure virtual browser solution designed to address the inherent lack of security in the protocols the world uses to access the web. He graduated with a B.S. from San Diego State University.

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor’s Page

Challenges in the Browser & Securing Web Sessions

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

Scott Petry

Scott Petry – CEO

Announcements

  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
prestitial ad