Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Security and Compliance WeeklySubscribe
Careers, Leadership, Endpoint Security, Endpoint Security

SCW #43

September 15, 2020
Section 0

David asserts that, from a consumer data and SMB perspective, we’ve already lost the Cybersecurity War on 2 major fronts. 1) Cybercriminals already have our unalterable PII, yet we’re still driving regulations and developing tools to protect it. 2) SMBs are the hardest hit / hardest affected by cybercriminality, yet cybersecurity service providers largely ignore this market. Visit https://www.securityweekly.com/scw for all the latest episodes!

Full Episode Show Notes

How We Lost the Cybersecurity War (and What Happens Next) – Part 1

Governing Goliath YouTube Channel: https://www.youtube.com/channel/UC74_1yQhL6lFnnhOR5uXGGg Jot & Tiddle Comics: https://jotandtiddle.com

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

John Snyder

John Snyder – CEO

Josh Marpet

Josh Marpet – COO

Scott Lyons

Scott Lyons – CEO

Guests

David King

David King – Founding Member / Owner

Announcements

  • BSides Boston is back in action for their 10 year anniversary! The conference will be held on Saturday, September 26th & tickets are only $10! You can get yours at https://bsidesbos.org! Some of the Security Weekly team will be in our own channel on the BSides Boston Discord server answering questions and possibly doing some contests!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

http://traffic.libsyn.com/sw-all/SCW_43_-_David_King_Governing_Goliath_Pt1-0_converted.mp3
Section 1

David asserts that, from a consumer data and SMB perspective, we’ve already lost the Cybersecurity War on 2 major fronts. 1) Cybercriminals already have our unalterable PII, yet we’re still driving regulations and developing tools to protect it. 2) SMBs are the hardest hit / hardest affected by cybercriminality, yet cybersecurity service providers largely ignore this market. Visit https://www.securityweekly.com/scw for all the latest episodes!

Full Episode Show Notes

How We Lost the Cybersecurity War (and What Happens Next) – Part 2

Governing Goliath YouTube Channel: https://www.youtube.com/channel/UC74_1yQhL6lFnnhOR5uXGGg Jot & Tiddle Comics: https://jotandtiddle.com

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

John Snyder

John Snyder – CEO

Josh Marpet

Josh Marpet – COO

Scott Lyons

Scott Lyons – CEO

Guests

David King

David King – Founding Member / Owner

Announcements

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting https://securityweekly.com/subscribe and clicking the button to join the list!

  • Security Weekly is ramping up our webcast/technical training schedule for the rest of 2020! In September you can Find out Why Traditional Data Security Can’t Be Zero Trust, and Learn how to reduce the blast radius of your cloud infrastructure. Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

http://traffic.libsyn.com/sw-all/SCW_43-_David_King_Governing_Goliath_Pt2-0_converted.mp3

Related

Supply chain
What happens when ‘protestware’ sabotages open source in response to current events?

Joe UchillMarch 17, 2022

New software supply chain concerns emerged in the open-source community when a popular Javascript library began to delete all files on systems in Belarus and Russia as a protest to the war in Ukraine.

Supply chain
Add runtime to an SBOM for even stronger security

Sandeep Lahane March 10, 2022

A dynamic, runtime SBOM aims to protect the software supply chain.

Ransomware
Ransomware seen as No. 1 threat of financial organizations

Steve ZurierMarch 3, 2022

F-Secure study says financial companies are concerned about ransomware, supply chain attacks, cloud security adoption challenges, and risks from financial technologies such as SWIFT, Open Banking, and ATMs.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.