2023 AT&T Cybersecurity Insights Report: Edge Ecosystem – Theresa Lanowitz, Steve Winterfeld – BSW #320
Organizations still struggle with DDoS, ransomware, and personal information exfiltration. In order the prevent these attacks, we first need to understand the ‘types’ of DDoS and emerging threat techniques used by the adversary. In this interview, we explore these attacks in the context of edge computing. As edge computing use cases evolve, organizations need to understand the intersection of edge computing, networking, and cybersecurity. We discuss the risks associated with edge computing, the controls that can mitigate these risks, and how to plan for implementation, including security budgeting.
Segment Resources: https://www.akamai.com/blog/security/defeating-triple-extortion-ransomware
This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attcybersecurity to learn more about them!
In the leadership and communications section, Board Members Struggling to Understand Cyber Risks, Cybersecurity Goals Conflict With Business Aims, Navigating Change: The Essence of Agile Leadership, and more!
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Full Audio
Segments
1. 2023 AT&T Cybersecurity Insights Report: Edge Ecosystem – Theresa Lanowitz, Steve Winterfeld – BSW #320
Organizations still struggle with DDoS, ransomware, and personal information exfiltration. In order the prevent these attacks, we first need to understand the ‘types’ of DDoS and emerging threat techniques used by the adversary. In this interview, we explore these attacks in the context of edge computing. As edge computing use cases evolve, organizations need to understand the intersection of edge computing, networking, and cybersecurity. We discuss the risks associated with edge computing, the controls that can mitigate these risks, and how to plan for implementation, including security budgeting.
Segment Resources: https://www.akamai.com/blog/security/defeating-triple-extortion-ransomware
This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attcybersecurity to learn more about them!
Announcements
Join us at SC Media’s Investing in IAM eSummit September 19th through 20th. This two-day virtual event will provide insights from industry experts with a deep dive into identity and access management. Register now for this free event where you will gain cybersecurity knowledge and receive 6.5 CPE credits just for attending!
Register today: securityweekly.com/IAM
Guests

Theresa Lanowitz is a proven global influencer on the trends and emerging technology poised to help today’s enterprises succeed. Formerly an industry analyst at Gartner, Theresa was at the forefront of establishing the firm’s application quality ecosystem and was a champion of application security technology. She also created and launched the Gartner Application & Innovation Solutions Summit, a premier conference for application and software engineers. Her professional career began as a software developer at McDonnell Douglas, where she worked on the C-17 military transport plane and held a US Department of Defense Top Secret security clearance. She also held positions as a product manager for Borland International Software—where she launched the iconic Java integrated development environment, JBuilder—and, Sun Microsystems—where she led strategic marketing for the Jini project – a precursor to IoT (Internet of Things). Throughout her career, Theresa has been a trusted advisor to some of the most innovative and influential companies and executives in the world.

Steve Winterfeld is Akamai’s Advisory CISO. He has strong background in building operational security programs that are compliant with industry regulations. Before joining the team, he served as CISO for Nordstrom Bank, Managing Director of Incident Response and Threat Intelligence at Charles Schwab and Senior Technical Director Cybersecurity & Group CTO at Northrop Grumman. Steve focuses on collaborating with Akamai’s customers to make sure they are successful in defending themselves and their customers. He also helps determine where Akamai should be focusing its security platform’s capabilities. Steve has published a book on Cyber Warfare and holds CISSP, ITIL and PMP certifications.
Hosts

2. Board Members Struggling while Cybersecurity Goals Conflict with Business – BSW #320
In the leadership and communications section, Board Members Struggling to Understand Cyber Risks, Cybersecurity Goals Conflict With Business Aims, Navigating Change: The Essence of Agile Leadership, and more!
Announcements
Security Weekly listeners: InfoSec World 2023 is just weeks away! Have you registered to join over 2,500 cybersecurity experts on September 25-27 in Lake Buena Vista, FL? InfoSec World is your gateway to a world of knowledge and growth. Don't miss the chance to enhance your career, connect with industry leaders, and make an impact on the rapidly evolving landscape.
Secure your seat using code ISW23-SECWEEK20 to save 20% off your registration. Register today: securityweekly.com/infosecworld2023
Hosts

- 1. Board Members Struggling to Understand Cyber Risks
Board members frequently struggle to understand cyber risks, putting businesses at higher risk of attacks.
- 2. Cybersecurity Goals Conflict With Business Aims
Cybersecurity is often out of sync with business goals, according to a study conducted by Forrester Consulting, which found 97% of organizations face challenges in trying to align cybersecurity priorities with business outcomes.
More than nine in 10 respondents (93%) said their organizations struggle with measuring their cybersecurity performance in relation to business outcomes.
- 3. How CIOs can build cybersecurity teamwork across leadership
Cross-departmental relationships are key to long-term business success. Discover why CIOs must focus on teamwork with these three C-suite roles for highly effective cybersecurity.
- 4. Navigating Change: The Essence of Agile Leadership
In today’s rapidly evolving business landscape, traditional leadership models are proving insufficient to steer organizations through the complexities of the digital age. Agile leadership, a dynamic and adaptive approach, has emerged as a powerful framework to guide teams and organizations towards success in this fast-paced environment. This article delves into the key principles and practices of Agile leadership, shedding light on its transformative potential for modern enterprises.
- 5. What Makes an “Authentic” Leader?
How do you define authenticity, as a leader? If you associate it with what feels comfortable, you may be holding yourself back.
- 6. Leading by Example: Boosting Productivity from the Top Down
Every organization dreams of a team that’s efficient, dedicated, and highly productive. However, creating such an environment is often a reflection of the top echelon’s attitudes and behaviors. Here’s how leaders can set the stage for a productivity surge.
