Careers, Leadership

Sharpen Our Tools – BSW #249

This week, we welcome Ann Marie van den Hurk, Small Business Cybersecurity Champion at Mind The Gap Cyber, to talk about Effective Communications During & After a Cyber Attack!

In the Leadership and Communications section, Cybersecurity Policy Creation: Priority One, 5 steps to run a successful cybersecurity champions program, The war for cloud and cybersecurity talent is on! , and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

View Show Index

Full Audio

Segments

1. Effective Communications During & After a Cyber Attack – Ann Marie van den Hurk – BSW #249

A cyber attack is a catastrophic event for any organization. Therefore, effective cyber crisis communication is crucial but often overlooked and an internal concern. In this conversation, we will talk about critical communications and why it is essential to recover quickly and with their reputation intact.

Announcements

  • Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

Guest

Ann Marie van den Hurk
Ann Marie van den Hurk
Small Business Cybersecurity Champion at Mind The Gap Cyber

Ann Marie van den Hurk, APR, MSM is founder of Mind The Gap Cyber. She brings twenty-five years of management experience, having led IT, operations, and communications departments. In addition, she has worked with executives in diverse sectors in crises, guiding them to resolutions in her decade of work as a business consultant.

Ann Marie was a nationally distributed business columnist for Lexington (KY) Herald-Leader and the Tribune Content Agency. Her award-winning column focused on public relations, crisis, marketing, cyber security, and social media for businesses by bringing new media to her readers before it becomes mainstream and breaks it down into digestible terms. In 2013, Ann Marie published her first book, Social Media Crisis Communications: Preparing for, Preventing, and Surviving a Public Relations #fail through Que.

Born in the Republic of Ireland, raised and educated in the United States, and lived in Europe, Ann Marie blends American and European sensibilities into her practice allowing for a unique global perceptive. She holds an M.S. in Justice and Homeland Security with a concentration in Cybersecurity and Intelligence from Salve Regina University. In addition, Ann Marie has a B.A. in International Relations from the University of Delaware. She is an active member of PRSA, InfraGard, AFCEA International, SAE International and ICS4ICS.

Based in Newport, Rhode Island, in New England, Ann Marie partners with clients throughout the United States and the world.

Hosts

Matt Alderman
Matt Alderman
Executive Director at CyberRisk Alliance
Ben Carr
Ben Carr
CISO at Cradlepoint
Bill Brenner
Bill Brenner
VP, Content Strategy at CyberRisk Alliance
Jason Albuquerque
Jason Albuquerque
Chief Operating Officer at Envision Technologies

2. Cybersecurity Policy Creation, Champions Program, & the War for Talent – BSW #249

In the leadership and communications section, Cybersecurity Policy Creation: Priority One, 5 steps to run a successful cybersecurity champions program, The war for cloud and cybersecurity talent is on! , and more!

Announcements

  • Join us June 29th for a webcast with Tyler Robinson and Beau Bullock to learn how to pivot into the world of Crypto security. Visit https://securityweekly.com/webcasts to register with only your name and email! Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.

  • CRA's Business Intelligence Unit has launched its next survey on Zero Trust! What are Your Barriers to Zero Trust Implementation? Take our survey and enter to win a $500 Tango card by visiting https://securityweekly.com/zerotrust. Report results will be released at our upcoming Zero Trust E-Summit in March!

Hosts

Matt Alderman
Matt Alderman
Executive Director at CyberRisk Alliance
  1. 1. The Purpose of Leadership in a changing world - In Remi Pearson’s book Disruptive Leadership, she clearly outlines Four Dimensions of Leadership which considers the following critical areas regardless of the business your part of the trademark TCI model Critical Alignment Model: 1. Environment 2. Structure 3. Implementation 4. People
  2. 2. Cybersecurity Policy Creation: Priority One - Insider threat incidences caused by human error cost businesses an average of $3.8 million each year. Therefore, improved cybersecurity rules enable employees to better understand how to keep data and apps secure. Here are some security policy examples to consider when you construct a mature security program. 1. Acceptable Use 2. Policy for Dealing with Data Breaches 3. Prepare a Disaster Recovery Strategy 4. Plan for Business Continuity 5. Remote Access 6. Policy Regarding Access Restriction
  3. 3. Cybersecurity: Many managers just don’t want to understand the risks - Senior managers are putting businesses at risk of cyberattacks and data breaches because they don't understand cybersecurity issues and, in some cases, don't even want to learn about the dangers.
  4. 4. 5 steps to run a successful cybersecurity champions program - 5 steps to a successful cybersecurity champions program: 1. Plan your security champions program thoroughly 2. Secure leadership buy-in to support your program 3. Prioritize communication skills, diversity when recruiting security champions 4. Balance commitment requirements, make training relevant and suitable 5. Incentivize your security champions program, make it fun and mutually beneficial
  5. 5. Seven Communication Tips for New Leaders To Get Good Results Faster - If you are new at leading a team, here are seven tips that might help you: 1. Establish a connection with your team 2. Explain your vision and goals to the team 3. Show that you care about your team’s development 4. Be clear and concise 5. Celebrate success 6. Be open to feedback 7. Encourage questions
  6. 6. Giving Negative Feedback Can Make Empathetic Leaders Less Effective - We all know how it feels to receive negative feedback — but how does giving negative feedback impact the person delivering it? The authors conducted a series of studies with nearly 500 leaders and found that the impact of delivering negative feedback depended on how empathetic the leaders were. They found that high-empathy leaders became less effective at core leadership tasks after giving negative feedback (especially if the recipient had a strong negative reaction), while low-empathy leaders actually became more effective. Based on these findings, the authors offer several strategies for organizations to better support both high- and low-empathy leaders, including encouraging more-empathetic leaders to take breaks after giving negative feedback and training less-empathetic leaders on techniques for delivering feedback more compassionately.
  7. 7. The war for cloud and cybersecurity talent is on! – MedCity News - The oldest news in the world still seems to be that we have a dearth of cybersecurity talent – now for the fifth consecutive year. In its latest annual report, The Life and Times of Cybersecurity Professionals 2021, ISSA reveals several reasons for the shortage.
Ben Carr
Ben Carr
CISO at Cradlepoint
Bill Brenner
Bill Brenner
VP, Content Strategy at CyberRisk Alliance
Jason Albuquerque
Jason Albuquerque
Chief Operating Officer at Envision Technologies
prestitial ad