This week, In the Leadership and Communications section, What is the hidden cost of maintaining legacy systems?, 10 Leadership Habits of Highly Effective Leaders, 5 Key Ingredients to Finding Satisfaction and Fulfillment in Your Work, and more!
Security Weekly is more than happy to announce that we will be at InfoSec World 2021 IN PERSON October 25th-27th, 2021! This year, our annual partnership with InfoSec World is extra special, as we are both business units under the CyberRisk Alliance brand! What does that mean for Security Weekly listeners & InfoSec World attendees? You will get to see and hear from many of the Security Weekly team at the event AND you will save 20% off on your world pass! Visit https://securityweekly.com/isw2021 to register using our discount code!
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
One of the main factors when deciding whether to keep or replace legacy systems is determining the cost. Here we dive into five of the hidden costs CIOs should be aware of today, icluding:
2. Environmental costs
3. Staff costs
4. Technical debt
5. Opportunity costs
With engineer turnover and a growing number of languages and frameworks, organizations can end up with a soaring IT backlog. The recipe for CIOs guiding their companies through growing IT complexity is to assess the backlog and focus on what improvements can most readily impact the business.
You can’t lead without mastering these 10 habits:
1- Define Your Vision
2- Communicate Clearly
3- Build Your Team
4- Deliver Results
5- Document Every Process
6 - Run Efficient Meetings
7 - Create a Sense of Urgency
8 - Delegate
9 - Create Healthy Culture
10- Solve Problems
A crisis communications team works best when all members are fully aware of their responsibilities. Here are some tips on building a highly effective response team:
1. Assign the right roles
2. Delegate based on skill set
3. Action plans for smaller teams
Knowing the “who”, “what”, “when”, “why”, and “how” of your work.
#1 —[Mindset] Know Who You’re Working For
#2 — [Direction] Know What You Want From Your Work
#3 — [Balance] Know When to Work and When Not to Work
#4— [Meaning] Know Why You Work
#5 — [Discipline] Know How to Work
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security.
Attackers pursue the shortest path to achieve their goals in your app. With a tri-layered security architecture, you can force hackers to crawl through a triathlon in your app. What’s in the three layers, to detect attacks sooner, slow attackers down, and stop them fast? Let’s take a journey across the three layers and discuss how to gain control o...
In the rapidly evolving landscape of application security, 2023 brought significant changes with the rise of generative AI tools and an increase in automated threats. In this discussion, Karl Triebes takes a deep dive into the major trends of the past year, examining their impact on the industry and shedding light on what security professionals can...