The CISO Stories Podcast

Subscribe

CSP #83 – The CEO Won’t Wear a Security Badge? Try This! – John Ceraolo

What do you do if the most senior person in your organization, the CEO, refuses to wear security badges- an essential control for identifying associates and restricting physical entry? Listen as John uses creativity to win the heart and mind of the CEO and embrace and become a strong advocate of the security awareness program!

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/08/CISOSTORIES_JohnCeraolo_ArticleV2.pdf

Ceraolo, J. 2019. Listening and Using Creativity in You Security Program In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 371-2. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald. This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them!

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #82 – Have we Forgotten About the Basics? – Benjamin Corll

Go to any security conference today and there is a plethora of new products to prevent, detect and respond to the current threat environment. But are we missing something? Is there a less expensive and more tactical way to approach security? Join Benjamin as we review what some are the key basics are that should be in place before investing in higher-end technology.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #81 – Using MindMaps to Strengthen Cybersecurity – Michael Wilcox

CISOs, security leaders and their teams must consume a large amount of information from many sources to remain effective. How does the CISO organize unstructured information? How does the CISO brainstorm? How does the CISO collaborate? Mind Mapping is a very effective tool to generate ideas quickly and was also used to create the CISO COMPASS book! Learn from a CISO who uses Mind Maps™ for just about everything!

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_MichaelWilcox_Article.pdf

Wilcox, M. 2019. Mind Maps™ Effective Method for Organizing Cybersecurity Information In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 80-81. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #80 – How to Talk With Your Lawyer – Mark Daryl Rasch

A Lawyer can be the CISOs best friend and advocate for cybersecurity investments. Are you frustrated with a lawyers answer of, “it depends?” Lawyers have a different thought process than many CISOs when apply the law. Join this session from a notable cybersecurity lawyer as to the differences in language and how to best take advantage of the legal expertise available to support the mission. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_MarkDRasch_Article.pdf Rasch, M. 2019. How to Talk to Your Lawyer In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 317-318. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald. Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Full episode and show notes

Segments

CSP #79 – Insider’s View of the CISO Search – Joyce Brocaglia

Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_Joyce_Brocaglia_Article.pdf

Brocaglia. 2019. An Insider’s View of the CISO Search In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 33-35. Fitzgerald, T. CRC Press, Boca Raton, Fl.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/*****

Companies clearly want to hire the best candidate for the CISO Role. Where best to learn, but from someone who has been successfully recruiting Security Leaders for over 35 years? Learn from the guidance Joyce provides to her clients when hiring for the CISO role. Joyce also discusses salaries, reporting relationships, and skills necessary today.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_Joyce_Brocaglia_Article.pdf

Brocaglia. 2019. An Insider’s View of the CISO Search In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 33-35. Fitzgerald, T. CRC Press, Boca Raton, Fl.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/*****

Companies clearly want to hire the best candidate for th

Full episode and show notes

Segments

CSP #78 – Solarwinds From the Inside: The Breach and the Aftermath – Tim Brown

The Solarwinds breach raised the visibility of Software supply chain risks, as many organizations employ third party software with potential access to sensitive information. Join the CISO of Solarwinds as he discusses what happened during the attack, the lessons learned, the mitigations employed after the attack, and excellent, transparent actions for organizations to manage software development and distribution processes.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #77 – Protecting Your Intellectual Property – Michael Boucher

As CISOs embark on implementing an Intellectual Property protection effort, they are often met with resistance, being challenged as to the necessity of the effort. Join Michael as he shares his experience in winning the support for his efforts to properly classify and secure the information and systems.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/07/CISOSTORIES_MichaelBoucher_Article.pdf

Boucher, M. 2019. Data Protection: Security Intellectual Property In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 371-2. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #76 – Achieving a Competitive Advantage Through Privacy By Design – Ann Cavoukian

Join the former Privacy Commissioner of Ontario, Canada and creator of PrivacyByDesign (PbD), translated into 40 languages and incorporated into General Data Protection Regulation (GDPR) and used by many organizations to proactively “bake-in” privacy into our systems. Every CISO needs to pay attention to and support the various country privacy laws.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/05/CISOSTORIES_AnnCavoukian_Article.pdf

Cavoukian, A. 2019. Lead with Privacy by Design for Competitive Advantage. In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 270-1. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #75 – Attracting Talent Using The Nice Framework – Greg Witte

As your organization increases the cybersecurity talent to protect and defend the information assets, how do you know what skills are needed? What tasks are to be performed and what knowledge is necessary to perform these functions? The NIST NICE Framework helps define the job and assist the CISO in hiring as well as measuring the capability along the career path.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/05/CISOSTORIES_GregWitte_Article.pdf

Witte, G. 2019. Using NICE Framework to Attract Talent In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pg. 422. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

CSP #74 – Where Should the CISO Report? Guess Again! – Stephen Fried

Where the CISO should report has been debated for many years, with the predominant view being “anywhere but the CIO”, while even in 2022, most CISOs are reporting to the CIO! Which reporting structure viewpoint is right? This podcast will examine the pros and cons of reporting to the CIO and other departments. Join Stephen as he shares his experience as a Former CISO for several large financial institutions, along with his current views.

To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/05/CISOSTORIES_StephenFried_Article.pdf

Fried, S. 2019. The Best Reporting Relationship for a CISO May Not Be What You Think! In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pgs. 174-5. Fitzgerald, T. CRC Press, Boca Raton, Fl. www.amazon.com/author/toddfitzgerald.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Full episode and show notes

Segments

prestitial ad