Skill Piper

CISO Stories Podcast (Audio)

Brought to you by, SC Media

https://skillpiper.com/share/1553494094

CISO Stories Podcast (Audio)

SC Media, and our sponsor Spirion, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.

...see more

    Business

Subscribe and Listen Anywhere

  • rss
  • spotify
  • apple
  • breez
  • youtube
  • castbox
  • overcast
  • podcastaddict
  • pocketcasts
  • podbean
  • playerfm
  • antennapod
  • podcastrepublic
  • anytimeplayer

Recent Episodes of CISO Stories Podcast (Audio)


That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174

That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174

As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting essential information. Good data governance processes are essential for effective security.

This segment is sponsored by Spirion. Visit https://cisostoriespodcast.com/spirion to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show...

Episode 14 May 2024 29m and 50s


Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173

Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173

Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and never will lead to better outcomes, yet this is all everyone is talking about. The trifecta of fear (we fear it, we don't understand it, we know we must have it) is used effectively by vendors to drive an ever-increasing wedge into IT...

Episode 7 May 2024 25m and 33s


Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172

Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172

The terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. Join us as we discuss why these gaps occur and what needs to be done to secure OT.

This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show...

Episode 30 April 2024 28m and 50s


The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171

For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar of traditional IT processes. For critical infrastructure, we are hooking up legacy systems to larger networks. Industrial control systems, that were never designed to be attached to the Internet, are now exposed to a wide array of new threats and attacks. Aside from those...

Episode 23 April 2024 28m and 5s


The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170

Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intellectual property theft: • Financial losses: Ransomware attacks can cripple operations and demand hefty payments. Manufacturing is a lucrative target for Ransomware. • There is little tolerance for downtime. • Difficulty in managing OT environments (different skillsets) • Increasing connectivity between IT and OT due to digital transformation Incidents such as the well documented Colonial Pipeline attack along with other manufacturing companies like D...

Episode 16 April 2024 30m and


Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169

The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either continue functioning or can recover quickly when faced with cybersecurity attack.

This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show...

Episode 9 April 2024 31m and 15s


Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168

Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168

Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability to be updated, and robustness (often, OT failures can endanger lives). More recently, as cyber warfare evolves, OT is one of two main attack vectors. This session will explore the threats, and ability to manage them, using war stories.

This segment is sponsored by Arctic Wolf. Visit https://www.ciso...

Episode 2 April 2024 32m and 30s


Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167

Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167

Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business ecosystem. We have seen the threat landscape change in the last few years. It has always been important to properly identify, categorize, and address risks created by our vendors and strategic partners, to now having to understand the entire supply chain, and how interruptions can affect your business. Even more recently, with the rise of Business Email...

Episode 26 March 2024 23m and


52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166

52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166

Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at every level (R&D, Design, Manufacturing, Distribution, Staging, Commissioning and Operating). This approach is guided by policies and regulations, continuously evolving to improve our maturity. On the Third-party Cyber posture level, Schneider Electric partners across the industry to raise cybersecurity maturity, with the World Economic Forum (WEF), ISA Global...

Episode 19 March 2024 30m and 13s


Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165

Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165

Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-political risk, environmental concerns to maintain business resiliency.

This segment is sponsored by VISO TRUST. Visit https://cisostoriespodcast.com/visotrust to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show Notes: https://cisostoriespodcast.com/csp-165

Episode 12 March 2024 30m and 49s

Skill Piper
HomeBlogAboutContactNewsletter

© 2024 Skill Piper. All rights reserved

Twitter