CISO Tradecraft®

#198 - Securing the Business Processes


Listen Later

G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes.  Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.

7 critical business processes common to most organizations.

  1. Book 
  • Order 
  • Bill 
  • Pay
  • Ship 
  • Close
  • Communicate 
  • Transcripts

    https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h

    Chapters

    • 00:00 Introduction to Securing the Business
  • 00:12 Begin Podcast
  • 01:08 Understanding Critical Business Processes
  • 02:23 Identifying and Prioritizing Business Functions
  • 03:00 Real-World Example: Restaurant Booking System
  • 04:57 Decision Making in Crisis Situations
  • 10:38 Mapping Confidentiality, Integrity, and Availability
  • 19:42 Conclusion and Final Thoughts
  • ...more
    View all episodesView all episodes
    Download on the App Store

    CISO Tradecraft®By CISO Tradecraft®

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    48 ratings


    More shows like CISO Tradecraft®

    View all
    Risky Business by Patrick Gray

    Risky Business

    362 Listeners

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

    SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

    634 Listeners

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

    Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

    368 Listeners

    Hacked by Hacked

    Hacked

    176 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,011 Listeners

    Smashing Security by Graham Cluley & Carole Theriault

    Smashing Security

    312 Listeners

    Click Here by Recorded Future News

    Click Here

    386 Listeners

    Malicious Life by Malicious Life

    Malicious Life

    923 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    7,852 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    142 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    182 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    308 Listeners

    Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

    Defense in Depth

    71 Listeners

    Cyber Security Headlines by CISO Series

    Cyber Security Headlines

    117 Listeners

    Risky Bulletin by risky.biz

    Risky Bulletin

    33 Listeners