Business Security Weekly (Audio)

BSW #267 - Malcolm Harkins, Paul McKay, Alberto Yepéz


Listen Later

There was a time when the perceived wisdom was to buy best of breed security technologies and that would do for your security program. Trouble of is, none of it integrates with each other or your wider IT. With budgets getting tighter, security pros are being asked to look again at big portfolio security providers and work out whether they can use their offerings to slim down. In this session I'll discuss what I'm hearing from our customers, and some of the things we are starting to see people do to balance the need to optimize cost and efficiency without compromising security protection.

 

Speed, Velocity, and Acceleration. The physics of motion are well documented, and we understand how these scalar and vector quantities differ. In information security and cyber risk management the dynamics are not as well understood which has confused our ability to distinguish between motion and progress. This confusion intensifies our escalating risk cycle by causing a mirage of control that continues to lead us to down a path of compromise and catastrophe, adding to our growing labor and skill deficit. This segment is meant to explore the existing physics and gravitational forces of how we have approached cyber risk management to date, discuss where we are stuck today as well as ideas for a path forward - a reorientation of security operations function so that it is optimized to handle the volume as well as reposition it from an anchor point of continual reaction to one where it can take proactive action in front of the cycle of risk. The heart of these changes is a redefinition of the risk equation we have been using for decades Risk = F (Threat, Vulnerability, Consequence) which while useful initially has created a spray and pray model across most of our organizations. I will explain how to redefine the equation to be Risk = F (Threat, Exploitability, Consequence).

Segment Resources: https://www.uscybersecurity.net/csmag/going-beyond-the-motions-of-cybersecurity/

 

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

 

Show Notes: https://securityweekly.com/bsw267

...more
View all episodesView all episodes
Download on the App Store

Business Security Weekly (Audio)By Security Weekly Productions

  • 5
  • 5
  • 5
  • 5
  • 5

5

3 ratings


More shows like Business Security Weekly (Audio)

View all
Risky Business by Patrick Gray

Risky Business

369 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

639 Listeners

The Cloudcast by Massive Studios

The Cloudcast

155 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,017 Listeners

Security Weekly News (Audio) by Security Weekly Productions

Security Weekly News (Audio)

33 Listeners

Enterprise Security Weekly (Audio) by Security Weekly Productions

Enterprise Security Weekly (Audio)

14 Listeners

Paul's Security Weekly (Audio) by Security Weekly Productions

Paul's Security Weekly (Audio)

17 Listeners

Click Here by Recorded Future News

Click Here

414 Listeners

Application Security Weekly (Audio) by Security Weekly Productions

Application Security Weekly (Audio)

12 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

176 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

188 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

Huberman Lab by Scicomm Media

Huberman Lab

29,330 Listeners

CISO Stories Podcast (Audio) by SC Media

CISO Stories Podcast (Audio)

11 Listeners