
Sign up to save your podcasts
Or


In this episode of "How Many CTOs Does It Take?" podcast, hosts Scott Porad and Brad Hefta-Gaub discuss the role of CTOs in setting a security-minded culture and provide real-life anecdotes of security breaches and incidents. The conversation covers critical frameworks like CIS, SOC 2, and tools like Vanta, Wiz, Drata, and AWS Security Hub. They emphasize the importance of incident response, continuous vulnerability management, and making security practices an effortless part of development workflows. The episode concludes by highlighting the urgency of adapting to new security challenges posed by AI and other technological advances.
00:00 Introduction and Episode Kickoff 01:05 The Role of the CTO in Security 04:40 Real-World Security Incidents 08:08 Incident Response and Security Culture 12:42 Frameworks and Best Practices 21:44 Human Factors in Security 25:34 Supply Chain Attacks 26:26 Best Practices for Software Inventory 27:23 Setting Priorities for Vulnerabilities 34:30 Automating Security Checks 36:08 Tools for Compliance and Security 40:48 The Importance of Trust in Security 49:15 Final Thoughts and ConclusionResources:
#TechPodcast #EngineeringPodcast #DevTalks #PodcastForDevs #HowManyCTOs #Podcast #CTOs #CTOPodcast #ChiefTechnologyOfficer #Technology #Engineering #SoftwareDevelopment #SoftwareEngineering #TechLeadership #EngineeringLeadership #EngineeringCulture #TechDebates #Security #SecurityIncidents #IncidentResponse #SecurityCulture #SoftwareSecurity #SupplyChainAttacks #SecurityChecks #ComplianceAndSecurity #AI #Vanta #Wiz #Drata #AWSSecurityHub #CIS #SOC2
By Brad Hefta-Gaub & Scott PoradIn this episode of "How Many CTOs Does It Take?" podcast, hosts Scott Porad and Brad Hefta-Gaub discuss the role of CTOs in setting a security-minded culture and provide real-life anecdotes of security breaches and incidents. The conversation covers critical frameworks like CIS, SOC 2, and tools like Vanta, Wiz, Drata, and AWS Security Hub. They emphasize the importance of incident response, continuous vulnerability management, and making security practices an effortless part of development workflows. The episode concludes by highlighting the urgency of adapting to new security challenges posed by AI and other technological advances.
00:00 Introduction and Episode Kickoff 01:05 The Role of the CTO in Security 04:40 Real-World Security Incidents 08:08 Incident Response and Security Culture 12:42 Frameworks and Best Practices 21:44 Human Factors in Security 25:34 Supply Chain Attacks 26:26 Best Practices for Software Inventory 27:23 Setting Priorities for Vulnerabilities 34:30 Automating Security Checks 36:08 Tools for Compliance and Security 40:48 The Importance of Trust in Security 49:15 Final Thoughts and ConclusionResources:
#TechPodcast #EngineeringPodcast #DevTalks #PodcastForDevs #HowManyCTOs #Podcast #CTOs #CTOPodcast #ChiefTechnologyOfficer #Technology #Engineering #SoftwareDevelopment #SoftwareEngineering #TechLeadership #EngineeringLeadership #EngineeringCulture #TechDebates #Security #SecurityIncidents #IncidentResponse #SecurityCulture #SoftwareSecurity #SupplyChainAttacks #SecurityChecks #ComplianceAndSecurity #AI #Vanta #Wiz #Drata #AWSSecurityHub #CIS #SOC2