The Business of Security
Josh Bruyning
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
All episodes
Best episodes
Seasons
Top 10 The Business of Security Episodes
Goodpods has curated a list of the 10 best The Business of Security episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to The Business of Security for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite The Business of Security episode by adding your comments to the episode page.
#00 - Business Of Security - Introduction To Podcast
The Business of Security
02/13/18 • 1 min
#44 - Continuous Process Improvement with Nick Means
The Business of Security
05/03/23 • 24 min
Nick Means has been leading software engineering teams for more than a decade in the healthtech and devtools spaces. His focus is on building distributed organizations defined by their cultures of high trust and autonomy. He’s also an international keynote speaker, having shared his unique brand of storytelling with audiences around the world. He works remotely from Austin, TX, and spends his spare time going on adventures with his wife and kids, running very slowly, and trying tobrew the perfect cup of coffee.
#11 - Robert Baldi, Director of Cyber Security Audit, Equifax - Audit as a Security Partner and Line of Defense
The Business of Security
10/15/18 • 40 min
Robert Baldi joins Ron Woerner on the Business of Security Podcast Series for a discussion about Cyber Security Audit and using the audit capability as a way to leverage change and enhance overall security performance.
Robert joined Equifax in 2018, in the wake of the massive 2017 data breach there.
Robert discusses using a mathematical formula for risk and translating this back into the investments for a Board discussion. Collaboration between security, audit and risk teams is key to success of all three parties.
#06 - Sharon Smith, Strategic Security Advisor - Defining Success as a Security Leader
The Business of Security
03/30/18 • 45 min
#15 - Chris Hadnagy, CEO, Social-Engineer, LLC - Hacking the Human!
The Business of Security
11/09/18 • 35 min
Chris Hadnagy joins Ron Woerner on this season 2 episode 6 titled Hacking the Human. A master of social engineering, Chris starts the episode with real-world scenarios that interesting and entertaining based on real-life social engineering exercises he has conducted. Further in the episode Chris shares valuable insight into understanding people and the value of becoming an active listener - specifically as a leader. Ron dives into the inevitable of being phished with Chris providing insights on responding to phishing attacks and improving protection in the future.
Linkedin: https://www.linkedin.com/in/christopherhadnagy/
Twitter: @SocEngineerInc
Web: social-engineer.com
#29 - Emerging Trends in IoT Cyber Security Regulation - Drew Spaniel, ICIT and James Russell, Paul Phillips of Microchip Technology
The Business of Security
09/15/20 • 35 min
In this episode we invite special guests Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology (https://icitech.org), James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology (https://www.microchip.com) and Paul Phillips, Principal Embedded Solution Engineer, Microchip Technology. We also hear from privacy expert Kirk Nahra, Partner and Co-Chair of Privacy and Cybersecurity Practice at WilmerHale.
This second episode in a multi-part series is packed full of information and trends related to IoT cybersecurity regulation and emerging practices. We hear from experts on the Europe and UK regulations as well as garner perspective from Kirk Nahra who lends insight from a legal and privacy standpoint on consumer best practices for IoT cybersecurity regulation. Topics covered include:
- Emerging regulatory requirements for IoT cybersecurity in United Kingdom
- Relevant guidance from NIST in the U.S.
- Impact of IoT cybersecurity regulatory requirements for both manufacturers and retailers
- How companies can integrate IoT cybersecurity in the real world
- Future looking trends and considerations
Guests:
Drew Spaniel, Lead Researcher, Institute for Critical Infrastructure Technology
James Russell, Worldwide Group Leader, Wireless Connectivity Specialists and IoT Security Team, Microchip Technology
Paul Phillips, Principal Embedded Solution Engineer, Microchip Technology
Special Commentary by:
Kirk Nahra, Partner and Co-Chair of Privacy and Cybersecurity Practice at WilmerHale.
Hosts:
Malcolm Harkins, Chief Security and Trust Officer, Cymatic(https://www.linkedin.com/in/malcolmharkins/)
Chad Boeckmann, Founder/CEO, TrustMAPP(https://www.linkedin.com/in/chadboeckmann/)
Sponsor:
TrustMAPP (https://trustmapp.com)
#40 - Mind the Tech Gap with Dr. Nikki Robinson
The Business of Security
09/23/22 • 43 min
In this episode of The Business of Security, we discuss Dr. Robinson's upcoming book, Mind the Tech Gap, and how to manage the problem of low to non-existent collaboration between IT and Security teams. This conversation covers tools and techniques for creating a rich, collaborative environment for organizations in order to achieve security goals.
Guest:
Dr. Nikki Robinson, Security Architect at IBM, Adjunct Professor at Capital Technology University
Hosts:
Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP
Sponsor:
TrustMAPP (https://trustmapp.com)
Mind the Tech Gap: Robinson, Nikki: 9781032206165: Amazon.com: Books
#38 - Succession Planning, with John Checco
The Business of Security
06/15/22 • 38 min
In this episode, guest John Checco, Resident CISO at Proofpoint, makes a compelling case for CISO succession planning. As John takes us through his journey as a CISO, we learn how companies factor skills, background, and strengths into their short to long-term succession plans.
The average estimated tenure of a CISO is only 26 months. 85% of surveyed CISOs say they are now looking for another role or would consider an opportunity if presented. Unless you take aggressive retention action, it is only a matter of time before you are recruiting again. We discuss the tenets of succession planning, how to find a successor, and what transferring ownership entails.
John gives us deep insight into relationship handoffs, which often involve organizations and personnel, both internal and external. We identify a successor's essential qualities, including leadership skills, organization ability, knowledge and experience, and cultural fit. In addition to primary skills, we discuss secondary skills such as project management, administrative competence, and background diversity.
Guest:
John Checco, Resident CISO @Proofpoint
Hosts:
Josh Bruyning, Solution Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP
Sponsor:
TrustMAPP (https://trustmapp.com)
#39 - Don't Fire the CISO, with Quentyn Taylor
The Business of Security
08/03/22 • 36 min
Top Tips for getting into the security industry and future proofing your strategy. This podcast will focus on Quentyn’s long career in cyber security and how working for the same company for a long period of time years has enabled him to build resilience and always think years ahead when executing a strategy.
Quentyn has a wealth of knowledge experience in both the IT and information security arenas and has driven Canon’s strategy to highlight the importance of document security and help business customers to minimize their security risk.
Host
Josh Bruyning, Solution Engineer @TrustMAPP
Guest:
Quentyn Taylor, Senior Director, Information Security and Global Response @Canon Europe
Sponsored by:
TrustMAPP
#42 - CIS Controls for Business with Valecia Stocchetti
The Business of Security
12/09/22 • 38 min
The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.
Join us as we discuss the impact that CIS Controls can have on your small to medium business. We dive into the mission of the Center for Infromation Security, membership, CIS Critical Controls, CIS Implementation Groups and much more!
Hosts:
Josh Bruyning, Sr. Solutions Engineer @TrustMAPP and Chad Boeckmann, Founder/CEO @TrustMAPP
Sponsor:
TrustMAPP (https://trustmapp.com)
Show more best episodes
Show more best episodes
FAQ
How many episodes does The Business of Security have?
The Business of Security currently has 48 episodes available.
What topics does The Business of Security cover?
The podcast is about Information Security, Leadership, Business Management, Podcasts, Technology, Ceo, Cio, Business and Cybersecurity.
What is the most popular episode on The Business of Security?
The episode title '#41 - Investing in Supply Chain Solutions with Marcus Bartram' is the most popular.
What is the average episode length on The Business of Security?
The average episode length on The Business of Security is 37 minutes.
How often are episodes of The Business of Security released?
Episodes of The Business of Security are typically released every 19 days, 21 hours.
When was the first episode of The Business of Security?
The first episode of The Business of Security was released on Feb 10, 2018.
Show more FAQ
Show more FAQ