Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Debunking DEI as a security threat: How DEI can improve security

Debunking DEI as a security threat: How DEI can improve security

Despite evidence that prioritizing Diversity, Equity and Inclusion (DEI) in the workforce is a profitable and secure path for the security industry, recent headlines are misleading readers about its usefulness. Often seen as a threat to organizational and government security efforts, DEI is being mislabeled as a tradeoff or zero-sum game where its efforts inherently compromise security requirements and resources. A key concern centers around DEI efforts distracting from security missions because firms and agencies…

Read More

Building organizational resilience for sustainable success

Building organizational resilience for sustainable success

Resilience is one of those amorphous, all-encompassing buzzwords that can mean so many things — and yet be devoid of meaning for that very reason. But it doesn’t have to be. In today’s fast-paced and ever-changing business landscape, resilience is a necessity. It’s the ability to respond to events or crises in a coordinated manner, minimizing damage and enabling a sustainable path forward. And it starts with building resilient teams. These groups are prepared to…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Challenges and victories women see in cybersecurity

Challenges and victories women see in cybersecurity

Professionals in the cybersecurity field recognize September 1, 2024, as International Women in Cyber Day.  “Celebrating women in cyber is an important way to recognize the invaluable contributions women make to the cybersecurity industry,” says Lynn Dohm, Executive Director of Women in Cybersecurity (WiCyS). “We’ve made tremendous progress in training and mentoring women in cybersecurity. Now, the industry must work to create inclusive environments that enable women to succeed and advance in cybersecurity roles.” Progress…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More

Women face nearly twice as much exclusion in cybersecurity than men

Women face nearly twice as much exclusion in cybersecurity than men

A report by Women in CyberSecurity (WiCyS) reveals key findings on the current state of inclusion in cybersecurity. By conducting a survey of 1,000 employees (65% women and 35% men) the report found notable gender disparities in the cybersecurity industry.  In the report, surveyed women noted the top four categories in which they experience exclusion: respect, career and growth, access and participation and recognition. When compared to their male counterparts, women reported 350% more exclusion…

Read More

Breaking down DE&I barriers: Practical tips for security leaders

Breaking down DE&I barriers: Practical tips for security leaders

March is Women’s History Month — an important time to acknowledge the women who are paving the way for innovation within organizations across all industries, specifically within science, technology engineering and math (STEM) fields such as cybersecurity, computer sciences and beyond. The crossroads of diversity, equity and inclusion (DE&I) and cybersecurity is a powerful reminder that diversity is at the heart of innovation. The more varied the experiences and thinking of employees, the better the…

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More
1 2 3 6