Description
How do you balance people, process, and technology, the three pillars of information security, to achieve a balanced security program? What can you do to bolster each pillar? Johannes Wiklund, the Head of Information Security at Jotforms, shares his experience on this, why he thinks a systematic approach to troubleshooting is important, and his key takeaways from the recent RSA conference.
Tune in to this episode of Ask A CISO to hear:
π What his first steps were after joining Jofform as the Head of Internal Security
π His experience trying to acquire new hires to strengthen his team
π Why he thinks problem-solving skills can be bolstered with proper run books and playbooks
π His take on the right approach to people, process, and technology, the three pillars of information security
π His approach to Security by Design
π Johannes' main takeaways from the recent RSA conference
The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy.
-- Show Notes and Transcript --
https://www.horangi.com/blog/people-process-and-technology
-- About Horangi Cybersecurity --
More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast
About Horangi Cyber Security: https://www.horangi.com
--- About the Guest --
Johannes' LinkedIn: https://www.linkedin.com/in/wiklund/
-- Attributions --
Ending Music: I Dunno by Grapes http://ccmixter.org/files/grapes/16626
Creative Commons β Attribution 3.0 Unportedβ CC BY 3.0
Free Download / Stream: https://bit.ly/i-dunno-grapes
Music promoted by Audio Library https://youtu.be/sNAE8-mB5lQWe
Join host Jeremy Snyder, Founder & CEO of Firetail, in conversation with cybersecurity expert Christine Bejerasco, CISO, WithSecure. Delve into Christine's 20-year journey defending against cyber threats, exploring the evolution of cloud security, instilling a security-first culture,...
Published 08/10/23
Artificial intelligence (AI) is changing the game for cybersecurity by analyzing massive quantities of risk data to speed up response times and augment under-resourced security operations. However, as all technology before AI, aside from advantages, they always come with a downside as well. AI...
Published 08/03/23