Description
G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.
7 critical business processes common to most organizations.
Book
Order
Bill
Pay
Ship
Close
Communicate
Transcripts
https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h
Chapters
00:00 Introduction to Securing the Business
00:12 Begin Podcast
01:08 Understanding Critical Business Processes
02:23 Identifying and Prioritizing Business Functions
03:00 Real-World Example: Restaurant Booking System
04:57 Decision Making in Crisis Situations
10:38 Mapping Confidentiality, Integrity, and Availability
19:42 Conclusion and Final Thoughts
This podcast episode of CISO Tradecraft features Shawnee Delaney, an insider threat expert, discussing insider threats in cybersecurity. Delaney, whose background includes espionage, explains how understanding human motivation and vulnerabilities is crucial for identifying and mitigating insider...
Published 11/25/24
Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field,...
Published 11/18/24