Sharpen Our Tools – BSW #249
Full Audio
View Show IndexSegments
1. Effective Communications During & After a Cyber Attack – Ann Marie van den Hurk – BSW #249
A cyber attack is a catastrophic event for any organization. Therefore, effective cyber crisis communication is crucial but often overlooked and an internal concern. In this conversation, we will talk about critical communications and why it is essential to recover quickly and with their reputation intact.
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Guest
Ann Marie van den Hurk, APR, MSM is founder of Mind The Gap Cyber. She brings twenty-five years of management experience, having led IT, operations, and communications departments. In addition, she has worked with executives in diverse sectors in crises, guiding them to resolutions in her decade of work as a business consultant.
Ann Marie was a nationally distributed business columnist for Lexington (KY) Herald-Leader and the Tribune Content Agency. Her award-winning column focused on public relations, crisis, marketing, cyber security, and social media for businesses by bringing new media to her readers before it becomes mainstream and breaks it down into digestible terms. In 2013, Ann Marie published her first book, Social Media Crisis Communications: Preparing for, Preventing, and Surviving a Public Relations #fail through Que.
Born in the Republic of Ireland, raised and educated in the United States, and lived in Europe, Ann Marie blends American and European sensibilities into her practice allowing for a unique global perceptive. She holds an M.S. in Justice and Homeland Security with a concentration in Cybersecurity and Intelligence from Salve Regina University. In addition, Ann Marie has a B.A. in International Relations from the University of Delaware. She is an active member of PRSA, InfraGard, AFCEA International, SAE International and ICS4ICS.
Based in Newport, Rhode Island, in New England, Ann Marie partners with clients throughout the United States and the world.
Hosts
2. Cybersecurity Policy Creation, Champions Program, & the War for Talent – BSW #249
In the leadership and communications section, Cybersecurity Policy Creation: Priority One, 5 steps to run a successful cybersecurity champions program, The war for cloud and cybersecurity talent is on! , and more!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
CRA's Business Intelligence Unit has launched its next survey on Zero Trust! What are Your Barriers to Zero Trust Implementation? Take our survey and enter to win a $500 Tango card by visiting https://securityweekly.com/zerotrust. Report results will be released at our upcoming Zero Trust E-Summit in March!
Hosts
- 1. The Purpose of Leadership in a changing worldIn Remi Pearson’s book Disruptive Leadership, she clearly outlines Four Dimensions of Leadership which considers the following critical areas regardless of the business your part of the trademark TCI model Critical Alignment Model: 1. Environment 2. Structure 3. Implementation 4. People
- 2. Cybersecurity Policy Creation: Priority OneInsider threat incidences caused by human error cost businesses an average of $3.8 million each year. Therefore, improved cybersecurity rules enable employees to better understand how to keep data and apps secure. Here are some security policy examples to consider when you construct a mature security program. 1. Acceptable Use 2. Policy for Dealing with Data Breaches 3. Prepare a Disaster Recovery Strategy 4. Plan for Business Continuity 5. Remote Access 6. Policy Regarding Access Restriction
- 3. Cybersecurity: Many managers just don’t want to understand the risksSenior managers are putting businesses at risk of cyberattacks and data breaches because they don't understand cybersecurity issues and, in some cases, don't even want to learn about the dangers.
- 4. 5 steps to run a successful cybersecurity champions program5 steps to a successful cybersecurity champions program: 1. Plan your security champions program thoroughly 2. Secure leadership buy-in to support your program 3. Prioritize communication skills, diversity when recruiting security champions 4. Balance commitment requirements, make training relevant and suitable 5. Incentivize your security champions program, make it fun and mutually beneficial
- 5. Seven Communication Tips for New Leaders To Get Good Results FasterIf you are new at leading a team, here are seven tips that might help you: 1. Establish a connection with your team 2. Explain your vision and goals to the team 3. Show that you care about your team’s development 4. Be clear and concise 5. Celebrate success 6. Be open to feedback 7. Encourage questions
- 6. Giving Negative Feedback Can Make Empathetic Leaders Less EffectiveWe all know how it feels to receive negative feedback — but how does giving negative feedback impact the person delivering it? The authors conducted a series of studies with nearly 500 leaders and found that the impact of delivering negative feedback depended on how empathetic the leaders were. They found that high-empathy leaders became less effective at core leadership tasks after giving negative feedback (especially if the recipient had a strong negative reaction), while low-empathy leaders actually became more effective. Based on these findings, the authors offer several strategies for organizations to better support both high- and low-empathy leaders, including encouraging more-empathetic leaders to take breaks after giving negative feedback and training less-empathetic leaders on techniques for delivering feedback more compassionately.
- 7. The war for cloud and cybersecurity talent is on! – MedCity NewsThe oldest news in the world still seems to be that we have a dearth of cybersecurity talent – now for the fifth consecutive year. In its latest annual report, The Life and Times of Cybersecurity Professionals 2021, ISSA reveals several reasons for the shortage.