Good Human Nature – BSW #252
Full Audio
View Show IndexSegments
1. Latest Ransomware Trends in 2022 – Fleming Shi – BSW #252
Ransomware developments we saw over the past year—along with a look ahead at what to expect in 2022. This segment is sponsored by Barracuda Networks. Visit https://securityweekly.com/barracuda to learn more about them!
Announcements
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Guest
Fleming joined Barracuda in 2004 as the founding engineer for the company’s web security product offerings, helping to create the first version of Barracuda’s message archiving product and paving the way for expansion into new content security product areas. As Chief Technology Officer, Fleming leads the company’s threat research and innovation engineering teams in building future technology platforms to deliver continued success in our security and data protection products. He has more than 20 patents granted or pending in network and content security.
Hosts
2. Answer This Question, Partner Across Teams, & Future of Cyber Insurance – BSW #252
In the leadership and communications section, Answer this question to assess your leadership, Partner Across Teams to Create a Cybersecurity Culture, The Future of Cyber Insurance, and more!
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Hosts
- 1. Answer this question to assess your leadershipAre the people around you better because of you? The first role of a leadership is to lead yourself. And remember: 1. We lead people 2. We manage process 3. And boss no one
- 2. Using Objectives and Key Results (OKRs) to Execute Your StrategyOKRs were created to target strategy execution. They answer the question of, “How do I translate the big-picture, long-term strategy into actionable, short-term work for my team?” To be specific: - Objectives — What do we want to achieve by the end of the strategic timeframe to get us closer to our Vision? Objectives are the “What”. - Key Results — What business outcomes can we measure that show progress toward our Objectives? Key Results are the “How”.
- 3. Everyone Wants a Seat at the Table: CISO + CIO Roles EvolveDoes the CISO report to the CIO? Does the CIO report to the CISO? Should those roles be combined? Why or why not? What does the evolution of the CISO and the role’s increasing visibility mean and why is it happening now?
- 4. Partner Across Teams to Create a Cybersecurity Culture – The New StackIn this articel, we’re going to talk about how to partner with others in your organization to help transform your people into a well-trained cybersecurity unit that keeps your critical systems safe. Step 1: Start at the Top for Leadership Buy-In Step 2: Engage Human Resources to Support Training Step 3: Regular and Creative Training for Everyone Step 4: Deputize Your Software Engineering Resources Step 5: Focus Security Team on What Matters Most
- 5. Why Becoming a Data-Driven Organization Is So HardBeing data-driven has been a priority for companies for decades — but many have seen mixed results. Why? According to a new survey of executives, company culture is a harder hurdle to clear than any technical problem. On top of that, the continuing explosion of the amount of data and growing concerns over privacy and data ownership keep making the task harder. The author offers three principles to help companies achieve their goals.
- 6. The Future of Cyber InsuranceAside from raising premiums, some insurers are reducing coverage for specific industries, including education and healthcare, limiting how much cyber coverage they offer or restricting contract terms. Some are extending standalone policies for cyber-risk rather than bundling it with wider coverage.