Artwork

Contenido proporcionado por Eric Sorensen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Eric Sorensen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

What Cybersecurity Can Learn from Tom Brady

52:41
 
Compartir
 

Manage episode 450365494 series 3352216
Contenido proporcionado por Eric Sorensen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Eric Sorensen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.
Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.

While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.

Joining me to discuss these topics and run through a mock exercise will be:

  • Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.
  • Matthew Welling, a partner at Crowell & Moring's Washington, D.C. office, where he works in the firm's Privacy & Cybersecurity Group.
  • Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.

In addition to the table top exercise, we'll discuss:

  • Communication challenges before, during and after an attack.
  • Response strategies and the evolving dynamic of out-of-band communications.
  • The ongoing challenges of addressing the Human Element of cybersecurity.
  • The impact of regulatory efforts and how they're playing a bigger role in attack response plans.
  • The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.
  • How to control the emotional responses that will undoubtedly emanate from an attack.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Capíttulos

1. What Cybersecurity Can Learn from Tom Brady (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:29)

3. (Cont.) What Cybersecurity Can Learn from Tom Brady (00:11:17)

124 episodios

Artwork
iconCompartir
 
Manage episode 450365494 series 3352216
Contenido proporcionado por Eric Sorensen. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Eric Sorensen o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats.
Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies.

While table top exercises are nothing new, we’re going to demonstrate how they’re evolving and can be customized according to your needs. We’re going to tackle the human element of cybersecurity by discussing communications strategies, and we’ll offer some insight on getting greater buy-in from throughout the organization, including the C-suite and those controlling the purse strings.

Joining me to discuss these topics and run through a mock exercise will be:

  • Navroop Mitter, the CEO and founder of ArmorText. His firm is a leader in secure out-of-band communications.
  • Matthew Welling, a partner at Crowell & Moring's Washington, D.C. office, where he works in the firm's Privacy & Cybersecurity Group.
  • Timothy Chase, the director of the Manufacturing ISAC, a non-profit organization and leading provider of threat intelligence sharing solutions.

In addition to the table top exercise, we'll discuss:

  • Communication challenges before, during and after an attack.
  • Response strategies and the evolving dynamic of out-of-band communications.
  • The ongoing challenges of addressing the Human Element of cybersecurity.
  • The impact of regulatory efforts and how they're playing a bigger role in attack response plans.
  • The types of tools or solutions that can play the biggest role in helping organizations respond to attacks more effectively.
  • How to control the emotional responses that will undoubtedly emanate from an attack.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

Capíttulos

1. What Cybersecurity Can Learn from Tom Brady (00:00:00)

2. [Ad] Everyday AI: Your daily guide to grown with Generative AI (00:10:29)

3. (Cont.) What Cybersecurity Can Learn from Tom Brady (00:11:17)

124 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir