¡Desconecta con la aplicación Player FM !
Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, & Culture, with special guest, Joanna Burkey
Manage episode 358220908 series 3291585
Check out our new LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
Joanna Burkey's imparts her wisdom to help other professionals develop a successful cybersecurity program, emphasizing the importance of thought diversity and exposure to all aspects of the business. What other advice does she have to offer?
"We need to be overseeing and ultimately accountable for the right culture of governance to be happening in our companies."
Joanna Burkey is the CISO of HP, Inc. and has been in the cybersecurity field for over 25 years, working in a variety of roles from software development to CISO. She has seen the evolution of the field firsthand and provides valuable insights into the most pressing issues and trends across the industry.
In this episode, you will learn:
- Exploring the essential cybersecurity capabilities to ensure effective coverage
- Examining the culture and networking elements of the cybersecurity field
- Investigating the role and responsibilities of the Chief Executive Officer in cybersecurity
- Understanding the identity and trust issues surrounding cybersecurity
About Joanna Burkey
- LinkedIn - https://www.linkedin.com/in/joanna-burkey
- Email: joanna.burkey@hp.com
- Social Media: https://www.linkedin.com/in/joanna-burkey/
Show Notes
- FDDI & ATM network drivers for Novell Netware - https://support.novell.com/techcenter/articles/ana19960403.html
- Smart Brevity - Jim VandeHei - https://a.co/d/6K4gj2b
- Enterprise Risk Management, by James Lam - https://a.co/d/apaNCHb
- Turn the Ship Around - https://a.co/d/2gy6Q7G
- Hyperion - https://a.co/d/fmTCcHi
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions -https://propodcastsolutions.com/
Show Notes created with Capsho - www.capsho.com
Capíttulos
1. Introduction (00:00:00)
2. Cybersecurity Origin Story (00:02:24)
3. CISO Role and Culture Evolved Over the Years (00:06:04)
4. Does a CISO Need A Technical or Business Background? (00:10:05)
5. What Advice For Being a CISO (00:13:23)
6. CISO Viewing Risk (00:15:47)
7. Challenges in a Diverse Work Environment? (00:18:48)
8. Different Cultures Impact Technology? (00:21:58)
9. CyberSecurity Management Advice (00:25:13)
10. Key Processes For Productivity (00:31:12)
11. Three Key Trends in Cybersecurity? (00:36:12)
12. Greatest Fail & Lesson Learned (00:39:25)
13. Favorite Book (00:42:33)
14. Conclusion (00:43:51)
39 episodios
Manage episode 358220908 series 3291585
Check out our new LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
Joanna Burkey's imparts her wisdom to help other professionals develop a successful cybersecurity program, emphasizing the importance of thought diversity and exposure to all aspects of the business. What other advice does she have to offer?
"We need to be overseeing and ultimately accountable for the right culture of governance to be happening in our companies."
Joanna Burkey is the CISO of HP, Inc. and has been in the cybersecurity field for over 25 years, working in a variety of roles from software development to CISO. She has seen the evolution of the field firsthand and provides valuable insights into the most pressing issues and trends across the industry.
In this episode, you will learn:
- Exploring the essential cybersecurity capabilities to ensure effective coverage
- Examining the culture and networking elements of the cybersecurity field
- Investigating the role and responsibilities of the Chief Executive Officer in cybersecurity
- Understanding the identity and trust issues surrounding cybersecurity
About Joanna Burkey
- LinkedIn - https://www.linkedin.com/in/joanna-burkey
- Email: joanna.burkey@hp.com
- Social Media: https://www.linkedin.com/in/joanna-burkey/
Show Notes
- FDDI & ATM network drivers for Novell Netware - https://support.novell.com/techcenter/articles/ana19960403.html
- Smart Brevity - Jim VandeHei - https://a.co/d/6K4gj2b
- Enterprise Risk Management, by James Lam - https://a.co/d/apaNCHb
- Turn the Ship Around - https://a.co/d/2gy6Q7G
- Hyperion - https://a.co/d/fmTCcHi
Connect with us:
Website: securitymasterminds.buzzsprout.com
KnowBe4 Resources:
- KnowBe4 Blog: https://blog.knowbe4.com
- Erich Kron - https://www.linkedin.com/in/erichkron
- Jelle Wieringa - https://www.linkedin.com/in/jellewieringa
- James McQuiggan - https://www.linkedin.com/in/jmcquiggan
- Javvad Malik: https://www.linkedin.com/in/javvad
- Music Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.com
- Announcer: Sarah McQuiggan - https://www.sarahmcquiggan.com
This show's sound is edited by ProPodcastSolutions -https://propodcastsolutions.com/
Show Notes created with Capsho - www.capsho.com
Capíttulos
1. Introduction (00:00:00)
2. Cybersecurity Origin Story (00:02:24)
3. CISO Role and Culture Evolved Over the Years (00:06:04)
4. Does a CISO Need A Technical or Business Background? (00:10:05)
5. What Advice For Being a CISO (00:13:23)
6. CISO Viewing Risk (00:15:47)
7. Challenges in a Diverse Work Environment? (00:18:48)
8. Different Cultures Impact Technology? (00:21:58)
9. CyberSecurity Management Advice (00:25:13)
10. Key Processes For Productivity (00:31:12)
11. Three Key Trends in Cybersecurity? (00:36:12)
12. Greatest Fail & Lesson Learned (00:39:25)
13. Favorite Book (00:42:33)
14. Conclusion (00:43:51)
39 episodios
모든 에피소드
×
1 Security and Ethics: Collaborating Across Teams for Responsible AI with Special Guest Alison Cossette 50:12

1 Aligning Cybersecurity Strategy with Business Goals: A CISO's Perspective with Special Guest, Joseph Carson 52:50

1 Adventures in Cybersecurity: From Music to Botnets and Beyond, with special guest, Dave Lewis 49:10

1 Guarding the Digital Frontier, Navigating Privacy in the Age of Data with special guest Jack Rhysider 35:40

1 50 years of Evolution of Cybersecurity and Securing Software From Punch Cards and PKI to ChatGPT with Special Guest, Loren Kohnfelder 53:20

1 Evolving the CISO Role: Technologist, Translator, Strategist, with Special Guest, Dr. Lee Mangold 36:38

1 Developing a Positive Security Culture: Going Beyond Scaring People with Special Guest, Dr. Jessica Barker, PhD, MBE 46:08


1 Beyond Technical Skills: Beyond Technical Skills: Unlocking the Human Element in Cybersecurity, with Special Guest, Julie Haney 48:32

1 Instilling a culture of continuous learning in cybersecurity and the tips for breaking into cybersecurity with Special Guest, Naomi Buckwalter 45:18


1 Supercharge Your Cybersecurity Program by collaborating with a BISO with special guest Nicole Dove 47:38

1 Unleashing the potential of AI and Zero Trust in Cybersecurity and Data Protection with our special guest, Ian Garrett. 43:15

1 Reducing Risk by addressing the Threats to your Cybersecurity program through innovative platforms, with our special guest, Bryson Bort. 46:04

1 Security Awareness by Blending Entertainment and Education for Engaging Employees, with Special Guest, Rob McCollum 40:14

1 Automating your cyber security program for compliance and reducing risk with special guest Stas Bojoukha 39:52

1 Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, & Culture, with special guest, Joanna Burkey 45:32

1 Human-Based Cyber Risk In Building Trust & Security For Organizations with Special Guest, Alexandra Panaretos 39:53

1 Why a Data-Driven cybersecurity Defense Will Protect Your Organization With Special Guest, Roger Grimes 43:35


1 Understanding the role of a CISO to reduce the risk of an exposure for an organization with special guest Quentyn Taylor 37:59

1 Ways to secure your applications and reduce the risk of a cyber attack on your applications with special guest, Tanya Janca 41:09

1 Breaking down Blockchain and the Impact on Cybersecurity and Industries with Guest, Jean-Michel Azzopardi 48:28



Bienvenido a Player FM!
Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.