Afleveringen
-
On this episode, Julie Myerholtz, Chief Information Security Officer of Brunswick Corporation, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamification improves security awareness and why identity security must evolve to address non-human identities and just-in-time access.
Key Takeaways:
(09:10) A strong mentor can shape an effective approach to identity security.
(12:17) A formal IT degree isnât required for a successful cybersecurity career.
(13:52) Cybersecurity plays a direct role in keeping business operations running.
(17:41) Executives need impact, not technical details, in security reporting.
(20:27) Securityâs success is invisible â failure is when people take notice.
(23:40) Security must align with business risk, not just technical threats.
(29:08) Identity security is the foundation of digital defense.
(32:50) Legacy identity debt creates major security challenges.
(36:17) Non-human identities must be managed like human accounts.
(39:42) Security incentives drive faster user adoption of new systems.
(43:00) Daytime deployments keep support teams available for issues.
Resources Mentioned:
Julie Myerholtz -
https://www.linkedin.com/in/jmyerholtz/
Brunswick Corporation -
https://www.linkedin.com/company/brunswick-corporation/
CyberArk -
https://www.cyberark.com/
Retail and Hospitality ISAC -
https://rhisac.org/
Thank you for listening to âAuthenticate This!: The Cybersecurity Leadership Podcast.â Be sure to leave us a review and subscribe so you donât miss an episode.
For more information, visit ic-consult.com.
#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
-
On this episode, Corey Kaemming, Sr. Director of Information Security at Valvoline Inc., joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works â and what doesnât â in building a strong security program.
Key Takeaways:
(06:36) Coreyâs leadership philosophy is rooted in listening first and building trust.
(10:58) Early mentorship conveys the importance of preparation and empathy.
(13:07) Identity security touches every part of the business and drives operations.
(18:49) Breaking into identity security requires hands-on experience and adaptability.
(23:59) Security leaders must communicate in ways that resonate with executives.
(27:47) Running security for a company's divestiture requires trust and precision.
(30:44) People resist security changes, but tying them to business outcomes helps.
(37:38) Too many identity tools create complexity and strain resources.
(42:29) Security isnât a one-time fix â it demands constant attention and updates.
(53:56) Zero trust is widely used but often misunderstood in execution.
Resources Mentioned:
Corey Kaemming -
https://www.linkedin.com/in/corey-kaemming/
Valvoline Inc. -
https://www.linkedin.com/company/valvoline/
Evanta -
https://www.evanta.com/
Signal -
https://signal.org/
Retail & Hospitality ISAC (RH-ISAC) -
https://rhisac.org/
Thank you for listening to âAuthenticate This!: The Cybersecurity Leadership Podcast.â Be sure to leave us a review and subscribe so you donât miss an episode.
For more information, visit ic-consult.com.
#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
-
Zijn er afleveringen die ontbreken?
-
On this inaugural episode, hosts Aaron Lentz and Tim York explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration.
Key Takeaways:
(02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises.
(06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively.
(12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance.
(17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs.
(20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies.
(25:42) Onboarding delays can erode trust and impact organizational culture.
(27:46) The best CISOs focus on influencing internal culture alongside implementing tools.
Resources Mentioned:
Aaron Lentz -
https://www.linkedin.com/in/aaron-lentz/
Tim York -
https://www.linkedin.com/in/tim-york-b80b23a/
ï»żï»żThank you for listening to âAuthenticate This!: The Cybersecurity Leadership Podcast.â Be sure to leave us a review and subscribe so you donât miss an episode.
For more information, visit ic-consult.com
#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement