Afleveringen
-
On this episode, Corey Kaemming, Sr. Director of Information Security at Valvoline Inc., joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works â and what doesnât â in building a strong security program.
Key Takeaways:
(06:36) Coreyâs leadership philosophy is rooted in listening first and building trust.
(10:58) Early mentorship conveys the importance of preparation and empathy.
(13:07) Identity security touches every part of the business and drives operations.
(18:49) Breaking into identity security requires hands-on experience and adaptability.
(23:59) Security leaders must communicate in ways that resonate with executives.
(27:47) Running security for a company's divestiture requires trust and precision.
(30:44) People resist security changes, but tying them to business outcomes helps.
(37:38) Too many identity tools create complexity and strain resources.
(42:29) Security isnât a one-time fix â it demands constant attention and updates.
(53:56) Zero trust is widely used but often misunderstood in execution.
Resources Mentioned:
Corey Kaemming -
https://www.linkedin.com/in/corey-kaemming/
Valvoline Inc. -
https://www.linkedin.com/company/valvoline/
Evanta -
https://www.evanta.com/
Signal -
https://signal.org/
Retail & Hospitality ISAC (RH-ISAC) -
https://rhisac.org/
Thank you for listening to âAuthenticate This!: The Cybersecurity Leadership Podcast.â Be sure to leave us a review and subscribe so you donât miss an episode.
For more information, visit ic-consult.com.
#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
-
On this inaugural episode, hosts Aaron Lentz and Tim York explore the human element in cybersecurity leadership, using real-world examples and practical insights. From understanding the nuances of deepfakes to thinking of identity tools as hammers, they share actionable strategies for influencing organizational culture and fostering effective collaboration.
Key Takeaways:
(02:26) A false tsunami alert at Bandon Dunes highlighted different human reactions to crises.
(06:02) Deepfakes have evolved from basic to highly convincing, requiring cultural changes to combat them effectively.
(12:25) A privileged access management (PAM) tool failed due to poor communication and user resistance.
(17:03) The rise of Chief Identity Officer roles reflects the growing complexity of identity programs.
(20:27) Simplifying identity workflows is critical for future-proofing cybersecurity strategies.
(25:42) Onboarding delays can erode trust and impact organizational culture.
(27:46) The best CISOs focus on influencing internal culture alongside implementing tools.
Resources Mentioned:
Aaron Lentz -
https://www.linkedin.com/in/aaron-lentz/
Tim York -
https://www.linkedin.com/in/tim-york-b80b23a/
ï»żï»żThank you for listening to âAuthenticate This!: The Cybersecurity Leadership Podcast.â Be sure to leave us a review and subscribe so you donât miss an episode.
For more information, visit ic-consult.com
#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
-
Zijn er afleveringen die ontbreken?