Afleveringen

  • Join G. Mark Hardy in a riveting episode of CISO Tradecraft as he sits down with Dustin Lehr to uncover strategies for creating security champions among developers. Explore effective techniques to inspire culture change, leverage AI tools for security, and discover the difference between leadership and management. This insightful discussion includes actionable steps to establish a robust security champions program, from defining a vision to executing with gamification. Whether you’re an aspiring champion or a seasoned cybersecurity leader, this episode is packed with valuable insights to elevate your organization’s security practices.

    Big Thanks to our Sponsors:

    ZeroPath - https://zeropath.com/

    CruiseCon - Use code CISOTRADECRAFT10 at https://cruisecon.com/ for 10% off registration!

    Transcripts - https://docs.google.com/document/d/1IgPbmnNaEF_1GIQTRxHStOoUKtZM4azH

    Learn more about this topic by reading Justin's Website - https://securitychampionsuccessguide.org/

    Justin Lehr's Company - https://www.katilyst.com/

    Chapters

    01:05 Meet Dustin Lair 04:05 Leadership vs. Management 06:17 The Role of Security Champions 17:20 Recruiting Security Champions 24:42 Exploring the Framework: Vision and Goals 26:25 Defining Participants and Their Roles 28:37 Understanding the Current Setting 33:27 Conceptualizing Ideal Actions 35:20 Designing with Gamification in Mind 40:30 Effective Delivery and Continuous Tuning 41:30 Overcoming Challenges and Final Thoughts
  • In this episode of CISO Tradecraft, host G Mark Hardy explores the top 10 cybersecurity predictions for 2025. From the rise of AI influencers to new standards in encryption, Hardy discusses significant trends and changes expected in the cybersecurity landscape. The episode delves into topics such as branding, application security, browser-based security, and post-quantum cryptography, aiming to prepare listeners for future challenges and advancements in the field.

    Big Thanks to our Sponsor

    CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    Team8 Fixing AppSec Paper - https://bunny-wp-pullzone-pqzn4foj9c.b-cdn.net/wp-content/uploads/2024/11/Fixing-AppSec-Paper.pdf

    Terraform and Open Policy Agent Example - https://spacelift.io/blog/terraform-best-practices#8-introduce-policy-as-code

    Transcripts - https://docs.google.com/document/d/1u6B2PrkJ1D14d9HjQQHSg7Fan3M6n4dy

    Chapters

    01:19 1) AI Influencers become normalized 03:17 2) The Importance of Production Quality in Branding 05:19 3) Google and Apple Collaboration for Enhanced Security 06:28 4) Consolidation in Application Security and Vulnerability Management 08:36 5) The Rise of Models Committees 09:09 6) Formalizing the CISO Role 11:03 7) Exclusive CISO Retreats: The New Trend 12:12 8) Automating Cybersecurity Tasks with Agentic AI 13:10 9) Browser-Based Security Solutions 14:22 10) Post-Quantum Cryptography: Preparing for the Future
  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • 🔥 Hackers Beware! Cyber Deception is Changing the Game 🔥

    In this must-hear episode of CISO Tradecraft, we expose a mind-blowing cybersecurity strategy that flips the script on attackers. Instead of waiting to be breached, cyber deception technology tricks hackers into revealing themselves—before they can do real damage. 🚨🎭

    Imagine laying digital traps—fake credentials, bogus systems, and irresistible bait—that lead cybercriminals straight into a controlled maze where every move they make is tracked.

    Early threat detection? ✅

    Real-time attacker intel? ✅

    Fewer false positives? ✅

    🎙️ Featuring deception tech guru Yuriy Gatupov, we break down:

    ✅ How deception tech works & why it’s a game-changer

    ✅ How to expose and track hackers in real time

    ✅ How to prove ROI and make the case for your org Cyber deception isn’t just defense—it’s offense against cyber threats. Are you ready to fight back? Listen now!

    Big thanks to our Sponsors

    ThreatLocker - https://hubs.ly/Q02_HRGK0

    CruiseCon - https://cruisecon.com/

    Contact Yuriy Gatupov -  [email protected]

    Yuri's LinkedIn - https://www.linkedin.com/in/yuriy-gatupov-373155281/

    Transcripts: https://docs.google.com/document/d/1oyQzCBRoPLbDOCOCypJMGGXxcPI5w75o

    Chapters

    02:05 History of Cyber Deception 04:57 Advantages of Deception Technology 06:57 Engagement and Detection Strategies 10:18 How Deception Technology Works 16:13 Attack Scenarios and Detection 24:09 Decoys and Deception: A New Paradigm 24:56 Real-World Success Stories 33:30 Deception in OT and SCADA Systems 37:38 Calculating ROI for Deception Technologies
  • In this episode of CISO Tradecraft, host G Mark Hardy interviews Ross Haleliuk, author of 'Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup.' Ross shares valuable insights on starting a cybersecurity company, and emphasizes the importance of understanding market needs, customer engagement, and trust in the industry. They discuss the role of angel investors, the differences between product and service companies, and the challenges founders face. The episode also includes an announcement about CISO Tradecraft's partnership with CruiseCon for an upcoming cybersecurity conference. Additionally, Ross provides a glimpse into his non-traditional background and journey into the cybersecurity space.

    Thank you to our sponsors

    - ThreatLocker - https://hubs.ly/Q02_HRGK0

    - CruiseCon - https://cruisecon.com/

    Ross Haleliuk's Book - https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/

    Ross Haleliuk's LinkedIn Page - https://www.linkedin.com/in/rosshaleliuk/

    Transcripts: https://docs.google.com/document/d/1b8UPolYvYWEYbmO7n_7NqrilObv-HNzo Chapters

    02:28 Ross Haleliuk's Background and Journey 04:32 Discussing the Book: Cyber for Builders 10:52 Insights on Cybersecurity and Business 15:54 Challenges and Realities of Cybersecurity Startups 22:19 Navigating Market Competition 23:15 Entering Established Markets 24:28 Challenges in Security Tool Adoption 25:11 Legacy Vendors and Market Entrenchment 27:35 Building a Company: Beyond the Product 30:02 Validating Market Needs 32:27 Funding Your Startup 35:25 The Role of Angel Investors 43:29 Conclusion and Next Steps
  • Join us on CISO Tradecraft as we explore the future of cybersecurity with Merritt Barrett, former Deputy CISO at AWS. Merritt, a Harvard Law graduate, shares her expert insights on the trends expected in the upcoming years, emphasizing the enduring aspects of cybersecurity, the implications of AI, and challenges in cloud security. Discover valuable strategies for managing security risks, the evolution of ransomware, and the integration of sustainable practices within the industry. Don't miss this episode filled with practical advice for current and aspiring CISOs!

    Thank you to our sponsors

    - ThreatLocker - https://hubs.ly/Q02_HRGK0

    - CruiseCon - https://cruisecon.com/

    Transcripts https://docs.google.com/document/d/1KRkN7jVZvAaYk1eSBde3GTiD-G9RPjXJ

    Chapters

    00:00 Introduction and Guest Overview 01:16 Future of Cybersecurity 02:18 AWS Security Insights 04:35 Shared Responsibility Model 09:59 AI in Cybersecurity 21:55 Security and Environmental Concerns 32:36 Predictions for 2025 and Beyond 42:46 Closing Remarks and Contact Information
  • In this episode of CISO Tradecraft, host G Mark Hardy discusses the history and evolution of endpoint protection with guest Kieran Human from ThreatLocker. Starting from the inception of antivirus software by John McAfee in the late 1980s, the episode delves into the advancements through Endpoint Detection and Response (EDR) and introduces the latest in endpoint security: allowlisting and ring fencing. The conversation highlights the limitations of traditional antivirus and EDR solutions in today's threat landscape, emphasizing the necessity of default-deny approaches to enhance cybersecurity. Kieran explains how ThreatLocker’s allowlisting and ring-fencing capabilities can block unauthorized applications and actions, thus significantly reducing the risk of malware and ransomware attacks. Practical insights, war stories, and deployment strategies are shared to help cybersecurity leaders implement these next-generation tools effectively.

    Thank you to our sponsor ThreatLocker

    https://hubs.ly/Q02_HRGK0

    Transcripts: https://docs.google.com/document/d/1UMrK44ysBjltNkddCkwx9ly6GJ14tIbC

    Chapters

    00:00 Introduction to Endpoint Protection 00:41 Upcoming Event: CruiseCon 2025 01:18 History of Endpoint Protection 03:34 Evolution of Antivirus to EDR 05:25 Next-Gen Endpoint Protection: Allowlisting 06:44 Guest Introduction: Kieran Human from ThreatLocker 08:06 Benefits of Allowlisting and Ring Fencing 17:14 Challenges and Best Practices 26:19 Conclusion and Call to Action
  • In this crucial episode of CISO Tradecraft, host G Mark Hardy delves into the urgent topic of the 'Salt Typhoon' threat, with insights from experts Adam Isles and Andreas Kurland from the Chertoff Group. The episode covers the implications for corporate security using SMS text messages when Chinese actors are breaking into major telecommunication entities. The conversation focuses on encryption, secure communications, and measures to mitigate risks from vulnerabilities in telecommunications infrastructure. The discussion includes practical steps for securing messaging, voice calls, virtual meetings, and emails. Learn actionable strategies to bolster your organization’s cybersecurity posture and ensure robust defense against sophisticated state-level cyber threats.

    Thank you to our sponsor Threat Locker

    https://www.threatlocker.com/pages/essential-eight-fast-track?utm_source=ciso_tradecraft&utm_medium=sponsor&utm_campaign=essential-eight_q4_24&utm_content=essential-eight&utm_term=podcast

    Link to recommendations:

    https://chertoffgroup.com/end-to-end-encryption-is-essential/

    Transcripts https://docs.google.com/document/d/13NKPUBU3c-qYQtX18NR08oYVRSSnHD_a

    Chapters:

    00:00 Introduction to Salt Typhoon 01:31 Meet the Experts: Adam Isles and Andreas Kurland 02:03 Understanding the Salt Typhoon Threat 04:49 Telecommunications and Security Risks 07:37 Messaging Security: Risks and Recommendations 20:14 Voice Communication Security 28:44 Securing Virtual Meetings 34:45 Email Security: Challenges and Solutions 41:35 Conclusion and Contact Information
  • In this riveting episode of CISO Tradecraft, host G Mark Hardy welcomes back Richard Thieme, a thought leader in cybersecurity and technology, almost three years after his last appearance. Richard delves into the necessity of thinking like a hacker, provides insights into the AI singularity, and discusses the ethical and societal implications of emerging technologies. The conversation also touches on Richard's extensive body of work, including his books and views on cyber warfare, disinformation, and ethical decision-making. Tune in for a thought-provoking discussion that challenges conventional wisdom and explores the interconnectedness of technology, consciousness, and our future.

    Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    Link to Richard’s home page (and links to Amazon for his books):

    https://thiemeworks.com/

    Link to the book, The Ending of Time:

    https://store.kfa.org/products/the-ending-of-time-new-edition

    Transcripts: https://docs.google.com/document/d/1Q7CJkF7Spji2iAbV_mYEyYHnKWobzo6N

    Chapters

    00:00 Introduction and Guest Announcement 00:56 Upcoming Cybersecurity Event: CruiseCon 01:41 Welcoming Back Richard Thieme 02:06 Reflecting on Past Discussions 02:59 The Necessity for Thinking Like a Hacker 03:10 Exploring Richard Thieme's Books 08:25 Understanding AI and Its Implications 18:28 Soft Power and Global Influence 24:01 The Power of Fiction in Revealing Truth 24:37 Ethical Frameworks Post 9/11 26:12 The Role of Empathy in Intelligence Work 26:37 The Blurring Line Between Fact and Fiction 29:52 The Isolation of Intelligence Work 31:18 The Interconnectedness of Everything 33:36 Exploring Remote Viewing and Consciousness 36:50 The Rise of AI and Ethical Considerations 39:43 The Evolution of Technology and Society 45:07 Final Thoughts and Reflections
  • This podcast episode of CISO Tradecraft features Shawnee Delaney, an insider threat expert, discussing insider threats in cybersecurity. Delaney, whose background includes espionage, explains how understanding human motivation and vulnerabilities is crucial for identifying and mitigating insider threats. The conversation highlights the importance of organizational culture, employee well-being, and proactive measures like employee lifecycle management and psychological testing in preventing such threats. Practical advice is offered for leaders to foster a supportive and communicative work environment to detect potential threats early. Finally, methods for creating effective insider threat programs and addressing cultural issues are explored.

    Shawnee Delaney's LinkedIn - https://www.linkedin.com/in/shawnee-delaney/

    Vaillance Group - https://www.vaillancegroup.com/

    Transcripts: https://docs.google.com/document/d/1xJiEMDL8CjNwwfBSvNHfnhfsrVgOMuk0

    Chapters

    00:00 Introduction to Insider Threat 00:26 Guest Introduction: Shawnee Delaney 00:58 CruiseCon 2025 Announcement 01:33 Shawnee's Career Journey 02:18 Understanding Espionage 03:43 Motivations Behind Espionage 07:46 Indicators of Insider Threat 10:48 Building a Positive Organizational Culture 18:21 Implementing an Insider Threat Program 21:05 Psychological Testing in Hiring 23:26 Assessing Organizational Culture 25:34 Core Values in the Navy and Marine Corps 26:16 A Commanding Officer's Story 28:32 Identifying Insider Threats 32:01 The Impact of Job Uncertainty 36:50 Gamifying Security Incentives 39:12 Building a Strong Security Culture 42:05 Final Thoughts and Recommendations
  • Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Raghav shares valuable insights from his extensive research on the unique stresses faced by CISOs, the organizational factors contributing to burnout, and practical coping mechanisms. We also explore the evolutionary phases of CISOs, from technical experts to strategic business enablers. Whether you're dealing with resource limitations, seeking executive support, or managing ever-evolving cybersecurity threats, this episode offers actionable advice to navigate the demanding role of a CISO successfully. Don't forget to like, comment, and share to help other CISOs and cybersecurity leaders!

    Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    Transcripts: https://docs.google.com/document/d/1fhLkaj_JetlYFQ50Q69uMGmsw3fS3Wqa

    CISO Burnout - https://aisel.aisnet.org/amcis2023/sig_lead/sig_lead/4/

    CISO-CIO Power Dynamics https://aisel.aisnet.org/amcis2024/is_leader/is_leader/6/

    Cybersec professionals and AI integration https://aisel.aisnet.org/amcis2024/security/security/29/

    Raghav can be reached on [email protected]

    Chapters

    00:00 Introduction and Guest Welcome 02:34 Understanding CISO Burnout 03:24 PhD Journey and Challenges 10:12 Key Findings on CISO Burnout 18:39 Six Sources of CISO Burnout 32:47 CISO Maturity Levels 42:57 Conclusion and Call to Action
  • Setting Sail with Cybersecurity: Exclusive Insights from Ira Winkler on CruiseCon 2025 🛳️ Join us for an exciting episode of CISO Tradecraft as G Mark Hardy sits down with renowned cybersecurity expert Ira Winkler! Discover the groundbreaking CruiseCon 2025, the first at-sea cybersecurity conference, featuring top-tier speakers and unrivaled networking opportunities. Learn about Ira's illustrious career, the significance of certifications, and the current state of the cybersecurity job market. Don't miss out on this chance to enhance your career and connect with industry luminaries.

    Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    Transcripts: https://docs.google.com/document/d/1CGyFBxOrxvJitKsH9BRKwf2_g8rRPZ6K

    Chapters

    00:00 Introduction and Special Announcement 00:42 Reconnecting with Ira Winkler 04:07 Early Cybersecurity Days and Certifications 14:35 Innovative Ideas and CruiseCon 21:32 Meet the Top Cybersecurity Experts 22:13 Exciting Events and Networking Opportunities 24:10 Special Deals and Sponsorships 34:47 Addressing the Cybersecurity Job Market
  • Join G. Mark Hardy on this exciting episode of CISO Tradecraft as he interviews J.C. Vega, the first cyber colonel in the United States Army. Vega shares his invaluable insights on leadership, team building, and success strategies that can transform your cybersecurity career. Plus, learn about CruiseCon 2025, Wee Dram, and how you can take your leadership skills to the next level. Don't miss out on this episode packed with wisdom, actionable advice, and some fun anecdotes. Subscribe, comment, and share with your peers!

    Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    JC Vega - https://www.linkedin.com/in/jcvega-cyber-colonel/

    Transcripts: https://docs.google.com/document/d/1ExuX-WVO4_qqLoIZDuT0QS2VAvN2resW

    Chapters

    00:00 Introduction and Special Guest Announcement 01:15 Meet J.C. Vega: The First Cyber Colonel 01:55 The Wee Dram Community 03:39 Building a Trusted Cybersecurity Community 09:12 Leadership Principles from Military to Civilian Life 12:31 Building and Leading Effective Teams 24:17 The Peter Principle and Career Progression 24:49 Creating a Shared Understanding in Cybersecurity 26:43 Commander's Intent: Defining Success 29:29 Empowering Teams and Accepting Prudent Risk 36:19 Rules to Live By: The Vega's Top Three 44:58 Final Thoughts and Farewell
  • In this special Halloween episode of CISO Tradecraft, host G Mark Hardy delves into the lurking dangers of Shadow IT and Zombie IT within organizations. Learn about the origins, risks, and impacts of these hidden threats, and discover proactive measures that CISOs can implement to safeguard their IT ecosystems. Strategies discussed include rigorous asset management, automation, and comprehensive compliance reviews. Tune in for insights to foster a secure, compliant, and efficient IT environment, and don't miss out on an exclusive opportunity to join a cybersecurity conference aboard a luxury cruise.

    Big Thanks to our Sponsor

    CruiseCon - https://cruisecon.com/

    CruiseCon Discount Code: CISOTRADECRAFT10

    Transcripts: https://docs.google.com/document/d/1lh-TQhaSOIA2rITaXgTaqugl7FRGevnn

    Chapters

    00:00 Introduction to Shadow IT and Zombie IT 02:14 Defining Shadow IT 04:58 Risks of Shadow IT 07:29 Introduction to Zombie IT 09:35 Risks of Zombie IT 11:25 Shadows vs Zombies 11:25 Comparing Shadow IT and Zombie IT 19:11 Lifecycle Management Strategies 19:56 Summarizing the Threats and Solutions 22:32 Final Thoughts and Call to Action
  • Unlocking SOC Excellence: Master the SOC Capability Maturity Model Join host G Mark Hardy in this compelling episode of CISO Tradecraft as he explores the revolutionary SOC Capability Maturity Model (SOC CMM) authored by Rob van Os. This episode is a must-watch for CISOs, aspiring CISOs, and cybersecurity professionals aiming to optimize their Security Operations Center (SOC). Learn how to measure, evaluate, and enhance your SOC's maturity across key domains including Business, People, Process, Technology, and Services. Gain insights into leveraging radar charts for visualizing SOC capabilities and hear case studies such as a mid-sized financial company’s remarkable improvements. Discover why understanding your SOC's strengths and weaknesses and conducting risk-based improvement planning are crucial. Don't miss out—elevate your cyber resilience today, subscribe, and share with your network to set your SOC on the path to excellence!

    References:

    SOC-CMM - https://www.soc-cmm.com/products/soc-cmm/ Robert van Os - https://www.linkedin.com/in/socadvisor/

    Transcripts: https://docs.google.com/document/d/1Fk6_t9FMyYXDF-7EfgpX_ZjLc0iPAgfN

    Chapters

    00:12 Introduction to CISO Tradecraft and SOCs 01:20 Understanding SOC CMM: A Game-Changing Tool 02:29 Evaluating SOC Maturity and Capability 06:04 Benefits and Implementation of SOC CMM 07:56 Understanding SOC Assessments 08:55 Deep Dive into SOC CMM Domains 12:42 Benefits and Flexibility of SOC CMM 14:40 Real-World Application and Conclusion
  • In this episode of CISO Tradecraft, host G Mark Hardy explores the challenges and misconceptions facing the next generation of cybersecurity professionals. The discussion covers the myth of a talent shortage, the shortcomings of current educational and certification programs, and the significance of aligning curricula with real-world needs. Hardy emphasizes the importance of hands-on experience, developing soft skills, and fostering continuous learning. The episode also highlights strategies for retaining talent, promoting internal training, and creating leadership opportunities to cultivate a skilled and satisfied cybersecurity workforce.

    Transcripts: https://docs.google.com/document/d/12fI2efHXuHR4dS3cu7P0UIBCtjBdgREI

    Chapters

    00:00 Introduction to the Cybersecurity Talent Crisis 00:40 Debunking the Talent Shortage Myth 02:23 The Real Talent Gap: Mid-Career Professionals 03:04 Outsourcing and Its Impact on Entry-Level Jobs 08:29 Challenges in Cybersecurity Education 16:13 The Importance of Practical Skills Over Theory 23:52 The Importance of Writing Skills 25:10 Continuous Learning and Self-Investment 26:07 Performance and Career Progression 28:40 Mentorship and Onboarding 29:51 Training and Development Challenges 32:32 Retention Strategies 33:44 Engaging Junior Employees 39:07 Technology and Innovation 40:54 Conclusion and Final Thoughts
  • In this episode of CISO Tradecraft, hosted by G Mark Hardy, you'll learn about four crucial tools in cloud security: CNAPP, CASB, CSPM, and CWPP. These tools serve various functions like protecting cloud-native applications, managing access security, maintaining cloud posture, and securing cloud workloads. The discussion covers their roles, benefits, key success metrics, and best practices for CISOs. As the cloud security landscape evolves, understanding and integrating these tools is vital for keeping your organization safe against cyber threats.

    Transcripts: https://docs.google.com/document/d/1Mx9qr30RuWrDUw1TLNkUDQ8xo4xvQdP_

    Chapters

    00:00 Introduction to Cloud Security Tools 02:24 Understanding CNAPP: The Comprehensive Cyber Defense 08:13 Exploring CASB: The Cloud Access Gatekeeper 11:12 Diving into CSPM: Ensuring Cloud Compliance 13:40 CWPP: Protecting Cloud Workloads 15:08 Best Practices for Cloud Security 15:54 Conclusion and Final Thoughts
  • In this episode of CISO Tradecraft, hosts G Mark Hardy and Mark Rasch discuss the intersection of artificial intelligence and the law. Recorded at the COSAC computer conference in Dublin, this episode covers the legal implications of AI, copyright issues, AI-generated content, privacy concerns, and ethical considerations. They explore the nuances between directed and undirected AI, the importance of training data, and the potential risks and liabilities associated with AI-driven systems. Tune in for a deep dive into how AI is reshaping cybersecurity and legal landscapes.

    Transcripts: https://docs.google.com/document/d/1s_eDwz-FPuyxYZRJaOknWi2Ozjqmodrl

    Chapters

    00:00 Introductions 01:13 Diving into Artificial Intelligence 04:04 Directed vs. Undirected AI 11:02 Legal and Ethical Issues of AI 23:47 AI and Copyright: Who Owns the Creation? 26:59 The Role of AI in Information Security 32:51 Ethical Dilemmas in AI Decision-Making 39:18 Future Challenges and Recommendations for AI
  • Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landscape.

    References

    OWASP Top 10 LLM Risks https://genai.owasp.org/

    Gartner CARE Standard - https://www.gartner.com/en/documents/3980890

    Make sure your controls work consistently over time (Consistency)Make sure your controls meet the business needs (Adequacy)Make sure your controls are appropriate and fair (Reasonableness)Make sure your controls produce the desire outcome (Effectiveness)

    Transcripts: https://docs.google.com/document/d/1V2ar7JBO503MN0RZcH7Q7VBkQUW9MYk6

    Chapters

    00:00 Introduction from Spain 00:42 Understanding Generative AI 03:25 Major Players in Generative AI 05:02 Risks of Generative AI 15:14 Mitigating Generative AI Risks 18:23 Implementing Solutions 24:09 Conclusion and Call to Action
  • G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.

    7 critical business processes common to most organizations.

    Book Order Bill PayShip CloseCommunicate

    Transcripts

    https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h

    Chapters

    00:00 Introduction to Securing the Business 00:12 Begin Podcast 01:08 Understanding Critical Business Processes 02:23 Identifying and Prioritizing Business Functions 03:00 Real-World Example: Restaurant Booking System 04:57 Decision Making in Crisis Situations 10:38 Mapping Confidentiality, Integrity, and Availability 19:42 Conclusion and Final Thoughts
  • Join host G Mark Hardy as he dives deep into the complexities of compliance and reporting, featuring special guests Brian Bradley and Josh Williams from FedShark. Discover a unique and streamlined approach to compliance using FedShark's innovative tools and AI-assisted systems. Learn about their exclusive offers for CISO Tradecraft listeners, including free downloads and discounted pre-assessment tools. Topics covered include CMMC, HIPAA, PCI, and more. Whether you're part of the Defense Industrial Base or dealing with multiple compliance frameworks, this episode is packed with practical advice to make your compliance journey smoother and more effective.

    Thanks to our podcast sponsor, Fedshark

    CISO Traderaft Promo & Link to CMMC White Papers: https://fedshark.com/ciso

    RapidAssess: https://fedshark.com/rapid-assess

    Company website: https://fedshark.com

    FedShark Blog: https://fedshark.com/blog

    Schedule a Demo: https://fedshark.com/contact-us

    LinkedIn Matt Beaghley: https://www.linkedin.com/in/mbeaghley/

    LinkedIn Brian Bradley: https://www.linkedin.com/in/brian-bradley-97a82668/

    Chapters

    00:00 Introduction and Special Offer 03:18 Meet the Experts: Brian and Josh 06:49 Challenges in Compliance 16:23 Understanding CMMC 29:02 Understanding Scope in Compliance 30:22 Introducing the AI-Enhanced Compliance Solution 31:24 Streamlining Interviews and Documentation 42:19 Final Thoughts and Recommendations