Friendlyfire Podcast public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
FriendlyFire Podcast

FriendlyFire Podcast

Unsubscribe
Unsubscribe
Monthly
 
Info y juegos que tal vez no conozcas, o no hayas jugado; discusiones y mucha risa. Mate y facturas, y 7 amigos que graban sus charlas sobre videojuegos. Desde la actualidad hasta los clásicos, y muchas anécdotas!
  continue reading
 
Recent studies show that 82% of cyber incidents result from unintended human behavior. Further, the errant behavior of only 5% of all users creates most of this risk. This is pretty alarming, and yet no one is talking about it. Modifying the behavior of these few individuals can have a force multiplier effect on reducing overall enterprise cyber risks. Welcome to Friendly Fire: Mitigating Unintentional User Risk. Where we explore Human Risk, to raise awareness across the industry, and stimul ...
  continue reading
 
Loading …
show series
 
Security awareness training is not enough to protect ourselves from cyber risks. But how can we control these risks? Today, Kristina Belnap, the SVP and CISO of HealthEquity, brings the role of human resources in bringing human risk management into the organization. Educating everyone on AI and bringing awareness into the space are keys to protecti…
  continue reading
 
Cybersecurity is a high-stakes card game, and sometimes, it's not about winning every hand but mastering the game as a whole. In this episode, we welcome Allison Miller of Cartomancy Labs for an illuminating discussion on "The Theoretical Floor" and why resilience is the secret sauce to defending against modern cyber threats. She expounds on the wo…
  continue reading
 
For an API security platform to succeed in today’s fast-paced society, it must be widely familiar with the current trends of the digital world and keep its most skilled people for a long time. Tyler Shields sits down with Karl Mattson, CISO at Noname, to discuss these two vital factors. Karl explains how they approach cybersecurity as an up-to-date…
  continue reading
 
Product security has greatly changed over time. How does human contribute to the changes going on? In this episode, Joern Freydank, a Lead Cyber (Application) Security Engineer, dissects the human issues in product security. He emphasizes the value of humans in providing a higher level of order intelligence operating the systems. Joern also shares …
  continue reading
 
We should embrace the human side of cybersecurity, where knowledge and vigilance become our most potent weapons in the age of digital health. In this episode, Esmond Kane, a CISO at a leading healthcare organization, sheds light on the critical role of human risk management in safeguarding our digital lives. He emphasizes that no matter the technol…
  continue reading
 
As technology advances, so does the threat posed in cyberspace. In this episode, Mark Weatherford, the SVP and Chief Security Officer at AlertEnterprise, navigates us through cyberspace and how AI and Government Policy impact change in cybersecurity threats. There is a monumental shift in positioning, treating, and regulating CISOs within the compa…
  continue reading
 
People make mistakes, and these unintentional mistakes drastically impact an organization. You shouldn't dance with risks and wait for cyber attacks to steal your stage. It's time to take action with Andre Russotti of Altria Client Services as he explains how Zero Trust does not solve the user-behavior problem that causes insider risks. Would you r…
  continue reading
 
In this episode, we unravel the complexities of Identity and Access Management (IAM) and explore the cutting-edge concept of Zero Trust. Join host Tyler Shields as he sits with Christine Owen, a recovering attorney who found solace in IAM and Zero Trust principles. Christine sheds light on the modern challenges of protecting digital assets in an ev…
  continue reading
 
Balancing risk and privacy is a delicate dance, but with the right solutions and strategies, organizations can effectively manage potential threats to their security while protecting their users' data. For today’s episode, Matthew Stephenson interviews renowned privacy and technology attorney Greg Silberman to discuss the fascinating and complex wo…
  continue reading
 
If there is one sector that is keeping people cool, warm, and secure, that would be the utility sector. They are the ones who have been ensuring that our basic needs are well-provided and, in that process, well-functioning for decades. However, with the cyber element growing and taking root in the sector, threats to how utilities are delivered have…
  continue reading
 
There are a lot of factors that cause problems within the cybersecurity space, but the human element ranks as the top reason. With the huge communication chasm among IT experts, C-suite leaders, and hiring managers, there is still work to be done in bridging these gaps. Matthew Stephenson discusses how to solve this disconnect with the Founder and …
  continue reading
 
"Privacy isn't dead, but people need to be made more aware of the invasiveness of the internet of things, digital devices, and tracking." – Theresa Payton. Every company has a duty of care to ensure they are tracking their employees on a certain level to ensure people are who they say they are, working when they say they're working, and taking care…
  continue reading
 
This digital information age puts businesses vulnerable not only to external attacks but internal as well. Even more threatening when these happen to those in a highly-regulated industry with a significant amount of information needed securing. Suffice to say, friendly fires happen and must be dealt with as much as other threats. In this episode, T…
  continue reading
 
Insight Global is a massive company that connects talent with the companies that need that talent. As such, it plays a critical role in the cybersecurity industry. In this episode, Jonathan Waldrop, the Senior Director at Insight Global, talks about how the company uses the human element when it comes to security. Jonathan discusses that changing t…
  continue reading
 
Awareness, culture, and behavior. How are these things related to technology and security? In this episode, Kai Roer, the author of Build a Security Culture, provides some insights into the importance and impact of security culture. Kai highlights that there are social and cultural triggers that drive human behavior. Matthew Stephenson and Kai Roer…
  continue reading
 
Data security awareness is indeed valuable, but how is it actually framed? Most people in the security space rely solely on the human firewall, and that is where the problem occurs. In this episode, Ira Winkler, author of Security Awareness for Dummies, explains why organizations should stop depending on user awareness alone in protecting their dat…
  continue reading
 
Most organizations don’t want to have adversarial conversations about cybercrime. They either don’t care enough or they don’t really understand it. But this lack of visibility within your network can result in a huge risk to your organization. Not knowing if you are dealing with an insider threat is scary. You can't prepare for it or set up counter…
  continue reading
 
When a cybersecurity breach happens, expect things to go crazy. You will have to deal with legal teams and an all-out investigation with the authorities. You will have to find out who did it as soon as possible. Is it an attack from the outside or due to neglect from someone from the inside? How are your customers doing? How can you circumvent futu…
  continue reading
 
A lot of cybersecurity assessments are done with a checklist of how many high-risk, medium-risk, and low-risk vulnerabilities there are. It's very non-human, which is something a lot of people will get turned off by. If you truly want executive leaders to start paying attention to cybersecurity, you need to present it in a more humane so that it’s …
  continue reading
 
Securing Humanity is a collective responsibility. In this episode, Matthew Stephenson interviews Elsine Van Os, the founder and CEO of Signpost Six, Insider Risk Management consultancy firm with behavioral science at its heart. Elsine discusses cybersecurity and risk management within the organization, and shares the psychological aspect of it all.…
  continue reading
 
Adobe is one of the most ubiquitous brands worldwide, being present in almost every tool or industry imaginable these days. How do you secure everything and keep data safe from cyberattacks when running such a huge company? Eric Anderson, Director of Enterprise Security at Adobe, joins Matthew Stephenson to discuss how they approach cybersecurity w…
  continue reading
 
In this digital age, leaving your data unprotected will surely invite cyber attackers to take advantage of your precious information. On top of ensuring a foolproof strategy that keeps away hackers, you must also be wary of insider threats that may jeopardize your data. Matthew Stephenson chats with Christine Gadsby, the Vice President of Product S…
  continue reading
 
How secure is your security? How can you ensure it is free from defects and critical vulnerabilities? In this episode, Derek Fisher, the author of the Application Security Program Handbook, shares how developers can position themselves to minimize risk in the space created. Derek tries to map everything back to risks in developing software to ensur…
  continue reading
 
More often than not, the first thing that comes to mind with the term "cyber threat" is something external. But did you know that internal threats are just as serious as external ones? In this episode, Matthew Stephenson sits down with technologist Kurtis Minder, the Founder of GroupSense, to discuss how to watch out for cybersecurity attacks from …
  continue reading
 
In this new technological age, it may seem like we have already made so much progress towards advancing with science, machines, software, and technology as a whole—but we actually still may not be as far off as we think we are. In this episode, Matthew Stephenson sits down with Arun Vishwanath and discusses cybersecurity, how much it has done so fa…
  continue reading
 
How secure is your security program? The rampant issues of unauthorized access, use, and modification of customer data require a security program to further secure and protect this information. In this episode of Friendly Fire, Sean Cassidy, the Head of Security at Asana, sits with Matt to share his insights on how you can build a secure security p…
  continue reading
 
Research shows that 80% of the users of your tools cause 8% of your security incidents. You cannot safeguard your entire business until you know who these people are. When identifying risky employees, reducing future incidents, and defending the workforce, Robert Fly is your security guy! In this episode, he sits with Matthew Stephenson to share hi…
  continue reading
 
8% of your employees are going to cause 80% of your security incidents. Employee mistakes are inevitable, no matter how much training you give them. That is why you need to change the way you think about security and plan ahead. Instead of trying to put out fires, prevent them from happening in the first place. Join Matthew Stephenson as he talks t…
  continue reading
 
Having a diverse background in our careers rewards us with diverse experiences and insights. Janet Heins brings the breadth of her career experience to her role as the Chief Information Security Officer (CISO) at iHeartMedia. In this episode, she sits down with Matthew Stephenson to tell us about her journey from the cruise line industry, manufactu…
  continue reading
 
The role of a CISO is one with many responsibilities. How do people in this position manage and balance everything that comes with their role? Here to shed light with a psychoanalytical perspective on the role is Mark Eggleston, CSC's chief information security officer (CISO). He is responsible for the global security and privacy program design, op…
  continue reading
 
In a Zero Trust model, you have to always assume a breach. This is a model that everyone needs to be aware of because everyone wants to know that they are being protected, especially in school. Parents want to know that their children are in a safe environment. This is what the Chief Information Security Officer at SMU, George Finney is tasked with…
  continue reading
 
Do you think your job is hard? Well, being the Chief Security Officer at HCA Healthcare, Paul Connelly was able to wrap his arms around an industry where there are 275,000 employees and 36 million patient care encounters each year. But how does he do that? In today’s episode, Paul Connelly shares his endeavours as a Chief Security Officer who built…
  continue reading
 
Zero Trust has been a thing for a few years now, and people have leaned into it. However, Booz Allen's Commercial Practice is changing that narrative and looking to the future to evolve the notion of Trust. In this episode, Matthew Stephenson welcomes the Vice President of Booz Allen's Commercial Practice, Luke Simonetti. Luke explains what Dynamic…
  continue reading
 
Many people in workplaces around the world have been clicked dubious links thinking they’re important emails from work. These people have become victims of spear phishing, one of the biggest threats to workplace security right now. How can we protect ourselves from the bad actors that do this? In this episode, Camille Morhardt, the Director of Secu…
  continue reading
 
If you are the smartest person in your organization, then you're doing something wrong. Listen to your host Matthew Stephenson as he talks with Nick Ryan, the CISO at Baker Tilly, about the value of being the dumbest person in the room. Together, they discuss team culture and the different elements that shape successful mergers and acquisitions. Ni…
  continue reading
 
A cyberattack is a real and ongoing danger for businesses today. Cybersecurity training can help you protect your company from the inside so you can feel as prepared as possible. The Cyber Range and Training Center in RIT's Global Cybersecurity Institute does just this. They train people by giving them immersive scenarios and emulation training. Th…
  continue reading
 
Leading a team takes a lot of skill. Imagine what it takes to lead a team of 12,000! Find out how first-time CISO and Vice President for Insight and Microsoft's 2022 Security Changemaker of the Year, Jason Rader, powers through his day as he talks about the vital role his team plays in his or any organization. With more than 25 years of providing s…
  continue reading
 
Cybersecurity can help an organization do strategic development and whole lot of other things. But the biggest thing it brings to the table is trust. If you work in cybersecurity, the people in the organization has to trust you and you need to have the credentials for that. There is not trust without credibility. Trust is key in the world of cybers…
  continue reading
 
"Be yourself" is always good advice. But as hackers get smarter, they can be you too! In this digital age, more people spend time online, from connecting with family and friends to doing business. At the same time, online risks keep growing. So do we take offense or defense? In this episode, Dan Lohrmann, Field CISO for Public Sector & Client Advis…
  continue reading
 
Leaders and entrepreneurs know that there are a lot of factors in growing an organization. You must think about structures, making better decisions, and what truly matters. Matthew Stephenson sits down for a conversation with Dr. Shayla Treadwell on the importance of building a culture of trust in your organization to drive excellent results and ha…
  continue reading
 
For any system that involves humans, there is always the potential for vulnerabilities. Whether it is a system of communication or a physical security system, if humans are involved in any way, there is always the potential for someone to exploit a weakness. In this episode, F (freakyclown) C, Co-CEO at Cygenta, explores some ways that any system i…
  continue reading
 
Cybersecurity is one of the most important issues facing businesses and organizations today. The increasing reliance on technology has also increased the threat of cyberattacks. While there are many challenges associated with cybersecurity, there are also opportunities for organizations to improve their cybersecurity posture. Dr. Edward Amoroso, CE…
  continue reading
 
Being a CISO requires you to be the team's incident commander. You need to be willing to tackle problems and risks with good leadership. Users are looking up to you to help solve problems effectively. You need to guide these people so they won't get compromised. Join us as we talk to Brent Deterding about what it takes to engage your people as a CI…
  continue reading
 
Companies need to put more effort into empowering their people when it comes to creating a cybersecurity culture. This is what’s called the people-centric approach to cybersecurity culture. When someone comes forward because they clicked a malicious link, reward them. Don't punish them because then they will keep quiet about what they're doing. Hum…
  continue reading
 
There is a looming threat in the healthcare industry today: ransomware. Eddie Borrero, Vice President and Chief Information Security Officer at Blue Shield of California, advocates that companies must start prioritizing security to ensure the safety of businesses and, most importantly, people whose lives are on the line when systems go down. In tod…
  continue reading
 
A lot of people think that insider threats are always malicious, but most of the time, they are unwitting vectors of risk. Join Harris Schwartz as he talks to Co-Founder of the Cyentia Institute, Wade Baker, about his research on internal risks. Discover how much of it comes from human risks like email phishing or downloading malware. Learn how the…
  continue reading
 
When it comes to cybersecurity and protection, it's easy to blame the individual. But what are more effective methods to counter human risk? Joining Harris Schwartz for this episode is Mark Sangster. Mark is the Chief of Strategy for Adlumin. He is also an award-winning speaker and the author of No Safe Harbor: The Inside Truth About Cybercrime and…
  continue reading
 
Esta semana tuvimos el placer de recibir en la mesa a Juli de Gamer con mate y Crios Devs, y charlamos de todo. Desde su formación como diseñadora gráfica hasta su pasión por los videojuegos, y la industria en el país. Y como no? de lo más importante en esta semana sobre lo que pasó con los videojuegos. Nos pueden seguir en estas redes: Facebook: h…
  continue reading
 
Nos pueden seguir en estas redes: Facebook: https://www.facebook.com/friendlyfirevg/ Ivoox: https://ar.ivoox.com/es/friendly-fire Grupo de Facebook: https://www.facebook.com/groups/1501995776765178/ Twitter: @FriendlyFireVG Instagram: FriendlyFire_Podcast Blog: friendlyfirepodcast.blogspot.com/ Esta semana se rompió la maldición que impedía que Nic…
  continue reading
 
Loading …

Quick Reference Guide