Artwork

Content provided by McCreight & Leece. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by McCreight & Leece or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Innovation and Influence

34:09
 
Share
 

Manage episode 314763844 series 2866181
Content provided by McCreight & Leece. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by McCreight & Leece or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

The year end episode does some comparing and contrasting of risk management in different areas, including things outside of cyber. Ironically, recorded just a couple days before most of the world learned about a module design choice in Java that suddenly makes logging dangerous, it brings home the point that our cyber threat landscape is complex .
Complexity and uncertainty are nothing new for cyber security and risk management professionals. Navigating through those waters despite the lack of authority often afforded those tasked with ensuring an organization's safety adds human behaviour to that complexity. Tim offers a number of suggestions on influencing action despite competing agendas within the organization.

  continue reading

40 episodes

Artwork
iconShare
 
Manage episode 314763844 series 2866181
Content provided by McCreight & Leece. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by McCreight & Leece or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

The year end episode does some comparing and contrasting of risk management in different areas, including things outside of cyber. Ironically, recorded just a couple days before most of the world learned about a module design choice in Java that suddenly makes logging dangerous, it brings home the point that our cyber threat landscape is complex .
Complexity and uncertainty are nothing new for cyber security and risk management professionals. Navigating through those waters despite the lack of authority often afforded those tasked with ensuring an organization's safety adds human behaviour to that complexity. Tim offers a number of suggestions on influencing action despite competing agendas within the organization.

  continue reading

40 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide