1. Accelerating Security with Security Automation – 03:00 PM-03:30 PM
Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, join our Discord Server, and follow us on our newest live-streaming platform, Twitch!
Are you struggling with Alert Overload, Manual Processes, Multiple/Disparate Tools, Talent Shortage, and/or Budget Constraints? Of course you are! John McClure, Chief Information Security Officer from Laureate Education, joins us to discuss how he solved these challenges by implementing SOAR and accelerating security.
John McClure – CISO at Laureate Education, Inc.
John McClure is the Chief Information Security Officer for Laureate Education, Inc. He is a proud military veteran (Army Aviation.) He separated from the military to enter in the technology field. John has worked for more than 20-years in the critical infrastructure and information security arena, and supported the federal government and Intelligence Community for over 20 years before transitioning to the commercial sector.
CIO & CSO at Carousel Industries
Executive Director at CyberRisk Alliance
Founder at Security Weekly
2. Risk Management Approach, Automation, & the Problem With Cyber Insurance – 03:30 PM-04:00 PM
Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!
In the Leadership and Communications section, Developing a Risk Management Approach to Cybersecurity, How Automation Can Protect Against Data Breaches, The Problem with Cyber Insurance: Outdated Incentives, and more!
1. Security operations
2. Cyberrisk and cyber intelligence
3. Data loss and fraud prevention
4. Security architecture
5. Identity and access management
6. Program management
7. Investigations and forensics
1. Benefits of Cybersecurity Investments Must be Framed Around Enterprise Goals
2. Define and determine risk posture
3. Drive home the value proposition added and control the narrative
The Problem with Cyber Insurance: Outdated Incentives – Instead of solving your cybersecurity problems, cyber insurance companies capitalize on your amortized cost given the probability of a breach. It’s economically viable because data breaches have been relatively cheap. Here’s the limitations of cyber insurance:
1. Cyber Insurance Won’t Save your Reputation
2. Cyber Insurance Won’t Save your Data
3. Cyber Insurance may not be a Sustainable Industry
Research: A Little Recognition Can Provide a Big Morale Boost – As organizations large and small face the twin challenges of increasingly strained budgets and burned out workforces, what can managers do to keep employees engaged — without breaking the bank? In this piece, the authors share new research on the power of symbolic awards such as thank you notes, public recognition, and certificates. They find that these simple interventions can significantly improve employee motivation, but clarify that to maximize their effect, it’s essential to customize these rewards to your unique context. Specifically, the authors draw on prior research to highlight five key considerations for managers looking to implement symbolic awards: the most impactful messenger, the best timing, whether to make it private or public, attention to detail, and the importance of starting small. While these interventions are no substitute for fair monetary compensation, especially when cash is limited, symbolic awards can go a long way to demonstrate your appreciation for your employees and keep spirits high.