bsw213

Business Security Weekly Episode #213 – April 19, 2021

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. The Hybrid Workforce: Addressing the Challenges of Work from Anywhere – 03:00 PM-03:30 PM

Sponsored By

sponsor
Visit https://securityweekly.com/barracuda for more information!

Announcements

  • Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, join our Discord Server, and follow us on our newest live-streaming platform, Twitch!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

Description

When the world went fully remote a year ago, many systems had to migrate from on-premise to the cloud. Now that we’re starting to re-open offices, do we move these system back to on-premise or is cloud the new normal? Fleming Shi, CTO from Barracuda Networks, joins us to discuss the ongoing challenges of the hybrid workforce.

This segment is sponsored by Barracuda Networks.

Visit https://securityweekly.com/barracuda to learn more about them!

Guest(s)

Fleming Shi

Fleming Shi – CTO at Barracuda Networks

@ShiFleming

Fleming joined Barracuda in 2004 as the founding engineer for the company’s web security product offerings, helping to create the first version of Barracuda’s message archiving product and paving the way for expansion into new content security product areas. As Chief Technology Officer, Fleming leads the company’s threat research and innovation engineering teams in building future technology platforms to deliver continued success in our security and data protection products. He has more than 20 patents granted or pending in network and content security.

Hosts

JasonAlbuquerque

Jason Albuquerque

@Jay_Albuquerque

CIO & CSO at Carousel Industries

MattAlderman

Matt Alderman

@maldermania

Executive Director at CyberRisk Alliance

PaulAsadoorian

Paul Asadoorian

@securityweekly

Founder at Security Weekly

2. Cyber-Risk Threat, 4 Steps to Better Security Hygiene, & 10 Rules for Work-Life – 03:30 PM-04:00 PM

Announcements

  • Our next live webcast will be on April 29th at 11am ET where you will learn how to prepare for & prevent modern ransomware attacks! Our next technical training will be on May 6th at 11am ET. This technical training webcast will explore common misconfigurations of NGINX, the damage they could do, and how to avoid them. Also join us May 13th at 11am ET for a technical training with Thycotic to see how attackers gain access to endpoints and learn defensive strategies to protect against those attacks. Visit https://securityweekly.com/webcasts to register now! If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand

Description

In the Leadership and Communications section, Federal Reserve Chairman Says Cyber-Risk a Top Threat to National Economy, What Good Leaders Do When Replacing Bad Leaders, My Ten Rules for Work-Life Balance, and more!

Hosts

JasonAlbuquerque

Jason Albuquerque

@Jay_Albuquerque

CIO & CSO at Carousel Industries

MattAlderman

Matt Alderman

@maldermania

Executive Director at CyberRisk Alliance

  1. Federal Reserve Chairman Says Cyber-Risk a Top Threat to National Economy – Cyberattacks on major financial institutions pose one of the biggest threats to the US economy, with the potential to cripple the system, according to Federal Reserve Chairman Jerome Powell.
  2. 4 steps to better security hygiene and posture management – CISOs know that cybersecurity depends upon a foundation of strong security hygiene and posture management, but increasing scale and complexity make the basics all but impossible. So, what do they do? Leading CISOs I’ve spoken with recently take the following steps:

    1. Take over attack surface management
    2. Focus on the crown jewels
    3. Invest in cloud security
    4. Increase testing

  3. What Good Leaders Do When Replacing Bad Leaders – Any leader who is assuming a role previously held by someone else has to face their predecessor’s legacy, but those who are replacing poor or controversial leaders have a special challenge. These three strategies will help your company move on:

    1) Acknowledge the contributions of the previous leader. Don’t ignore their contributions or blame them for all of the organization’s challenges.
    2) Create space for forgiveness. It will allow people to let go of the past and make room for a new vision and direction.
    3) Seek to understand your employees’ experience. Ask them what they want and need going forward. You will have some employees who are supportive of previous leadership.

    You don’t automatically become a good leader merely by taking over for a bad one. Ultimately you become a good leader by leading differently and more inclusively.

  4. “Security leaders must communicate consistently and with transparency to build trust” – In turbulent times organizations need to focus on business priorities and restructure processes and teams. How should security leaders set their priorities and how do they tackle the security incidents at scale – even as security budgets remain flat? And what are the communication strategies that CISOs need to adopt while communicating with Board members and other stakeholders?
  5. The CISO Life Is Half as Good – Lora Vaughn was at a crossroads — and that was before mandated pandemic lockdowns came into play. Here’s her story of how life got sweeter after she stepped away from the CISO job.
  6. My Ten Rules for Work-Life Balance – My 10 Rules for Work-Life Balance:

    1. I do not wake up before 7:30 a.m. and I make certain I go to sleep before 1 a.m.
    2. I always get 7.5 to 8 hours of sleep a night. (And if I don’t, I will take an afternoon nap, period.)
    3. I do not take meetings on Wednesdays.
    4. One day a month — and only one day a month — I binge watch YouTube for a few hours.
    5. I do not work while I’m eating lunch and dinner, even if that means I eat in 10 minutes and am 10 minutes late to a meeting.
    6. I play an iPhone game every single day.
    7. I meditate every day.
    8. I call my mom when I wake up, when I go to sleep, and at lunch and dinner.
    9. I schedule monthly catch-ups with my friends.
    10. I play with my dog, walk him, and/or train him every day.

PaulAsadoorian

Paul Asadoorian

@securityweekly

Founder at Security Weekly