• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 2 – Ben Carr – SCW #98

Security Weekly Productions Ben Carr, dockerized, Jeff Man, Johanna Baum, Kat Valentine, life of a virtual CISO, not compliance, risk management, security careers, security certifications, security degree, Security Policy, the current state of privacy and software development, Travis Isaacson December 14, 2021



Ben Carr will lead us in a discussion about the origins of the role of CISO, roles/responsibilities, and what it’s like to be a CISO. We’ll touch on qualifications, organizational structure, its place in security and compliance, what it’s like to be hero or scapegoat. All this and more! Visit https://www.securityweekly.com/scw for all the latest episodes!

Full Episode Show Notes

Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 2

Guests

Ben Carr

Ben Carr – CISO at Cradlepoint

Ben Carr, is the Chief Information Security Officer at Cradlepoint. Ben is an information security and risk executive and thought leader with more than 25 years of results driven experience in developing and executing long-term security strategies. He is focused on solving security issues that address current business objectives while balancing today’s operational risks. Ben has demonstrated global leadership and experience, through executive leadership roles of advanced technology, high risk, and rapid growth initiatives at companies such as Aristocrat, Tenable, Visa and Nokia. While at Aristocrat Ben built a world class global Cybersecurity program from the ground up as part of a digital transformation. As a senior Cybersecurity executive at Visa, Ben was responsible for developing and leading Visa’s global Attack Surface Management team and capability. Prior to his role at Visa he led all security programs for Nokia corporate IT as the Global Head of IT Security. He has a strong technical background, product development experience, and operational awareness centered around a data centric and risk based approach. Ben is on the Board of Director for IT-ISAC, and has served on Advisory boards for Mimecast, Qualys, Accuvant, and Sentinel One. Ben has also served on philanthropic advisory boards for PKU support and awareness.

Hosts

Jeff Man

Jeff Man – #HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems

@MrJeffMan

Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon. Currently a Sr. InfoSec Consultant for Online Business Systems.

Johanna Baum

Johanna Baum – CEO, Founder at Strategic Security Solutions

@johannabaums3

Johanna (Jo) Baum, CEO and Founder of S3, a security consulting company focusing on IAM, eGRC, and Security Professional Services.

Jo has vast expertise in the security and compliance field and has served both industry and large consulting organizations. For the last fourteen years, she has operated as the CEO and founder of Strategic Security Solutions (S3) providing security, eGRC, and IDG services for Fortune 2000 companies.

Kat Valentine

Kat Valentine – Compliance Free Agent (Consultant) at Osmosis Security

Getting her start with phones and computers at the early age of 6, Kat decided to put fear of success and failure aside to start Osmosis Security, a boutique security firm that supported her vision of what the professional hacker community should be focused on. Kat had humble beginnings and started her career working technical support for a local dial-up ISP in 1998. Since then, Kat worked in many different roles, from network voice engineer, vulnerability researcher to auditor, and is responsible for the secure and compliant design of several well-known cloud providers, payment providers, security platforms and end user applications, including the first compliance automation platform.

Announcements

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

  • In an overabundance of caution, we have decided to flip this year’s SW Unlocked to a virtual format. The safety of our listeners and hosts is our number one priority. We will miss seeing you all in person, but we hope you can still join us at Security Weekly Unlocked Virtual! The event will now take place on Thursday, Dec 16 from 9am-6pm ET. You can still register for free at https://securityweekly.com/unlocked.

Related Posts

hp jeff

Jeff Man /

HP Print Security Tech Day: An In-Depth Review

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes