Logo

    Information Sharing - A 360 Degree View, Part 2 - Errol Weiss - SCW #68

    enApril 07, 2021
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Errol will talk about his experiences with information sharing and building the world's first Information Sharing & Analysis Center in 1999. Errol brings unique perspective to the table as he was the service provider behind the Financial Services ISAC, then a subscriber and ISAC member for 13 years in the banking and finance sector.

    Segment Resources: National Council of ISACs - great resource to find out about all the different ISACs https://www.nationalisacs.org/

    ISAOs - https://www.isao.org/information-sharing-groups/

    Information Sharing Best Practices Toolkit: https://h-isac.org/h-isac-information-sharing-best-practices/

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw68

    Recent Episodes from Security and Compliance Weekly (video)

    The Security Hippie, Part 2 - Barak Engel - SCW #99

    The Security Hippie, Part 2 - Barak Engel - SCW #99

    Author of "Why CISOs Fail" is joining us today to tell us about the success of his first book as well as introduce us to his forthcoming book, "Security Hippie. Barak is best known for pioneering the concept of the virtual (or fractional) CISO model nearly two decades ago. Over the twenty years since then he has applied that model and strategy to building, managing and counseling security departments across countless and diverse organizations, including MuleSoft, Amplitude Analytics, Livenation/Ticketmaster, StubHub, Barnes and Noble, bebe Stores and many others. The goal of his new book is to convey security concepts in the form of telling stories, so we hope to hear a few examples from him during the course of the interview.

     

    To leave a heartfelt message for Hannah (Jeff's granddaughter): https://www.caringbridge.org/visit/hannahman

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw99

    The Security Hippie, Part 1 - Barak Engel - SCW #99

    The Security Hippie, Part 1 - Barak Engel - SCW #99

    Author of "Why CISOs Fail" is joining us today to tell us about the success of his first book as well as introduce us to his forthcoming book, "Security Hippie. Barak is best known for pioneering the concept of the virtual (or fractional) CISO model nearly two decades ago. Over the twenty years since then he has applied that model and strategy to building, managing and counseling security departments across countless and diverse organizations, including MuleSoft, Amplitude Analytics, Livenation/Ticketmaster, StubHub, Barnes and Noble, bebe Stores and many others. The goal of his new book is to convey security concepts in the form of telling stories, so we hope to hear a few examples from him during the course of the interview.

     

    To leave a heartfelt message for Hannah (Jeff's granddaughter): https://www.caringbridge.org/visit/hannahman

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw99

    Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 2 - Ben Carr - SCW #98

    Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 2 - Ben Carr - SCW #98

    Ben Carr will lead us in a discussion about the origins of the role of CISO, roles/responsibilities, and what it's like to be a CISO. We'll touch on qualifications, organizational structure, its place in security and compliance, what it's like to be hero or scapegoat. All this and more!

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw98

    Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 1 - Ben Carr - SCW #98

    Everything You Wanted to Know About CISOs But Were Afraid to Ask, Part 1 - Ben Carr - SCW #98

    Ben Carr will lead us in a discussion about the origins of the role of CISO, roles/responsibilities, and what it's like to be a CISO. We'll touch on qualifications, organizational structure, its place in security and compliance, what it's like to be hero or scapegoat. All this and more!

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw98

    Hacker Situational Awareness, Part 2 - John Threat - SCW #97

    Hacker Situational Awareness, Part 2 - John Threat - SCW #97

    There’s something happening here – and what it is ain’t exactly clear to O.G hackers like John Threat or our own Mr. Jeff Man. We’re going to devote an episode talking about how things used to be back in the day from a hacker/penetration perspective and discuss how things are today. Are things better? Worse? Depends on your attack vector, perhaps? Join us on Discord and participate in the discussion of what’s right and what’s wrong in our industry today and what can we do about it. All from a hacker’s perspective.

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw97

    Hacker Situational Awareness, Part 1 - John Threat - SCW #97

    Hacker Situational Awareness, Part 1 - John Threat - SCW #97

    There’s something happening here – and what it is ain’t exactly clear to O.G hackers like John Threat or our own Mr. Jeff Man. We’re going to devote an episode talking about how things used to be back in the day from a hacker/penetration perspective and discuss how things are today. Are things better? Worse? Depends on your attack vector, perhaps? Join us on Discord and participate in the discussion of what’s right and what’s wrong in our industry today and what can we do about it. All from a hacker’s perspective.

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw97

    Security & Compliance Thru the Lens of a Technology Journalist, Part 2 - Evan Schuman - SCW #96

    Security & Compliance Thru the Lens of a Technology Journalist, Part 2 - Evan Schuman - SCW #96

    In the early days of PCI there was an online column called StorefrontBacktalk which focused on retail and technology issues. The column provided valuable insights from various specialists on the interpretation and application of many of the more challenging security requirements found in PCI DSS which was reflected in its tag line, “Techniques, Tools and Tirade about Retail Technology and E-Commerce. The founder of the column, Evan Schuman, is a veteran journalist who has covered a wide range of technology, privacy and legal issues over the past three decades. Evan will give us his take on many of the issues facing the connected world -past, present, and future.

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw96

    Security & Compliance Thru the Lens of a Technology Journalist, Part 1 - Evan Schuman - SCW #96

    Security & Compliance Thru the Lens of a Technology Journalist, Part 1 - Evan Schuman - SCW #96

    In the early days of PCI there was an online column called StorefrontBacktalk which focused on retail and technology issues. The column provided valuable insights from various specialists on the interpretation and application of many of the more challenging security requirements found in PCI DSS which was reflected in its tag line, “Techniques, Tools and Tirade about Retail Technology and E-Commerce. The founder of the column, Evan Schuman, is a veteran journalist who has covered a wide range of technology, privacy and legal issues over the past three decades. Evan will give us his take on many of the issues facing the connected world -past, present, and future.

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw96

    CISA Guidance for MSPs and SMBs, Part 2 - Chris Loehr - SCW #95

    CISA Guidance for MSPs and SMBs, Part 2 - Chris Loehr - SCW #95

    CISA recently published guidance for how managed service providers (MSPs) should approach security for their operations based on the premise that cyber threat actors are known to target MSPs to reach their customers. MSPs provide remote management of customer IT and end-user systems and generally have direct access to their customers’ networks and data. By exploiting trust relationships in MSP networks, cyber threat actors can gain access to a large number of the victim MSP customers. The CISA Insights publication provides mitigation and hardening guidance for MSPs and their small- and mid-size business customers. By applying this guidance, organizations can protect MSP customer network assets and reduce the risk of successful cyberattacks. Our conversation today will focus on the problems that MSPs and SMBs face in achieving the right level of security for their organizations, satisfy compliance and regulatory requirements, while trying to stay in business.

     

    Segment Resources: https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw95

    CISA Guidance for MSPs and SMBs, Part 1 - Chris Loehr - SCW #95

    CISA Guidance for MSPs and SMBs, Part 1 - Chris Loehr - SCW #95

    CISA recently published guidance for how managed service providers (MSPs) should approach security for their operations based on the premise that cyber threat actors are known to target MSPs to reach their customers. MSPs provide remote management of customer IT and end-user systems and generally have direct access to their customers’ networks and data. By exploiting trust relationships in MSP networks, cyber threat actors can gain access to a large number of the victim MSP customers. The CISA Insights publication provides mitigation and hardening guidance for MSPs and their small- and mid-size business customers. By applying this guidance, organizations can protect MSP customer network assets and reduce the risk of successful cyberattacks. Our conversation today will focus on the problems that MSPs and SMBs face in achieving the right level of security for their organizations, satisfy compliance and regulatory requirements, while trying to stay in business.

     

    Segment Resources: https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw95

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io