1. EachPod
EachPod
Business Security Weekly (Audio) - Podcast

Business Security Weekly (Audio)

About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.

Business Technology News Tech News Leadership
Update frequency
every 7 days
Average duration
61 minutes
Episodes
430
Years Active
2016 - 2025
Share to:
BSW #264 - Dan Neault

BSW #264 - Dan Neault

In the Leadership and Communications section, Uber CISO's trial underscores the importance of truth, transparency, and trust, 4 Leadership Strategies to Help Women Advance in the Tech Industry, 5 Bes…

01:04:08  |   Wed 27 Jul 2022
BSW #263 - Jerry Layden, Kevin Powers

BSW #263 - Jerry Layden, Kevin Powers

Boards and CEOs are asking what their cyber risk posture is, and they aren't getting clear answers. Reports produced from assessments oftentimes are built on stale data rather than real-time complian…

00:58:10  |   Wed 27 Jul 2022
BSW #270 - Doug Landoll

BSW #270 - Doug Landoll

In the leadership and communications section, 5 Cybersecurity Questions CFOs Should Ask CISOs, How Leaders Can Escape Their Echo Chambers, 10 Cybersecurity Compliance Statistics That Show Why You Mus…

00:52:19  |   Mon 25 Jul 2022
BSW #269 - Mike Goldgof

BSW #269 - Mike Goldgof

In the leadership and communications section, How CISOs can prepare for new and unpredictable cyberthreats, 8 Leadership and Management Principles from Ex-Navy Seal, Practice Transparent Leadership, …

00:59:38  |   Wed 20 Jul 2022
BSW #268 - Security Money

BSW #268 - Security Money

In the Leadership and Communications segment: How to build a cyber capable board, Who Is Legally Responsible for a Cyber Incident?, Building a security culture of 'Yes', and more!

 

This edition of S…

01:04:31  |   Sat 16 Jul 2022
BSW #267 - Malcolm Harkins, Paul McKay, Alberto Yepéz

BSW #267 - Malcolm Harkins, Paul McKay, Alberto Yepéz

There was a time when the perceived wisdom was to buy best of breed security technologies and that would do for your security program. Trouble of is, none of it integrates with each other or your wid…

01:11:01  |   Fri 15 Jul 2022
BSW #266 - John Bruggeman & Brandon Dunlap

BSW #266 - John Bruggeman & Brandon Dunlap

What does a CISO do all day? Do they eat bon-bons and read the WSJ? Do they read Threatpost or BleepingComputer or Twitter? Why does a company need a CISO, or better still, do they need one? All thes…

00:55:30  |   Mon 11 Jul 2022
BSW #265 - Bryan Ware and Victor Gamra

BSW #265 - Bryan Ware and Victor Gamra

In the Leadership and Communications section, Being concerned is not enough – What boards should know and do about cybersecurity, In the Case of Cybersecurity, the Best Defense is Education, Reskilli…

01:03:02  |   Mon 11 Jul 2022
BSW #262 - Mike Ernst

BSW #262 - Mike Ernst

This week, we start off with an interview featuring Mike Ernst, VP of Sales Engineering, Worldwide at ExtraHop! Then, in the Leadership & Communications section: 6 information governance best practic…

00:56:48  |   Tue 10 May 2022
BSW #261 - Dave Klein

BSW #261 - Dave Klein

In our first segment: Dave Klein, Cybersecurity Evangelist at Cymulate joins Business Security Weekly to discuss the value of "Extended Security Posture Management"! Then In the Leadership and Commun…

00:54:20  |   Fri 06 May 2022
BSW #260 - Jess Burn

BSW #260 - Jess Burn

This week, Senior Analyst Jess Burn will go highlight Forrester's eight security program recommendations for 2022 that will help security leaders take full advantage of their political capital — and …

00:58:27  |   Thu 28 Apr 2022
BSW #259 - Tim Woods

BSW #259 - Tim Woods

This week, Tim Woods, VP Technology Alliances at Firemon, joins BSW to discuss how centralized policy management can provide the visibility, enforcement, and compliance of policies across hybrid clou…

01:05:10  |   Wed 20 Apr 2022
BSW #258 - Derek Manky

BSW #258 - Derek Manky

By and large, individual malware strains come and go, but to stop attacks more quickly, organizations need to gain a deeper understanding of attack techniques. By analyzing the attack goals of attack…

00:56:57  |   Wed 13 Apr 2022
BSW #257 - Jonathan Gohstand

BSW #257 - Jonathan Gohstand

As the world shifted to remote work, then hybrid work, organizations have struggled with legacy technologies to solve the security challenges of this new way of working. But what if you could use the…

00:58:40  |   Thu 07 Apr 2022
BSW #256 - Charlene Deaver-Vazquez

BSW #256 - Charlene Deaver-Vazquez

Every CISO CIO asks the question, what's the risk? Quantitative analysis, mathematical models are designed to answer this question. Understand how they work, when to use them, and what they can tell …

00:55:11  |   Wed 30 Mar 2022
BSW #255 - Olesia Klevchuk

BSW #255 - Olesia Klevchuk

The most recent trends in social engineering, the latest methods attackers are using to trick their victims, and the best practices to protect your business from these evolving threats. In the Leader…

00:54:14  |   Thu 24 Mar 2022
BSW #254 - Jody Brazil

BSW #254 - Jody Brazil

It doesn't matter how much security technology you have, how much you spend on security: security outcomes are achieved by doing all the little things right. You can spend $10M on network security te…

00:57:48  |   Thu 17 Mar 2022
BSW #253 - Michael McPherson

BSW #253 - Michael McPherson

Something is seriously wrong with our current approach to cybersecurity––the more we spend, the worse the situation becomes. In an industry plagued by a chronic talent shortage, one thing is clear: s…

00:58:58  |   Wed 09 Mar 2022
Good Human Nature - BSW #252

Good Human Nature - BSW #252

Ransomware developments we saw over the past year—along with a look ahead at what to expect in 2022. In the Leadership and Communications section, Answer this question to assess your leadership, Part…

01:03:21  |   Wed 02 Mar 2022
Accurate Assessment - BSW #251

Accurate Assessment - BSW #251

The Business Information Security Officer, or BISO, is relatively new and somewhat controversial role. Does this role act as the CISO's non-technical liaison to the business units or as the CISO's de…

01:06:05  |   Thu 24 Feb 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Security Weekly Productions. This content is not affiliated with or endorsed by eachpod.com.