Compromising Positions - A Cyber Security Podcast Titelbild

Compromising Positions - A Cyber Security Podcast

Compromising Positions - A Cyber Security Podcast

Von: Compromising Positions
Jetzt kostenlos hören, ohne Abo

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals.

We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey.

Every week we will be joined by Developers, User Researchers, Designers, Product Owners, Data Scientists, Cloud Specialists, Scrum Masters, C-Suite Execs, AI/MI boffins, and many, many more non-security positions!

This is a podcast aim to get you thinking about security without boring you to death!

Join our two hosts, Lianne Potter, Cyber Anthropologist and Head of Security Operations at a major retailer and Jeff Watkins, CTO at XDesign for this informal, frank, and at times anarchic look at what people really think about cybersecurity in organisations and what cybersecurity people should ACTUALLY be doing.

Property of Lianne Potter and Jeff Watkins
Sozialwissenschaften Ökonomie
  • EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!
    Nov 21 2024

    Did you know the best way to bring down hackers is to punch them in the face? That if you don’t have a seven screen set up you’re a rogue amateur? Or that the best hackers have fins?

    This Episode we are joined by Simon Painter a senior software engineer with nearly 20 years of experience in the industry and author of the book Functional Programming with C#.

    In this episode, Hack The Movies! The Best And Worst Hacker Movies Part 2! Our regular programming has been hijacked to bring you a discussion on the best, and worst, hacker movies! In this episode we cover The Beekeeper (2024), Swordfish (2001), Jonny Mnemonic (1995), Paper Man (1971) and The Italian Job (1969).

    So boot up that modem, turn off the lights and enter the deepest darkest web of hacker forums, and try not overload your memory bank, as we explore this sometimes brilliant and sometimes bonkers sub-genre!

    Show Notes

    A Developer Goes to The Movies! Simon’s fantastic history on how technology features in films

    Paper Man (1971)

    About SIMON PAINTER

    With nearly 20 years of software engineering experience across various industries, Simon is a Senior Software Engineer at Talos360. Simon is also a Microsoft Most Valuable Professional (MVP) since 2023, an O'Reilly technical book author, and a public speaker at IT events worldwide.

    His core competencies include C#, JavaScript, React.js, and Microsoft Azure, as well as ITIL and computer security.

    LINKS FOR SIMON PaINTER

    Simon’s Website

    Simon’s Linkedin

    Simon’s Book, Functional Programming with C#

    Mehr anzeigen Weniger anzeigen
    1 Std. und 20 Min.
  • EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget
    Nov 14 2024

    We all know running a cybersecurity function is expensive and many of us have a hard time successfully negotiating the budgets we need to keep our organisation safe.

    But what if we let you in on the secrets of successfully securing your cybersecurity budget?

    This week we are joined by Scott Robertson, CFO of CreateFuture and he gives us the insights on what you should ask for when it comes to your next yearly budget, how to ask for it and crucially (because timing is everything when it comes to money!) when to ask for it!

    Key Takeaways:

    What Does a CFO do? A CFO is not just about managing financials but also safeguarding assets and ensuring future stability through effective risk management.

    Time Your Requests Strategically: Discover the optimal timing to approach your CFO for budget increases and how to align your requests with the organisation's financial planning.

    Quantify the Cost of Risk: Learn how to effectively communicate the potential financial impact of cyberattacks and the value of preventive measures.

    Build Strong Relationships: Cultivate relationships with key stakeholders, including the CFO and other executives, to foster trust and support.

    Prioritise and Justify: Identify critical security needs, prioritise investments, and present a compelling business case to secure the necessary budget.

    Mehr anzeigen Weniger anzeigen
    41 Min.
  • EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?
    Nov 7 2024

    The data landscape is changing faster than ever, and with it, the security threats - so whose responsibility is it to make sure your data is safe? Is it the data team? Or is it the cyber team? We tackle this question and more with Head of Data at AND Digital, Tim Hatton.

    From leveraging AI to secure data to the importance of real user testing, to how Tim threat models his client’s data capability, you won’t want to skip this ever-important topic!

    We also talk about ‘data mesh’ and if you’re not familiar with that term - it’s a data management framework that decentralises data ownership and responsibility to the teams that use the data. The idea is to make data more accessible and available to business users by directly connecting data owners, data producers, and data consumers.

    So you can see why we thought that was an important topic to cover because, with this model, comes a lot of trust in others doing the right thing when it comes to data security!

    So you won’t want to ‘mesh it up’ if people are following this framework in your organisation.

    Key Takeaways:

    Test User Journeys with Real People: Assumptions don't cut it—Tim emphasizes the importance of validating user journeys with real-world testing to ensure effective data usage.

    AI and the Data Deluge: Friend or Foe? We explore the booming trend of AI in data management, but also ask the tough questions: Can AI be used for good in cybersecurity? Can it even help solve cold cases?

    Holistic Data Security Assessments: Discover Tim's approach to assessing clients' data capabilities and security, involving both data and cybersecurity teams for comprehensive protection.

    Maturity Matters: Responsibility for Data Protection. Tim reveals a surprising trend - immature organizations might have stricter controls! Discover how your organization's maturity level defines data security ownership.

    The Future of Self-Sovereign Data: Explore the concept of self-sovereign data and why it might be the future of personal data management and security.

    Show Notes

    Book - Wicked Beyond Belief (The one I mistakenly said was Helter Skelter)

    An Article on Self-Sovereign Data

    About Tim Hatton

    Tim Hatton has been working in digital since before it was called digital. Over the course of his career, he has worked on data and digital transformation projects for some of the biggest companies in the world.

    He joined AND Digital in 2016 and is currently Head of Data. At AND he has worked on data strategy projects for clients in industries including finance, travel, publishing and retail as well as for several government departments.

    Tim joined AND from Accenture Digital, and prior to this Tim ran his own digital marketing agency for many years, and co-founded a number of dotcom start-ups during the 1990s, none of which made him a millionaire but all of which taught him a great deal.

    Tim is a regular speaker on digital topics at AND Digital events, for AND’s clients and in the media.

    LINKS FOR Tim Hatton

    Tim’s LinkedIn

    Mehr anzeigen Weniger anzeigen
    44 Min.
Noch keine Rezensionen vorhanden