Leadership as a Hero’s Journey: 4 Virtues for Transforming Uncertainty and Anxiety into Results
Today I had an interesting conversation with Ken Westin. Ken is commonly referred to as ‘The Good Hacker’ and has spent the past 15 years working with law enforcement and research teams to analyze current and emerging threats to determine how our everyday products and gadgets can mitigate these threats.
He is regularly reached out to as a subject matter expert in the area of security, privacy and surveillance technologies.
In our industry people do a lot of talking about how they want to stop cyber security threat, developing technologies they hope will stop threats, but rarely do you actually come in contact with people actually demonstrating a track record of success thwarting, mitigating and bringing people to justice.
This episode is sponsored by the CIO Scoreboard
What you will learn from this interview:
How to get in touch with Ken:
RSA Conference Session – Killing the Kill Chain
LinkedIn Published Articles
Ken Podcast I enjoyed at Tripwire site
BBC article – “I’m a professional cyberstalker”
Defcon Talk: Confessions of a Professional Cyber Stalker
Resources Mentioned:
ID Experts – Radar product – Helps with hi profile breach cleanup cases
Tripwire– Automation of Security Compliance + Workflow
Bill’s interview with Aharon Chernin, CTO of Soltra
Summarized Show Notes:
This episode is sponsored by the CIO Scoreboard
All methods of how to access the show are below:
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter.
This episode is sponsored by the CIO Scoreboard
I have never been particularly impressed with people who achieve meteoric results in business if other areas of their lives are going in exactly the opposite direction or are stagnant. What good is it to satisfy shareholders if your kids see you rarely or they see you but you are not present with them? Or you achieve business goals but skip your thirties with exercise because you feel that you can’t afford to take the time.
Since my twenties, my bigger fascination has been to find models of success that incorporate all areas of life (business, family, relationships, health and spirituality) as a vision of success. My interest has been to find and learn from well-rounded people who have a mission and focus on positive impact in all major areas of life. They are far more interesting and usually get great business results as well.
Notably, one of the patterns of highly self-actualized people that I have observed is that they have some combination of experts, trainers, coaches, thought leaders, mastermind groups, etc around them to help them reach the highest levels of performance and to ‘be’ the best expressions of themselves multiple areas of life.
Some Fortune 500 companies invest in Executive Coaches for top level executives in order to make sure that their investments in critical leaders and the teams and assets they lead are optimized for performance. There is quite a lot riding on peak performance. The better a corporate leader performs, the better the company does. It is quite simple. Leaders need coaches just like athletes.
I asked myself - what do top Executive Coaches do with their clients to achieve great results? I wanted to know so I asked Gail.
Gail is super impressive. She has been working with top leaders of American businesses now for the better part of 25+ years in the areas of Executive Leadership Development, Lifestyle Management, Wellness, Succession Planning, and Strategic Business Planning. She is one of the best at optimizing business executives in all areas of life.
Her level of professionalism and insight is off the chart. I stumbled into her while reading her gem of a book All Together Now: Vision, Leadership, and Wellness and as a result reached out to her since I couldn’t stop taking notes as I read it. She approaches business and personal performance as one and the same and believes they are intricately linked.
I am on a mission to get you to operate at the highest levels you can in all areas of life. In this episode we discuss:
Gail Voisin is the CEO of her coaching and consulting practice in Toronto, Canada, She is an international Executive Coach and trusted advisor to corporate executives in North America and globally. She is an author of her Book - The All Together Now Advantage™, which is a proven success. With her unique background and combination of skills, she integrates and links Vision, Leadership and Wellness to strategic plans and organizational objectives to measure Return On Investment (ROI).
How to get in touch with Gail:
All Together Now: Vision, Leadership, and Wellness
Resources Mentioned:
Summarized Show Notes:
This episode is sponsored by the CIO Scoreboard
All methods of how to access the show are below:
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe below for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.
This episode is sponsored by the CIO Scoreboard
In this episode I interviewed Tyler Cohen Wood who has an impressive amount of experience in Cyber security, and Digital Forensic Security - in addition to helping the White House, the Department of Defense, The Intelligence Community, Federal Law enforcement and even NASA.
In our discussion on security, we talk about the different protections available on Social media and the different types of cookies and how to ensure that you are protecting yourself and your family to the maximum. Read further for more information as we discuss the following important points:
As a business leader who wants to be fluent on the impact of current privacy and security challenges, you will find Tyler’s message educational on both the personal, work, and family areas of your life.
Tyler Cohen Wood is an expert in social media and cyber issues. She was a senior officer and a Senior Leader and Cyber Branch Chief for the Defense Intelligence Agency. She was a cyber branch chief for the Defense Intelligence Agency (DIA) within the Department of Defense (DoD) where she makes decisions and recommendations significantly changing, interpreting, and developing important cyber policies and programs affecting current and future DoD and Intelligence Community policies. She previously worked for the Department of Defense Cyber Crime Center as a senior digital forensic analyst, using her expertise in intrusion, malware analysis, and major crimes to bring about many successful prosecutions. Before joining the DoD Cyber Crime Center, she was employed at IBM and NASA as a senior forensic analyst.
She wrote the book Catching the Catfishers, where she explores the digital footprints that we all leave behind, whether we realize it or not. The book sheds light on a comprehensive set of online security components and teaches readers how to best protect their personal information from being put out and circulated on the web. She co-authored the textbook Alternate Data Storage Forensics and was featured in Best Damn Cybercrime and Digital Forensics Book Period.
How to contact Tyler:
Books:
Alternate Data Storage Forensics
Resources Mentioned:
Summarized Show Notes:
This episode is sponsored by the CIO Scoreboard
All methods of how to access the show are below:
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe below for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.
As a leader, how can you be immensely present in the moment with people, both at work and in your personal life and in any situation?
In my insightful and humorous discussion with Shawn Hunter we discuss his book Out Think: How Innovative Leaders Drive Exceptional Outcomes and the wisdom gleaned from interviewing hundreds of thought leaders and executives from all walks of life.
Shawn not only writes about this topic as an author, but has also had to live it as an entrepreneur who has built and sold a company which was acquired by Skillsoft. He has interviewed so many successful people that he can see patterns of success and achievement that might take us 100 – 200 books and years to learn.
In this interview ideas come fast and you will surely want to capture them. Take notes. Shawn shares numerous anecdotes and stories throughout the interview and every one of them will present a teaching moment for you. Here are 10 of the highlights:
Shawn is an author and the Executive Producer & Vice President for Leadership Development Channel at Skillsoft. He has been interviewing and writing about amazing leaders from around the globe for over ten years. Skillsoft provides cloud-based solutions for customers worldwide, who range from global enterprises, government and education customers to mid-sized and small businesses. He originally co-founded Targeted Learning Corporation with his father Hal Hunter, Ph.D., which was acquired by Skillsoft in February 2007. He has a degree in Political Science and Government from St. Andrews Presbyterian College.
As quoted from Shawn’s website eloquently , “We’ve entered a new era. Call it the age of imagination, ideation, conceptualization, creativity, innovation – take your pick. Creativity, mental flexibility, and collaboration have displaced one-dimensional intelligence and isolated determination as core ingredients of competitive advantage. Creative people who can bring innovation to the world are our greatest capital now and with the right leadership and inspiration, creativity and execution can be nurtured in everyone. In any field, expertise is not only expected – it is given. Success for workers and companies centers on being nimble, creative and having the initiative to bring unique solutions to unexpected problems. "
Books
Out Think: How Innovative Leaders Drive Exceptional Outcomes
New Book: Transform. Behaviors Mind-sets as a leader you need to make up. Available for sale Fall of 2016.
Huffington Post Article: Signs of an Impending Bozo Explosion
How to get in touch with Shawn
ShawnHunter.com
Resources Mentioned
Shawn Achor - The Happiness Advantage: Linking Positive Brains to Performance
Shawn Achor - Before Happiness
Angela Duckworth and the Research on 'Grit'
Bob Sutton – Energizers and De-Energizer research PhD Stanford
Scott Eblin – Overworked and Overwhelmed - The Mindfulness Alternative
Douglas Conant TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
Summarized Show Notes
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives.
All methods of how to access the show are below:
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. You can find him online through LinkedIn and Twitter. Subscribe to weekly podcast updates and information about CIO Mastermind Discussion Topics here.
Today I am interviewing Eric Kaufmann. I asked Eric on the show to discuss his book Leadership as a Hero’s Journey – The Four Virtues for Transforming Uncertainty and Anxiety into Results and to share practical ideas and tools that deepen a leader’s ability to be efficient, effective and deliberate; a leader whom people are drawn to follow.
Eric’s journey contains 13 years of leadership consulting, management at Fortune 100 firms, degrees in business and psychology and a quarter century of Zen practice. He has also given a TED talk called Transformation Myths and Legends.
I am so glad to have Eric on the show because he gives a massively important message to us regarding ‘comfort’. As a leader you must explore your comforts with personal relationships, business relationships, and the results you are getting in every area of your life.
Are you ‘leaning into’ the problems and discomforts in your business and personal life? Or are you running away from or avoiding them?
The Western World can make us soft as men and women because we get mesmerized by external ‘things’ and ‘results’ and we forget that our results could be better if we got the INSIDE right first and this would drive the external results we so crave.
In my conversation with Eric we explore his work with Executives who are tackling their lives as a Hero would.
The Hero’s Journey (as popularized by Joseph Campbell) has three parts:
The Hero’s journey as Eric describes it takes enormous courage and the resilience to deal with fear, discomfort, and uncertainty in new ways that you may not have considered before.
The segments of the modern day hero are developed in the following areas:
Please enjoy my conversation with visionary thought leader and executive coach Eric Kaufmann. There are additional resources and summarized show notes below.
Books
Leadership is a Hero’s Journey? What Does it Take to Evolve Into a Great Leader? - RedZone
Videos
3 steps toward Leadership as a Hero's Journey
Your FEAR and How it Manifests in your Behavior
Why Great Leaders Break the Rules
Leadership begins at the end of YOUR comfort zone
Introduction to Sagatica Consulting
TEDx Talk Transformation Myths and Method
Blogs
Motivation - A Drug for Lazy Leaders
Eric's Recommended Books
Leadership is a Hero’s Journey? What Does it Take to Evolve Into a Great Leader? - RedZone
Getting in touch with Eric
Summarized Show Notes:
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
All methods of how to access the show are below:
Leave a podcast review here
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. You can find him online through LinkedIn and Twitter. Subscribe to weekly podcast updates and information about CIO Mastermind Discussion Topics here.
Introduction
In this ground-breaking interview with Tony McFarland, we discuss how companies and regulators interpret and understand current legislation on how to monitor and manage the risks that companies face that can potentially harm the business, and even affect shareholders. We discuss the concept of a material breach and how to define corporate obligations to material breach and disclosure.
I loved my discussion with Tony McFarland. Tony is an attorney and one of the best in the United States at understanding the fast moving and ever evolving Data Security and Privacy Law landscape. Tony has a very unique perspective from the top (CEO and Board) as it relates to the CIO’s requirement to answer questions from the top that have not been asked before.
We also discuss how current decisions and precedents on the Safe Harbor rule will affect the way companies across the Atlantic will have to justify the protections used, and required for data transfers.
Biography
Tony is a partner at Bass Berry and Sims PLC, with more than 30 years of experience working with leaders at public and private companies, particularly those in the financial services and healthcare industries, in complex individual and class action business litigation and situations. He has experience in Data Security and Privacy matters including electronic information security best practices, data retention and data management. He is also the Chairman of the firm’s Technology Committee and chair-elect of the Lex Mundi Knowledge Management Subcommittee. He is a co-author of Bloomberg BNA Banking Practice Portfolio Series No. 401, Securities Law for Banks.
We discussed legal impacts of the following:
Tony’s Published Work and Articles
Top CIOs and CISOs can learn a good deal by reading Tony’s published work in the following areas:
Summarized Show Notes
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
All methods of how to access the show are below:
Leave a podcast review here
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. You can find him online through LinkedIn and Twitter. Subscribe to weekly podcast updates and information about CIO Mastermind Discussion Topics here.
In this phenomenal interview with The Iceman Wim Hof we discuss what I believe may be the edge and frontier of human potential. By studying Wim, who has achieved 21 Guinness World Records, scientists are building a knowledge base of what is possible for humans. As Wim trains others to do what he does, then he becomes less of an ‘outlier’ and ‘anomaly’.
This is why I asked him to talk with me. I am interested in learning how he accomplishes his feats so that I can apply his methods to my own life. My hope is that you will be able to take pieces of this interview and do the same with yourself, family, and business. We discuss:
The Beginning of the Iceman
By the time Wim reached his teenage years, he was already running barefoot through the snow, comfortably. This was the beginning of a large series of confrontations with the cold, where every single time, limits were tested, and the outside world was stunned. Wim Hof is able to perform exceptionally, almost unnaturally, on what he is focused on during extreme situations. Due to our comfortable lifestyle today we are far removed from our natural body functions.
We breathe much more shallow which means that our body is not optimally supplied with oxygen. According to Wim, it’s not complicated at all: "What I am capable of, everybody can learn".
Control over your inner nature
Wim has taught himself how to control his heart rate, breathing and blood circulation. All this is regulated by the autonomic nervous system. Science says that the autonomic nervous system is a part of the body you just can´t control, yet Wim can, by steering his hypothalamus (an area in the brain which regulates the body temperature). While the body temperature of an untrained person drops dangerously after exposing it to extreme cold, Wim is able to retain his core temperature around 37 degrees Celsius, constantly. Even after 1 hour and 52 minutes sitting in ice, Wim’s core temperature stays the same. Scientists around the world are baffled by this exceptional capability.
He has accomplished 21 Guinness World Records with the most exceptional and unique performances. Here is a sampling of those:
Teaching Others and Scientific Proof
In order to squelch ‘naysayers’, Wim has embarked on a journey to prove his capabilities and also to teach others to do what he does.
He proved this in what I think is his landmark study where he trained 12 people to do a remarkable experiment highlighted below. The experiment (also referenced below in the science section) is called “Voluntary activation of the sympathetic nervous system and attenuation of the innate immune system response in humans” done by Dr. Pikkers and Kox, where Wim trained subjects influenced the autonomic nervous and immune system (video from the doctors).
Scientific Research
Teaching Others - Resources from this episode:
Wim Hof Method Explained in Detail
VICE Documentary featuring Wim
Reference Sites for Wim Hof
Ice Man website
Wikipedia
Four Hour Work Week Interview
Vice Video Link
Hypothermics Site
The Clymb Site
Social Media for Wim Hof
Twitter Link
You Tube
Face Book
LinkedIn
Instagram
Books By Wim Hof
Koud Kunstje
Becoming Iceman
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
All methods of how to access the show are below:
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe here for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.
Summarized Show Notes:
In this podcast episode I interview Bill Brenner, who is an expert at digesting threat intelligence information and making this information available to a wide pool of people from C-Suite Executives to coders and developers. Bill is a Senior Technical writer for Akamai and has been a writer for CSO Online, and Liquid Matrix Security Digest. Additionally, he created and writes in a blog called the OCD Diaries where he discusses mental health issues with IT Executives and staff within the technology industry.
Top 3 items for an IT Security Decision Maker to be concerned about moving forward:
You will also learn some of the best sources for IT Security threat information:
Securosis
Blogs and Podcasts:
Vulnerability Information Sources:
Humanity in Security - Mental Health
The importance of good mental health in the IT Security profession as it relates to depression, anxiety, coping with stress, OCD, Asperger’s, Autism.
The OCD Diaries – An opportunity to destigmatize mental illness and to give people in our industry a life raft and share tools that can help them. Taking your mental disorders and turning them into super powers!
Additional Show Notes
How to reach Bill Brenner:
LinkedIn
Facebook
Twitter
Akamai Blog
The OCD Diaries
Former Publications:
Liquid Matrix Security Digest
CSO Online
What is Your Plan for: Super-Vulnerabilities| Brand Take-down| & Incident Response| Humanity in Security - RedZone
All methods of how to access the show are below:
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
Leave a podcast review here
Bill Murphy is a world renowned IT Security Expert dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe here for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.
In this episode we discuss 6 different topics that you will definitely find highly interesting and relevant.
The Rise of Superman
The Most Bad Ass Navy Seal Ever – Jocko Willink
The Web’s Shadiest Neighborhoods by Blue Coat
TLD Article – Top Level Domains
Gaming to Improve Your Speed as an Adult
Hacks to Get More Sleep
Singularity University – Continuing Education
This episode is sponsored by the CIO Scoreboard, reducing the complexity of your IT Security initiatives. Sign up for a demo here.
All methods of how to access the show are below:
Leave a podcast review here
Bill is dedicated to your success as an IT Business Leader. Follow Bill on LinkedIn and Twitter. Subscribe here for weekly podcast, CIO Mastermind and CISO Mastermind updates delivered to your inbox easily and effortlessly.
If you have questions about Microsoft Azure Security you will love this interview with David Cross.
David Cross is the General Manager in charge of Security with Microsoft Azure. He has been the primary inventor of over 25 security patents and is the author of numerous publications and white papers. Prior to Microsoft, he served 5 years with the aviation electronic warfare community with the US Navy. He has a BS in CIS and a MBA.
One of the really fun parts of this interview is actually learning about his invention process as I was very curious about it since he has so many patents!
Are you a CIO, CSO, CISO, VP of IT, Dir of IT, SR VP of IT?
What does it cost you to manually examine threat intelligence information? Are you doing it at all?
If you are an IT decision maker you will want to listen to what Aharon Chernin, CTO of Soltra and I discuss related to Aharon’s expertise with STIX and TAXII. The STIX/TAXII standard is the future of IT Security as it relates to scaling access to actionable and relevant threat information that we can do something about versus being overwhelmed about yet more false positives. We discuss how sharing and teaching machines how to speak to each other about threat information is the vision of the future.
What if you could receive information from the FBI, DHS, and Cert for example and this could be ingested into your security machines, devices, software, etc and you didn’t need an analyst to make sense of the data? This is the vision of IT Security that I want you to consider. Only 1% of organizations have security analysts on staff. Why?....because humans are expensive and good ones are hard to scale to the level of threats all business from small to the mega-large are experiencing. Aharon is hard at work on this right now.w.
Ron is an expert in what it takes to develop the next generation of cyber security leaders.
• He is the Air Force Association US CyberPatriot 2013-2014 Mentor of the Year for his work with high school cybersecurity competitions.
• Ron Woerner is the Director of Cybersecurity Studies at Bellevue University. He has over 25 years of corporate and military experience in IT and Security
Resources for Cyber Security Team Competitions
1) Cyber Patriot Youth cyber security team competitions and explanations of the various levels of competition
2) ISC2/MITRE Cyber Challenge Academy Competitions – Capture the Flag
3) National Collegiate Cyber Defense Competition (CCDC)
4) Dr Dan Manson Cal State Pomona who created a single site to coordinate all cyber security competitions into one site called Cyber Security Federation - Single Site for information - Creating a sport out of cyber security competitions
Internationally acclaimed creativity expert Michael Michalko joins me today to discuss his creative thinking techniques that have inspired business thinkers around the world to create the innovative ideas and creative strategies they need to achieve unimaginable success in today's changing business environment of complexity and uncertainty. He says change the way you look at things and the things you look at change.
If you always think the way you’ve always thought, you’ll always get what you always got. The same old, same old ideas over and over again. The future belongs to those thinkers who embrace change, break new ground, forge new paths, and transform the way they think. Discover how to look at the same information as everyone else and see something different by using the creative thinking techniques and strategies that creative geniuses have used throughout history.
Uris is a leader in the world of research as it relates to IoT Security. This interview is a great learning tool to educate business leaders and your peers about where IoT is going and what it means to you and your business.
Mark is a world renowned expedition paddler and explorer and he has a powerful story to he shared about kayaking the entire length of the Amazon, Mississippi, Volga River (Europe’s largest river) and walking across Iran. My hope is that this interview will spur you on to try your own personal adventure or one with your family.
The CISO Should Not Report to the CIO |Assume you Have Been Hacked|6 Kill Chain Fundamentals You Must Know|How Can You Deny Command and Control Attacks| The Best Cyber Security Books - Hall of Fame|Alan Turing Should be a Hero|7 x ‘Must Ask and Prove’ Questions and CIO/CISO must ask about their Next Gen Firewall |Scaling Security with Real Cooperation|AI’s Role in Info Sec| The Beginnings of AI and Security
Two Ways to Avoid Being Perceived as a “Door Matt” and an “Order Taker” In Your Business. The Two Best Ways to Immediately Add Value to the Business, Converged Orgs Drive 4x More Profit, New Language for the CIO, Words that Really Matter, Projects and Investment Scoring.
Hacking-Back vs Attribution| APT Attack vs Targeted Attacks| Mobility and Virtualization| Leadership and Team Innovation| Ethics and the Selling of Vulnerabilities| The Best Zero Day definition Ever| Options of How to Avoid Poisoning Your Phone| Geo fencing| The One Question that you need to ask to Prevent Losing Your Job after a Breach Incident| Who has the Worse Cyber Criminals China or Russia?| Pinball Machines and Teaching Kids How Things Work Versus Consuming Things
Kayvan is an authentication expert. He gives a fascinating review of the old and future related to User Authentication Trends and Methods for Native Mobile Applications. Do you want to know pros and cons with various authentication methods of the future like IRIS, Selfie Based Authentication, Voice, Finger print, Face Recognition, Gesture and other Trends in Mobile Security ?
In the following interview Hadi and I discuss Big Data Security Topics like the Mosaic Effect, Mobile Security, The Demise of Passwords, IoT TOCTOU Attacks, Driverless Cars, Atomic Views of IoT, Orchestration Layers Limitations with Big Data Security, and what he describes as ‘Loose Membranes’ with IoT security
Are you and your team ready to make Leapfrog Steps or are you simply making Incremental Progress?
How do you get hard things done?
We are so often conditioned to look at the negative end of accomplishment. As human beings we tend to look at all the reasons something can’t be done versus listing all the reasons how it can be done.
My discussion with Don Wiegner in many ways you have heard the message before, but this time around you are hearing it from someone who has just spent two years doing what others thought was impossible. He discusses how to accomplish insurmountable goals and do it in a way that brings people together under a common purpose. Have you had a defining moment in your career where your back was against the wall and you had to get the job done?
Alex Hutton major bank CISO, thought leader, influencer, presenter, award winning speaker, as he discusses with me inspiration he gets from the best sushi in the world and a having a vision of craftsmanship in his profession.
I have written about Craftmanship in the past and after talking with CISO Alex Hutton this was emphasized even more. Jiro Ono owns the most famous Sushi restaurant in the world. Similar to Jiro’s you can approach your profession as a master would.
The importance of IT Ops and Security being run as a craft is important because most CIOs and CISOs feel that their biggest value unfortunately is when there is a problem (data breach, failure of a system, etc)
Alex Hutton has served as CEO for Risk Management Insight. He served as a principal in the Risk Intelligence group for Verizon, involved in the development of the VDBIR. He is an avid security blogger, speaker and conference organizer. He brings a wealth of knowledge and experience on risk management and metrics to any discussion. He is a passionate and experienced public speaker
Jack Jones is widely considered a thought leader in risk management and information security, Jack has been employed in technology for the past thirty years; specializing in information security and risk management for twenty-four of those years. During this time he has garnered a decade of experience as a CISO, including five years for a Fortune 100 financial services company. His work has also been recognized by his peers and the industry, earning him the 2006 ISSA Excellence in the Field of Security Practices award, and the 2012 CSO Compass Award for Leadership in Risk Management.
Jack is the originator of the now industry standard risk management framework known as Factor Analysis of Information Risk (FAIR). FAIR has seen adoption globally, within organizations of all sizes, and is now regularly included in graduate-level university courses on information security and referenced by other industry standards. He also recently co-authored a book on FAIR entitled "Measuring and Managing Information Risk - A FAIR Approach".
You are really going to enjoy my interview with Mark Robnett, CIO Justice Federal Credit Union. Mark is a rising star in the Credit Union industry and I asked him to detail for you in this episode how he put together his presentation to his board regarding his IT security strategy and tactics. I have found that Justice FCU is about 1-2 years ahead of Credit Unions of its size. I would put them on par with firms many times their size. Mark also has the added pressure of having a very smart and technically savvy board. There is no hiding behind jargon and complexity with them because the board is comprised of individuals with backgrounds in FBI and Justice Department. What a challenge!
This interview was a lot of fun.
Enterprises frequently buy security products with the best of intentions, but they end up being abandoned. Sometimes the product never makes it out of the box and into the rack. What factors contribute towards security shelfware and what can be done by both vendors and enterprises to avoid this happening? If it has happened how can you reverse it?What are the top security products that end up on the shelf or marginally used?