Episodes

4 days ago
4 days ago
In this episode, Brian speaks with Justin Keck, Director of Security at Inspire Security Solutions, about the evolving role of the CISO, the importance of business acumen in security, and the need for effective communication across departments. They discuss the significance of building a security culture, the role of security champions, and the emerging BISO role as a liaison between security and business needs. As always, the conversation ends on the ongoing battle for privacy in the face of data breaches and the necessity for collaboration within organizations to enhance security. Chapters 00:00 Introduction to Security and the CISO Role 04:13 The Evolving Role of the CISO 09:50 Communication and Business Acumen in Security 14:26 The Importance of Security Culture 21:57 The Role of Security Champions 30:29 The BISO Role and Its Significance 35:32 The Ongoing Battle for Privacy 39:26 Closing Thoughts and Contact Information

Tuesday Oct 21, 2025
P071 - Brian Speaks the Truth: How to Make IT Feel Frictionless
Tuesday Oct 21, 2025
Tuesday Oct 21, 2025
In this episode, Brian and the host discuss the evolution of technology and its impact on daily life, particularly focusing on the ideal tech stack for 2025, frustrations with current technology, the need for standardization, and goals for 2026. They also touch on the intersection of pop culture and technology, exploring how past media has predicted current trends and the implications of smart devices and IoT on privacy and user experience. The conversation wraps up with reflections on the challenges of maintaining a frictionless IT environment and the importance of collaboration in navigating these issues.Chapters 00:00 Introduction and Episode Setup 01:44 Imagining a Frictionless Tech Environment 08:13 The Frustrations of Modern Technology 12:43 The Need for Standardization in Tech 16:39 Goals for IT in 2026 20:41 Pop Culture and Technology 25:07 Closing Thoughts on IT and Automation 29:55 Outro

Tuesday Oct 14, 2025
E070 - Milou Speaks the Truth: On How to Make IT Feel Frictionless
Tuesday Oct 14, 2025
Tuesday Oct 14, 2025
In this episode of Socializing Security, host Milou Meier shares her personal experiences and frustrations as a compliance officer and small business owner in the IT sector. She discusses the challenges of navigating technology, the importance of a frictionless IT environment, and the need for connection in a tech-heavy world. Milou reflects on her own technology struggles and emphasizes the significance of making IT systems work seamlessly to enhance productivity and reduce frustration.Chapters00:00 Introduction to the Conversation00:01 Exploring Key Themes in Security00:37 Introduction and Personal Reflections02:44 The Challenges of IT and Compliance05:18 Navigating Technology Frustrations07:18 The Importance of Frictionless IT09:46 Community and Connection in Technology12:21 Personal Experiences with IT Systems15:18 Reflections on 2025 and Looking Ahead to 2026

Tuesday Oct 07, 2025
E069 - The Intersection of Data Strategy and Healthcare
Tuesday Oct 07, 2025
Tuesday Oct 07, 2025
In this conversation, Patrick Kovalik discusses the critical role of data in the healthcare industry, emphasizing the importance of data strategy, protection, and governance. He highlights the complexities of managing healthcare data, the shift towards synthetic data, and the challenges posed by unstructured data. The discussion also touches on the balance between privacy and security, particularly in the context of healthcare, and the need for organizations to adapt their data strategies to meet evolving demands.
Chapters00:00 Introduction to Data in Healthcare04:15 Understanding Data Strategy06:56 The Importance of Protecting Health Data11:41 Governance vs. Strategy in Data Management14:56 The Role of Synthetic Data for Development and Sharing23:09 Partnerships and Sharing Data30:22 The Challenges of Unstructured Data33:36 Privacy in the Healthcare Data Space38:52 Closing Thoughts on Data Strategy

Tuesday Sep 30, 2025
E068 - Compliance Programs: Part 2
Tuesday Sep 30, 2025
Tuesday Sep 30, 2025
In this episode of Socializing Security, Milou and Brian delve into the complexities of compliance programs, focusing on the importance of selecting the right audit firms, the role of GRC software, and the common controls necessary for effective compliance. They discuss the significance of access control, incident response, risk management, data protection, vendor management, security awareness training, audit logging, business continuity, and vulnerability management. The conversation emphasizes the mutual relationship between security and compliance, providing insights for organizations looking to enhance their compliance efforts.Chapters00:00 Exploring Compliance Programs02:45 Partnering with Audit Firms05:32 Choosing the Right Audit Firm08:25 The Role of GRC Software11:03 Managing Compliance Documentation14:07 Common Security Controls21:46 Access Control Challenges23:33 Incident Response Essentials26:07 Risk Management Practices27:49 Data Protection and Privacy30:25 Vendor Management Strategies32:23 Security Awareness Training Importance34:10 Audit Logging and Monitoring36:29 Business Continuity and Disaster Recovery38:29 Vulnerability Management Overview

Tuesday Sep 23, 2025
E067 - Compliance Programs: Part 1
Tuesday Sep 23, 2025
Tuesday Sep 23, 2025
In this episode of Socializing Security, the hosts delve into the essential topic of compliance within the cybersecurity landscape. They explore various compliance frameworks such as SOC 2, ISO 27001, HIPAA, and FedRAMP, discussing their significance, requirements, and the implications for organizations. The conversation highlights the importance of compliance in demonstrating security controls to customers and the challenges faced by companies in achieving and maintaining these standards. The hosts also touch on emerging standards related to AI and the evolving landscape of compliance requirements. Chapters 00:00 Introduction to Compliance in Security 02:03 Understanding Compliance and Its Importance 06:29 Diving into SOC 2 Compliance 10:52 Exploring ISO 27001 Compliance 14:42 AI and Emerging Standards 16:39 Overview of CSA STAR Compliance 20:09 Understanding CMMC for Defense Contractors 22:57 Navigating FedRAMP Compliance 28:53 HIPAA and Healthcare Compliance 31:41 HITRUST Certification in Healthcare 34:31 SOX Compliance for Public Companies 36:19 PCI DSS for Payment Processing 38:52 GDPR? 39:49 Structuring Audits 42:05 Preparing for a Second Part 43:55 Outro

Tuesday Sep 16, 2025
E066 - Cybersecurity for the Public Good
Tuesday Sep 16, 2025
Tuesday Sep 16, 2025
In this episode, Tracy Doaks, the president and CEO of MCNC, discusses her extensive background in both public and private sectors, emphasizing the importance of digital equity and the challenges faced in cybersecurity funding. She highlights the impact of technology on public service and the necessity of addressing the digital divide, particularly in rural communities. The discussion also delves into the ongoing negotiation between privacy and security in technology, and the need for collaboration to enhance cybersecurity efforts.Chapters 00:00 Introduction to Tracy Doaks and MCNC 04:15 A Passion for the Public Good 11:04 Challenges in Cybersecurity for Public Sector 23:31 Striving For Digital Equity 33:03 The Relationship Between Privacy and Security 37:33 Reflections

Tuesday Sep 09, 2025
E065 - Risky Business - Let's Talk About Risk Management
Tuesday Sep 09, 2025
Tuesday Sep 09, 2025
In this episode of Socializing Security, Brian and Milou delve into the fundamentals of risk management, emphasizing its importance across all organizations. They discuss the definition of risk management, the process of identifying and assessing risks, and the significance of executive buy-in. The conversation covers various aspects of risk management, including quantitative analysis, compliance requirements, and the integration of risk management with cybersecurity practices. The hosts also explore different strategies for treating risks and the necessity of ongoing monitoring and review to ensure effective risk management.
Chapters
00:00 Introduction to Risk Management00:57 Understanding Risk Management03:07 Risk Assessment and Organizational Context07:24 Quantitative Risk Analysis11:39 The Importance of Cybersecurity in Risk Management14:00 Compliance and Risk Management15:28 Integrating Risk Management with Cybersecurity Practices20:17 Implementing a Risk Management Program23:31 Risk Treatment Strategies26:58 Monitoring and Reviewing Risks

Tuesday Sep 02, 2025
E064 - Aligning Physical and Cyber Security
Tuesday Sep 02, 2025
Tuesday Sep 02, 2025
In this episode, Jake Williams discusses the intersection of physical and cybersecurity, emphasizing the importance of threat assessments and understanding vulnerabilities. The conversation explores how human behavior impacts security, the need for integrated security measures, and the balance between privacy and security. Jake shares insights on training for security awareness and the significance of proactive planning in maintaining safety.OODA Loop: https://en.wikipedia.org/wiki/OODA_loop Jake on LinkedIn: https://www.linkedin.com/in/jthomaswilliams1/Fortified Risk: https://www.fortifiedrisk.com/ More about phishing on episode 61: https://www.socializingsecurity.com/e/e061-gone-phishing | https://youtu.be/r84Mx4s3jKUChapters 00:00 Introduction to Jake and Fortified Risk Group 03:16 The Importance of Threat Assessments 08:27 Understanding Open Source Intelligence 10:07 Avoiding Lax Physical Security 11:17 Bridging Physical and Digital Security 17:01 Humans as the Weakest Link In Physical Security 22:38 Training for Security Awareness 28:32 Balancing Privacy and Security 32:13 Reflections

Tuesday Aug 26, 2025
E063 - Security Foundations - Plugging Holes with Asset Management
Tuesday Aug 26, 2025
Tuesday Aug 26, 2025
In this episode of Socializing Security, Steve Sims returns to discuss the fundamentals of cybersecurity, focusing on vulnerability management. The conversation covers the importance of understanding assets, the role of CVE in tracking vulnerabilities, prioritization strategies, and the necessity of having a robust vulnerability management plan. Steve emphasizes the significance of compensating controls, risk management, and the need for documentation and exceptions in the face of vulnerabilities. The episode concludes with insights on engaging consultants to build effective security plans and the importance of continuous adaptation in cybersecurity practices.
Steve's previous episode about Asset Management: https://www.socializingsecurity.com/e/e012-security-foundations-champions-of-asset-management
More from Steve at https://www.cruxialtech.com/
Chapters 00:00 Introduction and Reintroduction 04:08 Security Fundamentals Start with Asset Management 06:10 Vulnerability Management Essentials 08:58 The Role of CVEs in Vulnerability Tracking 11:54 Prioritizing Vulnerabilities in Your Environment 19:19 Compensating Controls and Risk Management 23:23 Prioritization and Hard Decisions 28:25 Building a Vulnerability Management Plan 32:37 Business Impact and Resource Allocation 34:27 Wrapping Up and the Future of Security Essentials 35:41 Reflections







