Episodes

29 minutes ago
E066 - Cybersecurity for the Public Good
29 minutes ago
29 minutes ago
In this episode, Tracy Doaks, the president and CEO of MCNC, discusses her extensive background in both public and private sectors, emphasizing the importance of digital equity and the challenges faced in cybersecurity funding. She highlights the impact of technology on public service and the necessity of addressing the digital divide, particularly in rural communities. The discussion also delves into the ongoing negotiation between privacy and security in technology, and the need for collaboration to enhance cybersecurity efforts.Chapters 00:00 Introduction to Tracy Doaks and MCNC 04:15 A Passion for the Public Good 11:04 Challenges in Cybersecurity for Public Sector 23:31 Striving For Digital Equity 33:03 The Relationship Between Privacy and Security 37:33 Reflections

Tuesday Sep 09, 2025
E065 - Risky Business - Let's Talk About Risk Management
Tuesday Sep 09, 2025
Tuesday Sep 09, 2025
In this episode of Socializing Security, Brian and Milou delve into the fundamentals of risk management, emphasizing its importance across all organizations. They discuss the definition of risk management, the process of identifying and assessing risks, and the significance of executive buy-in. The conversation covers various aspects of risk management, including quantitative analysis, compliance requirements, and the integration of risk management with cybersecurity practices. The hosts also explore different strategies for treating risks and the necessity of ongoing monitoring and review to ensure effective risk management.
Chapters
00:00 Introduction to Risk Management00:57 Understanding Risk Management03:07 Risk Assessment and Organizational Context07:24 Quantitative Risk Analysis11:39 The Importance of Cybersecurity in Risk Management14:00 Compliance and Risk Management15:28 Integrating Risk Management with Cybersecurity Practices20:17 Implementing a Risk Management Program23:31 Risk Treatment Strategies26:58 Monitoring and Reviewing Risks

Tuesday Sep 02, 2025
E064 - Aligning Physical and Cyber Security
Tuesday Sep 02, 2025
Tuesday Sep 02, 2025
In this episode, Jake Williams discusses the intersection of physical and cybersecurity, emphasizing the importance of threat assessments and understanding vulnerabilities. The conversation explores how human behavior impacts security, the need for integrated security measures, and the balance between privacy and security. Jake shares insights on training for security awareness and the significance of proactive planning in maintaining safety.OODA Loop: https://en.wikipedia.org/wiki/OODA_loop Jake on LinkedIn: https://www.linkedin.com/in/jthomaswilliams1/Fortified Risk: https://www.fortifiedrisk.com/ More about phishing on episode 61: https://www.socializingsecurity.com/e/e061-gone-phishing | https://youtu.be/r84Mx4s3jKUChapters 00:00 Introduction to Jake and Fortified Risk Group 03:16 The Importance of Threat Assessments 08:27 Understanding Open Source Intelligence 10:07 Avoiding Lax Physical Security 11:17 Bridging Physical and Digital Security 17:01 Humans as the Weakest Link In Physical Security 22:38 Training for Security Awareness 28:32 Balancing Privacy and Security 32:13 Reflections

Tuesday Aug 26, 2025
E063 - Security Foundations - Plugging Holes with Asset Management
Tuesday Aug 26, 2025
Tuesday Aug 26, 2025
In this episode of Socializing Security, Steve Sims returns to discuss the fundamentals of cybersecurity, focusing on vulnerability management. The conversation covers the importance of understanding assets, the role of CVE in tracking vulnerabilities, prioritization strategies, and the necessity of having a robust vulnerability management plan. Steve emphasizes the significance of compensating controls, risk management, and the need for documentation and exceptions in the face of vulnerabilities. The episode concludes with insights on engaging consultants to build effective security plans and the importance of continuous adaptation in cybersecurity practices.
Steve's previous episode about Asset Management: https://www.socializingsecurity.com/e/e012-security-foundations-champions-of-asset-management
More from Steve at https://www.cruxialtech.com/
Chapters 00:00 Introduction and Reintroduction 04:08 Security Fundamentals Start with Asset Management 06:10 Vulnerability Management Essentials 08:58 The Role of CVEs in Vulnerability Tracking 11:54 Prioritizing Vulnerabilities in Your Environment 19:19 Compensating Controls and Risk Management 23:23 Prioritization and Hard Decisions 28:25 Building a Vulnerability Management Plan 32:37 Business Impact and Resource Allocation 34:27 Wrapping Up and the Future of Security Essentials 35:41 Reflections

Tuesday Aug 19, 2025
E062 - Who cares about data security?
Tuesday Aug 19, 2025
Tuesday Aug 19, 2025
In this episode, the hosts discuss the various roles and responsibilities related to data security within organizations. They explore the importance of CISOs, compliance teams, and IT departments in managing data security, the lifecycle of data, and the challenges of sensitive data management. The conversation also touches on the implications of data breaches, public exposure of data, and the necessity of effective data retention policies.Chapters00:00 Introduction to Data Security Responsibilities02:40 Roles of CISOs and InfoSec Teams05:47 The Importance of Compliance and GRC08:20 Collaboration Between IT, Compliance, and Security11:10 Data Lifecycle Management13:54 Reducing Sensitive Data Exposure16:26 Reporting on Data Breaches19:25 Internal Threats and Access Control22:21 Public Exposure of Data25:01 Data Retention Policies and Legal Considerations27:51 Conclusion and Future Perspectives

Tuesday Aug 12, 2025
E061 - Gone Phishing
Tuesday Aug 12, 2025
Tuesday Aug 12, 2025
In this episode, Brian and Milou discuss the often-dreaded topic of phishing and compliance training. They explore the various types of phishing attacks, including spear phishing and whaling, and delve into the business aspects of phishing, such as ransomware. The conversation emphasizes the importance of human factors in cybersecurity, highlighting the need for effective training and awareness. They provide practical tips for identifying phishing emails and stress the importance of a vigilant and collaborative approach to cybersecurity.A list of phishing techniques: https://us.norton.com/blog/online-scams/types-of-phishingChapters00:00 Introduction to Phishing and Compliance Training03:14 Understanding Phishing: Definition and Types12:37 The Business of Phishing: Ransomware and Illicit Profits18:21 The Human Factor: Training and Awareness in Phishing Prevention21:20 Identifying Phishing Emails: Tips and Best Practices28:24 Conclusion: Staying Vigilant Against Phishing Threats

Tuesday Aug 05, 2025
P060 - Investing in Technology
Tuesday Aug 05, 2025
Tuesday Aug 05, 2025
In this episode, Yousuf Khan, a seasoned CIO and CISO turned venture capitalist, shares insights on the critical role of communication in leadership, the nuances between CIO and CISO responsibilities, and the importance of investing in B2B software. He discusses the challenges faced in the tech landscape, particularly regarding privacy and security, and emphasizes the need for a proactive approach in managing these issues. Yousuf also reflects on his transition from practitioner to investor, highlighting the significance of understanding the product and team behind startups.Chapters 00:00 Introduction to Yousuf Khan and His Background 05:53 The Evolving Role of CIO and CISO 10:49 Differentiating Responsibilities: CIO vs CISO 16:19 Transitioning to Venture Capital: A New Chapter 20:02 Investment Strategies in B2B Software 25:51 The Importance of Due Diligence in Venture Capital 29:53 Current Challenges for CIOs and CISOs 35:56 The Ongoing Fight for Privacy and Security 41:31 Contact and Goodbyes 42:50 Perspectives 48:26 Investment Philosophy: Believing in the Product 48:29 Outro

Tuesday Jul 29, 2025
E059 - Security Lessons from Everyday Life
Tuesday Jul 29, 2025
Tuesday Jul 29, 2025
In this episode, Brian discusses security lessons derived from everyday life, focusing on urban planning, road safety, and their implications for cybersecurity. He emphasizes the importance of system design over individual accountability, the concept of normal accidents in complex systems, and the necessity of disaster preparedness. Brian also highlights the need for effective communication of security concepts to non-professionals, aiming to make security more relatable and understandable.Chapters00:00 Introduction to Security Lessons from Everyday Life00:54 Urban Planning and Road Safety Insights03:13 Applying Urban Design Principles to Cybersecurity06:53 Project Management and Accountability in Cybersecurity08:30 Understanding Normal Accidents in Complex Systems11:48 Disaster Preparedness and Recovery Planning15:31 Conclusion and Future Discussions on Security Awareness

Tuesday Jul 22, 2025
E058 - Separating Disaster and Cyber Recoveries
Tuesday Jul 22, 2025
Tuesday Jul 22, 2025
In this episode of Socializing Security, Brian and Milou delve into the critical distinctions between IT disaster recovery and cyber attack recovery. They explore the definitions, planning strategies, recovery processes, and the varying impacts of each type of incident on organizations. The conversation emphasizes the importance of having well-defined disaster recovery and incident response plans, as well as the need for proactive measures to mitigate risks associated with both IT disasters and cyber attacks.
Chapters00:00 Introduction to IT and Cyber Disasters01:47 Defining IT Disasters05:06 Understanding Cyber Attacks09:58 Planning for IT Disasters vs Cyber Attacks14:40 Backup Strategies and Recovery Planning22:26 Comparing Impacts of IT Disasters and Cyber Attacks26:23 The Role of Forensics for Cyber Attacks27:32 Comparing the Impacts of IT and Cyber Disasters31:36 Response Team Dynamics34:12 Key Takeaways and Conclusion

Tuesday Jul 15, 2025
E057 - Navigating Trust in Online Retail
Tuesday Jul 15, 2025
Tuesday Jul 15, 2025
In this episode of Socializing Security, the hosts discuss the importance of trusting retailers when shopping online. They explore various strategies for evaluating the credibility of websites, the significance of payment methods in ensuring security, and the necessity of protecting personal information. The conversation also highlights warning signs of potential fraud and best practices for online shopping to enhance consumer safety.
Related EpisodesGenetic Testing and Privacy- video: https://youtu.be/TtNSiC9nqgI - audio: https://www.socializingsecurity.com/e/e042-genetic-testing-and-data-privacy Telemarketing, Compliance, and Consumer Protection- https://youtu.be/ZdyFSNFf-vI - https://www.socializingsecurity.com/e/e045-dialed-in-telemarketing-compliance-and-consumer-protection
Chapters00:00 Introduction to the Online Shopping Dilemma03:34 Evaluating Online Reviews and Security06:32 Payment Methods: Protecting Your Financial Information11:59 Minimizing Data Sharing20:55 Identifying and Dealing with Fraud26:52 Summarization and Outro