Episodes

Tuesday Aug 19, 2025
E062 - Who cares about data security?
Tuesday Aug 19, 2025
Tuesday Aug 19, 2025
In this episode, the hosts discuss the various roles and responsibilities related to data security within organizations. They explore the importance of CISOs, compliance teams, and IT departments in managing data security, the lifecycle of data, and the challenges of sensitive data management. The conversation also touches on the implications of data breaches, public exposure of data, and the necessity of effective data retention policies.Chapters00:00 Introduction to Data Security Responsibilities02:40 Roles of CISOs and InfoSec Teams05:47 The Importance of Compliance and GRC08:20 Collaboration Between IT, Compliance, and Security11:10 Data Lifecycle Management13:54 Reducing Sensitive Data Exposure16:26 Reporting on Data Breaches19:25 Internal Threats and Access Control22:21 Public Exposure of Data25:01 Data Retention Policies and Legal Considerations27:51 Conclusion and Future Perspectives

Tuesday Aug 12, 2025
E061 - Gone Phishing
Tuesday Aug 12, 2025
Tuesday Aug 12, 2025
In this episode, Brian and Milou discuss the often-dreaded topic of phishing and compliance training. They explore the various types of phishing attacks, including spear phishing and whaling, and delve into the business aspects of phishing, such as ransomware. The conversation emphasizes the importance of human factors in cybersecurity, highlighting the need for effective training and awareness. They provide practical tips for identifying phishing emails and stress the importance of a vigilant and collaborative approach to cybersecurity.A list of phishing techniques: https://us.norton.com/blog/online-scams/types-of-phishingChapters00:00 Introduction to Phishing and Compliance Training03:14 Understanding Phishing: Definition and Types12:37 The Business of Phishing: Ransomware and Illicit Profits18:21 The Human Factor: Training and Awareness in Phishing Prevention21:20 Identifying Phishing Emails: Tips and Best Practices28:24 Conclusion: Staying Vigilant Against Phishing Threats

Tuesday Aug 05, 2025
P060 - Investing in Technology
Tuesday Aug 05, 2025
Tuesday Aug 05, 2025
In this episode, Yousuf Khan, a seasoned CIO and CISO turned venture capitalist, shares insights on the critical role of communication in leadership, the nuances between CIO and CISO responsibilities, and the importance of investing in B2B software. He discusses the challenges faced in the tech landscape, particularly regarding privacy and security, and emphasizes the need for a proactive approach in managing these issues. Yousuf also reflects on his transition from practitioner to investor, highlighting the significance of understanding the product and team behind startups.Chapters 00:00 Introduction to Yousuf Khan and His Background 05:53 The Evolving Role of CIO and CISO 10:49 Differentiating Responsibilities: CIO vs CISO 16:19 Transitioning to Venture Capital: A New Chapter 20:02 Investment Strategies in B2B Software 25:51 The Importance of Due Diligence in Venture Capital 29:53 Current Challenges for CIOs and CISOs 35:56 The Ongoing Fight for Privacy and Security 41:31 Contact and Goodbyes 42:50 Perspectives 48:26 Investment Philosophy: Believing in the Product 48:29 Outro

Tuesday Jul 29, 2025
E059 - Security Lessons from Everyday Life
Tuesday Jul 29, 2025
Tuesday Jul 29, 2025
In this episode, Brian discusses security lessons derived from everyday life, focusing on urban planning, road safety, and their implications for cybersecurity. He emphasizes the importance of system design over individual accountability, the concept of normal accidents in complex systems, and the necessity of disaster preparedness. Brian also highlights the need for effective communication of security concepts to non-professionals, aiming to make security more relatable and understandable.Chapters00:00 Introduction to Security Lessons from Everyday Life00:54 Urban Planning and Road Safety Insights03:13 Applying Urban Design Principles to Cybersecurity06:53 Project Management and Accountability in Cybersecurity08:30 Understanding Normal Accidents in Complex Systems11:48 Disaster Preparedness and Recovery Planning15:31 Conclusion and Future Discussions on Security Awareness

Tuesday Jul 22, 2025
E058 - Separating Disaster and Cyber Recoveries
Tuesday Jul 22, 2025
Tuesday Jul 22, 2025
In this episode of Socializing Security, Brian and Milou delve into the critical distinctions between IT disaster recovery and cyber attack recovery. They explore the definitions, planning strategies, recovery processes, and the varying impacts of each type of incident on organizations. The conversation emphasizes the importance of having well-defined disaster recovery and incident response plans, as well as the need for proactive measures to mitigate risks associated with both IT disasters and cyber attacks.
Chapters00:00 Introduction to IT and Cyber Disasters01:47 Defining IT Disasters05:06 Understanding Cyber Attacks09:58 Planning for IT Disasters vs Cyber Attacks14:40 Backup Strategies and Recovery Planning22:26 Comparing Impacts of IT Disasters and Cyber Attacks26:23 The Role of Forensics for Cyber Attacks27:32 Comparing the Impacts of IT and Cyber Disasters31:36 Response Team Dynamics34:12 Key Takeaways and Conclusion

Tuesday Jul 15, 2025
E057 - Navigating Trust in Online Retail
Tuesday Jul 15, 2025
Tuesday Jul 15, 2025
In this episode of Socializing Security, the hosts discuss the importance of trusting retailers when shopping online. They explore various strategies for evaluating the credibility of websites, the significance of payment methods in ensuring security, and the necessity of protecting personal information. The conversation also highlights warning signs of potential fraud and best practices for online shopping to enhance consumer safety.
Related EpisodesGenetic Testing and Privacy- video: https://youtu.be/TtNSiC9nqgI - audio: https://www.socializingsecurity.com/e/e042-genetic-testing-and-data-privacy Telemarketing, Compliance, and Consumer Protection- https://youtu.be/ZdyFSNFf-vI - https://www.socializingsecurity.com/e/e045-dialed-in-telemarketing-compliance-and-consumer-protection
Chapters00:00 Introduction to the Online Shopping Dilemma03:34 Evaluating Online Reviews and Security06:32 Payment Methods: Protecting Your Financial Information11:59 Minimizing Data Sharing20:55 Identifying and Dealing with Fraud26:52 Summarization and Outro

Tuesday Jul 08, 2025
E056 - Toxic Isn’t Just a Buzzword: Let’s Talk Workplace Abuse
Tuesday Jul 08, 2025
Tuesday Jul 08, 2025
In this episode, Milou and Brian sit down with Kimberly Williams, VP of People, Culture, and Compliance at Walker Advertising and spokesperson for the End Workplace Abuse movement. They explore how toxic work environments harm employee mental health—and create real security risks.Topics include:- What workplace psychological abuse looks like- How trauma impacts decision-making and security awareness- The Workplace Psychological Safety Act and why it matters- Tools to document abuse (e.g., Hively, Work Receipts)- Why HR isn’t always the solution—and how to protect yourself- The real financial cost of “brilliant jerks”- Kim shares practical advice for individuals and organizations, and explains how listeners can support ongoing legislative efforts at endworkplaceabuse.com.
Chapters
00:00 Introduction to Workplace Psychological Abuse05:49 Understanding the Impact of Workplace Trauma08:35 Identifying Signs of Toxic Work Culture12:54 Documenting Abuse and Engaging HR16:42 Navigating Workplace Dynamics and Rights19:48 The Movement for Workplace Psychological Safety24:43 Legislative Efforts and Future Directions31:07 Final Thoughts on Privacy and Workplace Rights

Tuesday Jul 01, 2025
E055 - Turning Up FEDRAMP to 20X
Tuesday Jul 01, 2025
Tuesday Jul 01, 2025
In this episode of Socializing Security, Brian and Milou discuss the complexities and recent changes to the FedRAMP certification process, which is essential for cloud service providers working with the U.S. government. They explore the challenges of compliance, the costs involved, and the implications of the new FedRAMP 20X program aimed at streamlining the certification process. The conversation highlights the balance between maintaining security standards and making it easier for companies, especially startups, to engage with government contracts.
Chapters00:00 Introduction to FedRAMP and Its Importance02:44 Understanding FedRAMP Certification Levels04:58 Challenges and Costs of FedRAMP Compliance09:51 Recent Changes: FedRAMP 20X Overview16:28 Balancing Security and Efficiency in FedRAMP21:48 Government Partnering with Industry26:42 Conclusion and Looking to the Future

Tuesday Jun 24, 2025
E054 - Building a Data Governance Strategy Part 2
Tuesday Jun 24, 2025
Tuesday Jun 24, 2025
In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountability.
This is part two of a special edition episode that follows a tabletop framework where each of us presents our concerns with implementing a data governance strategy as different representatives from organizational units.

Tuesday Jun 17, 2025
E053 - Building a Data Governance Strategy Part 1
Tuesday Jun 17, 2025
Tuesday Jun 17, 2025
In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountability.
This is a special edition two-part exercise that follows a tabletop framework where each of us presents our concerns with implementing a data governance strategy as different representatives from organizational units.







