Socializing Security
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
Episodes

Tuesday Oct 07, 2025
E069 - The Intersection of Data Strategy and Healthcare
Tuesday Oct 07, 2025
Tuesday Oct 07, 2025
In this conversation, Patrick Kovalik discusses the critical role of data in the healthcare industry, emphasizing the importance of data strategy, protection, and governance. He highlights the complexities of managing healthcare data, the shift towards synthetic data, and the challenges posed by unstructured data. The discussion also touches on the balance between privacy and security, particularly in the context of healthcare, and the need for organizations to adapt their data strategies to meet evolving demands.
Chapters00:00 Introduction to Data in Healthcare04:15 Understanding Data Strategy06:56 The Importance of Protecting Health Data11:41 Governance vs. Strategy in Data Management14:56 The Role of Synthetic Data for Development and Sharing23:09 Partnerships and Sharing Data30:22 The Challenges of Unstructured Data33:36 Privacy in the Healthcare Data Space38:52 Closing Thoughts on Data Strategy

Tuesday Sep 30, 2025
E068 - Compliance Programs: Part 2
Tuesday Sep 30, 2025
Tuesday Sep 30, 2025
In this episode of Socializing Security, Milou and Brian delve into the complexities of compliance programs, focusing on the importance of selecting the right audit firms, the role of GRC software, and the common controls necessary for effective compliance. They discuss the significance of access control, incident response, risk management, data protection, vendor management, security awareness training, audit logging, business continuity, and vulnerability management. The conversation emphasizes the mutual relationship between security and compliance, providing insights for organizations looking to enhance their compliance efforts.Chapters00:00 Exploring Compliance Programs02:45 Partnering with Audit Firms05:32 Choosing the Right Audit Firm08:25 The Role of GRC Software11:03 Managing Compliance Documentation14:07 Common Security Controls21:46 Access Control Challenges23:33 Incident Response Essentials26:07 Risk Management Practices27:49 Data Protection and Privacy30:25 Vendor Management Strategies32:23 Security Awareness Training Importance34:10 Audit Logging and Monitoring36:29 Business Continuity and Disaster Recovery38:29 Vulnerability Management Overview

Tuesday Sep 23, 2025
E067 - Compliance Programs: Part 1
Tuesday Sep 23, 2025
Tuesday Sep 23, 2025
In this episode of Socializing Security, the hosts delve into the essential topic of compliance within the cybersecurity landscape. They explore various compliance frameworks such as SOC 2, ISO 27001, HIPAA, and FedRAMP, discussing their significance, requirements, and the implications for organizations. The conversation highlights the importance of compliance in demonstrating security controls to customers and the challenges faced by companies in achieving and maintaining these standards. The hosts also touch on emerging standards related to AI and the evolving landscape of compliance requirements. Chapters 00:00 Introduction to Compliance in Security 02:03 Understanding Compliance and Its Importance 06:29 Diving into SOC 2 Compliance 10:52 Exploring ISO 27001 Compliance 14:42 AI and Emerging Standards 16:39 Overview of CSA STAR Compliance 20:09 Understanding CMMC for Defense Contractors 22:57 Navigating FedRAMP Compliance 28:53 HIPAA and Healthcare Compliance 31:41 HITRUST Certification in Healthcare 34:31 SOX Compliance for Public Companies 36:19 PCI DSS for Payment Processing 38:52 GDPR? 39:49 Structuring Audits 42:05 Preparing for a Second Part 43:55 Outro

Tuesday Sep 16, 2025
E066 - Cybersecurity for the Public Good
Tuesday Sep 16, 2025
Tuesday Sep 16, 2025
In this episode, Tracy Doaks, the president and CEO of MCNC, discusses her extensive background in both public and private sectors, emphasizing the importance of digital equity and the challenges faced in cybersecurity funding. She highlights the impact of technology on public service and the necessity of addressing the digital divide, particularly in rural communities. The discussion also delves into the ongoing negotiation between privacy and security in technology, and the need for collaboration to enhance cybersecurity efforts.Chapters 00:00 Introduction to Tracy Doaks and MCNC 04:15 A Passion for the Public Good 11:04 Challenges in Cybersecurity for Public Sector 23:31 Striving For Digital Equity 33:03 The Relationship Between Privacy and Security 37:33 Reflections

Tuesday Sep 09, 2025
E065 - Risky Business - Let's Talk About Risk Management
Tuesday Sep 09, 2025
Tuesday Sep 09, 2025
In this episode of Socializing Security, Brian and Milou delve into the fundamentals of risk management, emphasizing its importance across all organizations. They discuss the definition of risk management, the process of identifying and assessing risks, and the significance of executive buy-in. The conversation covers various aspects of risk management, including quantitative analysis, compliance requirements, and the integration of risk management with cybersecurity practices. The hosts also explore different strategies for treating risks and the necessity of ongoing monitoring and review to ensure effective risk management.
Chapters
00:00 Introduction to Risk Management00:57 Understanding Risk Management03:07 Risk Assessment and Organizational Context07:24 Quantitative Risk Analysis11:39 The Importance of Cybersecurity in Risk Management14:00 Compliance and Risk Management15:28 Integrating Risk Management with Cybersecurity Practices20:17 Implementing a Risk Management Program23:31 Risk Treatment Strategies26:58 Monitoring and Reviewing Risks

Tuesday Sep 02, 2025
E064 - Aligning Physical and Cyber Security
Tuesday Sep 02, 2025
Tuesday Sep 02, 2025
In this episode, Jake Williams discusses the intersection of physical and cybersecurity, emphasizing the importance of threat assessments and understanding vulnerabilities. The conversation explores how human behavior impacts security, the need for integrated security measures, and the balance between privacy and security. Jake shares insights on training for security awareness and the significance of proactive planning in maintaining safety.OODA Loop: https://en.wikipedia.org/wiki/OODA_loop Jake on LinkedIn: https://www.linkedin.com/in/jthomaswilliams1/Fortified Risk: https://www.fortifiedrisk.com/ More about phishing on episode 61: https://www.socializingsecurity.com/e/e061-gone-phishing | https://youtu.be/r84Mx4s3jKUChapters 00:00 Introduction to Jake and Fortified Risk Group 03:16 The Importance of Threat Assessments 08:27 Understanding Open Source Intelligence 10:07 Avoiding Lax Physical Security 11:17 Bridging Physical and Digital Security 17:01 Humans as the Weakest Link In Physical Security 22:38 Training for Security Awareness 28:32 Balancing Privacy and Security 32:13 Reflections

Tuesday Aug 26, 2025
E063 - Security Foundations - Plugging Holes with Asset Management
Tuesday Aug 26, 2025
Tuesday Aug 26, 2025
In this episode of Socializing Security, Steve Sims returns to discuss the fundamentals of cybersecurity, focusing on vulnerability management. The conversation covers the importance of understanding assets, the role of CVE in tracking vulnerabilities, prioritization strategies, and the necessity of having a robust vulnerability management plan. Steve emphasizes the significance of compensating controls, risk management, and the need for documentation and exceptions in the face of vulnerabilities. The episode concludes with insights on engaging consultants to build effective security plans and the importance of continuous adaptation in cybersecurity practices.
Steve's previous episode about Asset Management: https://www.socializingsecurity.com/e/e012-security-foundations-champions-of-asset-management
More from Steve at https://www.cruxialtech.com/
Chapters 00:00 Introduction and Reintroduction 04:08 Security Fundamentals Start with Asset Management 06:10 Vulnerability Management Essentials 08:58 The Role of CVEs in Vulnerability Tracking 11:54 Prioritizing Vulnerabilities in Your Environment 19:19 Compensating Controls and Risk Management 23:23 Prioritization and Hard Decisions 28:25 Building a Vulnerability Management Plan 32:37 Business Impact and Resource Allocation 34:27 Wrapping Up and the Future of Security Essentials 35:41 Reflections

Tuesday Aug 19, 2025
E062 - Who cares about data security?
Tuesday Aug 19, 2025
Tuesday Aug 19, 2025
In this episode, the hosts discuss the various roles and responsibilities related to data security within organizations. They explore the importance of CISOs, compliance teams, and IT departments in managing data security, the lifecycle of data, and the challenges of sensitive data management. The conversation also touches on the implications of data breaches, public exposure of data, and the necessity of effective data retention policies.Chapters00:00 Introduction to Data Security Responsibilities02:40 Roles of CISOs and InfoSec Teams05:47 The Importance of Compliance and GRC08:20 Collaboration Between IT, Compliance, and Security11:10 Data Lifecycle Management13:54 Reducing Sensitive Data Exposure16:26 Reporting on Data Breaches19:25 Internal Threats and Access Control22:21 Public Exposure of Data25:01 Data Retention Policies and Legal Considerations27:51 Conclusion and Future Perspectives

Tuesday Aug 12, 2025
E061 - Gone Phishing
Tuesday Aug 12, 2025
Tuesday Aug 12, 2025
In this episode, Brian and Milou discuss the often-dreaded topic of phishing and compliance training. They explore the various types of phishing attacks, including spear phishing and whaling, and delve into the business aspects of phishing, such as ransomware. The conversation emphasizes the importance of human factors in cybersecurity, highlighting the need for effective training and awareness. They provide practical tips for identifying phishing emails and stress the importance of a vigilant and collaborative approach to cybersecurity.A list of phishing techniques: https://us.norton.com/blog/online-scams/types-of-phishingChapters00:00 Introduction to Phishing and Compliance Training03:14 Understanding Phishing: Definition and Types12:37 The Business of Phishing: Ransomware and Illicit Profits18:21 The Human Factor: Training and Awareness in Phishing Prevention21:20 Identifying Phishing Emails: Tips and Best Practices28:24 Conclusion: Staying Vigilant Against Phishing Threats

Tuesday Aug 05, 2025
P060 - Investing in Technology
Tuesday Aug 05, 2025
Tuesday Aug 05, 2025
In this episode, Yousuf Khan, a seasoned CIO and CISO turned venture capitalist, shares insights on the critical role of communication in leadership, the nuances between CIO and CISO responsibilities, and the importance of investing in B2B software. He discusses the challenges faced in the tech landscape, particularly regarding privacy and security, and emphasizes the need for a proactive approach in managing these issues. Yousuf also reflects on his transition from practitioner to investor, highlighting the significance of understanding the product and team behind startups.Chapters 00:00 Introduction to Yousuf Khan and His Background 05:53 The Evolving Role of CIO and CISO 10:49 Differentiating Responsibilities: CIO vs CISO 16:19 Transitioning to Venture Capital: A New Chapter 20:02 Investment Strategies in B2B Software 25:51 The Importance of Due Diligence in Venture Capital 29:53 Current Challenges for CIOs and CISOs 35:56 The Ongoing Fight for Privacy and Security 41:31 Contact and Goodbyes 42:50 Perspectives 48:26 Investment Philosophy: Believing in the Product 48:29 Outro







