Paul’s Security Weekly (Audio)
Technology
Matt Coose is the founder and CEO of cybersecurity compliance firm Qmulos, previously the director of Federal Network Security for the National Cyber Security Division of the (DHS).
CISOs carry the ultimate burden and weight of compliance and reporting and are often the last buck. Says Coose, best-of-breed is better described as best-to-bleed-the-budget: it’s a bottom-up, tech-first, reactive approach for acquiring technology as opposed to managing risk. Choose shares his top considerations below for how CISOs can navigate the crowded market of cybersecurity tools when cost is highly scrutinized, but regulations keep growing.
Platforms are what every vendor dreams of being called, but no platform does it all, says Coose.
Coose shares what smart CISOs and mature organizations understand, that others don’t:
• There’s no “buying their way out of security issues or into a better risk posture.” They understand the need to evolve to a top-down, risk-driven, inherently business-aligned, dynamically adaptable, and evidence-based security management strategy.
• That looking at technology choices through the lens of risk controls (and the related data provided by technology that implements those controls) enables credible and transparent strategic tech portfolio management decisions that are immune to vendor preferences or the latest market(ing) fads.
• The need for meaningful security and risk measurement and the difference between leading and lagging indicators.
• The original intent of security and regulatory compliance as a model for proactive and consistent risk management (leading indicator), not just a historical reporting and audit function (lagging indicator).
• That managing risk, compliance, and security as distinct and separate functions is not only wasteful and inefficient, but denies the enterprise the ability to cross-leverage significant people, process, and technology investments
In the Security News: Don’t expose your supercomputer, auth bypass and command injection FTW, just patch it, using OSQuery against you, massive credential stuffing, backdoors in Harmony, looking at Android, so basically I am licensing my printer, hacking Tesla, injecting keystrokes over Bluetooth, and remembering the work of David L. Mills.
Visit https://www.securityweekly.com/psw for all the latest episodes!
Show Notes: https://securityweekly.com/psw-814
Corporate Ransomware Deep Dive - Jeremiah Grossman, Mikko Hypponen - PSW #828
Kicking Off With Crypto - PSW #827
Advising The President On Cyber-Physical Resilience - Philip Venables - PSW #826
PCI 4.0 - Winn Schwartau - PSW #825
Digging Into Supply Chain Security - James McMurry - PSW #824
XZ - Backdoors and The Fragile Supply Chain - PSW #823
Are we winning? - Jason Healey - PSW #822
Securing All The Things - Josh Corman - PSW #821
Memory Safety, Re-Writing Software, and OSS Supply Chains - Omkhar Arasaratnam - PSW #820
Facing the Reality of Risk Prioritization - Bianca Lewis (BiaSciLab), Dan DeCloss - PSW #819
Social Engineering: AI & Living Off The Land - Jayson E. Street - PSW #818
Illuminating Cybersecurity Wisdom: Insights from a Thought Leader - Wendy Nather - PSW Vault
Physical Security and Social Engineering - Hacker Heroes: Toby Miller - PSW #817
You Can’t Defend What You Can’t Define - Sergey Bratus - PSW #816
Identifying Bad By Defining Good - Danny Jenkins - PSW #815
K-12 Cybersecurity - Brian Stephens - PSW #813
The Evolution of Purple Teaming - Jared Atkinson - PSW #812
Hacker Heroes - Casey Ellis - PSW Vault
Interview with Dr. Whitfield Diffie - PSW Vault
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Darknet Diaries