A Virtual Information Security Officer (VISO) can help make your IT dollars more effective.Typically, we’re starting with the Scoreboard because we want to measure twice and only cut once. It’s important to ask these key questions:
If you enjoy listening to my podcast, please take a minute to leave a review here!
My guest today is Adam Shostack. Adam is a consultant, entrepreneur, technologist, game designer, and author of the book Threat Modelling: Designing for Security.
I invited Adam to talk security and discuss a concept he designed that is called threat modelling. I love the simplicity of the concept and appreciate the fact that Adam understands the complexity of security and was able to distill it into an actionable security program.
Our conversation is versatile, covering technical areas and goes up to the board level. If you have an interest in making security simple, and if your instinct tells you that defense is the new offence, you will enjoy listening to this podcast episode. Continue reading →
Chris Hadnagy specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. His goal is to secure companies by educating them on the methods used by attackers, identifying vulnerabilities, and mitigating issues through appropriate levels of awareness and security.