Transcript
WEBVTT
1
00:00:05.519 --> 00:00:10.029
Are you struggling to come up with
original content weekend and week out? Start
2
00:00:10.070 --> 00:00:14.710
a podcast, interview your ideal clients, let them talk about what they care
3
00:00:14.750 --> 00:00:20.350
about most and never run out of
content ideas again. Learn more at sweetphish
4
00:00:20.429 --> 00:00:30.260
MEDIACOM. You're listening to BEDB growth, a daily podcast for BTB leaders.
5
00:00:30.859 --> 00:00:34.740
We've interviewed names you've probably heard before, like Gary Vander truck and Simon Senek,
6
00:00:35.060 --> 00:00:39.049
but you've probably never heard from the
majority of our guests. That's because
7
00:00:39.090 --> 00:00:43.530
the bulk of our interviews aren't with
professional speakers and authors. Most of our
8
00:00:43.570 --> 00:00:47.969
guests are in the trenches leading sales
and marketing teams. They're implementing strategy,
9
00:00:48.009 --> 00:00:52.799
they're experimenting with tactics, they're building
the fastest growing BTB companies in the world.
10
00:00:53.439 --> 00:00:56.079
My name is James Carberry. I'm
the founder of sweet fish media,
11
00:00:56.320 --> 00:01:00.039
a podcast agency for BB brands,
and I'm also one of the cohosts of
12
00:01:00.159 --> 00:01:03.349
this show. When we're not interviewing
sales and marketing leaders, you'll hear stories
13
00:01:03.390 --> 00:01:07.870
from behind the scenes of our own
business. Will share the ups and downs
14
00:01:07.909 --> 00:01:11.310
of our journey as we attempt to
take over the world. Just getting well,
15
00:01:11.950 --> 00:01:22.420
maybe let's get into the show.
Hey everyone, it is Kelsey cores
16
00:01:22.540 --> 00:01:27.379
with sweetphish media. Welcome back to
our new podcast series. We are really
17
00:01:27.739 --> 00:01:30.859
ided to share with you a new
show that we just launched for our friends
18
00:01:30.980 --> 00:01:34.409
over at proof point. Today we're
going to share with you a quick snippet
19
00:01:34.489 --> 00:01:40.450
from their very first episode. This
episode was hosted by Ken Spencer Brown and
20
00:01:40.569 --> 00:01:46.730
it features Robert Powell, editorial director
America's and thought leadership at the Economist Intelligence
21
00:01:46.849 --> 00:01:49.000
Unit. If you think you'll find
the show valuable after you check out the
22
00:01:49.079 --> 00:01:55.480
snippet, just search protecting people and
Apple podcast or your favorite podcast player.
23
00:01:56.040 --> 00:01:57.599
Make sure you subscribe and, if
you really like it, don't forget to
24
00:01:57.640 --> 00:02:01.430
leave a review. It's a great
way to help people find new podcast content.
25
00:02:01.989 --> 00:02:05.629
And maybe the show isn't up your
alley, but you know someone who
26
00:02:05.629 --> 00:02:07.990
could be interested. Send them a
text message, a linkedin message, a
27
00:02:08.349 --> 00:02:13.069
facebook message, a smoke signal,
I don't know, anything you can think
28
00:02:13.110 --> 00:02:15.939
of to get their attention. It
could be a really thoughtful way to let
29
00:02:15.020 --> 00:02:19.819
someone in your network know that you're
thinking about them and looking to share valuable
30
00:02:19.900 --> 00:02:23.259
resources. Here is the snippet from
Ken and his conversation with Robert Powell.
31
00:02:25.099 --> 00:02:29.379
Let's start with a phrase from the
title of the report that really stood out.
32
00:02:29.780 --> 00:02:32.449
Threads from within. What does that
mean? Well, thanks, guying,
33
00:02:32.689 --> 00:02:37.650
and many thanks for vict me on
see a threats from within. So
34
00:02:38.330 --> 00:02:42.569
in a fact, what we're referring
to, hear people UN ability. So
35
00:02:42.650 --> 00:02:46.919
this could include anything that emanates from
fishing. A runs wow, male wow
36
00:02:47.599 --> 00:02:53.639
is the email compromise. These will
the kind of issues, but quite distinctive
37
00:02:53.680 --> 00:03:00.150
from some kind of technical attack that
my com via over your computer or something
38
00:03:00.270 --> 00:03:04.469
that's and has real very little actually
human element. I'm in this case.
39
00:03:04.949 --> 00:03:08.229
It's little more difficult when we're dealing
with people because you can't necessarily patch a
40
00:03:08.349 --> 00:03:12.030
person. You might be able to
patch a person, as I may be
41
00:03:12.069 --> 00:03:14.939
able to patch a system, but
not a person. And so we found
42
00:03:15.340 --> 00:03:17.539
this was no great surprise, but
the level of it was something of a
43
00:03:17.580 --> 00:03:22.460
surprise. Eighty five percent of the
respondence we spoke to, so we did
44
00:03:22.500 --> 00:03:25.180
a survey of CIO, see Soos, of out executives and so forth,
45
00:03:25.539 --> 00:03:30.729
eighty five percent of them agreed the
most cyber security breaches as the result of
46
00:03:30.810 --> 00:03:35.770
human vulnerabilities. It's not because of
technology, is not because the processes.
47
00:03:35.969 --> 00:03:38.250
It's people. That's what we mean
when we're talking about threats from with him
48
00:03:38.610 --> 00:03:42.719
and it's interesting. Did it any
five presenter, sounds pretty high. It
49
00:03:42.800 --> 00:03:46.120
was at a surprise. I think
the level was something of a surprised.
50
00:03:46.159 --> 00:03:51.199
We always think that everything is extremely
sophisticated in the intricate. By an interesting
51
00:03:51.240 --> 00:03:54.789
conversation with a gentleman into chief security
officer and he said you need to look
52
00:03:54.789 --> 00:03:58.990
at these kind of things. is
almost too faceted or multifaceted. So on
53
00:03:59.030 --> 00:04:01.430
the one hand you have you know
the pink pants. I can of attacks,
54
00:04:01.509 --> 00:04:05.509
so somebody's going in using all kinds
of clever wires and getting the diamond,
55
00:04:05.550 --> 00:04:09.229
if you know the movie, the
Pink Panzer. But then it's all
56
00:04:09.349 --> 00:04:15.939
kinds of attacks where someone's just opportunistically
walking down the road trying to open the
57
00:04:15.019 --> 00:04:18.819
door and seeing if someone didn't lock
the door that day. And a lot
58
00:04:18.860 --> 00:04:23.420
of that is human error. But
it turns out that actually, in effect,
59
00:04:23.420 --> 00:04:27.370
that people not locking their doors and
making simple mistake is the backdoor,
60
00:04:27.449 --> 00:04:30.490
if you will, the the criminals
using to access systems. I just didn't
61
00:04:30.529 --> 00:04:34.370
realize it'd be quite not prevalent.
Eighty five percent isn't phenomenally I figures.
62
00:04:36.250 --> 00:04:40.680
All right, everyone, we really
hope you enjoyed that short clip from Ken,
63
00:04:40.839 --> 00:04:44.920
Spencer Brown and Robert Powell. Ken
is going to be a fantastic host,
64
00:04:44.959 --> 00:04:47.319
along with all of the other hosts
at proofpoint. If you're listening to
65
00:04:47.439 --> 00:04:50.399
the show, we know you're thinking
about growth. So, no matter what
66
00:04:50.600 --> 00:04:55.829
your role is in sales, marketing
or another function, if you're looking to
67
00:04:55.870 --> 00:05:00.430
drive growth for your organization, we
definitely think you'll get value from subscribing to
68
00:05:00.509 --> 00:05:03.990
the show as you learn more about
the human side of cybersecurity. Again,
69
00:05:04.230 --> 00:05:09.779
just search protecting people and Apple podcasts, or wherever you do your listening.
70
00:05:09.860 --> 00:05:13.459
Subscribe, leave a review if you
like it and tell a friend if you
71
00:05:13.660 --> 00:05:15.899
think they'd enjoy it. Thank you
so much and have a wonderful day.
72
00:05:15.939 --> 00:05:25.689
Until next time. I hate it
when podcasts incessantly ask their listeners for reviews,
73
00:05:25.889 --> 00:05:29.370
but I get why they do it, because reviews are enormously helpful when
74
00:05:29.410 --> 00:05:31.449
you're trying to grow a podcast audience. So here's what we decided to do.
75
00:05:31.889 --> 00:05:34.959
If you leave a review for me
to be growth and apple podcasts and
76
00:05:35.160 --> 00:05:40.560
email me a screenshot of the review
to James at Sweet Fish Mediacom. I'll
77
00:05:40.560 --> 00:05:44.199
send you assigned copy of my new
book, content based networking. How to
78
00:05:44.279 --> 00:05:46.439
instantly connect with anyone you want to
know. We get a review, you
79
00:05:46.920 --> 00:05:48.519
get a free book. We both
win.