Every Friday we share one non-obvious insight from your favorite creators in our newsletter.
March 3, 2020

#NewPodcast: Protecting People w/ Ken Spencer Brown

In this episode of the #NewPodcast series, we share a part of the very first episode of Protecting People Podcast with Ken Spencer Brown and the team at Proofpoint. Check out the new show in your favorite podcast player:

The player is loading ...
B2B Growth

In this episode of the #NewPodcast series, we share a part of the very first episode of Protecting People Podcast with Ken Spencer Brown and the team at Proofpoint.

Check out the new show in your favorite podcast player:

Apple Podcasts

Spotify

Stitcher

Google Play

Transcript
WEBVTT 1 00:00:05.519 --> 00:00:10.029 Are you struggling to come up with original content weekend and week out? Start 2 00:00:10.070 --> 00:00:14.710 a podcast, interview your ideal clients, let them talk about what they care 3 00:00:14.750 --> 00:00:20.350 about most and never run out of content ideas again. Learn more at sweetphish 4 00:00:20.429 --> 00:00:30.260 MEDIACOM. You're listening to BEDB growth, a daily podcast for BTB leaders. 5 00:00:30.859 --> 00:00:34.740 We've interviewed names you've probably heard before, like Gary Vander truck and Simon Senek, 6 00:00:35.060 --> 00:00:39.049 but you've probably never heard from the majority of our guests. That's because 7 00:00:39.090 --> 00:00:43.530 the bulk of our interviews aren't with professional speakers and authors. Most of our 8 00:00:43.570 --> 00:00:47.969 guests are in the trenches leading sales and marketing teams. They're implementing strategy, 9 00:00:48.009 --> 00:00:52.799 they're experimenting with tactics, they're building the fastest growing BTB companies in the world. 10 00:00:53.439 --> 00:00:56.079 My name is James Carberry. I'm the founder of sweet fish media, 11 00:00:56.320 --> 00:01:00.039 a podcast agency for BB brands, and I'm also one of the cohosts of 12 00:01:00.159 --> 00:01:03.349 this show. When we're not interviewing sales and marketing leaders, you'll hear stories 13 00:01:03.390 --> 00:01:07.870 from behind the scenes of our own business. Will share the ups and downs 14 00:01:07.909 --> 00:01:11.310 of our journey as we attempt to take over the world. Just getting well, 15 00:01:11.950 --> 00:01:22.420 maybe let's get into the show. Hey everyone, it is Kelsey cores 16 00:01:22.540 --> 00:01:27.379 with sweetphish media. Welcome back to our new podcast series. We are really 17 00:01:27.739 --> 00:01:30.859 ided to share with you a new show that we just launched for our friends 18 00:01:30.980 --> 00:01:34.409 over at proof point. Today we're going to share with you a quick snippet 19 00:01:34.489 --> 00:01:40.450 from their very first episode. This episode was hosted by Ken Spencer Brown and 20 00:01:40.569 --> 00:01:46.730 it features Robert Powell, editorial director America's and thought leadership at the Economist Intelligence 21 00:01:46.849 --> 00:01:49.000 Unit. If you think you'll find the show valuable after you check out the 22 00:01:49.079 --> 00:01:55.480 snippet, just search protecting people and Apple podcast or your favorite podcast player. 23 00:01:56.040 --> 00:01:57.599 Make sure you subscribe and, if you really like it, don't forget to 24 00:01:57.640 --> 00:02:01.430 leave a review. It's a great way to help people find new podcast content. 25 00:02:01.989 --> 00:02:05.629 And maybe the show isn't up your alley, but you know someone who 26 00:02:05.629 --> 00:02:07.990 could be interested. Send them a text message, a linkedin message, a 27 00:02:08.349 --> 00:02:13.069 facebook message, a smoke signal, I don't know, anything you can think 28 00:02:13.110 --> 00:02:15.939 of to get their attention. It could be a really thoughtful way to let 29 00:02:15.020 --> 00:02:19.819 someone in your network know that you're thinking about them and looking to share valuable 30 00:02:19.900 --> 00:02:23.259 resources. Here is the snippet from Ken and his conversation with Robert Powell. 31 00:02:25.099 --> 00:02:29.379 Let's start with a phrase from the title of the report that really stood out. 32 00:02:29.780 --> 00:02:32.449 Threads from within. What does that mean? Well, thanks, guying, 33 00:02:32.689 --> 00:02:37.650 and many thanks for vict me on see a threats from within. So 34 00:02:38.330 --> 00:02:42.569 in a fact, what we're referring to, hear people UN ability. So 35 00:02:42.650 --> 00:02:46.919 this could include anything that emanates from fishing. A runs wow, male wow 36 00:02:47.599 --> 00:02:53.639 is the email compromise. These will the kind of issues, but quite distinctive 37 00:02:53.680 --> 00:03:00.150 from some kind of technical attack that my com via over your computer or something 38 00:03:00.270 --> 00:03:04.469 that's and has real very little actually human element. I'm in this case. 39 00:03:04.949 --> 00:03:08.229 It's little more difficult when we're dealing with people because you can't necessarily patch a 40 00:03:08.349 --> 00:03:12.030 person. You might be able to patch a person, as I may be 41 00:03:12.069 --> 00:03:14.939 able to patch a system, but not a person. And so we found 42 00:03:15.340 --> 00:03:17.539 this was no great surprise, but the level of it was something of a 43 00:03:17.580 --> 00:03:22.460 surprise. Eighty five percent of the respondence we spoke to, so we did 44 00:03:22.500 --> 00:03:25.180 a survey of CIO, see Soos, of out executives and so forth, 45 00:03:25.539 --> 00:03:30.729 eighty five percent of them agreed the most cyber security breaches as the result of 46 00:03:30.810 --> 00:03:35.770 human vulnerabilities. It's not because of technology, is not because the processes. 47 00:03:35.969 --> 00:03:38.250 It's people. That's what we mean when we're talking about threats from with him 48 00:03:38.610 --> 00:03:42.719 and it's interesting. Did it any five presenter, sounds pretty high. It 49 00:03:42.800 --> 00:03:46.120 was at a surprise. I think the level was something of a surprised. 50 00:03:46.159 --> 00:03:51.199 We always think that everything is extremely sophisticated in the intricate. By an interesting 51 00:03:51.240 --> 00:03:54.789 conversation with a gentleman into chief security officer and he said you need to look 52 00:03:54.789 --> 00:03:58.990 at these kind of things. is almost too faceted or multifaceted. So on 53 00:03:59.030 --> 00:04:01.430 the one hand you have you know the pink pants. I can of attacks, 54 00:04:01.509 --> 00:04:05.509 so somebody's going in using all kinds of clever wires and getting the diamond, 55 00:04:05.550 --> 00:04:09.229 if you know the movie, the Pink Panzer. But then it's all 56 00:04:09.349 --> 00:04:15.939 kinds of attacks where someone's just opportunistically walking down the road trying to open the 57 00:04:15.019 --> 00:04:18.819 door and seeing if someone didn't lock the door that day. And a lot 58 00:04:18.860 --> 00:04:23.420 of that is human error. But it turns out that actually, in effect, 59 00:04:23.420 --> 00:04:27.370 that people not locking their doors and making simple mistake is the backdoor, 60 00:04:27.449 --> 00:04:30.490 if you will, the the criminals using to access systems. I just didn't 61 00:04:30.529 --> 00:04:34.370 realize it'd be quite not prevalent. Eighty five percent isn't phenomenally I figures. 62 00:04:36.250 --> 00:04:40.680 All right, everyone, we really hope you enjoyed that short clip from Ken, 63 00:04:40.839 --> 00:04:44.920 Spencer Brown and Robert Powell. Ken is going to be a fantastic host, 64 00:04:44.959 --> 00:04:47.319 along with all of the other hosts at proofpoint. If you're listening to 65 00:04:47.439 --> 00:04:50.399 the show, we know you're thinking about growth. So, no matter what 66 00:04:50.600 --> 00:04:55.829 your role is in sales, marketing or another function, if you're looking to 67 00:04:55.870 --> 00:05:00.430 drive growth for your organization, we definitely think you'll get value from subscribing to 68 00:05:00.509 --> 00:05:03.990 the show as you learn more about the human side of cybersecurity. Again, 69 00:05:04.230 --> 00:05:09.779 just search protecting people and Apple podcasts, or wherever you do your listening. 70 00:05:09.860 --> 00:05:13.459 Subscribe, leave a review if you like it and tell a friend if you 71 00:05:13.660 --> 00:05:15.899 think they'd enjoy it. Thank you so much and have a wonderful day. 72 00:05:15.939 --> 00:05:25.689 Until next time. I hate it when podcasts incessantly ask their listeners for reviews, 73 00:05:25.889 --> 00:05:29.370 but I get why they do it, because reviews are enormously helpful when 74 00:05:29.410 --> 00:05:31.449 you're trying to grow a podcast audience. So here's what we decided to do. 75 00:05:31.889 --> 00:05:34.959 If you leave a review for me to be growth and apple podcasts and 76 00:05:35.160 --> 00:05:40.560 email me a screenshot of the review to James at Sweet Fish Mediacom. I'll 77 00:05:40.560 --> 00:05:44.199 send you assigned copy of my new book, content based networking. How to 78 00:05:44.279 --> 00:05:46.439 instantly connect with anyone you want to know. We get a review, you 79 00:05:46.920 --> 00:05:48.519 get a free book. We both win.