Every Friday we share one non-obvious insight from your favorite creators in our newsletter.
April 7, 2020

#NewPodcast: The Virtual CISO Podcast w/ John Verry

The player is loading ...
B2B Growth

In this episode of the #NewPodcast series, we share a part of the very first episode of The Virtual CISO Podcast with John Verry of Pivot Point Security.

Check out the new show in your favorite podcast player:

Apple Podcasts

Spotify

Stitcher

Google Play

Transcript
WEBVTT 1 00:00:05.639 --> 00:00:09.310 Hey, it is Kelsey cores with sweet fish media and welcome back to the 2 00:00:09.390 --> 00:00:13.150 new podcast series. Today we're going to share with you a quick snippet from 3 00:00:13.150 --> 00:00:17.589 a new podcast we produce for our friends over at pivot point security. It's 4 00:00:17.629 --> 00:00:22.859 called the virtual see Sooa podcast. This podcast provides frank discussions of the very 5 00:00:22.940 --> 00:00:28.460 best in information security, advice and insights for security it and business leaders. 6 00:00:28.940 --> 00:00:32.539 The host of this podcast is John Very and we get to tune in as 7 00:00:32.619 --> 00:00:37.090 he chats with industry leaders to ensure you have what you need to be confident 8 00:00:37.130 --> 00:00:41.530 in your security and compliance. If you think you'll find the show valuable after 9 00:00:41.570 --> 00:00:45.969 you check out this quick snippet, just search the virtual see Soa podcast in 10 00:00:46.130 --> 00:00:49.890 apple or your favorite podcast player. If this show isn't for you, but 11 00:00:50.000 --> 00:00:53.159 you know someone who could be interested, let them know, whether that's a 12 00:00:53.240 --> 00:00:56.520 text message, a linkedin message, a phone call or a smoke signal. 13 00:00:56.960 --> 00:01:00.600 Anyway you let them know is a good way makes you subscribe and if you 14 00:01:00.759 --> 00:01:03.280 really like it, don't forget to leave a review. Okay, let's jump 15 00:01:03.349 --> 00:01:11.150 into the snippet from John's very first episode. I talk with business and technical 16 00:01:11.230 --> 00:01:17.390 leadership of probably a dozen issh small to medium sized enterprise each week and they're 17 00:01:17.430 --> 00:01:22.459 all struggling, notably with the same information security and privacy challenges. In some 18 00:01:22.659 --> 00:01:26.939 cases, unfortunately, they're really getting hurt by security events and breaches, the 19 00:01:26.019 --> 00:01:30.180 things you read about in the paper on everyday basis or on the Internet paper. 20 00:01:30.219 --> 00:01:33.250 I sound old, you know. At times what I do can be 21 00:01:33.290 --> 00:01:34.689 pretty painful. You're at a call. Last week, as an example, 22 00:01:36.250 --> 00:01:41.049 small private wealth management firm four eightyzero dollars moved out of a banking account by 23 00:01:41.090 --> 00:01:44.890 a hacker, you know, unfortunately, through a business email. Compromise here 24 00:01:44.969 --> 00:01:47.680 was interesting. You know, unfortunately was too late to fix that issue. 25 00:01:47.920 --> 00:01:52.319 Fortunately, was really enough to avoid another issue with this particular client. And 26 00:01:52.439 --> 00:01:57.519 the sad thing about that happening is that, although information security is a very 27 00:01:57.680 --> 00:02:02.909 complex topic, it's not really that complicated. You know, it's basic risk 28 00:02:02.950 --> 00:02:07.509 management. So in the podcast we're hoping to simplify the process, you know, 29 00:02:07.590 --> 00:02:12.909 simplify information security and privacy by elevating the conversation a bit, you know, 30 00:02:12.990 --> 00:02:15.259 taking it from bits and bites and bringing it up a level to a 31 00:02:15.379 --> 00:02:21.580 point where we're bringing value to both a cio and a CFO or a cio 32 00:02:21.780 --> 00:02:25.780 and a CTEO and a CIO and a COO, and we think that's going 33 00:02:25.860 --> 00:02:29.979 to help not only to our customers but of course, by helping our customers, 34 00:02:30.009 --> 00:02:32.409 were helping their customers right, because we're keeping that data sogain. Absolutely 35 00:02:32.610 --> 00:02:38.689 absolutely there are effects of exactly Greater Sayes. The and management is going to 36 00:02:38.770 --> 00:02:42.330 be far beyond just that first touch exactly. And if you think about it, 37 00:02:42.330 --> 00:02:46.240 a good information security conversation is one that resonates from the server room all 38 00:02:46.280 --> 00:02:49.080 the way to the board room. Right. So if we can have that 39 00:02:49.199 --> 00:02:52.840 conversation that works in both places, than I think we've done our job. 40 00:02:53.120 --> 00:02:55.479 So, if I summed up, in a perfect world, I'm hoping that 41 00:02:55.599 --> 00:03:00.469 this podcast allows us to change our conversations from a one to one to a 42 00:03:00.550 --> 00:03:02.629 one of many. That's going to make it easier for a broader audience to 43 00:03:04.069 --> 00:03:07.669 gain some perspective and learn to be proactive right to come put in place a 44 00:03:07.789 --> 00:03:10.550 good security plan, so to speak, chart that course and hopefully avoid the 45 00:03:10.710 --> 00:03:16.060 security incidents that are negatively impacting them and or their customers. All right, 46 00:03:16.139 --> 00:03:21.300 everyone, we really hope you enjoyed that short clip from John. Remember, 47 00:03:21.340 --> 00:03:25.740 if you're looking for the latest strategies, tips and trends from season information security 48 00:03:25.860 --> 00:03:31.810 officers. Want the know BS answers to your biggest security questions or just simply 49 00:03:31.889 --> 00:03:36.930 want to stay informed and proactive, this is the podcast for you. John 50 00:03:36.969 --> 00:03:42.520 will keep you educated and perhaps even mildly entertained through topics like breach avoidance, 51 00:03:42.759 --> 00:03:47.680 incident response dealing with those pesky security questionnaires, among other topics. Again, 52 00:03:47.800 --> 00:03:53.240 to find this show, just search the virtual s so podcasts and apple podcasts, 53 00:03:53.280 --> 00:03:55.750 or wherever you do. You're listening. Subscribe. We were review if 54 00:03:55.789 --> 00:03:59.270 you like it, and don't forget to tell a friend if you think they'd 55 00:03:59.270 --> 00:04:04.710 enjoy it. Think of it as security with a smile. I hate it 56 00:04:04.830 --> 00:04:09.990 when podcasts incessantly ask their listeners for reviews, but I get why they do 57 00:04:10.060 --> 00:04:14.219 it, because reviews are enormously helpful when you're trying to grow a podcast audience. 58 00:04:14.539 --> 00:04:16.259 So here's what we decided to do. If you leave a review for 59 00:04:16.420 --> 00:04:20.259 be to be growth in apple podcasts and email me a screenshot of the review 60 00:04:20.420 --> 00:04:25.529 to James At sweetfish Mediacom, I'll send you a signed copy of my new 61 00:04:25.569 --> 00:04:29.410 book, content based networking, how to instantly connect with anyone you want to 62 00:04:29.490 --> 00:04:31.610 know. We get a review, you get a free book. We both 63 00:04:31.689 --> win