Transcript
WEBVTT
1
00:00:05.639 --> 00:00:09.310
Hey, it is Kelsey cores with
sweet fish media and welcome back to the
2
00:00:09.390 --> 00:00:13.150
new podcast series. Today we're going
to share with you a quick snippet from
3
00:00:13.150 --> 00:00:17.589
a new podcast we produce for our
friends over at pivot point security. It's
4
00:00:17.629 --> 00:00:22.859
called the virtual see Sooa podcast.
This podcast provides frank discussions of the very
5
00:00:22.940 --> 00:00:28.460
best in information security, advice and
insights for security it and business leaders.
6
00:00:28.940 --> 00:00:32.539
The host of this podcast is John
Very and we get to tune in as
7
00:00:32.619 --> 00:00:37.090
he chats with industry leaders to ensure
you have what you need to be confident
8
00:00:37.130 --> 00:00:41.530
in your security and compliance. If
you think you'll find the show valuable after
9
00:00:41.570 --> 00:00:45.969
you check out this quick snippet,
just search the virtual see Soa podcast in
10
00:00:46.130 --> 00:00:49.890
apple or your favorite podcast player.
If this show isn't for you, but
11
00:00:50.000 --> 00:00:53.159
you know someone who could be interested, let them know, whether that's a
12
00:00:53.240 --> 00:00:56.520
text message, a linkedin message,
a phone call or a smoke signal.
13
00:00:56.960 --> 00:01:00.600
Anyway you let them know is a
good way makes you subscribe and if you
14
00:01:00.759 --> 00:01:03.280
really like it, don't forget to
leave a review. Okay, let's jump
15
00:01:03.349 --> 00:01:11.150
into the snippet from John's very first
episode. I talk with business and technical
16
00:01:11.230 --> 00:01:17.390
leadership of probably a dozen issh small
to medium sized enterprise each week and they're
17
00:01:17.430 --> 00:01:22.459
all struggling, notably with the same
information security and privacy challenges. In some
18
00:01:22.659 --> 00:01:26.939
cases, unfortunately, they're really getting
hurt by security events and breaches, the
19
00:01:26.019 --> 00:01:30.180
things you read about in the paper
on everyday basis or on the Internet paper.
20
00:01:30.219 --> 00:01:33.250
I sound old, you know.
At times what I do can be
21
00:01:33.290 --> 00:01:34.689
pretty painful. You're at a call. Last week, as an example,
22
00:01:36.250 --> 00:01:41.049
small private wealth management firm four eightyzero
dollars moved out of a banking account by
23
00:01:41.090 --> 00:01:44.890
a hacker, you know, unfortunately, through a business email. Compromise here
24
00:01:44.969 --> 00:01:47.680
was interesting. You know, unfortunately
was too late to fix that issue.
25
00:01:47.920 --> 00:01:52.319
Fortunately, was really enough to avoid
another issue with this particular client. And
26
00:01:52.439 --> 00:01:57.519
the sad thing about that happening is
that, although information security is a very
27
00:01:57.680 --> 00:02:02.909
complex topic, it's not really that
complicated. You know, it's basic risk
28
00:02:02.950 --> 00:02:07.509
management. So in the podcast we're
hoping to simplify the process, you know,
29
00:02:07.590 --> 00:02:12.909
simplify information security and privacy by elevating
the conversation a bit, you know,
30
00:02:12.990 --> 00:02:15.259
taking it from bits and bites and
bringing it up a level to a
31
00:02:15.379 --> 00:02:21.580
point where we're bringing value to both
a cio and a CFO or a cio
32
00:02:21.780 --> 00:02:25.780
and a CTEO and a CIO and
a COO, and we think that's going
33
00:02:25.860 --> 00:02:29.979
to help not only to our customers
but of course, by helping our customers,
34
00:02:30.009 --> 00:02:32.409
were helping their customers right, because
we're keeping that data sogain. Absolutely
35
00:02:32.610 --> 00:02:38.689
absolutely there are effects of exactly Greater
Sayes. The and management is going to
36
00:02:38.770 --> 00:02:42.330
be far beyond just that first touch
exactly. And if you think about it,
37
00:02:42.330 --> 00:02:46.240
a good information security conversation is one
that resonates from the server room all
38
00:02:46.280 --> 00:02:49.080
the way to the board room.
Right. So if we can have that
39
00:02:49.199 --> 00:02:52.840
conversation that works in both places,
than I think we've done our job.
40
00:02:53.120 --> 00:02:55.479
So, if I summed up,
in a perfect world, I'm hoping that
41
00:02:55.599 --> 00:03:00.469
this podcast allows us to change our
conversations from a one to one to a
42
00:03:00.550 --> 00:03:02.629
one of many. That's going to
make it easier for a broader audience to
43
00:03:04.069 --> 00:03:07.669
gain some perspective and learn to be
proactive right to come put in place a
44
00:03:07.789 --> 00:03:10.550
good security plan, so to speak, chart that course and hopefully avoid the
45
00:03:10.710 --> 00:03:16.060
security incidents that are negatively impacting them
and or their customers. All right,
46
00:03:16.139 --> 00:03:21.300
everyone, we really hope you enjoyed
that short clip from John. Remember,
47
00:03:21.340 --> 00:03:25.740
if you're looking for the latest strategies, tips and trends from season information security
48
00:03:25.860 --> 00:03:31.810
officers. Want the know BS answers
to your biggest security questions or just simply
49
00:03:31.889 --> 00:03:36.930
want to stay informed and proactive,
this is the podcast for you. John
50
00:03:36.969 --> 00:03:42.520
will keep you educated and perhaps even
mildly entertained through topics like breach avoidance,
51
00:03:42.759 --> 00:03:47.680
incident response dealing with those pesky security
questionnaires, among other topics. Again,
52
00:03:47.800 --> 00:03:53.240
to find this show, just search
the virtual s so podcasts and apple podcasts,
53
00:03:53.280 --> 00:03:55.750
or wherever you do. You're listening. Subscribe. We were review if
54
00:03:55.789 --> 00:03:59.270
you like it, and don't forget
to tell a friend if you think they'd
55
00:03:59.270 --> 00:04:04.710
enjoy it. Think of it as
security with a smile. I hate it
56
00:04:04.830 --> 00:04:09.990
when podcasts incessantly ask their listeners for
reviews, but I get why they do
57
00:04:10.060 --> 00:04:14.219
it, because reviews are enormously helpful
when you're trying to grow a podcast audience.
58
00:04:14.539 --> 00:04:16.259
So here's what we decided to do. If you leave a review for
59
00:04:16.420 --> 00:04:20.259
be to be growth in apple podcasts
and email me a screenshot of the review
60
00:04:20.420 --> 00:04:25.529
to James At sweetfish Mediacom, I'll
send you a signed copy of my new
61
00:04:25.569 --> 00:04:29.410
book, content based networking, how
to instantly connect with anyone you want to
62
00:04:29.490 --> 00:04:31.610
know. We get a review,
you get a free book. We both
63
00:04:31.689 -->
win