Category Archives: Privacy Policy

Podcast: Patrick Knight

rS4ton93_400x400

Patrick Knight

Patrick Knight is Senior Director of Cyber Strategy and Product Management at Veriato. For over 17 years Patrick has worked for major security leaders developing products and guiding online security policies, including encryption, network intrusion detection and anti-malware threat protection technologies. At Veriato, he is helping organizations across the globe protect sensitive data from risks posed by insiders. Prior to entering the online security industry, he spent 12 years in national security in the U.S. Intelligence Community.

Patrick joined me to speak about insider threats and discuss some of the findings in the recently released Insider Threat Program Maturity Model report by Veriato. The report provides insight into how organizations today are addressing the threat of insiders. By looking at how factors like program support, budget, the presence of a formal team, and privacy impact program maturity, this report can provide a better understanding of what conditions are necessary to achieve the most effective program possible.

InsiderThreatReport-STILL

The Insider Threat Program Maturity Model provides organizations with a way to benchmark their current ability to monitor, detect, mitigate, and respond to insider threats. The Maturity Model also helps to determine a path to further mature the existing program towards a metrics-centric, optimized program.

Download the report free here.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

Tagged , , , , , , , , , , ,

PODCAST: Josh Mayfield

josh-mayfield-largeImage-7-a-2359

Josh Mayfield

Josh Mayfield is Director of Security Strategy at Absolute. Josh works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

Tagged , , , , , , , , , , , ,

Podcast: Malcolm Harkins

Malcom-Harkins-Twitter

Malcolm Harkins

Malcolm Harkins is the Chief Security and Trust Officer at Cylance Inc. He oversees information technology, information risk and security, as well as security and privacy policy. Harkins is also responsible for peer out reach activities to drive improvement across the world in the understanding of cyber-risks as well as best practices to manage and mitigate those risks. Previously Harkins was Vice President and Chief Security and Privacy Officer (CSPO) at Intel Corporation.

DIRECT DOWNLOAD OF PODCAST MP3 FILE

Subscribe on iTunes, GooglePlay and Stitcher!

Check out Malcolm’s talks at RSAC

Malcolm on panel at RSAC 2018:

Tagged , , , , , , ,