<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/greatsecuritydebate/" rel="self" type="application/rss+xml"/><title><![CDATA[Great Security Debate]]></title><podcast:guid>f997d68c-f53d-5434-965f-f181246ad8b2</podcast:guid><lastBuildDate>Tue, 10 Mar 2026 19:29:16 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[© 2025 Distilling Security Inc.]]></copyright><managingEditor>The Great Security Debate</managingEditor><itunes:summary><![CDATA[Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. 
Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
]]></itunes:summary><image><url>https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg</url><title>Great Security Debate</title><link><![CDATA[https://distillingsecurity.com/securitydebate/]]></link></image><itunes:image href="https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg"/><itunes:owner><itunes:name>The Great Security Debate</itunes:name></itunes:owner><itunes:author>The Great Security Debate</itunes:author><description>Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don&apos;t. 
Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
</description><link>https://distillingsecurity.com/securitydebate/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Security From All Views]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"></itunes:category><itunes:category text="Society &amp; Culture"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/greatsecuritydebate/</itunes:new-feed-url><podcast:locked>yes</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Doorbells Ring Hollow</title><itunes:title>Doorbells Ring Hollow</itunes:title><description><![CDATA[<p>What on earth were Ring and Amazon thinking when they aired their Super Bowl advert that previewed a “there’s nowhere you can hide” type of dystopian future masked as a way to find your lost dog?  With cameras everywhere, are we safer or just more exposed? When camera data is deleted, is it really gone (spoiler alert: not necessarily), and more. Are we approaching the new location of the “creepy line” or as a society are we content to trade privacy for security? And what happens when the glasses with cameras become more pervasive? Are we all on cam all the time whether we like it or not?</p><p>Show notes:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ring Super Bowl Advert - <a href="https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html</a> </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Decoder Podcast - Let’s talk about Ring, lost dogs, and the surveillance state - https://youtu.be/QQjW68B7s8g</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ring and Flock cancel partnership - <a href="https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Savanna Guthrie Nest Video Retrieval - <a href="https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage" rel="noopener noreferrer" target="_blank">https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Apple San Bernardino Matter - <a href="https://epic.org/documents/apple-v-fbi-2/" rel="noopener noreferrer" target="_blank">https://epic.org/documents/apple-v-fbi-2/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DJI robot vacuum cameras accessible via Internet - <a href="https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt" rel="noopener noreferrer" target="_blank">https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Unifi protect cameras - <a href="https://geni.us/isNyY2" rel="noopener noreferrer" target="_blank">https://geni.us/isNyY2</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Zuck in court to testify on social media addiction - <a href="https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b" rel="noopener noreferrer" target="_blank">https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b</a> </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Glassholes are back - and forbidden in court -  <a href="https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie recommendation  - Happy Gilmore - <a href="https://geni.us/v96XEgb" rel="noopener noreferrer" target="_blank">https://geni.us/v96XEgb</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Meta/Facebook studies on addictiveness of social media - <a href="https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>LinkedIn/Microsoft Verification data being shared with many others, including Persona -= <a href="https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/" rel="noopener noreferrer" target="_blank">https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/</a></li></ol><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></description><content:encoded><![CDATA[<p>What on earth were Ring and Amazon thinking when they aired their Super Bowl advert that previewed a “there’s nowhere you can hide” type of dystopian future masked as a way to find your lost dog?  With cameras everywhere, are we safer or just more exposed? When camera data is deleted, is it really gone (spoiler alert: not necessarily), and more. Are we approaching the new location of the “creepy line” or as a society are we content to trade privacy for security? And what happens when the glasses with cameras become more pervasive? Are we all on cam all the time whether we like it or not?</p><p>Show notes:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ring Super Bowl Advert - <a href="https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2026/02/19/business/ring-super-bowl-ad-privacy.html</a> </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Decoder Podcast - Let’s talk about Ring, lost dogs, and the surveillance state - https://youtu.be/QQjW68B7s8g</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ring and Flock cancel partnership - <a href="https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2026/02/13/amazons-ring-cancels-partnership-with-flock-a-network-of-ai-cameras-used-by-ice-feds-and-police/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Savanna Guthrie Nest Video Retrieval - <a href="https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage" rel="noopener noreferrer" target="_blank">https://www.theverge.com/tech/877235/nancy-guthrie-google-nest-cam-video-storage</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Apple San Bernardino Matter - <a href="https://epic.org/documents/apple-v-fbi-2/" rel="noopener noreferrer" target="_blank">https://epic.org/documents/apple-v-fbi-2/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>DJI robot vacuum cameras accessible via Internet - <a href="https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt" rel="noopener noreferrer" target="_blank">https://www.theverge.com/tech/879088/dji-romo-hack-vulnerability-remote-control-camera-access-mqtt</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Unifi protect cameras - <a href="https://geni.us/isNyY2" rel="noopener noreferrer" target="_blank">https://geni.us/isNyY2</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Zuck in court to testify on social media addiction - <a href="https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b" rel="noopener noreferrer" target="_blank">https://apnews.com/article/mark-zuckerberg-trial-testimony-instagram-c8cbaa32ccbf4933ec3a7beebd6cf34b</a> </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Glassholes are back - and forbidden in court -  <a href="https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/meta-trial-mark-zuckerberg-ai-glasses/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie recommendation  - Happy Gilmore - <a href="https://geni.us/v96XEgb" rel="noopener noreferrer" target="_blank">https://geni.us/v96XEgb</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Meta/Facebook studies on addictiveness of social media - <a href="https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2026/02/23/tech/facebook-researchers-study-addictive-features</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>LinkedIn/Microsoft Verification data being shared with many others, including Persona -= <a href="https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/" rel="noopener noreferrer" target="_blank">https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/</a></li></ol><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/doorbells-ring-hollow]]></link><guid isPermaLink="false">79fd7340-77b3-4559-96d1-bece606ab44c</guid><itunes:image href="https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg"/><pubDate>Mon, 23 Feb 2026 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/79fd7340-77b3-4559-96d1-bece606ab44c.mp3" length="67420224" type="audio/mpeg"/><itunes:duration>46:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>68</itunes:episode><podcast:episode>68</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/175dc6b6-f8a1-4920-8437-7c917366cb50/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/175dc6b6-f8a1-4920-8437-7c917366cb50/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/175dc6b6-f8a1-4920-8437-7c917366cb50/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-c08f18ee-d9f2-4f87-a64c-e53cb51781bb.json" type="application/json+chapters"/></item><item><title>Complacency in the Loop</title><itunes:title>Complacency in the Loop</itunes:title><description><![CDATA[<p>AI is growing in use within information security, but are we ready to trust it to do all the things we hope it can, and do so automatically without doing harm?  Context is king, and training to that level is only possible when you give all your experience to the AI. What are the tradeoffs to doing so? What happens when we depend on AI and forget (or worse, never learn) the underpinnings of what makes the AI system work (remember the calculator debates of the 1980s?). And does the end justify the means when it comes to AI use? And what is that “ends” anyway? Efficiency, automation, knowledge? Erik, Dan, and Brian discuss it all in this week’s Great Security Debate!</p><p><strong>Show Notes</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Report on reasons Israel didn’t catch oct 7 attacks - <a href="https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack" rel="noopener noreferrer" target="_blank">https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Shin Bet Report - Source Doc (Hebrew) - <a href="https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1" rel="noopener noreferrer" target="_blank">https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Waymo hits student on bicycle - <a href="https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Waymo violates school bus rules - <a href="https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation - Agentic Dan - <a href="https://distillingsecurity.com/episode-64-agentic-dan/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/episode-64-agentic-dan/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TV Recommendation - Pluribus - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza" rel="noopener noreferrer" target="_blank">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trust Issues in AI - </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>“I bought this Tesla before Elon went crazy” magnet -  <a href="https://geni.us/DXQYk" rel="noopener noreferrer" target="_blank">https://geni.us/DXQYk</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>OpenAI adds ads - <a href="https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1" rel="noopener noreferrer" target="_blank">https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Satya Nadella AI Internal Memo - <a href="https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52" rel="noopener noreferrer" target="_blank">https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FDA AI Rules - <a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological" rel="noopener noreferrer" target="_blank">https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Utah AI Prescriptions - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation: Terminator - <a href="https://geni.us/59025" rel="noopener noreferrer" target="_blank">https://geni.us/59025</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Book Recommendation:  The Cuckoos Egg - <a href="https://geni.us/hYE9" rel="noopener noreferrer" target="_blank">https://geni.us/hYE9</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Book Recommendation:   AI 2041 - <a href="https://geni.us/5dtV54h" rel="noopener noreferrer" target="_blank">https://geni.us/5dtV54h</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Anthropic Super Bowl Ad - <a href="https://fortune.com/2026/02/09/what-was-anthropic-super-bowl-ad-chatgpt-therapy-sam-altman-reaction/" rel="noopener noreferrer" target="_blank">Scott Galloway on why Anthropic's Super Bowl ad got to Sam ... - Fortune</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China facial recognition payments - <a href="https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/" rel="noopener noreferrer" target="_blank">https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation:  Sneakers - <a href="https://geni.us/P7SB" rel="noopener noreferrer" target="_blank">https://geni.us/P7SB</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Dawn of the Post Literate Society - <a href="https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1" rel="noopener noreferrer" target="_blank">https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Leading Causes of Death in the US, 2023 - <a href="https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm" rel="noopener noreferrer" target="_blank">https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automated car sex in backseat - <a href="https://dailydot.com/driverless-car-sex-autonomous" rel="noopener noreferrer" target="_blank">https://dailydot.com/driverless-car-sex-autonomous</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation: The Final Act - <a href="https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Calculators and Children - <a href="https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation: Mentorcore - <a href="https://distillingsecurity.com/tag/mentorcore/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/tag/mentorcore/</a></li></ol><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></description><content:encoded><![CDATA[<p>AI is growing in use within information security, but are we ready to trust it to do all the things we hope it can, and do so automatically without doing harm?  Context is king, and training to that level is only possible when you give all your experience to the AI. What are the tradeoffs to doing so? What happens when we depend on AI and forget (or worse, never learn) the underpinnings of what makes the AI system work (remember the calculator debates of the 1980s?). And does the end justify the means when it comes to AI use? And what is that “ends” anyway? Efficiency, automation, knowledge? Erik, Dan, and Brian discuss it all in this week’s Great Security Debate!</p><p><strong>Show Notes</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Report on reasons Israel didn’t catch oct 7 attacks - <a href="https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack" rel="noopener noreferrer" target="_blank">https://www.npr.org/2025/03/05/nx-s1-5318591/israel-shin-bet-security-failure-october-7-attack</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Shin Bet Report - Source Doc (Hebrew) - <a href="https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1" rel="noopener noreferrer" target="_blank">https://www.documentcloud.org/documents/25551448-yqry-tkhqyr-shyrvt-hbytkhvn-hklly-710/#document/p1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Waymo hits student on bicycle - <a href="https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2024/2/7/24065063/waymo-driverless-car-strikes-bicyclist-san-francisco-injuries</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Waymo violates school bus rules - <a href="https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/waymo-recall-3000-vehicles-software-school-bus/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation - Agentic Dan - <a href="https://distillingsecurity.com/episode-64-agentic-dan/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/episode-64-agentic-dan/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>TV Recommendation - Pluribus - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza" rel="noopener noreferrer" target="_blank">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Trust Issues in AI - </li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>“I bought this Tesla before Elon went crazy” magnet -  <a href="https://geni.us/DXQYk" rel="noopener noreferrer" target="_blank">https://geni.us/DXQYk</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>OpenAI adds ads - <a href="https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1" rel="noopener noreferrer" target="_blank">https://apnews.com/article/chatgpt-ads-openai-advertising-83812a066375a805fa2e29b28fc77da1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Satya Nadella AI Internal Memo - <a href="https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52" rel="noopener noreferrer" target="_blank">https://africa.businessinsider.com/news/nadellas-message-to-microsoft-execs-get-on-board-with-the-ai-grind-or-get-out/sq0fe52</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>FDA AI Rules - <a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological" rel="noopener noreferrer" target="_blank">https://www.fda.gov/regulatory-information/search-fda-guidance-documents/considerations-use-artificial-intelligence-support-regulatory-decision-making-drug-and-biological</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Utah AI Prescriptions - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation: Terminator - <a href="https://geni.us/59025" rel="noopener noreferrer" target="_blank">https://geni.us/59025</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Book Recommendation:  The Cuckoos Egg - <a href="https://geni.us/hYE9" rel="noopener noreferrer" target="_blank">https://geni.us/hYE9</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Book Recommendation:   AI 2041 - <a href="https://geni.us/5dtV54h" rel="noopener noreferrer" target="_blank">https://geni.us/5dtV54h</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Anthropic Super Bowl Ad - <a href="https://fortune.com/2026/02/09/what-was-anthropic-super-bowl-ad-chatgpt-therapy-sam-altman-reaction/" rel="noopener noreferrer" target="_blank">Scott Galloway on why Anthropic's Super Bowl ad got to Sam ... - Fortune</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>China facial recognition payments - <a href="https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/" rel="noopener noreferrer" target="_blank">https://www.chowhound.com/2073279/grocery-store-facial-recognition-china-smile-to-pay/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation:  Sneakers - <a href="https://geni.us/P7SB" rel="noopener noreferrer" target="_blank">https://geni.us/P7SB</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Dawn of the Post Literate Society - <a href="https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1" rel="noopener noreferrer" target="_blank">https://jmarriott.substack.com/p/the-dawn-of-the-post-literate-society-aa1</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Leading Causes of Death in the US, 2023 - <a href="https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm" rel="noopener noreferrer" target="_blank">https://www.cdc.gov/nchs/fastats/leading-causes-of-death.htm</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Automated car sex in backseat - <a href="https://dailydot.com/driverless-car-sex-autonomous" rel="noopener noreferrer" target="_blank">https://dailydot.com/driverless-car-sex-autonomous</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation: The Final Act - <a href="https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/new-podcast-coming-soon-the-final-act/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Calculators and Children - <a href="https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/pulse/crunching-numbers-debate-over-calculator-use-math-education-church-sg6te/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Podcast Recommendation: Mentorcore - <a href="https://distillingsecurity.com/tag/mentorcore/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/tag/mentorcore/</a></li></ol><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/complacency-in-the-loop]]></link><guid isPermaLink="false">ee56e385-40f2-4ab0-ab50-f5d879fb45f9</guid><itunes:image href="https://artwork.captivate.fm/5afff5ee-61d4-4ccf-86c2-90db3a209993/GSD-67-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 09 Feb 2026 11:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/ee56e385-40f2-4ab0-ab50-f5d879fb45f9.mp3" length="62729280" type="audio/mpeg"/><itunes:duration>43:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>67</itunes:episode><podcast:episode>67</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/203d588a-9c67-4441-8e2e-5090d75624b3/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/203d588a-9c67-4441-8e2e-5090d75624b3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/203d588a-9c67-4441-8e2e-5090d75624b3/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Episode 67: Complacency in the Loop"><podcast:source uri="https://youtu.be/B3VHOqnaQng"/></podcast:alternateEnclosure></item><item><title>WOPR Was Right</title><itunes:title>WOPR Was Right</itunes:title><description><![CDATA[<p>Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way?&nbsp;Or will it end with WOPR’s recognition that the only way to win the game is not to play at all?</p><p>It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.&nbsp;</p><p>Thanks for being part of the debate!</p><p><br></p><p>Show Notes:</p><p><br></p><ul><li>Caracas Invasion - <a href="https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598" rel="noopener noreferrer" target="_blank">https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598</a></li><li>Stuxnet Explained - <a href="https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html</a></li><li>Book Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - <a href="https://geni.us/swbN" rel="noopener noreferrer" target="_blank">https://geni.us/swbN</a></li><li>San Bernardino vs Apple - <a href="https://epic.org/documents/apple-v-fbi-2/" rel="noopener noreferrer" target="_blank">https://epic.org/documents/apple-v-fbi-2/</a></li><li>Movie Recommendation: Real Genius - <a href="https://geni.us/abYUYT" rel="noopener noreferrer" target="_blank">https://geni.us/abYUYT</a></li><li>Book Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - <a href="https://geni.us/SL21a" rel="noopener noreferrer" target="_blank">https://geni.us/SL21a</a></li><li>CIA Triad - <a href="https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/</a></li><li>Book Recommendation: Atomic Habits - <a href="https://geni.us/Nn2GSYr" rel="noopener noreferrer" target="_blank">https://geni.us/Nn2GSYr</a></li><li>Michigan Council of Women in Technology -<a href="https://mcwt.org" rel="noopener noreferrer" target="_blank">https://mcwt.org</a></li><li>Critical Infrastructure (Sectors) - <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors</a></li><li>Shadowbrokers - <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/</a></li><li>AI Prescriptions (Utah) - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a>&nbsp;</li><li>Japanese Omoiyari - <a href="https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE</a></li><li>GSD Episode on Japanese Parking Culture - <a href="https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/</a></li><li>Book Recommendation: Plato’s Republic - <a href="https://geni.us/vLBu4" rel="noopener noreferrer" target="_blank">https://geni.us/vLBu4</a></li><li>Movie Recommendation: Angela’s Christmas - <a href="https://geni.us/Vn9n" rel="noopener noreferrer" target="_blank">https://geni.us/Vn9n</a></li><li>Movie Recommendation: Die Hard - <a href="https://geni.us/eMASs" rel="noopener noreferrer" target="_blank">https://geni.us/eMASs</a></li><li>Movie Recommendation: Wargames - <a href="https://geni.us/L2R5Ij" rel="noopener noreferrer" target="_blank">https://geni.us/L2R5Ij</a></li><li>TV Recommendation: West Wing - Proportional Response -&nbsp;<a href="https://geni.us/9mU1k4" rel="noopener noreferrer" target="_blank">https://geni.us/9mU1k4</a></li><li>Movie Recommendation: Goldeneye - <a href="https://geni.us/0dO0b" rel="noopener noreferrer" target="_blank">https://geni.us/0dO0b</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></description><content:encoded><![CDATA[<p>Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security practitioners have a role (or an obligation, or even a liability) to close vulnerabilities that can be used in primary or retaliatory scenarios. How much of human nature makes cyber retaliation a foregone conclusion, or can we find ways to reduce the need or use or availability of ways in via the technology. From Stuxnet to Iran to Caracas, using cybersecurity is a prevalent vector of retaliation, but does it always have to be that way?&nbsp;Or will it end with WOPR’s recognition that the only way to win the game is not to play at all?</p><p>It’s hard to talk about modern cybersecurity and not bring in current events, and even harder to keep it from turning political. We tried very hard to do a good job in the latter as we talked about the former.&nbsp;</p><p>Thanks for being part of the debate!</p><p><br></p><p>Show Notes:</p><p><br></p><ul><li>Caracas Invasion - <a href="https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598" rel="noopener noreferrer" target="_blank">https://abcnews.go.com/International/explosions-heard-venezuelas-capital-city-caracas/story?id=128861598</a></li><li>Stuxnet Explained - <a href="https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html</a></li><li>Book Recommendation: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon - <a href="https://geni.us/swbN" rel="noopener noreferrer" target="_blank">https://geni.us/swbN</a></li><li>San Bernardino vs Apple - <a href="https://epic.org/documents/apple-v-fbi-2/" rel="noopener noreferrer" target="_blank">https://epic.org/documents/apple-v-fbi-2/</a></li><li>Movie Recommendation: Real Genius - <a href="https://geni.us/abYUYT" rel="noopener noreferrer" target="_blank">https://geni.us/abYUYT</a></li><li>Book Recommendation: The Creature from Jekyll Island: A Second Look at the Federal Reserve - <a href="https://geni.us/SL21a" rel="noopener noreferrer" target="_blank">https://geni.us/SL21a</a></li><li>CIA Triad - <a href="https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews.com/cia-triad-confidentiality-integrity-availability/</a></li><li>Book Recommendation: Atomic Habits - <a href="https://geni.us/Nn2GSYr" rel="noopener noreferrer" target="_blank">https://geni.us/Nn2GSYr</a></li><li>Michigan Council of Women in Technology -<a href="https://mcwt.org" rel="noopener noreferrer" target="_blank">https://mcwt.org</a></li><li>Critical Infrastructure (Sectors) - <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors</a></li><li>Shadowbrokers - <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/</a></li><li>AI Prescriptions (Utah) - <a href="https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2026/01/06/artificial-intelligence-prescribing-medications-utah-00709122</a>&nbsp;</li><li>Japanese Omoiyari - <a href="https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/herman-singh-b669357_in-japan-it-is-a-recognized-cultural-practice-activity-7408365447953272834-1op9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABlrqMBKb13DctlHfhW1OWtb-yWqdfUjnE</a></li><li>GSD Episode on Japanese Parking Culture - <a href="https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com/episode-65-signs-signs-everywhere-a-sign/</a></li><li>Book Recommendation: Plato’s Republic - <a href="https://geni.us/vLBu4" rel="noopener noreferrer" target="_blank">https://geni.us/vLBu4</a></li><li>Movie Recommendation: Angela’s Christmas - <a href="https://geni.us/Vn9n" rel="noopener noreferrer" target="_blank">https://geni.us/Vn9n</a></li><li>Movie Recommendation: Die Hard - <a href="https://geni.us/eMASs" rel="noopener noreferrer" target="_blank">https://geni.us/eMASs</a></li><li>Movie Recommendation: Wargames - <a href="https://geni.us/L2R5Ij" rel="noopener noreferrer" target="_blank">https://geni.us/L2R5Ij</a></li><li>TV Recommendation: West Wing - Proportional Response -&nbsp;<a href="https://geni.us/9mU1k4" rel="noopener noreferrer" target="_blank">https://geni.us/9mU1k4</a></li><li>Movie Recommendation: Goldeneye - <a href="https://geni.us/0dO0b" rel="noopener noreferrer" target="_blank">https://geni.us/0dO0b</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/wopr-was-right]]></link><guid isPermaLink="false">8ecc79ee-de3d-426b-8e71-13e4697b34a8</guid><itunes:image href="https://artwork.captivate.fm/fa7f4739-6e49-438d-ab38-cc04d2bbd930/GSD-66-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 12 Jan 2026 16:15:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/8ecc79ee-de3d-426b-8e71-13e4697b34a8.mp3" length="64339776" type="audio/mpeg"/><itunes:duration>44:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>66</itunes:episode><podcast:episode>66</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/a567abdb-e2a4-4139-b2a6-e9b8e4c77d95/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a567abdb-e2a4-4139-b2a6-e9b8e4c77d95/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a567abdb-e2a4-4139-b2a6-e9b8e4c77d95/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-30df86bd-931f-452d-9b14-d8ebafdd73eb.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 66 - WOPR Was Right"><podcast:source uri="https://youtu.be/doKLAHmq3Es"/></podcast:alternateEnclosure></item><item><title>Signs, Signs. Everywhere A Sign.</title><itunes:title>Signs, Signs. Everywhere A Sign.</itunes:title><description><![CDATA[<p>Rules are made and policies are established. But the “how” of implementing and meeting those regulations or policies will be very context specific. In this episode of the Great Security Debate, Dan, Erik, and Brian cover a number of key policies and requirements and some different ways to think about implementing them and how the specific situation, company, risk will affect the way you meet the rule. From driving a car to incident response and everything in between. We debate the need to look back at old rules and see if they all still make sense (a great programme called Kill Stupid Rules), and flexibility in control implementation to meet evolving business needs, to move quickly, and keeping the whole picture of the business, customer, and employees in mind.</p><p>Thanks for Listening!</p><p>Show Notes:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Passing on the right in Michigan: <a href="https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637" rel="noopener noreferrer" target="_blank">https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Overtake time in Triathlon: <a href="https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/" rel="noopener noreferrer" target="_blank">https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Reflex Security (Agentic Tabletop Exercises and Training): <a href="https://reflexsecurity.io" rel="noopener noreferrer" target="_blank">https://reflexsecurity.io</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Kill Stupid Rules: <a href="https://www.wsb.com/blog/employee-retention-secret/" rel="noopener noreferrer" target="_blank">https://www.wsb.com/blog/employee-retention-secret/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>GM Dress Code Change (2020): <a href="https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/" rel="noopener noreferrer" target="_blank">https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Silly State Rules: <a href="https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe" rel="noopener noreferrer" target="_blank">https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Sex in Full Self Driving Cars (Clean): <a href="https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029" rel="noopener noreferrer" target="_blank">https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - The Usual Suspects: <a href="https://geni.us/wVrLOCB" rel="noopener noreferrer" target="_blank">https://geni.us/wVrLOCB</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>John Bingham, COO, Speak by Design: <a href="https://www.speakbydesign.com/about-us" rel="noopener noreferrer" target="_blank">https://www.speakbydesign.com/about-us</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - Gremlins: <a href="https://geni.us/qE6NAC" rel="noopener noreferrer" target="_blank">https://geni.us/qE6NAC</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation -Die Hard: <a href="https://geni.us/eMASs" rel="noopener noreferrer" target="_blank">https://geni.us/eMASs</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - Love Actually: <a href="https://geni.us/yj8Fqh" rel="noopener noreferrer" target="_blank">https://geni.us/yj8Fqh</a></li></ol><br/><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></description><content:encoded><![CDATA[<p>Rules are made and policies are established. But the “how” of implementing and meeting those regulations or policies will be very context specific. In this episode of the Great Security Debate, Dan, Erik, and Brian cover a number of key policies and requirements and some different ways to think about implementing them and how the specific situation, company, risk will affect the way you meet the rule. From driving a car to incident response and everything in between. We debate the need to look back at old rules and see if they all still make sense (a great programme called Kill Stupid Rules), and flexibility in control implementation to meet evolving business needs, to move quickly, and keeping the whole picture of the business, customer, and employees in mind.</p><p>Thanks for Listening!</p><p>Show Notes:</p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Passing on the right in Michigan: <a href="https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637" rel="noopener noreferrer" target="_blank">https://legislature.mi.gov/Laws/MCL?objectName=MCL-257-637</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Overtake time in Triathlon: <a href="https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/" rel="noopener noreferrer" target="_blank">https://www.triathlete.com/training/race-tips/9-race-rules-didnt-know-breaking/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Reflex Security (Agentic Tabletop Exercises and Training): <a href="https://reflexsecurity.io" rel="noopener noreferrer" target="_blank">https://reflexsecurity.io</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Kill Stupid Rules: <a href="https://www.wsb.com/blog/employee-retention-secret/" rel="noopener noreferrer" target="_blank">https://www.wsb.com/blog/employee-retention-secret/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>GM Dress Code Change (2020): <a href="https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/" rel="noopener noreferrer" target="_blank">https://gmauthority.com/blog/2020/06/how-general-motors-ceo-mary-barra-changed-the-companys-dress-code-for-the-better/</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Silly State Rules: <a href="https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe" rel="noopener noreferrer" target="_blank">https://www.buzzfeed.com/rhiannacampbell/weird-old-american-laws-you-wont-believe</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Sex in Full Self Driving Cars (Clean): <a href="https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029" rel="noopener noreferrer" target="_blank">https://www.cbc.ca/news/science/sex-distracted-driving-1.3562029</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - The Usual Suspects: <a href="https://geni.us/wVrLOCB" rel="noopener noreferrer" target="_blank">https://geni.us/wVrLOCB</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>John Bingham, COO, Speak by Design: <a href="https://www.speakbydesign.com/about-us" rel="noopener noreferrer" target="_blank">https://www.speakbydesign.com/about-us</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - Gremlins: <a href="https://geni.us/qE6NAC" rel="noopener noreferrer" target="_blank">https://geni.us/qE6NAC</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation -Die Hard: <a href="https://geni.us/eMASs" rel="noopener noreferrer" target="_blank">https://geni.us/eMASs</a></li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Movie Recommendation - Love Actually: <a href="https://geni.us/yj8Fqh" rel="noopener noreferrer" target="_blank">https://geni.us/yj8Fqh</a></li></ol><br/><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/context-is-king]]></link><guid isPermaLink="false">0305c8fc-7dc8-4764-bec4-5acd7d737325</guid><itunes:image href="https://artwork.captivate.fm/631cbf64-7d5d-47ba-bc54-5727a24281dc/GSD-65-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 29 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/0305c8fc-7dc8-4764-bec4-5acd7d737325.mp3" length="78101568" type="audio/mpeg"/><itunes:duration>54:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>65</itunes:episode><podcast:episode>65</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/3afb0b57-e055-4a9f-9356-3cfa35ee2714/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3afb0b57-e055-4a9f-9356-3cfa35ee2714/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3afb0b57-e055-4a9f-9356-3cfa35ee2714/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Episode 65 - Signs. Signs. Everywhere A Sign."><podcast:source uri="https://youtu.be/ww2akK4ICDY"/></podcast:alternateEnclosure></item><item><title>Agentic Dan</title><itunes:title>Agentic Dan</itunes:title><description><![CDATA[<p>We are back for another Great Security Debate. </p><p>In this episode: we discuss the potential role of agentic AI in security, from true “copilot” to automated decider of things, and whether LLMs are just a really cool search engine. Brian, Erik, and Dan also debate the means and extent to which we could replace ourselves with agents and what the inhibitors and risks are (spoiler alert: trust and survival of that agent after employment were big factors), and how do we train those agents of all the steps our brains take to make the decisions that the humans make, and do so without polluting it with aspirational versions of ourselves (think: Instagram vs Reality). And it all leads to a parenting lesson by Brian and an&nbsp;automotive process lesson by Erik? It’s quite a debate.&nbsp;</p><p>Thanks for listening! We might do one more episode in 2026, but if not have a wonderful holidays and a happy new year!</p><p>Here’s the quote that Brian references at the end of the episode by Tolstoy:</p><blockquote>Patience is waiting.&nbsp;Not passively waiting.&nbsp;That is laziness.&nbsp;But to Keep going when the going is hard and slow - that is patience.&nbsp;The two most powerful warriors are patience and time. The value lies not in reducing "power" (computational energy) but in leveraging that processing power to achieve outcomes that are difficult, slow, or impossible for humans to manage alone.</blockquote><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>Reflex Security - <a href="https://reflexsecurity.io/" rel="noopener noreferrer" target="_blank">https://reflexsecurity.io</a></li><li>Movie Recommendation: Multiplicity - <a href="https://geni.us/7vgKO" rel="noopener noreferrer" target="_blank">https://geni.us/7vgKO</a></li><li>Plaid Privacy Policy - <a href="https://plaid.com/legal/" rel="noopener noreferrer" target="_blank">https://plaid.com/legal/</a></li><li><a href="http://Prompts.ai" rel="noopener noreferrer" target="_blank">Prompts.ai</a> - <a href="https://www.prompts.ai/en" rel="noopener noreferrer" target="_blank">https://www.prompts.ai/en</a></li><li>Music Recommendation: Take On Me - A-ha - <a href="https://www.youtube.com/watch?v=djV11Xbc914" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=djV11Xbc914</a></li><li>Book Recommendation: The Toyota Way - Book - <a href="https://geni.us/3LcpM" rel="noopener noreferrer" target="_blank">https://geni.us/3LcpM</a></li><li>Book Recommendation: Six Sigma - <a href="https://geni.us/CS8ql" rel="noopener noreferrer" target="_blank">https://geni.us/CS8ql</a></li><li>Book Recommendation: Matricide -&nbsp;<a href="https://geni.us/Xfn2MB" rel="noopener noreferrer" target="_blank">https://geni.us/Xfn2MB</a></li><li>Book Recommendation: The Lorax - <a href="https://geni.us/Fy8X4b" rel="noopener noreferrer" target="_blank">https://geni.us/Fy8X4b</a></li><li>Perplexity - <a href="https://www.perplexity.ai" rel="noopener noreferrer" target="_blank">https://www.perplexity.ai</a></li><li>TV Recommendation - Pluribus (Apple TV+) - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza" rel="noopener noreferrer" target="_blank">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></description><content:encoded><![CDATA[<p>We are back for another Great Security Debate. </p><p>In this episode: we discuss the potential role of agentic AI in security, from true “copilot” to automated decider of things, and whether LLMs are just a really cool search engine. Brian, Erik, and Dan also debate the means and extent to which we could replace ourselves with agents and what the inhibitors and risks are (spoiler alert: trust and survival of that agent after employment were big factors), and how do we train those agents of all the steps our brains take to make the decisions that the humans make, and do so without polluting it with aspirational versions of ourselves (think: Instagram vs Reality). And it all leads to a parenting lesson by Brian and an&nbsp;automotive process lesson by Erik? It’s quite a debate.&nbsp;</p><p>Thanks for listening! We might do one more episode in 2026, but if not have a wonderful holidays and a happy new year!</p><p>Here’s the quote that Brian references at the end of the episode by Tolstoy:</p><blockquote>Patience is waiting.&nbsp;Not passively waiting.&nbsp;That is laziness.&nbsp;But to Keep going when the going is hard and slow - that is patience.&nbsp;The two most powerful warriors are patience and time. The value lies not in reducing "power" (computational energy) but in leveraging that processing power to achieve outcomes that are difficult, slow, or impossible for humans to manage alone.</blockquote><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>Reflex Security - <a href="https://reflexsecurity.io/" rel="noopener noreferrer" target="_blank">https://reflexsecurity.io</a></li><li>Movie Recommendation: Multiplicity - <a href="https://geni.us/7vgKO" rel="noopener noreferrer" target="_blank">https://geni.us/7vgKO</a></li><li>Plaid Privacy Policy - <a href="https://plaid.com/legal/" rel="noopener noreferrer" target="_blank">https://plaid.com/legal/</a></li><li><a href="http://Prompts.ai" rel="noopener noreferrer" target="_blank">Prompts.ai</a> - <a href="https://www.prompts.ai/en" rel="noopener noreferrer" target="_blank">https://www.prompts.ai/en</a></li><li>Music Recommendation: Take On Me - A-ha - <a href="https://www.youtube.com/watch?v=djV11Xbc914" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=djV11Xbc914</a></li><li>Book Recommendation: The Toyota Way - Book - <a href="https://geni.us/3LcpM" rel="noopener noreferrer" target="_blank">https://geni.us/3LcpM</a></li><li>Book Recommendation: Six Sigma - <a href="https://geni.us/CS8ql" rel="noopener noreferrer" target="_blank">https://geni.us/CS8ql</a></li><li>Book Recommendation: Matricide -&nbsp;<a href="https://geni.us/Xfn2MB" rel="noopener noreferrer" target="_blank">https://geni.us/Xfn2MB</a></li><li>Book Recommendation: The Lorax - <a href="https://geni.us/Fy8X4b" rel="noopener noreferrer" target="_blank">https://geni.us/Fy8X4b</a></li><li>Perplexity - <a href="https://www.perplexity.ai" rel="noopener noreferrer" target="_blank">https://www.perplexity.ai</a></li><li>TV Recommendation - Pluribus (Apple TV+) - <a href="https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza" rel="noopener noreferrer" target="_blank">https://tv.apple.com/us/show/pluribus/umc.cmc.37axgovs2yozlyh3c2cmwzlza</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/agentic-dan]]></link><guid isPermaLink="false">37860e49-629f-4063-b408-e9eb6a1bdb5b</guid><itunes:image href="https://artwork.captivate.fm/4e936b69-b306-4a27-8751-703d3d2cfb27/GSD-64-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 15 Dec 2025 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/37860e49-629f-4063-b408-e9eb6a1bdb5b.mp3" length="70342848" type="audio/mpeg"/><itunes:duration>48:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>64</itunes:episode><podcast:episode>64</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/60c5395c-c075-44d8-accf-4fefe4bf5870/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/60c5395c-c075-44d8-accf-4fefe4bf5870/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/60c5395c-c075-44d8-accf-4fefe4bf5870/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="GSD 64   Agentic Dan"><podcast:source uri="https://youtu.be/aDdm7mh5skc"/></podcast:alternateEnclosure></item><item><title>Give a Sh!t Posture Management</title><itunes:title>Give a Sh!t Posture Management</itunes:title><description><![CDATA[<p>On this weeks’ Debate, Brian brings a truckload of acronyms for more single panes of glass to help us consolidate our various single panes of glass, Erik may actually be Brian (or maybe Brian is Erik), and Dan confirms he still (and likely always will) spend the rest of his days living in the house he just built deep in the Trough of Disillusionment.</p><p>What started out as a chat about some new technologies in the space turned into a treatise on the state of leadership and the future talent pipeline’s need for more curiosity (and why we think they are starved of the opportunity to learn to be curious). Along the way we talk about what motivates organisations to do security right from the get go vs leaving it alone based on difficulty to remediate, and the risk balances of both (think: productivity vs security). Throw in a little “binary opinions have dragged us into the mire” and you’ve got a full episode of The Great Security Debate.</p><p>We also drop some hints about a new show coming from The Distilling Security network in 2026 called The Final Act which will bring guests in the later stages of their careers about the urgency of our careers in security and tech, what they want to leave behind as legacy, and what they are doing to prepare their orgs for their eventual departure. Add on how they have and will give back to the community, and what their successors want to see done before this first generation of security and tech leaders hit the road.</p><p>Please subscribe and leave a comment.&nbsp; If you’d like to sponsor the network, please email sponsors@distillingsecurity.com</p><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>What is Data Security Posture Management (DSPM) - <a href="https://www.ibm.com/think/topics/data-security-posture-management" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/topics/data-security-posture-management</a></li><li>What is Identity Security Posture Management (ISPM) - <a href="https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/</a></li><li>What is an Institutional Review Board (IRB) - <a href="https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html" rel="noopener noreferrer" target="_blank">https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html</a></li><li>Lucy pulls the football (hand egg) away from Charlie Brown - <a href="https://www.youtube.com/watch?v=9dsm7K1Xkn4" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=9dsm7K1Xkn4</a></li><li>Healthy foods are more costly - <a href="https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html</a></li><li>Why Ford cancelled the Bronco after OJ - <a href="https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/" rel="noopener noreferrer" target="_blank">https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/</a></li><li>Not enough data - GSD Episode 62 [Audio] - <a href="https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511" rel="noopener noreferrer" target="_blank">https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511</a></li><li>Not enough data - GSD Episode 62 [Video] -&nbsp;</li><li>Book Recommendation - Anxious Generation by Jonathan Haidt - <a href="https://geni.us/lDrdn3" rel="noopener noreferrer" target="_blank">https://geni.us/lDrdn3</a></li><li>Book Recommendation - The Coddling of the American Mind by Jonathan Haidt - <a href="https://geni.us/Xqary2V" rel="noopener noreferrer" target="_blank">https://geni.us/Xqary2V</a></li><li>Ford has 5000 skilled mechanic jobs they can’t fill - <a href="https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/" rel="noopener noreferrer" target="_blank">https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></description><content:encoded><![CDATA[<p>On this weeks’ Debate, Brian brings a truckload of acronyms for more single panes of glass to help us consolidate our various single panes of glass, Erik may actually be Brian (or maybe Brian is Erik), and Dan confirms he still (and likely always will) spend the rest of his days living in the house he just built deep in the Trough of Disillusionment.</p><p>What started out as a chat about some new technologies in the space turned into a treatise on the state of leadership and the future talent pipeline’s need for more curiosity (and why we think they are starved of the opportunity to learn to be curious). Along the way we talk about what motivates organisations to do security right from the get go vs leaving it alone based on difficulty to remediate, and the risk balances of both (think: productivity vs security). Throw in a little “binary opinions have dragged us into the mire” and you’ve got a full episode of The Great Security Debate.</p><p>We also drop some hints about a new show coming from The Distilling Security network in 2026 called The Final Act which will bring guests in the later stages of their careers about the urgency of our careers in security and tech, what they want to leave behind as legacy, and what they are doing to prepare their orgs for their eventual departure. Add on how they have and will give back to the community, and what their successors want to see done before this first generation of security and tech leaders hit the road.</p><p>Please subscribe and leave a comment.&nbsp; If you’d like to sponsor the network, please email sponsors@distillingsecurity.com</p><p>Thanks for listening!</p><p>Show Notes:</p><ul><li>What is Data Security Posture Management (DSPM) - <a href="https://www.ibm.com/think/topics/data-security-posture-management" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/topics/data-security-posture-management</a></li><li>What is Identity Security Posture Management (ISPM) - <a href="https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security-posture-management-ispm/</a></li><li>What is an Institutional Review Board (IRB) - <a href="https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html" rel="noopener noreferrer" target="_blank">https://www.hhs.gov/ohrp/education-and-outreach/online-education/human-research-protection-training/lesson-3-what-are-irbs/index.html</a></li><li>Lucy pulls the football (hand egg) away from Charlie Brown - <a href="https://www.youtube.com/watch?v=9dsm7K1Xkn4" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=9dsm7K1Xkn4</a></li><li>Healthy foods are more costly - <a href="https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2023/12/27/healthy-foods-are-often-more-expensive-heres-why.html</a></li><li>Why Ford cancelled the Bronco after OJ - <a href="https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/" rel="noopener noreferrer" target="_blank">https://www.slashgear.com/1560204/reason-ford-bronco-discontinued-after-oj-simpson-trial-explained/</a></li><li>Not enough data - GSD Episode 62 [Audio] - <a href="https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511" rel="noopener noreferrer" target="_blank">https://podcasts.apple.com/us/podcast/the-100-years-ai-flood/id1513770103?i=1000735045511</a></li><li>Not enough data - GSD Episode 62 [Video] -&nbsp;</li><li>Book Recommendation - Anxious Generation by Jonathan Haidt - <a href="https://geni.us/lDrdn3" rel="noopener noreferrer" target="_blank">https://geni.us/lDrdn3</a></li><li>Book Recommendation - The Coddling of the American Mind by Jonathan Haidt - <a href="https://geni.us/Xqary2V" rel="noopener noreferrer" target="_blank">https://geni.us/Xqary2V</a></li><li>Ford has 5000 skilled mechanic jobs they can’t fill - <a href="https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/" rel="noopener noreferrer" target="_blank">https://fortune.com/2025/11/12/ford-ceo-manufacturing-jobs-trade-schools-we-are-in-trouble-in-our-country/</a></li></ul><br/><p><em>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</em></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/give-a-sht-posture-management]]></link><guid isPermaLink="false">cedb110d-1e1f-4665-9453-3af8ecc0108e</guid><itunes:image href="https://artwork.captivate.fm/8068e6d6-dcc0-4a6c-8642-a566f4e8dd56/GSD-63-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 17 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/cedb110d-1e1f-4665-9453-3af8ecc0108e.mp3" length="78982272" type="audio/mpeg"/><itunes:duration>54:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>63</itunes:episode><podcast:episode>63</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/2f0408ff-69f3-4568-bb54-4f4f17bb276f/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2f0408ff-69f3-4568-bb54-4f4f17bb276f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/2f0408ff-69f3-4568-bb54-4f4f17bb276f/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-c401a9a0-c127-403a-8539-6ff9dc19539b.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 63 - Give a Sh!t Posture Management"><podcast:source uri="https://youtu.be/XhfXzC1wmQw"/></podcast:alternateEnclosure></item><item><title>The 100 Years AI Flood</title><itunes:title>The 100 Years AI Flood</itunes:title><description><![CDATA[<p>The Great Security Debate is *back*! It’s been a busy year, but it’s time to get this show back on the air (and maybe on the road). Dan takes a break from the rat race, Erik took over the world, and Brian uses Elmer’s Glue to splice his network cables.</p><p>Topics in the show this week: </p><ul><li>AWS and Microsoft make the best cases for business continuity plans, the AI</li><li>Is public cloud reliable enough? Should we all move back to local data centres? How can we reliably assess that risk?</li><li>Want an AI Data Centre on your town? NIMBY vs Innovation!</li></ul><br/><p>We will be back every 2 weeks on Mondays. Subscribe on YouTube at <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> to see our smiling faces as you watch, or in your favourite podcast application to listen on your commute or with your whole family around the radio.</p><p>See you on the 17th with more debates! And some entirely new shows coming from Distilling Security very soon, too. Subscribe to the newsletter on our website <a href="https://distillingsecurity.com" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com</a> to hear all about them</p><p>Links to mentioned articles and topics:</p><ul><li>AWS Outage - 20 October 2025 - <a href="https://www.bbc.com/news/articles/cev1en9077ro" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/cev1en9077ro</a></li><li>Microsoft Azure Outage - <a href="https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724</a></li><li>37Signals move from AWS to Data Centre - <a href="https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd" rel="noopener noreferrer" target="_blank">https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd</a></li><li>100 Years Flood - <a href="http://usgs.gov" rel="noopener noreferrer" target="_blank">usgs.gov</a> - <a href="https://www.usgs.gov/water-science-school/science/100-year-flood" rel="noopener noreferrer" target="_blank">https://www.usgs.gov/water-science-school/science/100-year-flood</a></li><li>Great Flood of 1937 - <a href="https://www.weather.gov/lmk/flood_37" rel="noopener noreferrer" target="_blank">https://www.weather.gov/lmk/flood_37</a></li><li>Impact of Jaguar Land Rover Incident - <a href="https://www.bbc.com/news/articles/c0qpl0v3gnzo" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/c0qpl0v3gnzo</a></li><li>CDK Attack and Outage - <a href="https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers" rel="noopener noreferrer" target="_blank">https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers</a></li><li>Russian grain blockade against Ukraine - <a href="https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade" rel="noopener noreferrer" target="_blank">https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade</a></li><li>Saline, Michigan OpenAI Data Centre &amp; Pushback - <a href="https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c" rel="noopener noreferrer" target="_blank">https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c</a></li><li>Racine, Wisconsin Foxconn and Microsoft site failures - <a href="https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/" rel="noopener noreferrer" target="_blank">https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/</a></li><li>Racine, Wisconsin What happened to FoxConn? <a href="https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/" rel="noopener noreferrer" target="_blank">https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/</a></li><li>Gartner Hype Cycle - <a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle" rel="noopener noreferrer" target="_blank">https://www.gartner.com/en/research/methodologies/gartner-hype-cycle</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The Great Security Debate is *back*! It’s been a busy year, but it’s time to get this show back on the air (and maybe on the road). Dan takes a break from the rat race, Erik took over the world, and Brian uses Elmer’s Glue to splice his network cables.</p><p>Topics in the show this week: </p><ul><li>AWS and Microsoft make the best cases for business continuity plans, the AI</li><li>Is public cloud reliable enough? Should we all move back to local data centres? How can we reliably assess that risk?</li><li>Want an AI Data Centre on your town? NIMBY vs Innovation!</li></ul><br/><p>We will be back every 2 weeks on Mondays. Subscribe on YouTube at <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> to see our smiling faces as you watch, or in your favourite podcast application to listen on your commute or with your whole family around the radio.</p><p>See you on the 17th with more debates! And some entirely new shows coming from Distilling Security very soon, too. Subscribe to the newsletter on our website <a href="https://distillingsecurity.com" rel="noopener noreferrer" target="_blank">https://distillingsecurity.com</a> to hear all about them</p><p>Links to mentioned articles and topics:</p><ul><li>AWS Outage - 20 October 2025 - <a href="https://www.bbc.com/news/articles/cev1en9077ro" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/cev1en9077ro</a></li><li>Microsoft Azure Outage - <a href="https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724" rel="noopener noreferrer" target="_blank">https://www.wsj.com/tech/microsoft-hit-with-azure-365-outage-b3ac0724</a></li><li>37Signals move from AWS to Data Centre - <a href="https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd" rel="noopener noreferrer" target="_blank">https://world.hey.com/dhh/our-cloud-exit-savings-will-now-top-ten-million-over-five-years-c7d9b5bd</a></li><li>100 Years Flood - <a href="http://usgs.gov" rel="noopener noreferrer" target="_blank">usgs.gov</a> - <a href="https://www.usgs.gov/water-science-school/science/100-year-flood" rel="noopener noreferrer" target="_blank">https://www.usgs.gov/water-science-school/science/100-year-flood</a></li><li>Great Flood of 1937 - <a href="https://www.weather.gov/lmk/flood_37" rel="noopener noreferrer" target="_blank">https://www.weather.gov/lmk/flood_37</a></li><li>Impact of Jaguar Land Rover Incident - <a href="https://www.bbc.com/news/articles/c0qpl0v3gnzo" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/articles/c0qpl0v3gnzo</a></li><li>CDK Attack and Outage - <a href="https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers" rel="noopener noreferrer" target="_blank">https://www.industryweek.com/technology-and-iiot/article/55091142/major-cybersecurity-breach-affects-auto-manufacturers</a></li><li>Russian grain blockade against Ukraine - <a href="https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade" rel="noopener noreferrer" target="_blank">https://www.cfr.org/article/how-ukraine-overcame-russias-grain-blockade</a></li><li>Saline, Michigan OpenAI Data Centre &amp; Pushback - <a href="https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c" rel="noopener noreferrer" target="_blank">https://apnews.com/article/openai-inc-joi-harris-data-management-and-storage-microsoft-corp-oracle-corp-f25196fca5865ed79d94c972249a272c</a></li><li>Racine, Wisconsin Foxconn and Microsoft site failures - <a href="https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/" rel="noopener noreferrer" target="_blank">https://racinecountyeye.com/2025/10/08/microsoft-abandon-1st-caledonia/</a></li><li>Racine, Wisconsin What happened to FoxConn? <a href="https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/" rel="noopener noreferrer" target="_blank">https://www.nbcchicago.com/news/local/what-happened-to-foxconn-a-look-at-the-1-2-billion-spent-and-where-it-all-went/3759518/</a></li><li>Gartner Hype Cycle - <a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle" rel="noopener noreferrer" target="_blank">https://www.gartner.com/en/research/methodologies/gartner-hype-cycle</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/the-100-years-ai-flood]]></link><guid isPermaLink="false">32b53907-921b-4dac-8af6-7f59c903f33b</guid><itunes:image href="https://artwork.captivate.fm/01816ad8-0ac5-40e1-819b-6b82e681cb20/GSD-62-New-Look-Square-Cover-Scaled.jpg"/><pubDate>Mon, 03 Nov 2025 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/32b53907-921b-4dac-8af6-7f59c903f33b.mp3" length="68313600" type="audio/mpeg"/><itunes:duration>47:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>62</itunes:episode><podcast:episode>62</podcast:episode><podcast:season>5</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab2c1b63-ebe2-4794-bdca-3571e995d56f/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab2c1b63-ebe2-4794-bdca-3571e995d56f/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ab2c1b63-ebe2-4794-bdca-3571e995d56f/index.html" type="text/html"/></item><item><title>Risky Risks: Live from the GTS Security Summit</title><itunes:title>Risky Risks: Live from the GTS Security Summit</itunes:title><description><![CDATA[<p>The Great Security Debate crew recorded a live episode at the GTS Security Summit in Detroit, Michigan with special guest, Zah Gonzalvo, SVP of Financial, Climate, and Operational Risk at Banco Popular. Tune in for a great discussion on risk, risk mitigation, risk prioritisation, and risk in context. Yep, it's all about risk!</p><p>Takeaways:</p><ul><li> The evolution of security has shifted from a binary perspective to a more nuanced understanding of risk management, acknowledging the need for flexibility in addressing diverse security challenges. </li><li> In contemporary discussions, it is increasingly evident that security must be integrated into business strategy, highlighting the imperative for security professionals to communicate effectively with stakeholders. </li><li> The role of the Chief Information Security Officer (CISO) has transcended traditional technological boundaries, necessitating a comprehensive grasp of business risk and operational efficiency. </li><li> Effective risk management within organizations requires a shared responsibility model, where every employee contributes to the overall security posture, thus reinforcing the concept that security is a collective endeavor. </li><li> Scenario analysis is a potent tool in risk management, enabling organizations to anticipate potential threats and understand the implications of various risk scenarios on their operations. </li><li> Engaging with business units to contextualize security risks in terms of operational impact and financial implications is vital for securing necessary budgets and resources for security initiatives. </li></ul><br/>]]></description><content:encoded><![CDATA[<p>The Great Security Debate crew recorded a live episode at the GTS Security Summit in Detroit, Michigan with special guest, Zah Gonzalvo, SVP of Financial, Climate, and Operational Risk at Banco Popular. Tune in for a great discussion on risk, risk mitigation, risk prioritisation, and risk in context. Yep, it's all about risk!</p><p>Takeaways:</p><ul><li> The evolution of security has shifted from a binary perspective to a more nuanced understanding of risk management, acknowledging the need for flexibility in addressing diverse security challenges. </li><li> In contemporary discussions, it is increasingly evident that security must be integrated into business strategy, highlighting the imperative for security professionals to communicate effectively with stakeholders. </li><li> The role of the Chief Information Security Officer (CISO) has transcended traditional technological boundaries, necessitating a comprehensive grasp of business risk and operational efficiency. </li><li> Effective risk management within organizations requires a shared responsibility model, where every employee contributes to the overall security posture, thus reinforcing the concept that security is a collective endeavor. </li><li> Scenario analysis is a potent tool in risk management, enabling organizations to anticipate potential threats and understand the implications of various risk scenarios on their operations. </li><li> Engaging with business units to contextualize security risks in terms of operational impact and financial implications is vital for securing necessary budgets and resources for security initiatives. </li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/january-episode]]></link><guid isPermaLink="false">dba0904a-8943-49b2-a9bb-94cdb059b5e2</guid><itunes:image href="https://artwork.captivate.fm/8dbf5ff8-102c-43ea-9039-0b66ea1f8620/xnFzal4qu-k9FhDDW9M6h87X.jpg"/><pubDate>Mon, 12 May 2025 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/episodes.captivate.fm/episode/dba0904a-8943-49b2-a9bb-94cdb059b5e2.mp3" length="68409216" type="audio/mpeg"/><itunes:duration>47:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>61</itunes:episode><podcast:episode>61</podcast:episode><podcast:season>4</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e7ccd1ce-cba9-4d77-a92e-858d5639cfd0/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e7ccd1ce-cba9-4d77-a92e-858d5639cfd0/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e7ccd1ce-cba9-4d77-a92e-858d5639cfd0/index.html" type="text/html"/><podcast:chapters url="https://transcripts.captivate.fm/chapter-d024a837-e8bf-4dc9-aea4-8954e57bc89a.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Risky Risks: Live from the GTS Security Summit"><podcast:source uri="https://youtu.be/sRGTzU3eUmw"/></podcast:alternateEnclosure></item><item><title>Fantasy Hacker League</title><itunes:title>Fantasy Hacker League</itunes:title><description><![CDATA[<p>In this episode of The Great Security Debate, Dan, Brian and Erik invent (and copyright) the idea of a Fantasy Hacker League then dig into more serious discussions on deception technology, asset discovery challenges, and resource management. The conversation also delves into the impact of budget constraints on security projects, the mental toll on cybersecurity professionals, and the evolving role of CISOs in digital transformation. Issues such as job stress, burnout, and role mismatches among security leaders are addressed, alongside strategic insights on integrating security within broader business operations.</p><p>00:00&nbsp;Introduction to the Great Security Debate</p><p>00:39&nbsp;Humorous Take on Hacker Recruitment</p><p>03:16&nbsp;Fantasy Hacker League Concept</p><p>09:18&nbsp;Microsoft's Honeypot Strategy</p><p>22:58&nbsp;Challenges in Security Budgets and Resources</p><p>31:03&nbsp;The Reality of Full-Time Positions</p><p>31:31&nbsp;Introverts vs. Extroverts in Leadership</p><p>32:06&nbsp;The Challenges of Being a CISO</p><p>33:53&nbsp;Work-Life Balance and Stress</p><p>37:04&nbsp;The Role of Security in Business</p><p>39:36&nbsp;The Future of Security Leadership</p><p>41:00&nbsp;Adapting to Economic Constraints</p><p>59:28&nbsp;The Importance of Enjoying Your Work</p><p>01:00:26&nbsp;Conclusion and Farewell</p>]]></description><content:encoded><![CDATA[<p>In this episode of The Great Security Debate, Dan, Brian and Erik invent (and copyright) the idea of a Fantasy Hacker League then dig into more serious discussions on deception technology, asset discovery challenges, and resource management. The conversation also delves into the impact of budget constraints on security projects, the mental toll on cybersecurity professionals, and the evolving role of CISOs in digital transformation. Issues such as job stress, burnout, and role mismatches among security leaders are addressed, alongside strategic insights on integrating security within broader business operations.</p><p>00:00&nbsp;Introduction to the Great Security Debate</p><p>00:39&nbsp;Humorous Take on Hacker Recruitment</p><p>03:16&nbsp;Fantasy Hacker League Concept</p><p>09:18&nbsp;Microsoft's Honeypot Strategy</p><p>22:58&nbsp;Challenges in Security Budgets and Resources</p><p>31:03&nbsp;The Reality of Full-Time Positions</p><p>31:31&nbsp;Introverts vs. Extroverts in Leadership</p><p>32:06&nbsp;The Challenges of Being a CISO</p><p>33:53&nbsp;Work-Life Balance and Stress</p><p>37:04&nbsp;The Role of Security in Business</p><p>39:36&nbsp;The Future of Security Leadership</p><p>41:00&nbsp;Adapting to Economic Constraints</p><p>59:28&nbsp;The Importance of Enjoying Your Work</p><p>01:00:26&nbsp;Conclusion and Farewell</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/fantasy-hacker-league]]></link><guid isPermaLink="false">4800a409-2470-49fd-ac2a-1e92dba12264</guid><itunes:image href="https://artwork.captivate.fm/4cdaefd5-6b7e-40e8-92e3-50f7fcc3daea/D2sXE8cbv1nfdFZR0-caVMHB.jpg"/><pubDate>Mon, 21 Oct 2024 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/eba8e12a-fc4b-4c82-b578-176ee55de96c/Episode-60-Fantasy-Hacker-League.mp3" length="89479872" type="audio/mpeg"/><itunes:duration>01:02:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>60</itunes:episode><podcast:episode>60</podcast:episode><podcast:season>4</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7ac1bd63-ed84-4480-9e2c-714686183556/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7ac1bd63-ed84-4480-9e2c-714686183556/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7ac1bd63-ed84-4480-9e2c-714686183556/index.html" type="text/html"/><podcast:alternateEnclosure type="video/youtube" title="Fantasy Hacker League"><podcast:source uri="https://youtu.be/bqhjD-AsI4s"/></podcast:alternateEnclosure></item><item><title>Free Disaster Recovery Tests!</title><itunes:title>Free Disaster Recovery Tests!</itunes:title><description><![CDATA[<p>Welcome to the Great Security Debate! In this episode, experts take on a multifaceted discussion about the intricacies of technology and cybersecurity. The debate navigates through the recent incident involving CrowdStrike and Microsoft, dissecting the layers of technology, processes, and the roles of different entities in maintaining security. Emphasizing the lessons learned, the debate also explores the challenges of disaster recovery, business continuity, and balancing risk in an increasingly complex digital landscape. Tune in as the hosts delve into the ramifications of over-consolidation, the implications of vendor lock-in, and the importance of maintaining a culture of quality and robust testing.</p><p>00:00 Introduction to the Great Security Debate</p><p>00:37 Layers of Technology and Finger Pointing</p><p>01:23 Disaster Recovery and Business Continuity</p><p>02:34 Market Leaders and Single Points of Failure</p><p>08:25 The Complexity of Software and Manufacturing Analogies</p><p>14:27 Kernel Access and Security Implications</p><p>23:29 BitLocker Keys and Recovery Challenges</p><p>28:05 Daily Text File Sharing</p><p>28:21 Transitioning BitLocker Management</p><p>28:45 Risk Profiles and Encryption Decisions</p><p>31:47 Team Collaboration and Lessons Learned</p><p>33:38 CrowdStrike Incident Analysis</p><p>36:18 The Importance of Response and Culture</p><p>44:10 Balancing Speed and Safety in Software</p><p>51:41 Closing Remarks and Future Plans</p>]]></description><content:encoded><![CDATA[<p>Welcome to the Great Security Debate! In this episode, experts take on a multifaceted discussion about the intricacies of technology and cybersecurity. The debate navigates through the recent incident involving CrowdStrike and Microsoft, dissecting the layers of technology, processes, and the roles of different entities in maintaining security. Emphasizing the lessons learned, the debate also explores the challenges of disaster recovery, business continuity, and balancing risk in an increasingly complex digital landscape. Tune in as the hosts delve into the ramifications of over-consolidation, the implications of vendor lock-in, and the importance of maintaining a culture of quality and robust testing.</p><p>00:00 Introduction to the Great Security Debate</p><p>00:37 Layers of Technology and Finger Pointing</p><p>01:23 Disaster Recovery and Business Continuity</p><p>02:34 Market Leaders and Single Points of Failure</p><p>08:25 The Complexity of Software and Manufacturing Analogies</p><p>14:27 Kernel Access and Security Implications</p><p>23:29 BitLocker Keys and Recovery Challenges</p><p>28:05 Daily Text File Sharing</p><p>28:21 Transitioning BitLocker Management</p><p>28:45 Risk Profiles and Encryption Decisions</p><p>31:47 Team Collaboration and Lessons Learned</p><p>33:38 CrowdStrike Incident Analysis</p><p>36:18 The Importance of Response and Culture</p><p>44:10 Balancing Speed and Safety in Software</p><p>51:41 Closing Remarks and Future Plans</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/free-disaster-recovery-tests]]></link><guid isPermaLink="false">53c823d8-5261-48ba-b4a7-3ba5ce54e896</guid><itunes:image href="https://artwork.captivate.fm/0dd031df-d1a5-4fab-9b26-9609be412648/l5u69OM2fZBhduBYrzJflGf1.jpg"/><pubDate>Tue, 03 Sep 2024 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/3aab5620-e02c-4d83-929d-1e3c39a45261/Episode-59-Free-Disaster-Recovery-Test.mp3" length="76721472" type="audio/mpeg"/><itunes:duration>53:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>59</itunes:episode><podcast:episode>59</podcast:episode><podcast:season>4</podcast:season></item><item><title>To Insure or Not To Insure: It’s Not Even a Question</title><itunes:title>To Insure or Not To Insure: It’s Not Even a Question</itunes:title><description><![CDATA[<p>This episode of 'The Great Security Debate' delves into the complexities surrounding cyber insurance, discussing its impact on minimising business risks and ensuring compliance. Erik, Brian, and Dan talk about how connected systems and automation increase risks and integrates AI reliance concerns. </p><p>Insurance policies, force majeure, and government regulations get some quality discussion and debate time, revealing fears and misconceptions about standardised security controls vs. adaptive security practices. And last up: the practicality and pitfalls of self-insurance, government intervention, and the need for standardised security terminology.</p><p>Show Links:</p><ul><li><a href="https://www.cisa.gov/resources-tools/resources/cisa-secure-design-pledge" rel="noopener noreferrer" target="_blank">CISA Secure by Design Pledge | CISA</a></li><li><a href="https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-guidance-single-sign-sso-adoption-small-and-medium-sized-businesses-smbs" rel="noopener noreferrer" target="_blank">CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) | CISA</a></li><li><a href="https://www.nbcnews.com/data-graphics/118th-congress-age-third-oldest-1789-rcna64117" rel="noopener noreferrer" target="_blank">The 118th Congress is the third oldest since 1789</a></li><li><a href="https://amzn.to/4bqUL4d" rel="noopener noreferrer" target="_blank">Book - The End of the World Is Just the Beginning</a></li><li><a href="https://rollcall.com/2024/06/28/supreme-courts-chevron-ruling-means-changes-for-writing-laws/" rel="noopener noreferrer" target="_blank">Supreme Court’s ‘Chevron’ ruling means changes for writing laws - Roll Call</a></li><li><a href="https://www.wsj.com/articles/insurers-warn-standardizing-cyber-policies-could-limit-future-coverage-fb0b7876" rel="noopener noreferrer" target="_blank">Insurers Warn Standardizing Cyber Policies Could Limit Future Coverage</a></li><li><a href="https://www.nytimes.com/2024/06/21/business/cyberattack-car-dealers-cdk.html" rel="noopener noreferrer" target="_blank">Cyberattacks Disrupt Car Sales by Dealers in U.S. and Canada</a></li></ul><br/><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p><p>00:00 Introduction to the Great Security Debate</p><p>00:30 The Role of Cyber Insurance</p><p>01:49 Manual Processes and Business Continuity</p><p>03:09 Manufacturing and Supply Chain Challenges</p><p>06:11 Insurance Policies and Cybersecurity</p><p>08:00 Standardization and Government Involvement</p><p>19:14 The Complexity of Cyber Warfare</p><p>22:35 Globalization and Cybersecurity</p><p>30:33 Leadership vs. Boss Mentality</p><p>33:53 The Role of Communication in Crisis</p><p>36:51 The Cost of Compliance</p><p>40:30 Global Cybersecurity Challenges</p><p>44:22 The Complexity of Online Trust</p><p>47:56 Insurance and Cybersecurity</p><p>53:07 The Future of Cyber Insurance</p><p>01:00:15 Conclusion and Final Thoughts</p>]]></description><content:encoded><![CDATA[<p>This episode of 'The Great Security Debate' delves into the complexities surrounding cyber insurance, discussing its impact on minimising business risks and ensuring compliance. Erik, Brian, and Dan talk about how connected systems and automation increase risks and integrates AI reliance concerns. </p><p>Insurance policies, force majeure, and government regulations get some quality discussion and debate time, revealing fears and misconceptions about standardised security controls vs. adaptive security practices. And last up: the practicality and pitfalls of self-insurance, government intervention, and the need for standardised security terminology.</p><p>Show Links:</p><ul><li><a href="https://www.cisa.gov/resources-tools/resources/cisa-secure-design-pledge" rel="noopener noreferrer" target="_blank">CISA Secure by Design Pledge | CISA</a></li><li><a href="https://www.cisa.gov/news-events/alerts/2024/06/20/cisa-releases-guidance-single-sign-sso-adoption-small-and-medium-sized-businesses-smbs" rel="noopener noreferrer" target="_blank">CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) | CISA</a></li><li><a href="https://www.nbcnews.com/data-graphics/118th-congress-age-third-oldest-1789-rcna64117" rel="noopener noreferrer" target="_blank">The 118th Congress is the third oldest since 1789</a></li><li><a href="https://amzn.to/4bqUL4d" rel="noopener noreferrer" target="_blank">Book - The End of the World Is Just the Beginning</a></li><li><a href="https://rollcall.com/2024/06/28/supreme-courts-chevron-ruling-means-changes-for-writing-laws/" rel="noopener noreferrer" target="_blank">Supreme Court’s ‘Chevron’ ruling means changes for writing laws - Roll Call</a></li><li><a href="https://www.wsj.com/articles/insurers-warn-standardizing-cyber-policies-could-limit-future-coverage-fb0b7876" rel="noopener noreferrer" target="_blank">Insurers Warn Standardizing Cyber Policies Could Limit Future Coverage</a></li><li><a href="https://www.nytimes.com/2024/06/21/business/cyberattack-car-dealers-cdk.html" rel="noopener noreferrer" target="_blank">Cyberattacks Disrupt Car Sales by Dealers in U.S. and Canada</a></li></ul><br/><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p><p>00:00 Introduction to the Great Security Debate</p><p>00:30 The Role of Cyber Insurance</p><p>01:49 Manual Processes and Business Continuity</p><p>03:09 Manufacturing and Supply Chain Challenges</p><p>06:11 Insurance Policies and Cybersecurity</p><p>08:00 Standardization and Government Involvement</p><p>19:14 The Complexity of Cyber Warfare</p><p>22:35 Globalization and Cybersecurity</p><p>30:33 Leadership vs. Boss Mentality</p><p>33:53 The Role of Communication in Crisis</p><p>36:51 The Cost of Compliance</p><p>40:30 Global Cybersecurity Challenges</p><p>44:22 The Complexity of Online Trust</p><p>47:56 Insurance and Cybersecurity</p><p>53:07 The Future of Cyber Insurance</p><p>01:00:15 Conclusion and Final Thoughts</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/to-insure-or-not-to-ensure]]></link><guid isPermaLink="false">6b878415-5ca5-4001-af83-6dd903d99fe6</guid><itunes:image href="https://artwork.captivate.fm/7bb0bd6a-312b-477b-9a6d-0583e1910514/pu2ivuaPqaywiFKY2IhtAJTx.jpg"/><pubDate>Mon, 01 Jul 2024 10:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/51422d9c-2740-4b6c-aaac-1a9c6c8cd4a4/To-Insure-or-Not-To-Insure.mp3" length="88846848" type="audio/mpeg"/><itunes:duration>01:01:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>58</itunes:episode><podcast:episode>58</podcast:episode><podcast:season>4</podcast:season></item><item><title>Wear a Stop Sign On Your Shirt</title><itunes:title>Wear a Stop Sign On Your Shirt</itunes:title><description><![CDATA[<p>In this episode of the Great Security Debate, Brian, Erik, and Dan dive into the latest trends in ransomware including an uptick in attacks against the hypervisor. Speaking of VMWare, we also "discuss" the way that Broadcom has handled the VMWare acquisition and why it both make sense (to them) and doesn't (to many customers).</p><p>The debate also heads into the impact of AI in cyber threats, and compare strategies for mitigating risk, such as prioritising vulnerabilities and understanding the attack landscape. </p><p>Additionally, the conversation shifts to business practices in tech acquisitions and the potential future disruptions in the market and importance of balancing security measures with user experience, and the need for adaptive, short-term security roadmaps to stay ahead in an ever-changing environment. </p><p>And break the big news about an upcoming Distilling Security in-person meet-up in Michigan in July!</p><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Show Notes:</p><p>episode-links</p><ul><li><a href="https://arstechnica.com/information-technology/2024/04/broadcom-execs-say-vmware-price-subscription-complaints-are-unwarranted/" rel="noopener noreferrer" target="_blank">Broadcom execs say VMware price, subscription complaints are unwarranted&nbsp; | Ars Technica</a></li><li><a href="https://blog.google/products/search/ai-overviews-update-may-2024/" rel="noopener noreferrer" target="_blank">What happened with AI Overviews and next steps</a></li><li><a href="https://amzn.to/457gfBq" rel="noopener noreferrer" target="_blank">Book - Titan: The Life of John D. Rockefeller, Sr.</a></li></ul><br/><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Great Security Debate, Brian, Erik, and Dan dive into the latest trends in ransomware including an uptick in attacks against the hypervisor. Speaking of VMWare, we also "discuss" the way that Broadcom has handled the VMWare acquisition and why it both make sense (to them) and doesn't (to many customers).</p><p>The debate also heads into the impact of AI in cyber threats, and compare strategies for mitigating risk, such as prioritising vulnerabilities and understanding the attack landscape. </p><p>Additionally, the conversation shifts to business practices in tech acquisitions and the potential future disruptions in the market and importance of balancing security measures with user experience, and the need for adaptive, short-term security roadmaps to stay ahead in an ever-changing environment. </p><p>And break the big news about an upcoming Distilling Security in-person meet-up in Michigan in July!</p><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Show Notes:</p><p>episode-links</p><ul><li><a href="https://arstechnica.com/information-technology/2024/04/broadcom-execs-say-vmware-price-subscription-complaints-are-unwarranted/" rel="noopener noreferrer" target="_blank">Broadcom execs say VMware price, subscription complaints are unwarranted&nbsp; | Ars Technica</a></li><li><a href="https://blog.google/products/search/ai-overviews-update-may-2024/" rel="noopener noreferrer" target="_blank">What happened with AI Overviews and next steps</a></li><li><a href="https://amzn.to/457gfBq" rel="noopener noreferrer" target="_blank">Book - Titan: The Life of John D. Rockefeller, Sr.</a></li></ul><br/><p>Thanks for listening! We have got some exciting changes ahead including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/wear-a-stop-sign-on-your-shirt]]></link><guid isPermaLink="false">da2d5eb8-3e52-4d3f-983a-8f0668d465a0</guid><itunes:image href="https://artwork.captivate.fm/cc269156-bdae-496d-aa86-79f76a0d2c7c/xRWbtqBGydHiRhD_jc7CN3bk.jpg"/><pubDate>Thu, 06 Jun 2024 07:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d2f191bd-af43-477c-afe1-7819f9dc284f/Wear-a-Stop-Sign-On-Your-Shirt.mp3" length="69398784" type="audio/mpeg"/><itunes:duration>48:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>57</itunes:episode><podcast:episode>57</podcast:episode><podcast:season>4</podcast:season></item><item><title>Mine Everything</title><itunes:title>Mine Everything</itunes:title><description><![CDATA[<p>Sorry about the audio on this one. We have got the tech back on track for the next episode. I promise!</p><p>Join the Great Security Debate as Brian, Erik, and Dan delve into 'pig slaughtering,' a scam involving rapport building to swindle victims out of money. </p><p>The discussion explores the intersections of security awareness, blockchain technology, and the ethical implications of digital tracking tools like chain analysis. Featuring real-world cases, including child exploitation traced through blockchain, and the broader debate on privacy versus legality in technology use. Are public blockchain transactions truly private? </p><p>And how can we balance innovative tech with ethical concerns? Tune in to hear all about it</p><p>Help support the podcast: <a href="https://ko-fi.com/distillingsecurity" rel="noopener noreferrer" target="_blank">https://ko-fi.com/distillingsecurity</a></p><p>Show Notes:</p><ul><li><a href="https://amzn.to/4e9JSGr" rel="noopener noreferrer" target="_blank">Movie: Oppenheimer</a></li><li><a href="https://www.theverge.com/2021/10/27/22748508/adobe-deepfake-tool-max-project-morpheus" rel="noopener noreferrer" target="_blank">Adobe has built a deepfake tool, but it doesn’t know what to do with it - The Verge</a></li><li><a href="https://amzn.to/4e7zPSk" rel="noopener noreferrer" target="_blank">Movie: Defending Your Life</a></li><li><a href="https://www.thurrott.com/cloud/296972/microsoft-edge-may-import-your-chrome-tabs-without-your-consent" rel="noopener noreferrer" target="_blank">Microsoft Edge May Import Your Chrome Tabs Without Your Consent</a></li><li><a href="https://helpx.adobe.com/manage-account/using/machine-learning-faq.html" rel="noopener noreferrer" target="_blank">Adobe content analysis FAQ</a></li><li><a href="https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data" rel="noopener noreferrer" target="_blank">How the Federal Government Buys Our Cell Phone Location Data</a></li><li><a href="https://publicbydefault.fyi" rel="noopener noreferrer" target="_blank">Public By Default - Stories Found in Venmo Comments</a></li><li><a href="https://www.chainalysis.com" rel="noopener noreferrer" target="_blank">Chainalaysis</a></li><li><a href="https://amzn.to/4bGdQ3c" rel="noopener noreferrer" target="_blank">Book: Tracers in the Dark</a></li><li><a href="https://www.youtube.com/watch?v=pLPpl2ISKTg" rel="noopener noreferrer" target="_blank">Pig Butchering Scams: Last Week Tonight with John Oliver</a></li><li><a href="https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html" rel="noopener noreferrer" target="_blank">7 Months Inside an Online Scam Labor Camp</a></li></ul><br/><p>Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></description><content:encoded><![CDATA[<p>Sorry about the audio on this one. We have got the tech back on track for the next episode. I promise!</p><p>Join the Great Security Debate as Brian, Erik, and Dan delve into 'pig slaughtering,' a scam involving rapport building to swindle victims out of money. </p><p>The discussion explores the intersections of security awareness, blockchain technology, and the ethical implications of digital tracking tools like chain analysis. Featuring real-world cases, including child exploitation traced through blockchain, and the broader debate on privacy versus legality in technology use. Are public blockchain transactions truly private? </p><p>And how can we balance innovative tech with ethical concerns? Tune in to hear all about it</p><p>Help support the podcast: <a href="https://ko-fi.com/distillingsecurity" rel="noopener noreferrer" target="_blank">https://ko-fi.com/distillingsecurity</a></p><p>Show Notes:</p><ul><li><a href="https://amzn.to/4e9JSGr" rel="noopener noreferrer" target="_blank">Movie: Oppenheimer</a></li><li><a href="https://www.theverge.com/2021/10/27/22748508/adobe-deepfake-tool-max-project-morpheus" rel="noopener noreferrer" target="_blank">Adobe has built a deepfake tool, but it doesn’t know what to do with it - The Verge</a></li><li><a href="https://amzn.to/4e7zPSk" rel="noopener noreferrer" target="_blank">Movie: Defending Your Life</a></li><li><a href="https://www.thurrott.com/cloud/296972/microsoft-edge-may-import-your-chrome-tabs-without-your-consent" rel="noopener noreferrer" target="_blank">Microsoft Edge May Import Your Chrome Tabs Without Your Consent</a></li><li><a href="https://helpx.adobe.com/manage-account/using/machine-learning-faq.html" rel="noopener noreferrer" target="_blank">Adobe content analysis FAQ</a></li><li><a href="https://www.eff.org/deeplinks/2022/06/how-federal-government-buys-our-cell-phone-location-data" rel="noopener noreferrer" target="_blank">How the Federal Government Buys Our Cell Phone Location Data</a></li><li><a href="https://publicbydefault.fyi" rel="noopener noreferrer" target="_blank">Public By Default - Stories Found in Venmo Comments</a></li><li><a href="https://www.chainalysis.com" rel="noopener noreferrer" target="_blank">Chainalaysis</a></li><li><a href="https://amzn.to/4bGdQ3c" rel="noopener noreferrer" target="_blank">Book: Tracers in the Dark</a></li><li><a href="https://www.youtube.com/watch?v=pLPpl2ISKTg" rel="noopener noreferrer" target="_blank">Pig Butchering Scams: Last Week Tonight with John Oliver</a></li><li><a href="https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html" rel="noopener noreferrer" target="_blank">7 Months Inside an Online Scam Labor Camp</a></li></ul><br/><p>Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/mine-everything]]></link><guid isPermaLink="false">9f4f5362-283a-4078-8870-4ea327401365</guid><itunes:image href="https://artwork.captivate.fm/85a12dc4-bbe5-45ee-a640-ec88849411d3/FRcUUTrttytb_PEIx5gcazob.jpg"/><pubDate>Wed, 05 Jun 2024 07:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b58d27bf-9dbc-4ec9-87bf-621abec1fea2/Mine-Everything.mp3" length="64743552" type="audio/mpeg"/><itunes:duration>44:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>56</itunes:episode><podcast:episode>56</podcast:episode><podcast:season>4</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Mine Everything"><podcast:source uri="https://youtu.be/SjxZ2BVq-cY"/></podcast:alternateEnclosure></item><item><title>Spoiler Alert: Leave the World Behind</title><itunes:title>Spoiler Alert: Leave the World Behind</itunes:title><description><![CDATA[<p>Join Dan, Brian, and Erik in the latest episode of The Great Security Debate as they explore the impact and implications of the movie 'Leave the World Behind.' Delving into cyber security, societal impacts of technology, and philosophical elements, this discussion touches upon vulnerability management, risk management, and the effect of constant connectivity on modern life. Tune in to hear not only their analysis of the film but also personal reflections on communication, societal changes, and practical steps for improving individual security resilience. This episode also marks the exciting announcement of the Great Security Debate becoming a part of the Distilling Security network. Don't miss out!</p><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Show Notes:</p><p>episode-links</p><ul><li><a href="https://distillingsecurity.com">Distilling Security – Consumable security, privacy, and compliance</a></li><li><a href="https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED</a></li><li><a href="https://publicaffairs.vpcomm.umich.edu/key-issues/august-2023-data-incident/">August 2023 Data Incident |  U-M Public Affairs</a></li><li><a href="https://www.annarbor.com/news/recent-power-outages-in-ann-arbor-have-multiple-causes-dte-energy-says/">Recent power outages in Ann Arbor have multiple causes, DTE Energy says</a></li><li><a href="https://www.netflix.com/title/81314956">Watch Leave the World Behind | Netflix Official Site</a></li></ul><br/><p>Editor note: This episode was recorded in the final days of 2023... but was lost to technology demons until now. One of those demons made it necessary to show the Zoom screen rather than our usual edited video cast. Sorry for the inconvenience and pain on your eyes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></description><content:encoded><![CDATA[<p>Join Dan, Brian, and Erik in the latest episode of The Great Security Debate as they explore the impact and implications of the movie 'Leave the World Behind.' Delving into cyber security, societal impacts of technology, and philosophical elements, this discussion touches upon vulnerability management, risk management, and the effect of constant connectivity on modern life. Tune in to hear not only their analysis of the film but also personal reflections on communication, societal changes, and practical steps for improving individual security resilience. This episode also marks the exciting announcement of the Great Security Debate becoming a part of the Distilling Security network. Don't miss out!</p><p>Help support the podcast: https://ko-fi.com/distillingsecurity</p><p>Show Notes:</p><p>episode-links</p><ul><li><a href="https://distillingsecurity.com">Distilling Security – Consumable security, privacy, and compliance</a></li><li><a href="https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED</a></li><li><a href="https://publicaffairs.vpcomm.umich.edu/key-issues/august-2023-data-incident/">August 2023 Data Incident |  U-M Public Affairs</a></li><li><a href="https://www.annarbor.com/news/recent-power-outages-in-ann-arbor-have-multiple-causes-dte-energy-says/">Recent power outages in Ann Arbor have multiple causes, DTE Energy says</a></li><li><a href="https://www.netflix.com/title/81314956">Watch Leave the World Behind | Netflix Official Site</a></li></ul><br/><p>Editor note: This episode was recorded in the final days of 2023... but was lost to technology demons until now. One of those demons made it necessary to show the Zoom screen rather than our usual edited video cast. Sorry for the inconvenience and pain on your eyes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate and Distilling Security, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/leave-the-world-behind]]></link><guid isPermaLink="false">16decf54-c97f-4c23-b37e-5d7cb7cbbbc0</guid><itunes:image href="https://artwork.captivate.fm/08b0d5a9-0f72-4a8b-bf42-7f5443356b16/_rGMeMMh85rI8u-5QzYjRWb5.jpg"/><pubDate>Tue, 04 Jun 2024 07:15:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4564fa46-445d-440f-985f-f5c4bf5d2347/Leave-the-World-Behind.mp3" length="84271680" type="audio/mpeg"/><itunes:duration>58:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>55</itunes:episode><podcast:episode>55</podcast:episode><podcast:season>4</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Spoiler Alert: Leave the World Behind"><podcast:source uri="https://youtu.be/tMdcMD2rKeA"/></podcast:alternateEnclosure></item><item><title>Potpourri of Debate... Now with AI</title><itunes:title>Potpourri of Debate... Now with AI</itunes:title><description><![CDATA[<p>It's an "all rounder" episode of The Great Security Debate. Brian watched a movie, Erik watched an advertisement, and Dan was overtly cynical. Just another day in the podcast booth for these three.</p><p>A variety pack of topics ranging from recent security attacks, to AI in technology, to automotive manufacturing (go figure), to privacy, to sponsorship and vendor models at live events, and more.</p><p>Links to everything we talked about are available in the show notes.</p><p>Thanks for listening and welcome to 2024! We have got some exciting changes ahead this year including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></description><content:encoded><![CDATA[<p>It's an "all rounder" episode of The Great Security Debate. Brian watched a movie, Erik watched an advertisement, and Dan was overtly cynical. Just another day in the podcast booth for these three.</p><p>A variety pack of topics ranging from recent security attacks, to AI in technology, to automotive manufacturing (go figure), to privacy, to sponsorship and vendor models at live events, and more.</p><p>Links to everything we talked about are available in the show notes.</p><p>Thanks for listening and welcome to 2024! We have got some exciting changes ahead this year including ways to support the podcast, some big announcements, new shows and conversations, and more! Thanks for listening!</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/potpourri-of-debate]]></link><guid isPermaLink="false">04143ae8-3215-4b34-92c4-b80e19f2ee9e</guid><itunes:image href="https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg"/><pubDate>Mon, 08 Jan 2024 10:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/38e1cedf-4288-4987-ba13-7d4941f19abc/GSD-54-Potpourri-of-Debate-Now-with-AI.mp3" length="93549312" type="audio/mpeg"/><itunes:duration>01:04:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>5</itunes:season><itunes:episode>54</itunes:episode><podcast:episode>54</podcast:episode><podcast:season>5</podcast:season></item><item><title>The Downfall of All Security (Sales)</title><itunes:title>The Downfall of All Security (Sales)</itunes:title><description><![CDATA[<p>It's not easy to sell things. It's even harder to sell to security practitioners and leaders. The Great Security Debate this week covers some angles in security tools (and selling those tools to security teams) that have taken their toll on the trust that needs to exist between those who buy and those who make the products that we use. From the software providers to the VAR (resellers) in the middle to the people and techniques used to market and sell the solutions. Some of the key topics of the discussion include:</p><ul><li>The challenges of security tool consolidation by non-security vendors</li><li>Security is not a lock-in tool, and security is not an upsell tool</li><li>Pushing changes to products without telling the customers before they happen or letting those customers have control over the change (and if they take it or not)</li><li>Security Selling with VARs &amp; Deal Registration </li><li>What are the motivators when a product is recommended to you</li><li>You can still buy direct (and why you might want to)</li><li>The challenge of selling into the SMB</li><li>The power of the “vouch” that flies in the face of some sales methods</li><li>The importance of being genuine in sales communications (aka knock off the programmatic drip campaigns that pretend to be personal)</li></ul><br/><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p>]]></description><content:encoded><![CDATA[<p>It's not easy to sell things. It's even harder to sell to security practitioners and leaders. The Great Security Debate this week covers some angles in security tools (and selling those tools to security teams) that have taken their toll on the trust that needs to exist between those who buy and those who make the products that we use. From the software providers to the VAR (resellers) in the middle to the people and techniques used to market and sell the solutions. Some of the key topics of the discussion include:</p><ul><li>The challenges of security tool consolidation by non-security vendors</li><li>Security is not a lock-in tool, and security is not an upsell tool</li><li>Pushing changes to products without telling the customers before they happen or letting those customers have control over the change (and if they take it or not)</li><li>Security Selling with VARs &amp; Deal Registration </li><li>What are the motivators when a product is recommended to you</li><li>You can still buy direct (and why you might want to)</li><li>The challenge of selling into the SMB</li><li>The power of the “vouch” that flies in the face of some sales methods</li><li>The importance of being genuine in sales communications (aka knock off the programmatic drip campaigns that pretend to be personal)</li></ul><br/><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/the-downfall-of-all-security-sales]]></link><guid isPermaLink="false">7dd8f6a9-e916-433f-a616-fdf9d648df00</guid><itunes:image href="https://artwork.captivate.fm/9bb0e677-ff49-4b7b-939f-b9be524e9279/JUxiqE_qpLw1lKt9Acn8x-Q2.jpg"/><pubDate>Mon, 27 Nov 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ffeb7028-35a6-4c8e-8adb-9ff1f61f0231/GSD-53-The-Downfall-of-All-Security-Sales.mp3" length="79425216" type="audio/mpeg"/><itunes:duration>55:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>53</itunes:episode><podcast:episode>53</podcast:episode><podcast:season>4</podcast:season></item><item><title>Less LLM, More Piano</title><itunes:title>Less LLM, More Piano</itunes:title><description><![CDATA[<p>This week we are debating modern AI systems, especially the commercial ones on just about everyone's lips when talking about CVs, high school term papers, and interview answers.</p><p>Large Language Models (LLMs), of which ChatGPT and Bard are two examples, are growing in prominence, but will they disrupt the technology world, or are they nothing more than just another blockchain fizzle?</p><p>In this episode:</p><ul><li>Are these even actually "AI" models, or really just very fast processing of large data sets?</li><li>What should I (and should I not) be putting into LLMs? How does the re-teaching based on data entered impact what you should put into public LLMs?</li><li>What are some valid use cases for LLMs?</li><li>Does depending on tools like LLMs (or calculators) bring us further from core understanding of how things work? Or should we be OK with the efficiency it brings?</li><li>How does copyright fit into the LLM expectation and model, and does the legal licensing of training data dull the shine of LLMs?</li><li>Are the analyses from LLMs skewed not only by the data they chose to use for training, but also by the userbase that uses that LLM?</li><li>How are any of the "good practise" security and privacy requirements for LLM different from any other systems? Spoiler alert: not at all.</li></ul><br/><p>Unrelated to AI, we also talk about what happens to all the "smart" things in your house when the internet goes out? What stops working? Way more than you might think...</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to&nbsp;<a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a>&nbsp;and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p><p>Links:</p><p>Is OpenAI almost bankrupt?: <a href="https://www.windowscentral.com/software-apps/chatgpts-fate-hangs-in-the-balance-as-openai-reportedly-edges-closer-to-bankruptcy" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/chatgpts-fate-hangs-in-the-balance-as-openai-reportedly-edges-closer-to-bankruptcy</a></p><p>Maybe not bankrupt, but has business problem: <a href="https://www.forbes.com/sites/lutzfinger/2023/08/18/is-openai-going-bankrupt-no-but-ai-models-dont-create-moats/?sh=3c8922845e22" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/lutzfinger/2023/08/18/is-openai-going-bankrupt-no-but-ai-models-dont-create-moats/?sh=3c8922845e22</a></p><p>Gartner declares LLMs at the peak of inflated expectations: https://www.gartner.com/en/newsroom/press-releases/2023-08-16-gartner-places-generative-ai-on-the-peak-of-inflated-expectations-on-the-2023-hype-cycle-for-emerging-technologies</p><p>When ChatGPT goes Bad: https://sloanreview.mit.edu/article/from-chatgpt-to-hackgpt-meeting-the-cybersecurity-threat-of-generative-ai/</p><p>https://venturebeat.com/security/how-fraudgpt-presages-the-future-of-weaponized-ai/</p><p>The Circle (Movie): <a href="https://www.imdb.com/title/tt4287320/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt4287320/</a></p><p>Amazon Sidewalk, and it's privacy issues: <a href="https://www.popsci.com/technology/amazon-sidewalks-privacy-concerns/" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/amazon-sidewalks-privacy-concerns/</a></p><p>Idiocracy (Movie): <a href="https://www.imdb.com/title/tt0387808/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt0387808/</a></p><p>Moores law is dead: https://www.technologyreview.com/2016/05/13/245938/moores-law-is-dead-now-what/</p><p>GM deletes Car Play from future EVs: <a href="https://www.theverge.com/2023/4/4/23669523/gm-apple-carplay-android-auto-ev-restrict-access" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/4/4/23669523/gm-apple-carplay-android-auto-ev-restrict-access</a></p><p>GM announces $130K EV Escalade (without CarPlay): <a href="https://www.theverge.com/2023/8/10/23827059/gm-no-carplay-android-auto-escalade-iq" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/8/10/23827059/gm-no-carplay-android-auto-escalade-iq</a></p><p>Fragile Things (Book): https://amzn.to/47BWWkB</p>]]></description><content:encoded><![CDATA[<p>This week we are debating modern AI systems, especially the commercial ones on just about everyone's lips when talking about CVs, high school term papers, and interview answers.</p><p>Large Language Models (LLMs), of which ChatGPT and Bard are two examples, are growing in prominence, but will they disrupt the technology world, or are they nothing more than just another blockchain fizzle?</p><p>In this episode:</p><ul><li>Are these even actually "AI" models, or really just very fast processing of large data sets?</li><li>What should I (and should I not) be putting into LLMs? How does the re-teaching based on data entered impact what you should put into public LLMs?</li><li>What are some valid use cases for LLMs?</li><li>Does depending on tools like LLMs (or calculators) bring us further from core understanding of how things work? Or should we be OK with the efficiency it brings?</li><li>How does copyright fit into the LLM expectation and model, and does the legal licensing of training data dull the shine of LLMs?</li><li>Are the analyses from LLMs skewed not only by the data they chose to use for training, but also by the userbase that uses that LLM?</li><li>How are any of the "good practise" security and privacy requirements for LLM different from any other systems? Spoiler alert: not at all.</li></ul><br/><p>Unrelated to AI, we also talk about what happens to all the "smart" things in your house when the internet goes out? What stops working? Way more than you might think...</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to&nbsp;<a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a>&nbsp;and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p><p>Links:</p><p>Is OpenAI almost bankrupt?: <a href="https://www.windowscentral.com/software-apps/chatgpts-fate-hangs-in-the-balance-as-openai-reportedly-edges-closer-to-bankruptcy" rel="noopener noreferrer" target="_blank">https://www.windowscentral.com/software-apps/chatgpts-fate-hangs-in-the-balance-as-openai-reportedly-edges-closer-to-bankruptcy</a></p><p>Maybe not bankrupt, but has business problem: <a href="https://www.forbes.com/sites/lutzfinger/2023/08/18/is-openai-going-bankrupt-no-but-ai-models-dont-create-moats/?sh=3c8922845e22" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/lutzfinger/2023/08/18/is-openai-going-bankrupt-no-but-ai-models-dont-create-moats/?sh=3c8922845e22</a></p><p>Gartner declares LLMs at the peak of inflated expectations: https://www.gartner.com/en/newsroom/press-releases/2023-08-16-gartner-places-generative-ai-on-the-peak-of-inflated-expectations-on-the-2023-hype-cycle-for-emerging-technologies</p><p>When ChatGPT goes Bad: https://sloanreview.mit.edu/article/from-chatgpt-to-hackgpt-meeting-the-cybersecurity-threat-of-generative-ai/</p><p>https://venturebeat.com/security/how-fraudgpt-presages-the-future-of-weaponized-ai/</p><p>The Circle (Movie): <a href="https://www.imdb.com/title/tt4287320/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt4287320/</a></p><p>Amazon Sidewalk, and it's privacy issues: <a href="https://www.popsci.com/technology/amazon-sidewalks-privacy-concerns/" rel="noopener noreferrer" target="_blank">https://www.popsci.com/technology/amazon-sidewalks-privacy-concerns/</a></p><p>Idiocracy (Movie): <a href="https://www.imdb.com/title/tt0387808/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt0387808/</a></p><p>Moores law is dead: https://www.technologyreview.com/2016/05/13/245938/moores-law-is-dead-now-what/</p><p>GM deletes Car Play from future EVs: <a href="https://www.theverge.com/2023/4/4/23669523/gm-apple-carplay-android-auto-ev-restrict-access" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/4/4/23669523/gm-apple-carplay-android-auto-ev-restrict-access</a></p><p>GM announces $130K EV Escalade (without CarPlay): <a href="https://www.theverge.com/2023/8/10/23827059/gm-no-carplay-android-auto-escalade-iq" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/8/10/23827059/gm-no-carplay-android-auto-escalade-iq</a></p><p>Fragile Things (Book): https://amzn.to/47BWWkB</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/less-llm-more-piano]]></link><guid isPermaLink="false">8eac9312-8828-4dd9-876e-b0ee01c35de0</guid><itunes:image href="https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg"/><pubDate>Mon, 21 Aug 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ed39325a-cdeb-4bad-b98a-7de9cfe17f9b/Less-LLM-More-Piano.mp3" length="74235456" type="audio/mpeg"/><itunes:duration>51:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>52</itunes:episode><podcast:episode>52</podcast:episode><podcast:season>4</podcast:season></item><item><title>Security *is* Business!</title><itunes:title>Security *is* Business!</itunes:title><description><![CDATA[<p>It's been a minute, but we are back with another Great Security Debate!</p><p>Whether it is compliance, trust, questionnaires, we all sell something to someone and security is core to that process.</p><p>In this episode, the focus is on how security integrates into the core of each of our businesses or organisations. From being part of strategic planning, the reminder that perfect being the enemy of progress, to the power in being a first mover on security and privacy topics:</p><ul><li>Compliance vs security: Is it pro forma? Do you check the SOC2 (and other) reports you get from your suppliers?</li><li>You're not a special snowflake: Why won't more orgs use standard questionnaires on supplier assessments?</li><li>There are multiple ways to solve a problem, and context is key. The process and environment may mean you don't need a technology control or a specific (prescribed) technology control.</li><li>"The business" is a term that should never be uttered again by security or technology practitioners and leaders.</li><li>There is power and business value in governance and transparency in security and privacy; build trust in your brand.</li><li>We need to move our programs a layer above the specific people. Risk is reduced by living at the process layer. Heroics are not scalable.</li><li>How can preparing for a triathlon be used to describe adherence to targets that lead to good security (and the brand value that comes with it)</li></ul><br/><p>Remember that you can't be "SOC2 Certified." And PFMEA is not always the answer to every question. Or is it?</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to&nbsp;<a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a>&nbsp;and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p>]]></description><content:encoded><![CDATA[<p>It's been a minute, but we are back with another Great Security Debate!</p><p>Whether it is compliance, trust, questionnaires, we all sell something to someone and security is core to that process.</p><p>In this episode, the focus is on how security integrates into the core of each of our businesses or organisations. From being part of strategic planning, the reminder that perfect being the enemy of progress, to the power in being a first mover on security and privacy topics:</p><ul><li>Compliance vs security: Is it pro forma? Do you check the SOC2 (and other) reports you get from your suppliers?</li><li>You're not a special snowflake: Why won't more orgs use standard questionnaires on supplier assessments?</li><li>There are multiple ways to solve a problem, and context is key. The process and environment may mean you don't need a technology control or a specific (prescribed) technology control.</li><li>"The business" is a term that should never be uttered again by security or technology practitioners and leaders.</li><li>There is power and business value in governance and transparency in security and privacy; build trust in your brand.</li><li>We need to move our programs a layer above the specific people. Risk is reduced by living at the process layer. Heroics are not scalable.</li><li>How can preparing for a triathlon be used to describe adherence to targets that lead to good security (and the brand value that comes with it)</li></ul><br/><p>Remember that you can't be "SOC2 Certified." And PFMEA is not always the answer to every question. Or is it?</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to&nbsp;<a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a>&nbsp;and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p>Thanks for listening!</p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-51-security-is-business]]></link><guid isPermaLink="false">7258afb7-68d5-4e55-97bc-d32cdedd66ed</guid><itunes:image href="https://artwork.captivate.fm/017c2d91-6387-4379-ad93-55cc0a369e63/xGxO0U3YjW5BVZB-1-7LPZk0.jpg"/><pubDate>Wed, 05 Jul 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a00451d8-e360-4e5a-9c94-71c4a59f6ca0/GSD-51-Security-IS-Business.mp3" length="66635712" type="audio/mpeg"/><itunes:duration>46:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>51</itunes:episode><podcast:episode>51</podcast:episode><podcast:season>4</podcast:season></item><item><title>Jess and Jeff Invade</title><itunes:title>Jess and Jeff Invade</itunes:title><description><![CDATA[<p>Welcome to a very special Great Security Debate.  If it is spring, it means that the annual Forrester “Top Recommendations For Your Security Program” report has come out, and we get to visit with one of the authors, Jess Burn. But this year, we get an added extra voice in that of Jess’ Forrester colleague Jeff Pollard. Both Jess and Jeff share a ton of insight on topics from that report and a few others (see the links below for blog posts about most of them)</p><p>In this episode we cover:</p><ul><li>How (if) CISOs have been able to become “part of the business” and help colleagues understand that in 2023 security <em>is</em> business.</li><li>Board reporting by CISOs and CIOs and where/how we succeed and fail.</li><li>Talent shortages in infosec: a self-created nightmare?</li><li>Consolidation in times of austerity: right or wrong for security?</li></ul><br/><p>Huge thanks to Jess and Jeff for joining (find their LinkedIn and Twitter in the links section). Even though Jess is legacy, we are pretty sure that Jeff will be welcomed back in 2024 with open arms.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for Listening!</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/security-risk-2019-cybersecuritys-staffing-shortage-is-self-inflicted/" rel="noopener noreferrer" target="_blank">Cybersecurity's Staffing Shortage Is Self-Inflicted</a></li><li><a href="https://www.speakbydesign.com/" rel="noopener noreferrer" target="_blank">Leadership Communication and Speaker Coaching | Speak by Design | United States</a></li><li><a href="https://www.forrester.com/blogs/build-better-bridges-introducing-forresters-biso-role-profile/?ref_search=604835_1682260080076" rel="noopener noreferrer" target="_blank">Build Better Bridges: Introducing Forrester’s BISO Role Profile</a></li><li><a href="https://www.forrester.com/blogs/announcing-analyst-experience-soc-analysts-finally-escape-the-shackles-of-bad-ux/?ref_search=604835_1682260080076" rel="noopener noreferrer" target="_blank">Announcing Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX</a></li><li><a href="https://www.forrester.com/blogs/the-pay-gap-isnt-the-only-problem-for-women-in-ciso-roles/?ref_search=604835_1682266372192" rel="noopener noreferrer" target="_blank">The Pay Gap Isn’t The Only Problem For Women In CISO Roles</a></li><li><a href="https://www.forrester.com/report/top-recommendations-for-your-security-program-2023/RES178962" rel="noopener noreferrer" target="_blank">Top Recommendations For Your Security Program, 2023 | Forrester</a></li><li><a href="https://www.forrester.com/blogs/how-cisos-can-navigate-the-2023-downturn/?ref_search=0_1682343390878" rel="noopener noreferrer" target="_blank">How CISOs Can Navigate The 2023 Downturn</a></li><li><a href="https://www.linkedin.com/in/jessburn/" rel="noopener noreferrer" target="_blank">Jess Burn | LinkedIn</a></li><li><a href="https://www.linkedin.com/in/jpollard96/" rel="noopener noreferrer" target="_blank">Jeff Pollard | LinkedIn</a></li><li><a href="https://twitter.com/jess_burn_" rel="noopener noreferrer" target="_blank">Jess Burn (@Jess_Burn_) / Twitter</a></li><li><a href="https://twitter.com/jeff_pollard2" rel="noopener noreferrer" target="_blank">Jeff Pollard (@jeff_pollard2) / Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Welcome to a very special Great Security Debate.  If it is spring, it means that the annual Forrester “Top Recommendations For Your Security Program” report has come out, and we get to visit with one of the authors, Jess Burn. But this year, we get an added extra voice in that of Jess’ Forrester colleague Jeff Pollard. Both Jess and Jeff share a ton of insight on topics from that report and a few others (see the links below for blog posts about most of them)</p><p>In this episode we cover:</p><ul><li>How (if) CISOs have been able to become “part of the business” and help colleagues understand that in 2023 security <em>is</em> business.</li><li>Board reporting by CISOs and CIOs and where/how we succeed and fail.</li><li>Talent shortages in infosec: a self-created nightmare?</li><li>Consolidation in times of austerity: right or wrong for security?</li></ul><br/><p>Huge thanks to Jess and Jeff for joining (find their LinkedIn and Twitter in the links section). Even though Jess is legacy, we are pretty sure that Jeff will be welcomed back in 2024 with open arms.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for Listening!</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/security-risk-2019-cybersecuritys-staffing-shortage-is-self-inflicted/" rel="noopener noreferrer" target="_blank">Cybersecurity's Staffing Shortage Is Self-Inflicted</a></li><li><a href="https://www.speakbydesign.com/" rel="noopener noreferrer" target="_blank">Leadership Communication and Speaker Coaching | Speak by Design | United States</a></li><li><a href="https://www.forrester.com/blogs/build-better-bridges-introducing-forresters-biso-role-profile/?ref_search=604835_1682260080076" rel="noopener noreferrer" target="_blank">Build Better Bridges: Introducing Forrester’s BISO Role Profile</a></li><li><a href="https://www.forrester.com/blogs/announcing-analyst-experience-soc-analysts-finally-escape-the-shackles-of-bad-ux/?ref_search=604835_1682260080076" rel="noopener noreferrer" target="_blank">Announcing Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX</a></li><li><a href="https://www.forrester.com/blogs/the-pay-gap-isnt-the-only-problem-for-women-in-ciso-roles/?ref_search=604835_1682266372192" rel="noopener noreferrer" target="_blank">The Pay Gap Isn’t The Only Problem For Women In CISO Roles</a></li><li><a href="https://www.forrester.com/report/top-recommendations-for-your-security-program-2023/RES178962" rel="noopener noreferrer" target="_blank">Top Recommendations For Your Security Program, 2023 | Forrester</a></li><li><a href="https://www.forrester.com/blogs/how-cisos-can-navigate-the-2023-downturn/?ref_search=0_1682343390878" rel="noopener noreferrer" target="_blank">How CISOs Can Navigate The 2023 Downturn</a></li><li><a href="https://www.linkedin.com/in/jessburn/" rel="noopener noreferrer" target="_blank">Jess Burn | LinkedIn</a></li><li><a href="https://www.linkedin.com/in/jpollard96/" rel="noopener noreferrer" target="_blank">Jeff Pollard | LinkedIn</a></li><li><a href="https://twitter.com/jess_burn_" rel="noopener noreferrer" target="_blank">Jess Burn (@Jess_Burn_) / Twitter</a></li><li><a href="https://twitter.com/jeff_pollard2" rel="noopener noreferrer" target="_blank">Jeff Pollard (@jeff_pollard2) / Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-50-jess-and-jeff-invade]]></link><guid isPermaLink="false">be3cff22-5fa9-47c4-a12a-f274ec3396f8</guid><itunes:image href="https://artwork.captivate.fm/32b74629-aa29-4d0f-a4b5-f288e2eaf201/cover.jpg"/><pubDate>Mon, 24 Apr 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1bd3336c-7948-47a5-943a-3b94dc6a768c/be3cff22-5fa9-47c4-a12a-f274ec3396f8.mp3" length="80606764" type="audio/mpeg"/><itunes:duration>54:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>50</itunes:episode><podcast:episode>50</podcast:episode><podcast:season>4</podcast:season></item><item><title>Bankplosion!</title><itunes:title>Bankplosion!</itunes:title><description><![CDATA[<p>This week, Brian, Erik, and Dan look into the security impacts of last week’s Silicon Valley Bank closure, both from a direct security risk, but also what we can learn about risk from the events leading up to the incident that we can apply to our information security responsibilities.</p><p>Brian kicks it off with a great description of how Silicon Valley Bank got here (based on what we knew on 12 March 2023 - subject to change as more becomes known after). And from that, we go some of the direct and indirect lessons and implications such as:</p><ul><li><br></li><li>Fraud attempts amongst a bevvy of legitimate bank account payment change requests from companies. Check from a known source before changing where you pay.</li><li><br></li><li><br></li><li>Putting all your eggs into one (infosec or financial) basket can be risky. And risk can bring great rewards, or great resentment</li><li><br></li><li><br></li><li>Evaluating vendors for where they bank as part of third party risk management (or not)</li><li><br></li><li><br></li><li>Clear insight to tough choices that have to be made to keep small business and startups running - sometimes that’s not “doing every thing of security”</li><li><br></li><li><br></li><li>Business continuity planning requires a more realistic “yeah that could happen” when doing the review</li><li><br></li><li><br></li><li>Remember that there is no such thing as no risk, just determining the right balance of (realistic) risk and downtime for your organisation</li><li><br></li><li><br></li><li>If one vendor goes away suddenly, what happens? What about if 6 go away all at once? </li><li><br></li><li><br></li><li>Diversity of suppliers vs. focusing on basics in the security stack</li><li><br></li></ul><br/><p>Along with some strong recommendations (or maybe they are warnings) for our security vendor listeners on how <em>not</em> to use this incident as a sales tool (tl;dr: DON’T!), there are a few correlations to the automotive industry. And check out the book club recommendations in the show notes on our website <a href="http://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">www.greatsecuritydebate.net</a>, too.</p><p><br></p><p>Since we recorded another bank, Signature Bank, has also been closed and placed into receivership. On behalf of all of us at Great Security Debate, we wish all those affected either as companies of these banks or their customers good wishes and hope for good news ahead on the recovery of funds.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.netinterest.co/p/the-demise-of-silicon-valley-bank?utm_campaign=post" rel="noopener noreferrer" target="_blank">The Demise of Silicon Valley Bank - by Marc Rubinstein</a></li><li><a href="https://amzn.to/4050Z4x" rel="noopener noreferrer" target="_blank">All the Devils Are Here: A Novel (Chief Inspector Gamache Novel Book 16) - Kindle edition by Penny, Louise. Mystery, Thriller &amp; Suspense Kindle eBooks @ Amazon.com.</a></li><li><a href="https://financialpost.com/fp-finance/banking/silicon-valley-bank-profit-squeeze-tech-downturn-short-sellers" rel="noopener noreferrer" target="_blank">Silicon Valley Bank profit squeeze in tech dip attracts short sellers | Financial Post</a></li><li><a href="https://insightbeforeaction.com/the-tenth-man-rule-principle-explained/" rel="noopener noreferrer" target="_blank">The Tenth Man Rule - Principle Explained</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062060244/securitydebat-20" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a> — https://amzn.to/3LcZKvT</li><li><a href="https://amzn.to/3LcZKvT" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>This week, Brian, Erik, and Dan look into the security impacts of last week’s Silicon Valley Bank closure, both from a direct security risk, but also what we can learn about risk from the events leading up to the incident that we can apply to our information security responsibilities.</p><p>Brian kicks it off with a great description of how Silicon Valley Bank got here (based on what we knew on 12 March 2023 - subject to change as more becomes known after). And from that, we go some of the direct and indirect lessons and implications such as:</p><ul><li><br></li><li>Fraud attempts amongst a bevvy of legitimate bank account payment change requests from companies. Check from a known source before changing where you pay.</li><li><br></li><li><br></li><li>Putting all your eggs into one (infosec or financial) basket can be risky. And risk can bring great rewards, or great resentment</li><li><br></li><li><br></li><li>Evaluating vendors for where they bank as part of third party risk management (or not)</li><li><br></li><li><br></li><li>Clear insight to tough choices that have to be made to keep small business and startups running - sometimes that’s not “doing every thing of security”</li><li><br></li><li><br></li><li>Business continuity planning requires a more realistic “yeah that could happen” when doing the review</li><li><br></li><li><br></li><li>Remember that there is no such thing as no risk, just determining the right balance of (realistic) risk and downtime for your organisation</li><li><br></li><li><br></li><li>If one vendor goes away suddenly, what happens? What about if 6 go away all at once? </li><li><br></li><li><br></li><li>Diversity of suppliers vs. focusing on basics in the security stack</li><li><br></li></ul><br/><p>Along with some strong recommendations (or maybe they are warnings) for our security vendor listeners on how <em>not</em> to use this incident as a sales tool (tl;dr: DON’T!), there are a few correlations to the automotive industry. And check out the book club recommendations in the show notes on our website <a href="http://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">www.greatsecuritydebate.net</a>, too.</p><p><br></p><p>Since we recorded another bank, Signature Bank, has also been closed and placed into receivership. On behalf of all of us at Great Security Debate, we wish all those affected either as companies of these banks or their customers good wishes and hope for good news ahead on the recovery of funds.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.netinterest.co/p/the-demise-of-silicon-valley-bank?utm_campaign=post" rel="noopener noreferrer" target="_blank">The Demise of Silicon Valley Bank - by Marc Rubinstein</a></li><li><a href="https://amzn.to/4050Z4x" rel="noopener noreferrer" target="_blank">All the Devils Are Here: A Novel (Chief Inspector Gamache Novel Book 16) - Kindle edition by Penny, Louise. Mystery, Thriller &amp; Suspense Kindle eBooks @ Amazon.com.</a></li><li><a href="https://financialpost.com/fp-finance/banking/silicon-valley-bank-profit-squeeze-tech-downturn-short-sellers" rel="noopener noreferrer" target="_blank">Silicon Valley Bank profit squeeze in tech dip attracts short sellers | Financial Post</a></li><li><a href="https://insightbeforeaction.com/the-tenth-man-rule-principle-explained/" rel="noopener noreferrer" target="_blank">The Tenth Man Rule - Principle Explained</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062060244/securitydebat-20" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a> — https://amzn.to/3LcZKvT</li><li><a href="https://amzn.to/3LcZKvT" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-49-bankplosion]]></link><guid isPermaLink="false">583b83d3-014f-441e-ae6f-04d141fe1732</guid><itunes:image href="https://artwork.captivate.fm/7cbc71cd-954f-4da0-aea5-b4c9c535a9de/cover.jpg"/><pubDate>Mon, 13 Mar 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/3bfdc889-d808-41a7-9fa9-8a430ecdd19b/583b83d3-014f-441e-ae6f-04d141fe1732.mp3" length="91580018" type="audio/mpeg"/><itunes:duration>01:02:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>49</itunes:episode><podcast:episode>49</podcast:episode><podcast:season>4</podcast:season></item><item><title>Back to Normal?</title><itunes:title>Back to Normal?</itunes:title><description><![CDATA[<p>The Great Security Debate Book Club is in FULL force this week as we talk  about life after you’ve gotten the job in information security and are looking for the growth and promotion that come as you grow your career. </p><p>Check out the show notes on our website <a href="http://www.greatsecuritydebate.net/48" rel="noopener noreferrer" target="_blank">www.greatsecuritydebate.net/48</a> to get links to all the books, articles, and references we discuss up through the show. </p><p>A mere appetiser sized sampling of the topics we cover in this hour include:</p><p><br></p><ul><li><br></li><li>What does it mean to “return to normal” in work in 2023?</li><li><br></li><li><br></li><li>How do you grow in your role once you are in the Infosec field?</li><li><br></li><li><br></li><li>The “old-man” perspective on entitlement in growing within jobs</li><li><br></li><li><br></li><li>What approaches work (and don’t work) when asking for promotions, raises, new roles, within your organisation</li><li><br></li><li><br></li><li>Conversely, how to approach getting responsibilities added with out getting additional compensation</li><li><br></li><li><br></li><li>Using the word “I” vs “We” when talking about a job and your team</li><li><br></li><li><br></li><li>What to consider the factors and risks outside the office when looking at role and organisational growth</li><li><br></li><li><br></li><li>The importance of knowing the difference between what you want to say vs how it will be received when read by the recipient</li><li><br></li><li><br></li><li>What do you do when you find yourself as (or think you are) the smartest person in the room?</li><li><br></li><li><br></li><li>What resources can people use to get ready for their next growth step at work?</li><li><br></li><li><br></li><li>How can networking and mentoring be valuable to find the next position?</li><li><br></li></ul><br/><p>Since it came up a few times in the show, remember that not every securty career path ends with becoming a CISO, or nor should we expect that everyone in infosec <em>wants</em> to become a CISO!</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.wsj.com/articles/high-earning-men-are-cutting-back-on-their-working-hours-11674697563" rel="noopener noreferrer" target="_blank">High-Earning Men Are Cutting Back on Their Working Hours - WSJ</a></li><li><a href="https://www.freep.com/story/news/local/michigan/2022/12/22/census-michigan-population-drops/69744139007/" rel="noopener noreferrer" target="_blank">Census: Michigan's population drops again for 2nd consecutive year</a></li><li><a href="https://www.mindtools.com/a3mi00v/5-whys" rel="noopener noreferrer" target="_blank">5 Whys - Getting to the Root of a Problem Quickly</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1733139222/securitydebat-20" rel="noopener noreferrer" target="_blank">Little Giants: 10 Hispanic Women Who Made History: Calderon, Raynelda A., Donna, Wiscombe: 9781733139229: Amazon.com: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B0BBSWCVT4/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: True North, Emerging Leader Edition: Leading Authentically in Today's Workplace eBook : Clayton, Zach, George, Bill, Gergen, David: Kindle Store</a></li><li><a href="https://www.amazon.com/s?k=never+split+the+difference+book&amp;i=stripbooks&amp;sprefix=never+split+the+difference%2Cstripbooks%2C93&amp;ref=nb_sb_ss_ts-doa-p_2_26" rel="noopener noreferrer" target="_blank">Amazon.com : never split the difference book</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B014DUR7L2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Never Split the Difference: Negotiating As If Your Life Depended On It eBook : Voss, Chris, Raz, Tahl: Kindle Store</a></li><li><a href="https://www.cnbc.com/2022/06/16/michigan-becomes-14th-state-to-mandate-personal-finance-education.html" rel="noopener noreferrer" target="_blank">Michigan becomes 14th state to mandate personal finance education</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B005K0AYH4/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Crucial Conversations Tools for Talking When Stakes Are High, Second Edition eBook : Patterson, Kerry, Grenny, Joseph, McMillan, Ron, Switzler, Al: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B09BNVBXJ1/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Crucial Confrontations: Tools for Talking About Broken Promises, Violated Expectations, and Bad Behavior (Audible Audio Edition): Kerry Patterson, Joseph Grenny, Ron McMillan, Al Switzler, Barrett Whitener, McGraw Hill-Ascent Audio: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B01CQ8U1EI/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Slumdog Millionaire [Blu-ray] : Boyle, Danny, Patel, Dev, Pinto, Freida, Khan, Irrfan, Kapoor, Anil, Shukla, Saurabh, Zutshi, Raj, Talwar, Jeneva, Aggarwal, Sunil, Ismail, Azharuddin Mohammed, Khedekar, Ayush Mahesh: Movies &amp; TV</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/6305428522/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Quiz Show : Ralph Fiennes, John Turturro, Hank Azaria, Rob Morrow, David Paymer, Allan Rich, Paul Scofield, Christopher McDonald, Johann Carlo, Mira Sorvino, Elizabeth Wilson, Griffin Dunne, Timothy Busfield, Martin Scorsese, Barry Levinson, Robert Redford, Paul Attanasio: Movies &amp; TV</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://bit.ly/mentorcoreslack" rel="noopener noreferrer" target="_blank">MentorCore Slack</a> — Join the Slack</li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The Great Security Debate Book Club is in FULL force this week as we talk  about life after you’ve gotten the job in information security and are looking for the growth and promotion that come as you grow your career. </p><p>Check out the show notes on our website <a href="http://www.greatsecuritydebate.net/48" rel="noopener noreferrer" target="_blank">www.greatsecuritydebate.net/48</a> to get links to all the books, articles, and references we discuss up through the show. </p><p>A mere appetiser sized sampling of the topics we cover in this hour include:</p><p><br></p><ul><li><br></li><li>What does it mean to “return to normal” in work in 2023?</li><li><br></li><li><br></li><li>How do you grow in your role once you are in the Infosec field?</li><li><br></li><li><br></li><li>The “old-man” perspective on entitlement in growing within jobs</li><li><br></li><li><br></li><li>What approaches work (and don’t work) when asking for promotions, raises, new roles, within your organisation</li><li><br></li><li><br></li><li>Conversely, how to approach getting responsibilities added with out getting additional compensation</li><li><br></li><li><br></li><li>Using the word “I” vs “We” when talking about a job and your team</li><li><br></li><li><br></li><li>What to consider the factors and risks outside the office when looking at role and organisational growth</li><li><br></li><li><br></li><li>The importance of knowing the difference between what you want to say vs how it will be received when read by the recipient</li><li><br></li><li><br></li><li>What do you do when you find yourself as (or think you are) the smartest person in the room?</li><li><br></li><li><br></li><li>What resources can people use to get ready for their next growth step at work?</li><li><br></li><li><br></li><li>How can networking and mentoring be valuable to find the next position?</li><li><br></li></ul><br/><p>Since it came up a few times in the show, remember that not every securty career path ends with becoming a CISO, or nor should we expect that everyone in infosec <em>wants</em> to become a CISO!</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.wsj.com/articles/high-earning-men-are-cutting-back-on-their-working-hours-11674697563" rel="noopener noreferrer" target="_blank">High-Earning Men Are Cutting Back on Their Working Hours - WSJ</a></li><li><a href="https://www.freep.com/story/news/local/michigan/2022/12/22/census-michigan-population-drops/69744139007/" rel="noopener noreferrer" target="_blank">Census: Michigan's population drops again for 2nd consecutive year</a></li><li><a href="https://www.mindtools.com/a3mi00v/5-whys" rel="noopener noreferrer" target="_blank">5 Whys - Getting to the Root of a Problem Quickly</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1733139222/securitydebat-20" rel="noopener noreferrer" target="_blank">Little Giants: 10 Hispanic Women Who Made History: Calderon, Raynelda A., Donna, Wiscombe: 9781733139229: Amazon.com: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B0BBSWCVT4/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: True North, Emerging Leader Edition: Leading Authentically in Today's Workplace eBook : Clayton, Zach, George, Bill, Gergen, David: Kindle Store</a></li><li><a href="https://www.amazon.com/s?k=never+split+the+difference+book&amp;i=stripbooks&amp;sprefix=never+split+the+difference%2Cstripbooks%2C93&amp;ref=nb_sb_ss_ts-doa-p_2_26" rel="noopener noreferrer" target="_blank">Amazon.com : never split the difference book</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B014DUR7L2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Never Split the Difference: Negotiating As If Your Life Depended On It eBook : Voss, Chris, Raz, Tahl: Kindle Store</a></li><li><a href="https://www.cnbc.com/2022/06/16/michigan-becomes-14th-state-to-mandate-personal-finance-education.html" rel="noopener noreferrer" target="_blank">Michigan becomes 14th state to mandate personal finance education</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B005K0AYH4/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Crucial Conversations Tools for Talking When Stakes Are High, Second Edition eBook : Patterson, Kerry, Grenny, Joseph, McMillan, Ron, Switzler, Al: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B09BNVBXJ1/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Crucial Confrontations: Tools for Talking About Broken Promises, Violated Expectations, and Bad Behavior (Audible Audio Edition): Kerry Patterson, Joseph Grenny, Ron McMillan, Al Switzler, Barrett Whitener, McGraw Hill-Ascent Audio: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B01CQ8U1EI/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Slumdog Millionaire [Blu-ray] : Boyle, Danny, Patel, Dev, Pinto, Freida, Khan, Irrfan, Kapoor, Anil, Shukla, Saurabh, Zutshi, Raj, Talwar, Jeneva, Aggarwal, Sunil, Ismail, Azharuddin Mohammed, Khedekar, Ayush Mahesh: Movies &amp; TV</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/6305428522/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Quiz Show : Ralph Fiennes, John Turturro, Hank Azaria, Rob Morrow, David Paymer, Allan Rich, Paul Scofield, Christopher McDonald, Johann Carlo, Mira Sorvino, Elizabeth Wilson, Griffin Dunne, Timothy Busfield, Martin Scorsese, Barry Levinson, Robert Redford, Paul Attanasio: Movies &amp; TV</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://bit.ly/mentorcoreslack" rel="noopener noreferrer" target="_blank">MentorCore Slack</a> — Join the Slack</li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-48-back-to-normal]]></link><guid isPermaLink="false">e76d3f4e-a16c-4a28-b23b-43dddd696ba1</guid><itunes:image href="https://artwork.captivate.fm/401056ad-8f1a-4b68-b126-959c644a50a2/cover.jpg"/><pubDate>Mon, 27 Feb 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e46157ce-260b-4467-a02f-db7fa0b6c884/e76d3f4e-a16c-4a28-b23b-43dddd696ba1.mp3" length="55885328" type="audio/mpeg"/><itunes:duration>54:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>48</itunes:episode><podcast:episode>48</podcast:episode><podcast:season>4</podcast:season></item><item><title>Uninsurable!</title><itunes:title>Uninsurable!</itunes:title><description><![CDATA[<p>Insurance for information security is changing. Recently some reports came out that there were moves by insurance companies to leave the cybersecurity insurance market - that it was uninsurable. Dan, Brian, and Erik discuss on this week's Great Security Debate:</p><ul><li><br></li><li>What happens now that cybersecurity insurance is built into contracts and requirements by customers doing business with other companies?</li><li><br></li><li><br></li><li>Are the carveouts such that it’s easier to just pay and not inform insurance that you want them to pay for the incident?</li><li><br></li><li><br></li><li>Does having “easy” insurance give too many orgs a pass on having to actually improve their security control sets?</li><li><br></li><li><br></li><li>How do insurance “formularies” make companies less secure by not letting them buy the newer, better technologies? </li><li><br></li><li><br></li><li>Conversely, how does the formulary of products help prevent from buying junk tech that calls itself “security”?</li><li><br></li><li><br></li><li>How does the threat of nonpayment of expenses and losses  by insurance companies after the fact affect organisational security decisions for or against the formulary?</li><li><br></li><li><br></li><li>How is relying on insurance to determine tech standards the same as the EU demanding all chargers be USB-C?</li><li><br></li><li><br></li><li>Does insurance go away altogether? Do we want it to go away?</li><li><br></li><li><br></li><li>What is the law of the horse and how does it apply to insurance in information security?</li><li><br></li><li><br></li><li>Can shifting downstream supplier risk into insurance really work to reduce risk?</li><li><br></li><li><br></li><li>Is security a cost centre, a cost of doing business, or a potential profit centre for orgs?</li><li><br></li><li><br></li><li>Should we shift from insurance mandate to “figure it out”</li><li><br></li><li><br></li><li>How does the conscious decision not to patch because the patch causes worse issues affect the insurance coverage?</li><li><br></li><li><br></li><li>How can we balance the expectation with our technology suppliers to maintain support longer, especially on IOT or high-cost, long life devices?</li><li><br></li><li><br></li><li>Can a move toward clear, yet broad expectations on controls be enough to meet security expectations for insurance without prescriptive formularies of technology and process?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.secureworld.io/industry-news/cyber-attacks-uninsurable" rel="noopener noreferrer" target="_blank">Large Insurer Says Cyber Attacks Are Becoming 'Uninsurable'</a></li><li><a href="https://www.managedit.com.au/blog/post/9492/3-times-businesses-were-denied-cyber-insurance-payouts/" rel="noopener noreferrer" target="_blank">3 Times Businesses Were Denied Cyber Insurance Payouts. | Managed IT</a></li><li><a href="https://www.europarl.europa.eu/news/en/headlines/society/20220413STO27211/usb-type-c-to-become-eu-s-common-charger-by-end-of-2024" rel="noopener noreferrer" target="_blank">USB-type C to become EU's common charger by end of 2024 | News | European Parliament</a></li><li><a href="https://www.darkreading.com/cloud/rackspace-ransomware-attack-microsoft-exchange-server-zero-day-exploit" rel="noopener noreferrer" target="_blank">Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations</a></li><li><a href="https://screenrant.com/arlo-ending-support-old-cameras-customer-reactions/" rel="noopener noreferrer" target="_blank">Arlo Is Ending Support For Its Old Cameras &amp; Customers Aren't Happy</a></li><li><a href="https://executivegov.com/2023/01/cisas-jen-easterly-on-fielding-software-offerings-that-are-secure-by-design/" rel="noopener noreferrer" target="_blank">CISA’s Jen Easterly: Tech Companies Should Deploy Software Offerings That Are "Secure by Design"</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Insurance for information security is changing. Recently some reports came out that there were moves by insurance companies to leave the cybersecurity insurance market - that it was uninsurable. Dan, Brian, and Erik discuss on this week's Great Security Debate:</p><ul><li><br></li><li>What happens now that cybersecurity insurance is built into contracts and requirements by customers doing business with other companies?</li><li><br></li><li><br></li><li>Are the carveouts such that it’s easier to just pay and not inform insurance that you want them to pay for the incident?</li><li><br></li><li><br></li><li>Does having “easy” insurance give too many orgs a pass on having to actually improve their security control sets?</li><li><br></li><li><br></li><li>How do insurance “formularies” make companies less secure by not letting them buy the newer, better technologies? </li><li><br></li><li><br></li><li>Conversely, how does the formulary of products help prevent from buying junk tech that calls itself “security”?</li><li><br></li><li><br></li><li>How does the threat of nonpayment of expenses and losses  by insurance companies after the fact affect organisational security decisions for or against the formulary?</li><li><br></li><li><br></li><li>How is relying on insurance to determine tech standards the same as the EU demanding all chargers be USB-C?</li><li><br></li><li><br></li><li>Does insurance go away altogether? Do we want it to go away?</li><li><br></li><li><br></li><li>What is the law of the horse and how does it apply to insurance in information security?</li><li><br></li><li><br></li><li>Can shifting downstream supplier risk into insurance really work to reduce risk?</li><li><br></li><li><br></li><li>Is security a cost centre, a cost of doing business, or a potential profit centre for orgs?</li><li><br></li><li><br></li><li>Should we shift from insurance mandate to “figure it out”</li><li><br></li><li><br></li><li>How does the conscious decision not to patch because the patch causes worse issues affect the insurance coverage?</li><li><br></li><li><br></li><li>How can we balance the expectation with our technology suppliers to maintain support longer, especially on IOT or high-cost, long life devices?</li><li><br></li><li><br></li><li>Can a move toward clear, yet broad expectations on controls be enough to meet security expectations for insurance without prescriptive formularies of technology and process?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.secureworld.io/industry-news/cyber-attacks-uninsurable" rel="noopener noreferrer" target="_blank">Large Insurer Says Cyber Attacks Are Becoming 'Uninsurable'</a></li><li><a href="https://www.managedit.com.au/blog/post/9492/3-times-businesses-were-denied-cyber-insurance-payouts/" rel="noopener noreferrer" target="_blank">3 Times Businesses Were Denied Cyber Insurance Payouts. | Managed IT</a></li><li><a href="https://www.europarl.europa.eu/news/en/headlines/society/20220413STO27211/usb-type-c-to-become-eu-s-common-charger-by-end-of-2024" rel="noopener noreferrer" target="_blank">USB-type C to become EU's common charger by end of 2024 | News | European Parliament</a></li><li><a href="https://www.darkreading.com/cloud/rackspace-ransomware-attack-microsoft-exchange-server-zero-day-exploit" rel="noopener noreferrer" target="_blank">Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations</a></li><li><a href="https://screenrant.com/arlo-ending-support-old-cameras-customer-reactions/" rel="noopener noreferrer" target="_blank">Arlo Is Ending Support For Its Old Cameras &amp; Customers Aren't Happy</a></li><li><a href="https://executivegov.com/2023/01/cisas-jen-easterly-on-fielding-software-offerings-that-are-secure-by-design/" rel="noopener noreferrer" target="_blank">CISA’s Jen Easterly: Tech Companies Should Deploy Software Offerings That Are "Secure by Design"</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-47-uninsurable]]></link><guid isPermaLink="false">219c5ed3-af5f-4a27-a093-0c6047442296</guid><itunes:image href="https://artwork.captivate.fm/08639da4-723a-4196-82f7-08b4504211b9/cover.jpg"/><pubDate>Mon, 16 Jan 2023 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/64315b40-34b2-4949-b4d7-9a61cca3403f/219c5ed3-af5f-4a27-a093-0c6047442296.mp3" length="62677605" type="audio/mpeg"/><itunes:duration>01:02:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>4</itunes:season><itunes:episode>47</itunes:episode><podcast:episode>47</podcast:episode><podcast:season>4</podcast:season></item><item><title>A Niche Inside a Niche Is Really Just a Quiche</title><itunes:title>A Niche Inside a Niche Is Really Just a Quiche</itunes:title><description><![CDATA[<p>Welcome to the year-end 2022 episode of The Great Security Debate. </p><p>In this hour, Brian, Erik, and Dan cover myriad ways hiring processes are failing job seekers and hiring organisations. It all kicked off with the impersonal nature of automated 1-way video interviews. It quickly jumped into the myriad of other ways we can do better on both sides, including (but not limited to):</p><ul><li><br></li><li>Do video interviews encourage fraud? Multiple jobs for one person? A fake version of you applying for a job?</li><li><br></li><li><br></li><li>Why are hiring managers and HR using video interviews?  Are there legitimate reasons?</li><li><br></li><li><br></li><li>Does the lack of ability to assess the candidate’s response to the interviewer’s response makes the interview less effective?</li><li><br></li><li><br></li><li>What is the impression left when a candidate is immediately rejected based on analytics and matching, not human interaction?</li><li><br></li><li><br></li><li>What’s the value of using your network around a broken applicant system? What do we lose by only depending on our networks for hiring?</li><li><br></li><li><br></li><li>How do these recorded methods exclude introverts and others that may not be camera comfortable in their presentation skills?</li><li><br></li><li><br></li><li>Can and should there be roles for people at higher levels that don’t include people management?</li><li><br></li><li><br></li><li>Is “AI” (term used in quotes on purpose) really the antithesis of diversity or inclusion?</li><li><br></li><li><br></li><li>How is connecting people to others and helping them expand their networks better than sending resumes to people you know?</li><li><br></li><li><br></li><li>In times of cash crunch, will hiring come from experienced people having been let go from roles, or hiring entry-level and ups killing them?</li><li><br></li></ul><br/><p>You’ll also get a few mentions of Buzzword Bingo; the shocking revelation that Brian works for a vendor; and Dan goes on a tirade about new software that does recording and analysis in Zoom meetings with and without permission. It’s another great debate!</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/acknowledging-our-love-hate-relationship-with-security-certifications/" rel="noopener noreferrer" target="_blank">Our Love-Hate Relationship With Security Certifications</a></li><li><a href="https://podcasts.apple.com/us/podcast/cyber-certifications-the-self-licking-ice-cream-cone/id1570251081?i=1000589410927" rel="noopener noreferrer" target="_blank">Cyber Certifications - The Self Licking Ice Cream Cone of Misery</a></li><li><a href="https://www.greatsecuritydebate.net/45" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 45: Live From the Big House</a></li><li><a href="https://www.greatsecuritydebate.net/43" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 43: New Team, Who Dis?</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0307352153/securitydebat-20" rel="noopener noreferrer" target="_blank">Quiet: The Power of Introverts in a World That Can't Stop Talking: Cain, Susan: 9780307352156: Amazon.com: Books</a></li><li><a href="https://insideevs.com/news/499611/tesla-cabin-camera-analyses-you/" rel="noopener noreferrer" target="_blank">Check Out How Tesla's In-Cabin Camera Analyses Your Face</a></li><li><a href="https://www.gong.io/call-recording-software/" rel="noopener noreferrer" target="_blank">Evil Call Recording Software: Rated #1 By Sales Pros | Gong</a></li><li><a href="https://www.linkedin.com/in/david-franco-379b064/" rel="noopener noreferrer" target="_blank">David Franco | LinkedIn</a></li><li><a href="https://www.livingandlearningcenter.org/" rel="noopener noreferrer" target="_blank">Living &amp; Learning Enrichment Center</a></li><li><a href="https://www.theguardian.com/commentisfree/2022/nov/26/alexa-how-did-amazons-voice-assistant-rack-up-a-10bn-loss" rel="noopener noreferrer" target="_blank">Alexa, how did Amazon’s voice assistant rack up a $10bn loss? | John Naughton | The Guardian</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Welcome to the year-end 2022 episode of The Great Security Debate. </p><p>In this hour, Brian, Erik, and Dan cover myriad ways hiring processes are failing job seekers and hiring organisations. It all kicked off with the impersonal nature of automated 1-way video interviews. It quickly jumped into the myriad of other ways we can do better on both sides, including (but not limited to):</p><ul><li><br></li><li>Do video interviews encourage fraud? Multiple jobs for one person? A fake version of you applying for a job?</li><li><br></li><li><br></li><li>Why are hiring managers and HR using video interviews?  Are there legitimate reasons?</li><li><br></li><li><br></li><li>Does the lack of ability to assess the candidate’s response to the interviewer’s response makes the interview less effective?</li><li><br></li><li><br></li><li>What is the impression left when a candidate is immediately rejected based on analytics and matching, not human interaction?</li><li><br></li><li><br></li><li>What’s the value of using your network around a broken applicant system? What do we lose by only depending on our networks for hiring?</li><li><br></li><li><br></li><li>How do these recorded methods exclude introverts and others that may not be camera comfortable in their presentation skills?</li><li><br></li><li><br></li><li>Can and should there be roles for people at higher levels that don’t include people management?</li><li><br></li><li><br></li><li>Is “AI” (term used in quotes on purpose) really the antithesis of diversity or inclusion?</li><li><br></li><li><br></li><li>How is connecting people to others and helping them expand their networks better than sending resumes to people you know?</li><li><br></li><li><br></li><li>In times of cash crunch, will hiring come from experienced people having been let go from roles, or hiring entry-level and ups killing them?</li><li><br></li></ul><br/><p>You’ll also get a few mentions of Buzzword Bingo; the shocking revelation that Brian works for a vendor; and Dan goes on a tirade about new software that does recording and analysis in Zoom meetings with and without permission. It’s another great debate!</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/acknowledging-our-love-hate-relationship-with-security-certifications/" rel="noopener noreferrer" target="_blank">Our Love-Hate Relationship With Security Certifications</a></li><li><a href="https://podcasts.apple.com/us/podcast/cyber-certifications-the-self-licking-ice-cream-cone/id1570251081?i=1000589410927" rel="noopener noreferrer" target="_blank">Cyber Certifications - The Self Licking Ice Cream Cone of Misery</a></li><li><a href="https://www.greatsecuritydebate.net/45" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 45: Live From the Big House</a></li><li><a href="https://www.greatsecuritydebate.net/43" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 43: New Team, Who Dis?</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0307352153/securitydebat-20" rel="noopener noreferrer" target="_blank">Quiet: The Power of Introverts in a World That Can't Stop Talking: Cain, Susan: 9780307352156: Amazon.com: Books</a></li><li><a href="https://insideevs.com/news/499611/tesla-cabin-camera-analyses-you/" rel="noopener noreferrer" target="_blank">Check Out How Tesla's In-Cabin Camera Analyses Your Face</a></li><li><a href="https://www.gong.io/call-recording-software/" rel="noopener noreferrer" target="_blank">Evil Call Recording Software: Rated #1 By Sales Pros | Gong</a></li><li><a href="https://www.linkedin.com/in/david-franco-379b064/" rel="noopener noreferrer" target="_blank">David Franco | LinkedIn</a></li><li><a href="https://www.livingandlearningcenter.org/" rel="noopener noreferrer" target="_blank">Living &amp; Learning Enrichment Center</a></li><li><a href="https://www.theguardian.com/commentisfree/2022/nov/26/alexa-how-did-amazons-voice-assistant-rack-up-a-10bn-loss" rel="noopener noreferrer" target="_blank">Alexa, how did Amazon’s voice assistant rack up a $10bn loss? | John Naughton | The Guardian</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-46-a-niche-inside-a-niche-is-really-just-a-quiche]]></link><guid isPermaLink="false">959d6adb-2321-4a29-98da-2c45810e71ff</guid><itunes:image href="https://artwork.captivate.fm/34c538e3-8a56-47a5-94e5-dca55fdd3e17/cover.jpg"/><pubDate>Tue, 27 Dec 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2d68da25-74da-4460-a865-0a3b432fdcfd/959d6adb-2321-4a29-98da-2c45810e71ff.mp3" length="58405969" type="audio/mpeg"/><itunes:duration>56:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>46</itunes:episode><podcast:episode>46</podcast:episode><podcast:season>3</podcast:season></item><item><title>Live From the Big House</title><itunes:title>Live From the Big House</itunes:title><description><![CDATA[<p>Recorded on Saturday 29 October 2022, at the tailgate before the University of Michigan vs Michigan State University (American) football game, Brian, Erik and Dan chat about the news of the day, with more than a few correlations back to football. And we had a special guest join us, too: <a href="https://www.linkedin.com/in/zahira-zah-rodriguez-gonzalvo-1a97692/" rel="noopener noreferrer" target="_blank">Zah Gonzalvo Rodriguez</a></p><ul><li><br></li><li>There was an upcoming OpenSSL vulnerability hitting the world this week. How would Software Bill of Materials (SBOM) make the response easier?</li><li><br></li><li><br></li><li>A reminder of our dependence on the stability and security of some very core tools (like OpenSSL) to run our businesses. Mot to mention the fact that such tools are often within the libraries we use and don’t even realise it’s there.</li><li><br></li><li><br></li><li>Similarities between football and security in the need to adjust based on what the other team shows signs of throwing at you, and further based on what they actually bring to the line.</li><li><br></li><li><br></li><li>How repeatable process and inventory help make the response to these vulnerability disclosures less like a firedrill and more like standard ops.</li><li><br></li><li><br></li><li>Did you know that credit ratings are being affected by information security posture and breach response?</li><li><br></li><li><br></li><li>Same thing with M&amp;A and investment valuation… if you’re not as mature in security and privacy you may see a discount taken on your value!</li><li><br></li><li><br></li><li>How transparent should we be with the peer companies and the public world about our security posture (like incident response plans, and security controls in place)?</li><li><br></li></ul><br/><p>And if you’re curious, you can find out what team Dan (the lifelong Badger) was supporting in the game. Congratulations to the University of Michigan in later winning this game, and to both teams for keeping the rivalry alive and spicy.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p>]]></description><content:encoded><![CDATA[<p>Recorded on Saturday 29 October 2022, at the tailgate before the University of Michigan vs Michigan State University (American) football game, Brian, Erik and Dan chat about the news of the day, with more than a few correlations back to football. And we had a special guest join us, too: <a href="https://www.linkedin.com/in/zahira-zah-rodriguez-gonzalvo-1a97692/" rel="noopener noreferrer" target="_blank">Zah Gonzalvo Rodriguez</a></p><ul><li><br></li><li>There was an upcoming OpenSSL vulnerability hitting the world this week. How would Software Bill of Materials (SBOM) make the response easier?</li><li><br></li><li><br></li><li>A reminder of our dependence on the stability and security of some very core tools (like OpenSSL) to run our businesses. Mot to mention the fact that such tools are often within the libraries we use and don’t even realise it’s there.</li><li><br></li><li><br></li><li>Similarities between football and security in the need to adjust based on what the other team shows signs of throwing at you, and further based on what they actually bring to the line.</li><li><br></li><li><br></li><li>How repeatable process and inventory help make the response to these vulnerability disclosures less like a firedrill and more like standard ops.</li><li><br></li><li><br></li><li>Did you know that credit ratings are being affected by information security posture and breach response?</li><li><br></li><li><br></li><li>Same thing with M&amp;A and investment valuation… if you’re not as mature in security and privacy you may see a discount taken on your value!</li><li><br></li><li><br></li><li>How transparent should we be with the peer companies and the public world about our security posture (like incident response plans, and security controls in place)?</li><li><br></li></ul><br/><p>And if you’re curious, you can find out what team Dan (the lifelong Badger) was supporting in the game. Congratulations to the University of Michigan in later winning this game, and to both teams for keeping the rivalry alive and spicy.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://youtube.com/@greatsecuritydebate" rel="noopener noreferrer" target="_blank">https://youtube.com/@greatsecuritydebate</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-45-live-from-the-big-house]]></link><guid isPermaLink="false">7c3ea270-7c21-48ad-a484-5921fcedf43c</guid><itunes:image href="https://artwork.captivate.fm/bb33bd63-3ee6-4fa0-8baf-e3015ba285fa/cover.jpg"/><pubDate>Sun, 30 Oct 2022 13:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8db83a78-e96c-4f3f-9ccd-e8cbe8b2f95a/7c3ea270-7c21-48ad-a484-5921fcedf43c.mp3" length="45926193" type="audio/mpeg"/><itunes:duration>45:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>45</itunes:episode><podcast:episode>45</podcast:episode><podcast:season>3</podcast:season><itunes:summary>Recorded on Saturday 29 October 2022, at the tailgate before the University of Michigan vs Michigan State University (American) football game, Brian, Erik and Dan chat about the news of the day, with more than a few correlations back to football. And we had a special guest join us, too: https://www.linkedin.com/in/zahira-zah-rodriguez-gonzalvo-1a97692/ (Zah Gonzalvo Rodriguez)



There was an upcoming OpenSSL vulnerability hitting the world this week. How would Software Bill of Materials (SBOM) make the response easier?

A reminder of our dependence on the stability and security of some very core tools (like OpenSSL) to run our businesses. Mot to mention the fact that such tools are often within the libraries we use and don’t even realise it’s there.

Similarities between football and security in the need to adjust based on what the other team shows signs of throwing at you, and further based on what they actually bring to the line.

How repeatable process and inventory help make the response to these vulnerability disclosures less like a firedrill and more like standard ops.

Did you know that credit ratings are being affected by information security posture and breach response?

Same thing with MandA and investment valuation… if you’re not as mature in security and privacy you may see a discount taken on your value!

How transparent should we be with the peer companies and the public world about our security posture (like incident response plans, and security controls in place)?



And if you’re curious, you can find out what team Dan (the lifelong Badger) was supporting in the game. Congratulations to the University of Michigan in later winning this game, and to both teams for keeping the rivalry alive and spicy.


We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head to https://youtube.com/@greatsecuritydebate (https://youtube.com/@greatsecuritydebate) and watch, subscribe and &amp;quot;like&amp;quot; the episodes.


Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.


Thanks for listening!
https://www.patreon.com/securitydebate (Support The Great Security Debate)</itunes:summary></item><item><title>No More Ads, No More Privacy Problem?</title><itunes:title>No More Ads, No More Privacy Problem?</itunes:title><description><![CDATA[<p>This week’s debate comes amid a combo platter of increased analytics leading to near-immediate contact when visiting a product’s website, along with more clarity from enforcement bodies about how they will approach their respective privacy legislation. One such fine was the Sephora CCPA matter in which California Attorney General levied a $1.2M fine on the company ([<a href="https://oag.ca.gov/news/press-releases/attorney-general-bonta-announces-settlement-sephora-part-ongoing-enforcement%5D" rel="noopener noreferrer" target="_blank">https://oag.ca.gov/news/press-releases/attorney-general-bonta-announces-settlement-sephora-part-ongoing-enforcement]</a>)</p><p>Listen in to hear Dan, Brian and Erik talk about:</p><ul><li><br></li><li>Are privacy and shareholder value at odds? How does protecting the privacy of the consumer help shareholder value?</li><li><br></li><li><br></li><li>A reminder that security and privacy can serve as a business differentiator</li><li><br></li><li><br></li><li>How to deal with the reputation of a company being set by misleading headlines (and people not reading the actual article/detail)?</li><li><br></li><li><br></li><li>Does better privacy practices in companies lead to reduced data for sale on the illicit market?</li><li><br></li><li><br></li><li>Does just “saying no to data collection” by companies make for a better privacy posture?</li><li><br></li><li><br></li><li>How long should (vs. how long do) you hold onto data?</li><li><br></li><li><br></li><li>How will companies be judged in the future by how they manage data today?</li><li><br></li><li><br></li><li>Are ads themselves the source of all our problems? </li><li><br></li><li><br></li><li>Why does the push for more advertising to reduce costs increases the push for more data collection?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.compliancepoint.com/ccpa/takeaways-sephora-ccpa-fine/" rel="noopener noreferrer" target="_blank">Sephora Hit with $1.2M Fine in First CCPA Enforcement - CompliancePoint</a></li><li><a href="https://www.nytimes.com/2022/09/14/climate/patagonia-climate-philanthropy-chouinard.html" rel="noopener noreferrer" target="_blank">Patagonia Founder Gives Away the Company to Fight Climate Change - The New York Times</a></li><li><a href="https://rmisc.org/" rel="noopener noreferrer" target="_blank">RMISC - Rocky Mountain Information Security Conference</a></li><li><a href="https://www.cnn.com/2021/04/08/tech/linkedin-data-scraped-hacker-site/index.html" rel="noopener noreferrer" target="_blank">500 million LinkedIn users' data is for sale on a hacker site | CNN Business</a></li><li><a href="https://www.washingtonpost.com/technology/2022/09/15/uber-hack/" rel="noopener noreferrer" target="_blank">Uber breached by hacker in cybersecurity incident - The Washington Post</a></li><li><a href="https://www.cnn.com/2022/09/20/business/morgan-stanley-fine-customer-data/index.html" rel="noopener noreferrer" target="_blank">'Astonishing.' Morgan Stanley hard drives holding sensitive client data got auctioned off online | CNN Business</a></li><li><a href="https://www.businessroundtable.org/archive/media/news-releases/jpmorgan-chase-chairman-and-ceo-jamie-dimon-named-chairman-business-roundtable" rel="noopener noreferrer" target="_blank">Business Roundtable</a></li><li><a href="https://www.jpmorgan.com/insights/research/why-is-cybersecurity-important-to-esg" rel="noopener noreferrer" target="_blank">Why is Cybersecurity Important to ESG</a></li><li><a href="https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds" rel="noopener noreferrer" target="_blank">'Anonymised' data can never be totally anonymous, says study | Data protection | The Guardian</a></li><li><a href="https://9to5google.com/2022/09/16/youtube-ads-unskippable/" rel="noopener noreferrer" target="_blank">YouTube showing up to 10 unskippable ads on a video</a></li><li><a href="https://www.nbcnews.com/news/us-news/amazon-s-alexa-may-have-witnessed-alleged-florida-murder-authorities-n1075621" rel="noopener noreferrer" target="_blank">Amazon's Alexa may have witnessed alleged Florida murder, authorities say</a></li><li><a href="https://www.poynter.org/commentary/2022/the-athletic-advertisements-new-york-times-reader-response/" rel="noopener noreferrer" target="_blank">The Athletic adds ads; readers are not pleased - Poynter</a></li><li><a href="https://www.cnbc.com/2022/09/20/amazon-thursday-night-football-nfl-stream-draws-record-prime-signups.html" rel="noopener noreferrer" target="_blank">Amazon says 'Thursday Night Football' NFL stream draws record Prime signups</a></li><li><a href="https://twitter.com/buddhake/status/1572277321440059392" rel="noopener noreferrer" target="_blank">Daniel Ayala on Twitter: "Spoiler alert: the “not interested” button on @youtube is as useful at honing the recommendations as the placebo thermostat that they put in your office to when you used to go to an office. https://t.co/yg7T9fEhid" / Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>This week’s debate comes amid a combo platter of increased analytics leading to near-immediate contact when visiting a product’s website, along with more clarity from enforcement bodies about how they will approach their respective privacy legislation. One such fine was the Sephora CCPA matter in which California Attorney General levied a $1.2M fine on the company ([<a href="https://oag.ca.gov/news/press-releases/attorney-general-bonta-announces-settlement-sephora-part-ongoing-enforcement%5D" rel="noopener noreferrer" target="_blank">https://oag.ca.gov/news/press-releases/attorney-general-bonta-announces-settlement-sephora-part-ongoing-enforcement]</a>)</p><p>Listen in to hear Dan, Brian and Erik talk about:</p><ul><li><br></li><li>Are privacy and shareholder value at odds? How does protecting the privacy of the consumer help shareholder value?</li><li><br></li><li><br></li><li>A reminder that security and privacy can serve as a business differentiator</li><li><br></li><li><br></li><li>How to deal with the reputation of a company being set by misleading headlines (and people not reading the actual article/detail)?</li><li><br></li><li><br></li><li>Does better privacy practices in companies lead to reduced data for sale on the illicit market?</li><li><br></li><li><br></li><li>Does just “saying no to data collection” by companies make for a better privacy posture?</li><li><br></li><li><br></li><li>How long should (vs. how long do) you hold onto data?</li><li><br></li><li><br></li><li>How will companies be judged in the future by how they manage data today?</li><li><br></li><li><br></li><li>Are ads themselves the source of all our problems? </li><li><br></li><li><br></li><li>Why does the push for more advertising to reduce costs increases the push for more data collection?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you choose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you use them. We do not make our recommendations based on the availability or benefits of these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.compliancepoint.com/ccpa/takeaways-sephora-ccpa-fine/" rel="noopener noreferrer" target="_blank">Sephora Hit with $1.2M Fine in First CCPA Enforcement - CompliancePoint</a></li><li><a href="https://www.nytimes.com/2022/09/14/climate/patagonia-climate-philanthropy-chouinard.html" rel="noopener noreferrer" target="_blank">Patagonia Founder Gives Away the Company to Fight Climate Change - The New York Times</a></li><li><a href="https://rmisc.org/" rel="noopener noreferrer" target="_blank">RMISC - Rocky Mountain Information Security Conference</a></li><li><a href="https://www.cnn.com/2021/04/08/tech/linkedin-data-scraped-hacker-site/index.html" rel="noopener noreferrer" target="_blank">500 million LinkedIn users' data is for sale on a hacker site | CNN Business</a></li><li><a href="https://www.washingtonpost.com/technology/2022/09/15/uber-hack/" rel="noopener noreferrer" target="_blank">Uber breached by hacker in cybersecurity incident - The Washington Post</a></li><li><a href="https://www.cnn.com/2022/09/20/business/morgan-stanley-fine-customer-data/index.html" rel="noopener noreferrer" target="_blank">'Astonishing.' Morgan Stanley hard drives holding sensitive client data got auctioned off online | CNN Business</a></li><li><a href="https://www.businessroundtable.org/archive/media/news-releases/jpmorgan-chase-chairman-and-ceo-jamie-dimon-named-chairman-business-roundtable" rel="noopener noreferrer" target="_blank">Business Roundtable</a></li><li><a href="https://www.jpmorgan.com/insights/research/why-is-cybersecurity-important-to-esg" rel="noopener noreferrer" target="_blank">Why is Cybersecurity Important to ESG</a></li><li><a href="https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds" rel="noopener noreferrer" target="_blank">'Anonymised' data can never be totally anonymous, says study | Data protection | The Guardian</a></li><li><a href="https://9to5google.com/2022/09/16/youtube-ads-unskippable/" rel="noopener noreferrer" target="_blank">YouTube showing up to 10 unskippable ads on a video</a></li><li><a href="https://www.nbcnews.com/news/us-news/amazon-s-alexa-may-have-witnessed-alleged-florida-murder-authorities-n1075621" rel="noopener noreferrer" target="_blank">Amazon's Alexa may have witnessed alleged Florida murder, authorities say</a></li><li><a href="https://www.poynter.org/commentary/2022/the-athletic-advertisements-new-york-times-reader-response/" rel="noopener noreferrer" target="_blank">The Athletic adds ads; readers are not pleased - Poynter</a></li><li><a href="https://www.cnbc.com/2022/09/20/amazon-thursday-night-football-nfl-stream-draws-record-prime-signups.html" rel="noopener noreferrer" target="_blank">Amazon says 'Thursday Night Football' NFL stream draws record Prime signups</a></li><li><a href="https://twitter.com/buddhake/status/1572277321440059392" rel="noopener noreferrer" target="_blank">Daniel Ayala on Twitter: "Spoiler alert: the “not interested” button on @youtube is as useful at honing the recommendations as the placebo thermostat that they put in your office to when you used to go to an office. https://t.co/yg7T9fEhid" / Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-44-no-more-ads-no-more-privacy-problem]]></link><guid isPermaLink="false">07bffc00-c108-4e05-9369-cda8e1ec7511</guid><itunes:image href="https://artwork.captivate.fm/4e210569-0449-42f7-949f-586436ccfb19/cover.jpg"/><pubDate>Mon, 03 Oct 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/23bc8fb4-45d0-4d82-bdb4-1ca1111ac5fd/07bffc00-c108-4e05-9369-cda8e1ec7511.mp3" length="41759046" type="audio/mpeg"/><itunes:duration>55:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>44</itunes:episode><podcast:episode>44</podcast:episode><podcast:season>3</podcast:season></item><item><title>New Team, Who Dis?</title><itunes:title>New Team, Who Dis?</itunes:title><description><![CDATA[<p>We've all seen it (or been it): a new boss arrives at the company and quickly thereafter a bunch of their old colleagues get hired. It feels like they are getting the band back together at the new place. What does that say to the organisation about that leader? What does doing the opposite (pausing, growing from within) say differently? Brian, Dan and Erik discuss, debate and dissect this from a few angles, including some of the following:</p><ul><li><br></li><li>The power of threes: Three paths when you come in as a new leader: bring your own, nurture within, hire all new. And the three arcs of a company - startup/scrappy , growth/maturation, steady/run.</li><li><br></li><li><br></li><li>Two critical skills we wish we were taught in school and earlier in work: communications and public speaking</li><li><br></li><li><br></li><li>The impacts on culture on leadership and how they approach the staffing question, and how you bring people in will be the biggest impact on the culture of the organisation</li><li><br></li><li><br></li><li>How can metrics hide the actual performance of the team?</li><li><br></li><li><br></li><li>Are the CISO retention numbers as bad as the urban myth ? Are CISOs staying longer than we think they are?</li><li><br></li><li><br></li><li>What organisational situations drive leaders to resort to bringing in the people they know and trust vs. Trusting those already there?</li><li><br></li><li><br></li><li>How does growth by acquisition change the way we approach the listening and staffing of our teams and supporting our organisations?</li><li><br></li><li><br></li><li>Approaches to finding people to provide new perspectives, without having already worked with them directly?</li><li><br></li><li><br></li><li>How does geographic culture affect the decision on how to staff your team as a new leader in an organisation?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/40" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 40: What Got You Here Won’t (Necessarily) Get You There</a></li><li><a href="https://blogs.cuit.columbia.edu/jp3864/2019/04/28/steve-jobs-last-words/" rel="noopener noreferrer" target="_blank">Steve Jobs Last Words – Jessica Peng</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/b07h4wpss2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Power Moves: Lessons from Davos (Audible Audio Edition): Adam Grant, Adam Grant, Audible Originals: Audible Books &amp; Originals</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1591840937/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Small Giants: Companies That Choose to Be Great Instead of Big: 9781591840930: Burlingham, Bo: Books</a></li><li><a href="https://www.zingermanscommunity.com/?utm_source=mailorder&amp;utm_medium=zinglink&amp;utm_campaign=zcobbar" rel="noopener noreferrer" target="_blank">Zingerman's Community of Businesses - inside the center of the gastro-deli universe</a></li><li><a href="https://www.brainyquote.com/quotes/warren_buffett_383933" rel="noopener noreferrer" target="_blank">Warren Buffett - Only when the tide goes out do you...</a></li><li><a href="https://www.heidrick.com/en/insights/compensation-trends/2022-global-chief-information-security-officer-ciso-survey" rel="noopener noreferrer" target="_blank">2022 Global Chief Information Security Officer (CISO) Survey | Insights | Heidrick &amp; Struggles</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://www.entrepreneur.com/article/430590" rel="noopener noreferrer" target="_blank">How Listening Will Transform Your Leadership</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>We've all seen it (or been it): a new boss arrives at the company and quickly thereafter a bunch of their old colleagues get hired. It feels like they are getting the band back together at the new place. What does that say to the organisation about that leader? What does doing the opposite (pausing, growing from within) say differently? Brian, Dan and Erik discuss, debate and dissect this from a few angles, including some of the following:</p><ul><li><br></li><li>The power of threes: Three paths when you come in as a new leader: bring your own, nurture within, hire all new. And the three arcs of a company - startup/scrappy , growth/maturation, steady/run.</li><li><br></li><li><br></li><li>Two critical skills we wish we were taught in school and earlier in work: communications and public speaking</li><li><br></li><li><br></li><li>The impacts on culture on leadership and how they approach the staffing question, and how you bring people in will be the biggest impact on the culture of the organisation</li><li><br></li><li><br></li><li>How can metrics hide the actual performance of the team?</li><li><br></li><li><br></li><li>Are the CISO retention numbers as bad as the urban myth ? Are CISOs staying longer than we think they are?</li><li><br></li><li><br></li><li>What organisational situations drive leaders to resort to bringing in the people they know and trust vs. Trusting those already there?</li><li><br></li><li><br></li><li>How does growth by acquisition change the way we approach the listening and staffing of our teams and supporting our organisations?</li><li><br></li><li><br></li><li>Approaches to finding people to provide new perspectives, without having already worked with them directly?</li><li><br></li><li><br></li><li>How does geographic culture affect the decision on how to staff your team as a new leader in an organisation?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/40" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 40: What Got You Here Won’t (Necessarily) Get You There</a></li><li><a href="https://blogs.cuit.columbia.edu/jp3864/2019/04/28/steve-jobs-last-words/" rel="noopener noreferrer" target="_blank">Steve Jobs Last Words – Jessica Peng</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/b07h4wpss2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Power Moves: Lessons from Davos (Audible Audio Edition): Adam Grant, Adam Grant, Audible Originals: Audible Books &amp; Originals</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1591840937/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Small Giants: Companies That Choose to Be Great Instead of Big: 9781591840930: Burlingham, Bo: Books</a></li><li><a href="https://www.zingermanscommunity.com/?utm_source=mailorder&amp;utm_medium=zinglink&amp;utm_campaign=zcobbar" rel="noopener noreferrer" target="_blank">Zingerman's Community of Businesses - inside the center of the gastro-deli universe</a></li><li><a href="https://www.brainyquote.com/quotes/warren_buffett_383933" rel="noopener noreferrer" target="_blank">Warren Buffett - Only when the tide goes out do you...</a></li><li><a href="https://www.heidrick.com/en/insights/compensation-trends/2022-global-chief-information-security-officer-ciso-survey" rel="noopener noreferrer" target="_blank">2022 Global Chief Information Security Officer (CISO) Survey | Insights | Heidrick &amp; Struggles</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://www.entrepreneur.com/article/430590" rel="noopener noreferrer" target="_blank">How Listening Will Transform Your Leadership</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-43-new-team-who-dis]]></link><guid isPermaLink="false">d6cc611a-bbaa-4037-94df-be56158b382d</guid><itunes:image href="https://artwork.captivate.fm/63d3f073-e060-40e9-8b52-a527a6d99d34/cover.jpg"/><pubDate>Thu, 01 Sep 2022 13:30:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2b637952-dca2-4f81-ac77-b1efdf2933c4/d6cc611a-bbaa-4037-94df-be56158b382d.mp3" length="46013264" type="audio/mpeg"/><itunes:duration>01:01:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>43</itunes:episode><podcast:episode>43</podcast:episode><podcast:season>3</podcast:season></item><item><title>Subscribe and Don&apos;t Like!</title><itunes:title>Subscribe and Don&apos;t Like!</itunes:title><description><![CDATA[<p>Are we getting subscription overload?  The move to more and more subscriptions is good for those selling, but are they good for those buying, too?</p><ul><li><br></li><li>Do subscriptions offset by other non-cash costs (e.g. data collection, advertising) reduce subscription fatigue?  How does that fit into the security product world?  What are the risks of making security technology only for those that can't afford it?  Why are the ad-supported versions more heavily marketed than the no-ad versions?</li><li><br></li><li><br></li><li>How do subscriptions encourage continuous development of software and features?  What about innovation?</li><li><br></li><li><br></li><li>What's a persistent feature, and what can be revoked or shifted into a different subscription tier (take a look at Slack's recent move to make the free tier way less valuable and encourage the need to move to a paid tier)</li><li><br></li><li><br></li><li>Do the combinatoric vastness of features that can go on and off based on the subscriptions you buy introduce an unnecessary or unsafe risk of not working well together in specific combos?</li><li><br></li><li><br></li><li>What are the legalities of jailbreaking your software rather than paying to activate it by subscription?  How does doing so affect the liability and effectiveness of the product?</li><li><br></li></ul><br/><p>We also talk about some things unrelated to subscriptions (and cars)!</p><ul><li><br></li><li>What is needed to adapt your communications (and subscription sales pitch) to VC/PE vs the CIO/CISO at a company?  East coast vs west coast?  Etc. </li><li><br></li><li><br></li><li>Tips for job candidates on looking for public info on what a company thinks is important from security and risk (hint: it's SEC filings like the 8-K and 10-K!)</li><li><br></li></ul><br/><p>Tune in to delight as Dan rants in Yiddish and then mess up the name of some of the most popular movies of our time.  Enjoy seeing (or hearing) Erik get on a soapbox stumping for Sig Sigma.  Binge on Brian talking about automotive manufacturing (who knew) and for once not be broadcasting from a "train station".</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>If you're watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062292986/securitydebat-20" rel="noopener noreferrer" target="_blank">Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials): Moore, Geoffrey A.: 9780062353948: Amazon.com: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B0877D6H28/securitydebat-20" rel="noopener noreferrer" target="_blank">This Is How They Tell Me the World Ends: The Cyberweapons Arms Race - Kindle edition by Perlroth, Nicole. Politics &amp; Social Sciences Kindle eBooks @ Amazon.com.</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Are we getting subscription overload?  The move to more and more subscriptions is good for those selling, but are they good for those buying, too?</p><ul><li><br></li><li>Do subscriptions offset by other non-cash costs (e.g. data collection, advertising) reduce subscription fatigue?  How does that fit into the security product world?  What are the risks of making security technology only for those that can't afford it?  Why are the ad-supported versions more heavily marketed than the no-ad versions?</li><li><br></li><li><br></li><li>How do subscriptions encourage continuous development of software and features?  What about innovation?</li><li><br></li><li><br></li><li>What's a persistent feature, and what can be revoked or shifted into a different subscription tier (take a look at Slack's recent move to make the free tier way less valuable and encourage the need to move to a paid tier)</li><li><br></li><li><br></li><li>Do the combinatoric vastness of features that can go on and off based on the subscriptions you buy introduce an unnecessary or unsafe risk of not working well together in specific combos?</li><li><br></li><li><br></li><li>What are the legalities of jailbreaking your software rather than paying to activate it by subscription?  How does doing so affect the liability and effectiveness of the product?</li><li><br></li></ul><br/><p>We also talk about some things unrelated to subscriptions (and cars)!</p><ul><li><br></li><li>What is needed to adapt your communications (and subscription sales pitch) to VC/PE vs the CIO/CISO at a company?  East coast vs west coast?  Etc. </li><li><br></li><li><br></li><li>Tips for job candidates on looking for public info on what a company thinks is important from security and risk (hint: it's SEC filings like the 8-K and 10-K!)</li><li><br></li></ul><br/><p>Tune in to delight as Dan rants in Yiddish and then mess up the name of some of the most popular movies of our time.  Enjoy seeing (or hearing) Erik get on a soapbox stumping for Sig Sigma.  Binge on Brian talking about automotive manufacturing (who knew) and for once not be broadcasting from a "train station".</p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>If you're watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062292986/securitydebat-20" rel="noopener noreferrer" target="_blank">Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials): Moore, Geoffrey A.: 9780062353948: Amazon.com: Books</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B0877D6H28/securitydebat-20" rel="noopener noreferrer" target="_blank">This Is How They Tell Me the World Ends: The Cyberweapons Arms Race - Kindle edition by Perlroth, Nicole. Politics &amp; Social Sciences Kindle eBooks @ Amazon.com.</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-42-subscribe-and-dont-like]]></link><guid isPermaLink="false">d9993736-e18a-4d68-92cb-11edf2f5cd36</guid><itunes:image href="https://artwork.captivate.fm/321f7669-8f1b-4695-9ec3-0fae0b92269f/cover.jpg"/><pubDate>Thu, 18 Aug 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/da8b148b-5973-4a77-ae6f-c855fc2906ec/d9993736-e18a-4d68-92cb-11edf2f5cd36.mp3" length="49851828" type="audio/mpeg"/><itunes:duration>01:06:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:season>3</podcast:season><itunes:summary>Are we getting subscription overload?  The move to more and more subscriptions is good for those selling, but are they good for those buying, too?



Do subscriptions offset by other non-cash costs (e.g. data collection, advertising) reduce subscription fatigue?  How does that fit into the security product world?  What are the risks of making security technology only for those that can&amp;#39;t afford it?  Why are the ad-supported versions more heavily marketed than the no-ad versions?

How do subscriptions encourage continuous development of software and features?  What about innovation?

What&amp;#39;s a persistent feature, and what can be revoked or shifted into a different subscription tier (take a look at Slack&amp;#39;s recent move to make the free tier way less valuable and encourage the need to move to a paid tier)

Do the combinatoric vastness of features that can go on and off based on the subscriptions you buy introduce an unnecessary or unsafe risk of not working well together in specific combos?

What are the legalities of jailbreaking your software rather than paying to activate it by subscription?  How does doing so affect the liability and effectiveness of the product?



We also talk about some things unrelated to subscriptions (and cars)!



What is needed to adapt your communications (and subscription sales pitch) to VC/PE vs the CIO/CISO at a company?  East coast vs west coast?  Etc. 

Tips for job candidates on looking for public info on what a company thinks is important from security and risk (hint: it&amp;#39;s SEC filings like the 8-K and 10-K!)



Tune in to delight as Dan rants in Yiddish and then mess up the name of some of the most popular movies of our time.  Enjoy seeing (or hearing) Erik get on a soapbox stumping for Sig Sigma.  Binge on Brian talking about automotive manufacturing (who knew) and for once not be broadcasting from a &amp;quot;train station&amp;quot;.


We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head over to https://bit.ly/gsdyoutube (https://bit.ly/gsdyoutube) and watch, subscribe and &amp;quot;like&amp;quot; the episodes.


If you&amp;#39;re watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai


Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.


Thanks for listening!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
http://www.amazon.com/exec/obidos/ASIN/0062292986/securitydebat-20 (Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials): Moore, Geoffrey A.: 9780062353948: Amazon.com: Books)
http://www.amazon.com/exec/obidos/ASIN/B0877D6H28/securitydebat-20 (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race - Kindle edition by Perlroth, Nicole. Politics &amp; Social Sciences Kindle eBooks @ Amazon.com.)</itunes:summary></item><item><title>Fake It Till You Make It?</title><itunes:title>Fake It Till You Make It?</itunes:title><description><![CDATA[<p>It's the dog days of summer here in the northern hemisphere, and we have some episodes to make the hot, muggy days go by faster (or the drive up to the cabin in the woods to escape it all).</p><p>This week Dan, Brian and Erik talk about what it takes to be a Virtual or Fractional CISO. Does someone that calls themselves one need to have had in-house CISO experience to do the job? Or do the fresh perspectives of someone that doesn't come with history benefit the organisation in a different way? Risks, challenges, and talking to Boards of Directors definitely have a strong place in the debate (and we hit on all of them)</p><p>We will be back with more episodes through August and then back to our usual bi-weekly pace as we hit the autumn. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>If you're watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://twitter.com/browninfosecguy/status/1531666982562562048" rel="noopener noreferrer" target="_blank">Sonny 🇨🇦❄️⚓ on Twitter: "WTF is this ??? #CyberSecurity #InfoSec https://t.co/DLHivTJ9Qw" / Twitter</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1635576059/securitydebat-20" rel="noopener noreferrer" target="_blank">This Is How They Tell Me the World Ends: The Cyberweapons Arms Race: Perlroth, Nicole: 9781635576054: Amazon.com: Books</a></li><li><a href="https://www.securelyyoursllc.com/sajay-rai/" rel="noopener noreferrer" target="_blank">Sajay Rai — Securely Yours LLCSecurely Yours LLC</a></li><li><a href="https://www.linkedin.com/in/sajay-rai-cpa-cissp-cism-72244/" rel="noopener noreferrer" target="_blank">Sajay Rai CPA, CISSP, CISM | LinkedIn</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1250067057/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon - Extreme Ownership: How U.S. Navy SEALs Lead and Win: Willink, Jocko, Babin, Leif: 9781250067050: Books</a></li><li><a href="https://rafeeqrehman.com/2022/04/24/ciso-mindmap-2022-what-do-infosec-professionals-really-do/" rel="noopener noreferrer" target="_blank">CISO MindMap 2022: What do InfoSec Professionals really do?Rafeeq Rehman | Cyber | Automation | Digital</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>It's the dog days of summer here in the northern hemisphere, and we have some episodes to make the hot, muggy days go by faster (or the drive up to the cabin in the woods to escape it all).</p><p>This week Dan, Brian and Erik talk about what it takes to be a Virtual or Fractional CISO. Does someone that calls themselves one need to have had in-house CISO experience to do the job? Or do the fresh perspectives of someone that doesn't come with history benefit the organisation in a different way? Risks, challenges, and talking to Boards of Directors definitely have a strong place in the debate (and we hit on all of them)</p><p>We will be back with more episodes through August and then back to our usual bi-weekly pace as we hit the autumn. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>If you're watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://twitter.com/browninfosecguy/status/1531666982562562048" rel="noopener noreferrer" target="_blank">Sonny 🇨🇦❄️⚓ on Twitter: "WTF is this ??? #CyberSecurity #InfoSec https://t.co/DLHivTJ9Qw" / Twitter</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1635576059/securitydebat-20" rel="noopener noreferrer" target="_blank">This Is How They Tell Me the World Ends: The Cyberweapons Arms Race: Perlroth, Nicole: 9781635576054: Amazon.com: Books</a></li><li><a href="https://www.securelyyoursllc.com/sajay-rai/" rel="noopener noreferrer" target="_blank">Sajay Rai — Securely Yours LLCSecurely Yours LLC</a></li><li><a href="https://www.linkedin.com/in/sajay-rai-cpa-cissp-cism-72244/" rel="noopener noreferrer" target="_blank">Sajay Rai CPA, CISSP, CISM | LinkedIn</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1250067057/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon - Extreme Ownership: How U.S. Navy SEALs Lead and Win: Willink, Jocko, Babin, Leif: 9781250067050: Books</a></li><li><a href="https://rafeeqrehman.com/2022/04/24/ciso-mindmap-2022-what-do-infosec-professionals-really-do/" rel="noopener noreferrer" target="_blank">CISO MindMap 2022: What do InfoSec Professionals really do?Rafeeq Rehman | Cyber | Automation | Digital</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-41-fake-it-till-you-make-it]]></link><guid isPermaLink="false">0af2dbc6-7bcb-4eae-9ecd-c2b05a939c72</guid><itunes:image href="https://artwork.captivate.fm/7b87d58a-cb0b-42b6-ae84-2a6f6fcd5960/cover.jpg"/><pubDate>Wed, 03 Aug 2022 13:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1857f7fa-1c3c-4cab-82fb-99990578e8d4/0af2dbc6-7bcb-4eae-9ecd-c2b05a939c72.mp3" length="44761775" type="audio/mpeg"/><itunes:duration>59:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:season>3</podcast:season><itunes:summary>It&amp;#39;s the dog days of summer here in the northern hemisphere, and we have some episodes to make the hot, muggy days go by faster (or the drive up to the cabin in the woods to escape it all).


This week Dan, Brian and Erik talk about what it takes to be a Virtual or Fractional CISO. Does someone that calls themselves one need to have had in-house CISO experience to do the job? Or do the fresh perspectives of someone that doesn&amp;#39;t come with history benefit the organisation in a different way? Risks, challenges, and talking to Boards of Directors definitely have a strong place in the debate (and we hit on all of them)


We will be back with more episodes through August and then back to our usual bi-weekly pace as we hit the autumn. 


We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head over to https://bit.ly/gsdyoutube (https://bit.ly/gsdyoutube) and watch, subscribe and &amp;quot;like&amp;quot; the episodes.


If you&amp;#39;re watching on YouTube, we are very sorry for the video sync issues this week! The sound is great, but one of our hosts does a very poor Milli Vanilli impression. We are writing up the root cause analysis documents and issuing CAPAs to keep it from happening agai


Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.


Thanks for listening!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://twitter.com/browninfosecguy/status/1531666982562562048 (Sonny 🇨🇦❄️⚓ on Twitter: &quot;WTF is this ??? #CyberSecurity #InfoSec https://t.co/DLHivTJ9Qw&quot; / Twitter)
http://www.amazon.com/exec/obidos/ASIN/1635576059/securitydebat-20 (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race: Perlroth, Nicole: 9781635576054: Amazon.com: Books)
https://www.securelyyoursllc.com/sajay-rai/ (Sajay Rai — Securely Yours LLCSecurely Yours LLC)
https://www.linkedin.com/in/sajay-rai-cpa-cissp-cism-72244/ (Sajay Rai CPA, CISSP, CISM | LinkedIn)
http://www.amazon.com/exec/obidos/ASIN/1250067057/securitydebat-20 (Amazon - Extreme Ownership: How U.S. Navy SEALs Lead and Win: Willink, Jocko, Babin, Leif: 9781250067050: Books)
https://rafeeqrehman.com/2022/04/24/ciso-mindmap-2022-what-do-infosec-professionals-really-do/ (CISO MindMap 2022: What do InfoSec Professionals really do?Rafeeq Rehman | Cyber | Automation | Digital)</itunes:summary></item><item><title>What Got You Here Won’t (Necessarily) Get You There</title><itunes:title>What Got You Here Won’t (Necessarily) Get You There</itunes:title><description><![CDATA[<p>Dan, Brian and Erik look at how the past informs our security future, and how things we have done in the past may not get us where we need to be in the future. Join us for a live podcast recording with live audience Q&amp;A, direct from the MCWT Executive Connection Summit.</p><p>In the live recording we covered a flurry of topics focused on changing ourselves, refreshing ourselves and renewing ourselves including:</p><ul><li><br></li><li>The barriers to entry to get into the security field</li><li><br></li><li><br></li><li>Experience vs. education requirements in security hiring</li><li><br></li><li><br></li><li>Changes afoot in hiring appetite as recession looms</li><li><br></li><li><br></li><li>Reporting requirements by public companies on breach or security events</li><li><br></li><li><br></li><li>Security beyond just confidentiality</li><li><br></li><li><br></li><li>Improvements that can be made to the hiring process</li><li><br></li><li><br></li><li>And lots more!</li><li><br></li></ul><br/><p>Huge thanks to the wonderful team at the Michigan Council on Women in Technology (<a href="https://mcwt.org" rel="noopener noreferrer" target="_blank">https://mcwt.org</a>) for asking us to be part of this great event bringing the Michigan technology community together to build connections. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Books - Amazon</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B00G3L0ZTQ/securitydebat-20" rel="noopener noreferrer" target="_blank">Leaders Eat Last Deluxe: Why Some Teams Pull Together and Others Don't eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6927955505902497792/" rel="noopener noreferrer" target="_blank">Marcus Stefanide - LinkedIn Post</a></li><li><a href="https://www.bio-itworldexpo.com/" rel="noopener noreferrer" target="_blank">Bio-IT World Conference &amp; Expo 2022 In Person &amp; Virtual</a></li><li><a href="https://www.forrester.com/blogs/author/jess_burn/" rel="noopener noreferrer" target="_blank">Jess Burn · Forrester</a></li><li><a href="https://techcrunch.com/2022/05/05/apple-google-microsoft-passwordless-logins/" rel="noopener noreferrer" target="_blank">Apple, Google and Microsoft team up on passwordless logins | TechCrunch</a></li><li><a href="https://www.sec.gov/news/press-release/2021-239" rel="noopener noreferrer" target="_blank">SEC.gov | SEC Proposes Rule to Provide Transparency in the Securities Lending Market</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0804171459/securitydebat-20" rel="noopener noreferrer" target="_blank">Future Crimes: Inside the Digital Underground and the Battle for Our Connected World: Goodman, Marc: 9780804171458: Books</a></li><li><a href="https://rafeeqrehman.com/2022/04/30/ciso-mindmap-2022-recommendations/" rel="noopener noreferrer" target="_blank">CISO MindMap 2022 - RecommendationsRafeeq Rehman | Cyber | Automation | Digital</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Dan, Brian and Erik look at how the past informs our security future, and how things we have done in the past may not get us where we need to be in the future. Join us for a live podcast recording with live audience Q&amp;A, direct from the MCWT Executive Connection Summit.</p><p>In the live recording we covered a flurry of topics focused on changing ourselves, refreshing ourselves and renewing ourselves including:</p><ul><li><br></li><li>The barriers to entry to get into the security field</li><li><br></li><li><br></li><li>Experience vs. education requirements in security hiring</li><li><br></li><li><br></li><li>Changes afoot in hiring appetite as recession looms</li><li><br></li><li><br></li><li>Reporting requirements by public companies on breach or security events</li><li><br></li><li><br></li><li>Security beyond just confidentiality</li><li><br></li><li><br></li><li>Improvements that can be made to the hiring process</li><li><br></li><li><br></li><li>And lots more!</li><li><br></li></ul><br/><p>Huge thanks to the wonderful team at the Michigan Council on Women in Technology (<a href="https://mcwt.org" rel="noopener noreferrer" target="_blank">https://mcwt.org</a>) for asking us to be part of this great event bringing the Michigan technology community together to build connections. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availability or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Books - Amazon</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B00G3L0ZTQ/securitydebat-20" rel="noopener noreferrer" target="_blank">Leaders Eat Last Deluxe: Why Some Teams Pull Together and Others Don't eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6927955505902497792/" rel="noopener noreferrer" target="_blank">Marcus Stefanide - LinkedIn Post</a></li><li><a href="https://www.bio-itworldexpo.com/" rel="noopener noreferrer" target="_blank">Bio-IT World Conference &amp; Expo 2022 In Person &amp; Virtual</a></li><li><a href="https://www.forrester.com/blogs/author/jess_burn/" rel="noopener noreferrer" target="_blank">Jess Burn · Forrester</a></li><li><a href="https://techcrunch.com/2022/05/05/apple-google-microsoft-passwordless-logins/" rel="noopener noreferrer" target="_blank">Apple, Google and Microsoft team up on passwordless logins | TechCrunch</a></li><li><a href="https://www.sec.gov/news/press-release/2021-239" rel="noopener noreferrer" target="_blank">SEC.gov | SEC Proposes Rule to Provide Transparency in the Securities Lending Market</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0804171459/securitydebat-20" rel="noopener noreferrer" target="_blank">Future Crimes: Inside the Digital Underground and the Battle for Our Connected World: Goodman, Marc: 9780804171458: Books</a></li><li><a href="https://rafeeqrehman.com/2022/04/30/ciso-mindmap-2022-recommendations/" rel="noopener noreferrer" target="_blank">CISO MindMap 2022 - RecommendationsRafeeq Rehman | Cyber | Automation | Digital</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-40-what-got-you-here-wont-necessarily-get-you-there]]></link><guid isPermaLink="false">3034b96b-0de3-464a-a133-848fccb1d617</guid><itunes:image href="https://artwork.captivate.fm/9747b3d2-aa55-4259-bf33-09fa40bab369/cover.jpg"/><pubDate>Thu, 26 May 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/61f60d8f-d5ea-4bfe-8404-1338069ae3c4/3034b96b-0de3-464a-a133-848fccb1d617.mp3" length="34445721" type="audio/mpeg"/><itunes:duration>45:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:season>3</podcast:season></item><item><title>Program Your Program</title><itunes:title>Program Your Program</itunes:title><description><![CDATA[<p>This week on The Great Security Debate we have arrived at one of our favourite episodes of the year (and what is and will be an annual thing!) when Forrester Senior Analyst, Jess Burn, returns to the show to share this years recommendations for security programs. </p><p>An overarching theme of the report is to use the captital that the CISO has acquired over the past few years and build out your program to where it needs to be. AKA, “strike while the iron is hot”</p><p>More detailed topics including:</p><p><br></p><ul><li><br></li><li>Career paths and changes in comp methodology for security teams need to change</li><li><br></li><li><br></li><li>Security Awareness needs adjustment for work for anywhere</li><li><br></li><li><br></li><li>Minimum viable security - it’s definitely not just “barely secure”</li><li><br></li></ul><br/><p>And a reminder that Dan, Brian and Erik will be doing a live episode of the podcast at the upcoming Michigan Women in Technology ExecutiveManagement Conference on May 5 in Novi, Michigan. Tickets for the whole conference are now available (<a href="https://MCWT.org" rel="noopener noreferrer" target="_blank">https://MCWT.org</a>) and the agenda for the day is great. See you there</p><p><br></p><p>If you want to listen to Jess’s previous episode, check out Episode 20, “It All Comes Down To Relaltionships.” <a href="https://www.greatsecuritydebate.net/20" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/20</a></p><p><br></p><p>You can find Jess on LinkedIn (<a href="https://www.linkedin.com/in/jessburn" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jessburn</a>), Twitter (<a href="https://twitter.com/jess_burn_" rel="noopener noreferrer" target="_blank">https://twitter.com/jess_burn_</a>) and at the Forrester blog (<a href="https://go.forrester.com/blogs/author/jess_burn/" rel="noopener noreferrer" target="_blank">https://go.forrester.com/blogs/author/jess_burn/</a>). </p><p><br></p><p>Thanks for joining us, Jess!  And thanks to you for listening and watching.</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/" rel="noopener noreferrer" target="_blank">Forrester's 2022 Top Recommendations For Your Security Program</a></li><li><a href="https://www.forrester.com/blogs/the-return-of-the-cybersecurity-incident-response-services-wave/" rel="noopener noreferrer" target="_blank">The Return Of The Forrester Wave™: Cybersecurity Incident Response Services</a></li><li><a href="https://www.inputmag.com/tech/starlink-russian-jamming-attack-us-military-elon-musk-vladimir-putin" rel="noopener noreferrer" target="_blank">Starlink fought off Russian jamming attack faster than the military could</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>This week on The Great Security Debate we have arrived at one of our favourite episodes of the year (and what is and will be an annual thing!) when Forrester Senior Analyst, Jess Burn, returns to the show to share this years recommendations for security programs. </p><p>An overarching theme of the report is to use the captital that the CISO has acquired over the past few years and build out your program to where it needs to be. AKA, “strike while the iron is hot”</p><p>More detailed topics including:</p><p><br></p><ul><li><br></li><li>Career paths and changes in comp methodology for security teams need to change</li><li><br></li><li><br></li><li>Security Awareness needs adjustment for work for anywhere</li><li><br></li><li><br></li><li>Minimum viable security - it’s definitely not just “barely secure”</li><li><br></li></ul><br/><p>And a reminder that Dan, Brian and Erik will be doing a live episode of the podcast at the upcoming Michigan Women in Technology ExecutiveManagement Conference on May 5 in Novi, Michigan. Tickets for the whole conference are now available (<a href="https://MCWT.org" rel="noopener noreferrer" target="_blank">https://MCWT.org</a>) and the agenda for the day is great. See you there</p><p><br></p><p>If you want to listen to Jess’s previous episode, check out Episode 20, “It All Comes Down To Relaltionships.” <a href="https://www.greatsecuritydebate.net/20" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/20</a></p><p><br></p><p>You can find Jess on LinkedIn (<a href="https://www.linkedin.com/in/jessburn" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jessburn</a>), Twitter (<a href="https://twitter.com/jess_burn_" rel="noopener noreferrer" target="_blank">https://twitter.com/jess_burn_</a>) and at the Forrester blog (<a href="https://go.forrester.com/blogs/author/jess_burn/" rel="noopener noreferrer" target="_blank">https://go.forrester.com/blogs/author/jess_burn/</a>). </p><p><br></p><p>Thanks for joining us, Jess!  And thanks to you for listening and watching.</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/" rel="noopener noreferrer" target="_blank">Forrester's 2022 Top Recommendations For Your Security Program</a></li><li><a href="https://www.forrester.com/blogs/the-return-of-the-cybersecurity-incident-response-services-wave/" rel="noopener noreferrer" target="_blank">The Return Of The Forrester Wave™: Cybersecurity Incident Response Services</a></li><li><a href="https://www.inputmag.com/tech/starlink-russian-jamming-attack-us-military-elon-musk-vladimir-putin" rel="noopener noreferrer" target="_blank">Starlink fought off Russian jamming attack faster than the military could</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-39-program-your-program]]></link><guid isPermaLink="false">56367464-f5b9-4101-9d3e-54117115512a</guid><itunes:image href="https://artwork.captivate.fm/153c25aa-69f3-4325-9ea1-b7956fca63aa/cover.jpg"/><pubDate>Mon, 25 Apr 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1c43e728-9871-4d5b-bf5c-0c7740082341/56367464-f5b9-4101-9d3e-54117115512a.mp3" length="46885585" type="audio/mpeg"/><itunes:duration>01:02:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:season>3</podcast:season><itunes:summary>This week on The Great Security Debate we have arrived at one of our favourite episodes of the year (and what is and will be an annual thing!) when Forrester Senior Analyst, Jess Burn, returns to the show to share this years recommendations for security programs. 


An overarching theme of the report is to use the captital that the CISO has acquired over the past few years and build out your program to where it needs to be. AKA, “strike while the iron is hot”


More detailed topics including:



Career paths and changes in comp methodology for security teams need to change

Security Awareness needs adjustment for work for anywhere

Minimum viable security - it’s definitely not just “barely secure”



And a reminder that Dan, Brian and Erik will be doing a live episode of the podcast at the upcoming Michigan Women in Technology ExecutiveManagement Conference on May 5 in Novi, Michigan. Tickets for the whole conference are now available (https://MCWT.org (https://MCWT.org)) and the agenda for the day is great. See you there


If you want to listen to Jess’s previous episode, check out Episode 20, “It All Comes Down To Relaltionships.” https://www.greatsecuritydebate.net/20 (https://www.greatsecuritydebate.net/20)


You can find Jess on LinkedIn (https://www.linkedin.com/in/jessburn (https://www.linkedin.com/in/jessburn)), Twitter (https://twitter.com/jess_burn_ (https://twitter.com/jess_burn_)) and at the Forrester blog (https://go.forrester.com/blogs/author/jess_burn/ (https://go.forrester.com/blogs/author/jess_burn/)). 


Thanks for joining us, Jess!  And thanks to you for listening and watching.
Special Guest: Jessica Burn.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/ (Forrester&apos;s 2022 Top Recommendations For Your Security Program)
https://www.forrester.com/blogs/the-return-of-the-cybersecurity-incident-response-services-wave/ (The Return Of The Forrester Wave™: Cybersecurity Incident Response Services)
https://www.inputmag.com/tech/starlink-russian-jamming-attack-us-military-elon-musk-vladimir-putin (Starlink fought off Russian jamming attack faster than the military could)</itunes:summary></item><item><title>Laws and Regs</title><itunes:title>Laws and Regs</itunes:title><description><![CDATA[<p>The Great Security Debate rolls on, this week looking at how governments, regulations and business values are and will shape the security posture of enterprises.</p><ul><li><br></li><li>Is attribution worth pursuing to the end?</li><li><br></li><li><br></li><li>How can state and federal law enforcement help figure out who and what happened after an incident?</li><li><br></li><li><br></li><li>Fast (agile) vs good (quality) vs cheap (cost)</li><li><br></li><li><br></li><li>Are you chasing the right metrics in your organisation? Do they encourage the right behaviour?</li><li><br></li><li><br></li><li>Is regulation required to make good security a greater market force?</li><li><br></li><li><br></li><li>What will the regulations emerging in the US focus on? The “what”, the “why”, the “how”, or the “who”? How will they change when and how companies report material breaches?</li><li><br></li><li><br></li><li>How does attribution of attack correlate to insurance coverage? How do IR firms fit into the equation?</li><li><br></li></ul><br/><p>Erik, Dan and Brian also announce that the podcast is going LIVE and On the road. On May 5, Great Security Debate will be recording a live episode at the MCWT Executive Connection Summit in Novi, Michigan! More info and registration details are at <a href="https://mcwt.wildapricot.org/event-4630370" rel="noopener noreferrer" target="_blank">https://mcwt.wildapricot.org/event-4630370</a>. Ticket sales begin on 18 April 2022.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cisa.gov/" rel="noopener noreferrer" target="_blank">Homepage | CISA</a></li><li><a href="https://www.sec.gov/news/press-release/2022-39" rel="noopener noreferrer" target="_blank">SEC.gov | SEC Proposes Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</a></li><li><a href="https://thehill.com/policy/cybersecurity/596628-senate-passes-cybersecurity-bill-amid-fears-of-russian-cyberattacks/" rel="noopener noreferrer" target="_blank">Senate passes cybersecurity bill amid fears of Russian cyberattacks | The Hill</a></li><li><a href="https://futureconevents.com/" rel="noopener noreferrer" target="_blank">Cutting Edge Cybersecurity Event Experience - FutureCon Events</a></li><li><a href="https://www.scmagazine.com/analysis/breach/solarwinds-lawsuits-can-proceed-texas-judge-rules" rel="noopener noreferrer" target="_blank">Court denies SolarWinds bid to throw out breach lawsuit</a></li><li><a href="https://sharing.nih.gov/data-management-and-sharing-policy/about-the-data-management-sharing-policies" rel="noopener noreferrer" target="_blank">About the Data Management &amp; Sharing Policies | Data Sharing</a></li><li><a href="https://mcwt.wildapricot.org/event-4630370" rel="noopener noreferrer" target="_blank">MCWT Foundation - Executive Connection Summit</a></li><li><a href="https://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/" rel="noopener noreferrer" target="_blank">Forrester's 2022 Top Recommendations For Your Security Program</a></li><li><a href="https://www.actionnetwork.com/news/buffalo-wild-wings-mgm-sportsbook-partnership" rel="noopener noreferrer" target="_blank">Buffalo Wild Wings Partners With MGM, Will Encourage Sports Betting in Restaurants | The Action Network</a></li><li><a href="https://sharing.nih.gov/data-management-and-sharing-policy" rel="noopener noreferrer" target="_blank">Data Management and Sharing Policy | Data Sharing</a></li><li><a href="https://www.greatsecuritydebate.net/20" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 20: It All Comes Down to Relationships (Guest Debater: Jessica Burn)</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The Great Security Debate rolls on, this week looking at how governments, regulations and business values are and will shape the security posture of enterprises.</p><ul><li><br></li><li>Is attribution worth pursuing to the end?</li><li><br></li><li><br></li><li>How can state and federal law enforcement help figure out who and what happened after an incident?</li><li><br></li><li><br></li><li>Fast (agile) vs good (quality) vs cheap (cost)</li><li><br></li><li><br></li><li>Are you chasing the right metrics in your organisation? Do they encourage the right behaviour?</li><li><br></li><li><br></li><li>Is regulation required to make good security a greater market force?</li><li><br></li><li><br></li><li>What will the regulations emerging in the US focus on? The “what”, the “why”, the “how”, or the “who”? How will they change when and how companies report material breaches?</li><li><br></li><li><br></li><li>How does attribution of attack correlate to insurance coverage? How do IR firms fit into the equation?</li><li><br></li></ul><br/><p>Erik, Dan and Brian also announce that the podcast is going LIVE and On the road. On May 5, Great Security Debate will be recording a live episode at the MCWT Executive Connection Summit in Novi, Michigan! More info and registration details are at <a href="https://mcwt.wildapricot.org/event-4630370" rel="noopener noreferrer" target="_blank">https://mcwt.wildapricot.org/event-4630370</a>. Ticket sales begin on 18 April 2022.</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cisa.gov/" rel="noopener noreferrer" target="_blank">Homepage | CISA</a></li><li><a href="https://www.sec.gov/news/press-release/2022-39" rel="noopener noreferrer" target="_blank">SEC.gov | SEC Proposes Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</a></li><li><a href="https://thehill.com/policy/cybersecurity/596628-senate-passes-cybersecurity-bill-amid-fears-of-russian-cyberattacks/" rel="noopener noreferrer" target="_blank">Senate passes cybersecurity bill amid fears of Russian cyberattacks | The Hill</a></li><li><a href="https://futureconevents.com/" rel="noopener noreferrer" target="_blank">Cutting Edge Cybersecurity Event Experience - FutureCon Events</a></li><li><a href="https://www.scmagazine.com/analysis/breach/solarwinds-lawsuits-can-proceed-texas-judge-rules" rel="noopener noreferrer" target="_blank">Court denies SolarWinds bid to throw out breach lawsuit</a></li><li><a href="https://sharing.nih.gov/data-management-and-sharing-policy/about-the-data-management-sharing-policies" rel="noopener noreferrer" target="_blank">About the Data Management &amp; Sharing Policies | Data Sharing</a></li><li><a href="https://mcwt.wildapricot.org/event-4630370" rel="noopener noreferrer" target="_blank">MCWT Foundation - Executive Connection Summit</a></li><li><a href="https://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/" rel="noopener noreferrer" target="_blank">Forrester's 2022 Top Recommendations For Your Security Program</a></li><li><a href="https://www.actionnetwork.com/news/buffalo-wild-wings-mgm-sportsbook-partnership" rel="noopener noreferrer" target="_blank">Buffalo Wild Wings Partners With MGM, Will Encourage Sports Betting in Restaurants | The Action Network</a></li><li><a href="https://sharing.nih.gov/data-management-and-sharing-policy" rel="noopener noreferrer" target="_blank">Data Management and Sharing Policy | Data Sharing</a></li><li><a href="https://www.greatsecuritydebate.net/20" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 20: It All Comes Down to Relationships (Guest Debater: Jessica Burn)</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-38-laws-and-regs]]></link><guid isPermaLink="false">2d2e1bcc-c921-4486-90c3-8418a13b095d</guid><itunes:image href="https://artwork.captivate.fm/34c53e8a-6610-4a7f-b66c-b7eab9034054/cover.jpg"/><pubDate>Wed, 13 Apr 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4d8d73eb-3d4e-4d70-b738-8c35b9ac073c/2d2e1bcc-c921-4486-90c3-8418a13b095d-converted.mp3" length="86713810" type="audio/mpeg"/><itunes:duration>45:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:season>3</podcast:season></item><item><title>Squality!</title><itunes:title>Squality!</itunes:title><description><![CDATA[<p>Recently, Brian, Dan and Erik had the great fortune to do a live version of the podcast at the monthly meeting of the SIM Detroit Chapter (<a href="https://chapter.simnet.org/detroit/home" rel="noopener noreferrer" target="_blank">https://chapter.simnet.org/detroit/home</a>). At the close of that discussion, the comment was raised as to whether or not security should be used as a competitive advantage by businesses. The topic seemed perfect for The Great Security Debate, so here we are.  In this episode, we cover:</p><ul><li><br></li><li>Can security be used as a business differentiator?</li><li><br></li><li><br></li><li>SHOULD security be used as a business differentiator?</li><li><br></li><li><br></li><li>If security is added too deeply into the sales cycle does it incentivise the wrong behaviours just to make a sale?</li><li><br></li><li><br></li><li>How can we quantify the value of security in the purchasing process when it is not easily attributable to direct cost saving or value?</li><li><br></li><li><br></li><li>How do closed systems compare to open systems with regard to security?</li><li><br></li><li><br></li><li>How does the rise of customer trust as a key organisational focus indicate the use of security as a business differentiator?</li><li><br></li><li><br></li><li>Do the fears that using security as a differentiator means that the collaborative nature and history of security will disappear?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.natlawreview.com/article/sec-proposes-cybersecurity-rules-public-companies" rel="noopener noreferrer" target="_blank">SEC Proposes Cybersecurity Rules for Public Companies</a></li><li><a href="https://www.tuvsud.com/en/services/auditing-and-system-certification/tisax" rel="noopener noreferrer" target="_blank">TISAX: Information security for the automotive industry | TÜV SÜD</a></li><li><a href="https://en.wikipedia.org/wiki/Failure_mode_and_effects_analysis" rel="noopener noreferrer" target="_blank">Failure mode and effects analysis - Wikipedia</a></li><li><a href="https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/" rel="noopener noreferrer" target="_blank">Bridgestone Americas confirms ransomware attack, LockBit leaks data</a></li><li><a href="https://www.fairinstitute.org/" rel="noopener noreferrer" target="_blank">Quantitative Information Risk Management | The FAIR Institute</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1541773837/securitydebat-20" rel="noopener noreferrer" target="_blank">Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat: Carlin, John P.: 9781541773837: Amazon.com: Books</a></li><li><a href="https://www.cnbc.com/2021/07/22/saudi-aramco-facing-50m-cyber-extortion-over-leaked-data.html" rel="noopener noreferrer" target="_blank">Saudi Aramco facing $50 million cyber extortion over leaked data</a></li><li><a href="https://www.theregister.com/2022/03/11/conti_leaks_code/" rel="noopener noreferrer" target="_blank">Leaked Conti files reveal life inside ransomware gang • The Register</a></li><li><a href="https://www.dnb.com/business-directory/company-profiles.kojima_industries_corporation.a78c258b38794f6a3172f5dffd70731d.html" rel="noopener noreferrer" target="_blank">KOJIMA INDUSTRIES CORPORATION Company Profile | TOYOTA, AICHI, Japan | Competitors, Financials &amp; Contacts - Dun &amp; Bradstreet</a></li><li><a href="https://library.educause.edu/resources/2020/4/higher-education-community-vendor-assessment-toolkit" rel="noopener noreferrer" target="_blank">Higher Education Community Vendor Assessment Toolkit | EDUCAUSE</a></li><li><a href="https://corltech.com/" rel="noopener noreferrer" target="_blank">Home Page – CORL Technologies</a></li><li><a href="https://cyturus.com/" rel="noopener noreferrer" target="_blank">Home – Cyturus</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://automotiveisac.com/auto-isac-summit-2021/" rel="noopener noreferrer" target="_blank">Auto-ISAC Summit 2021 – Auto-ISAC</a></li><li><a href="https://sso.tax/" rel="noopener noreferrer" target="_blank">The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.</a></li><li><a href="https://www.greatsecuritydebate.net/" rel="noopener noreferrer" target="_blank">The Great Security Debate</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Recently, Brian, Dan and Erik had the great fortune to do a live version of the podcast at the monthly meeting of the SIM Detroit Chapter (<a href="https://chapter.simnet.org/detroit/home" rel="noopener noreferrer" target="_blank">https://chapter.simnet.org/detroit/home</a>). At the close of that discussion, the comment was raised as to whether or not security should be used as a competitive advantage by businesses. The topic seemed perfect for The Great Security Debate, so here we are.  In this episode, we cover:</p><ul><li><br></li><li>Can security be used as a business differentiator?</li><li><br></li><li><br></li><li>SHOULD security be used as a business differentiator?</li><li><br></li><li><br></li><li>If security is added too deeply into the sales cycle does it incentivise the wrong behaviours just to make a sale?</li><li><br></li><li><br></li><li>How can we quantify the value of security in the purchasing process when it is not easily attributable to direct cost saving or value?</li><li><br></li><li><br></li><li>How do closed systems compare to open systems with regard to security?</li><li><br></li><li><br></li><li>How does the rise of customer trust as a key organisational focus indicate the use of security as a business differentiator?</li><li><br></li><li><br></li><li>Do the fears that using security as a differentiator means that the collaborative nature and history of security will disappear?</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.natlawreview.com/article/sec-proposes-cybersecurity-rules-public-companies" rel="noopener noreferrer" target="_blank">SEC Proposes Cybersecurity Rules for Public Companies</a></li><li><a href="https://www.tuvsud.com/en/services/auditing-and-system-certification/tisax" rel="noopener noreferrer" target="_blank">TISAX: Information security for the automotive industry | TÜV SÜD</a></li><li><a href="https://en.wikipedia.org/wiki/Failure_mode_and_effects_analysis" rel="noopener noreferrer" target="_blank">Failure mode and effects analysis - Wikipedia</a></li><li><a href="https://www.bleepingcomputer.com/news/security/bridgestone-americas-confirms-ransomware-attack-lockbit-leaks-data/" rel="noopener noreferrer" target="_blank">Bridgestone Americas confirms ransomware attack, LockBit leaks data</a></li><li><a href="https://www.fairinstitute.org/" rel="noopener noreferrer" target="_blank">Quantitative Information Risk Management | The FAIR Institute</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1541773837/securitydebat-20" rel="noopener noreferrer" target="_blank">Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat: Carlin, John P.: 9781541773837: Amazon.com: Books</a></li><li><a href="https://www.cnbc.com/2021/07/22/saudi-aramco-facing-50m-cyber-extortion-over-leaked-data.html" rel="noopener noreferrer" target="_blank">Saudi Aramco facing $50 million cyber extortion over leaked data</a></li><li><a href="https://www.theregister.com/2022/03/11/conti_leaks_code/" rel="noopener noreferrer" target="_blank">Leaked Conti files reveal life inside ransomware gang • The Register</a></li><li><a href="https://www.dnb.com/business-directory/company-profiles.kojima_industries_corporation.a78c258b38794f6a3172f5dffd70731d.html" rel="noopener noreferrer" target="_blank">KOJIMA INDUSTRIES CORPORATION Company Profile | TOYOTA, AICHI, Japan | Competitors, Financials &amp; Contacts - Dun &amp; Bradstreet</a></li><li><a href="https://library.educause.edu/resources/2020/4/higher-education-community-vendor-assessment-toolkit" rel="noopener noreferrer" target="_blank">Higher Education Community Vendor Assessment Toolkit | EDUCAUSE</a></li><li><a href="https://corltech.com/" rel="noopener noreferrer" target="_blank">Home Page – CORL Technologies</a></li><li><a href="https://cyturus.com/" rel="noopener noreferrer" target="_blank">Home – Cyturus</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://automotiveisac.com/auto-isac-summit-2021/" rel="noopener noreferrer" target="_blank">Auto-ISAC Summit 2021 – Auto-ISAC</a></li><li><a href="https://sso.tax/" rel="noopener noreferrer" target="_blank">The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.</a></li><li><a href="https://www.greatsecuritydebate.net/" rel="noopener noreferrer" target="_blank">The Great Security Debate</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-37-squality]]></link><guid isPermaLink="false">1bbd3d48-737f-40c5-9256-dbf55d63ac84</guid><itunes:image href="https://artwork.captivate.fm/a5a5150c-271b-4477-93ab-0f935b88c5ec/cover.jpg"/><pubDate>Tue, 29 Mar 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/434a04fe-2ee0-4ead-8b8a-d0c3b6daafaf/1bbd3d48-737f-40c5-9256-dbf55d63ac84.mp3" length="48952301" type="audio/mpeg"/><itunes:duration>01:05:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:season>3</podcast:season></item><item><title>How Do You Sleep At Night?</title><itunes:title>How Do You Sleep At Night?</itunes:title><description><![CDATA[<p>Current global events have led to increased focus on technology security. In this week's episode we debate to what extent this does or will confirm the rise of the information security roles within organisations. Our thoughts and good wishes go out to the people of Ukraine.</p><ul><li><br></li><li>Do current events confirm that the rise of the CISO organisation was warranted?</li><li><br></li><li><br></li><li>How do CISOs sleep at night considering everything going on?</li><li><br></li><li><br></li><li>How to reply to the question “what else should we be doing?”</li><li><br></li><li><br></li><li>Are the attacks the primary objective or are they a smokescreen?</li><li><br></li><li><br></li><li>How does the game of chess tie into to information security practises?</li><li><br></li><li><br></li><li>What is the CISOs role in reducing FUD (fear, uncertainty, doubt)?</li><li><br></li><li><br></li><li>Will current information  it pay for acts of war? Does it raise our collective stature?</li><li><br></li><li><br></li><li>Why is humility so important in the information security world?</li><li><br></li></ul><br/><p>The underlying message is that while it is late in the process now to do all the steps to protect your organisation, it’s never too late to get started!</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/" rel="noopener noreferrer" target="_blank">HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine - SentinelOne</a></li><li><a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/" rel="noopener noreferrer" target="_blank">The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B07GD4MFW2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers eBook : Greenberg, Andy: Kindle Store</a></li><li><a href="https://www.cnbc.com/2022/02/27/elon-musk-says-spacexs-internet-service-is-available-in-ukraine.html" rel="noopener noreferrer" target="_blank">Elon Musk says SpaceX's internet service is available in Ukraine</a></li><li><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-057a" rel="noopener noreferrer" target="_blank">Destructive Malware Targeting Organizations in Ukraine | CISA</a></li><li><a href="https://en.wikipedia.org/wiki/Morris_worm" rel="noopener noreferrer" target="_blank">Morris worm - Wikipedia</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079L5N2TC/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat eBook : Carlin, John P., Graff, Garrett M.: Kindle Store</a></li><li><a href="https://en.wikipedia.org/wiki/Moonlight_Maze" rel="noopener noreferrer" target="_blank">Moonlight Maze - Wikipedia</a></li><li><a href="https://arstechnica.com/information-technology/2017/05/new-shadow-brokers-0day-subscription-forces-high-risk-gamble-on-whitehats/" rel="noopener noreferrer" target="_blank">New Shadow Brokers 0-day subscription forces high-risk gamble on whitehats | Ars Technica</a></li><li><a href="https://arstechnica.com/information-technology/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/" rel="noopener noreferrer" target="_blank">An NSA-derived ransomware worm is shutting down computers worldwide | Ars Technica</a></li><li><a href="https://www.first.org/" rel="noopener noreferrer" target="_blank">FIRST - Improving Security Together</a></li><li><a href="https://www.scmagazine.com/news/apt/conti-ransomware-group-announces-support-for-russian-invasion-of-ukraine-threatens-retaliation" rel="noopener noreferrer" target="_blank">Conti ransomware group announces support for Russian invasion of Ukraine, threatens retaliation</a></li><li><a href="https://www.reuters.com/article/us-cyber-attack-maersk-idUSKBN19I1NO" rel="noopener noreferrer" target="_blank">Maersk says global IT breakdown caused by cyber attack | Reuters</a></li><li><a href="https://github.com/Netflix/chaosmonkey" rel="noopener noreferrer" target="_blank">GitHub - Netflix/chaosmonkey: Chaos Monkey is a resiliency tool that helps applications tolerate random instance failures.</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Current global events have led to increased focus on technology security. In this week's episode we debate to what extent this does or will confirm the rise of the information security roles within organisations. Our thoughts and good wishes go out to the people of Ukraine.</p><ul><li><br></li><li>Do current events confirm that the rise of the CISO organisation was warranted?</li><li><br></li><li><br></li><li>How do CISOs sleep at night considering everything going on?</li><li><br></li><li><br></li><li>How to reply to the question “what else should we be doing?”</li><li><br></li><li><br></li><li>Are the attacks the primary objective or are they a smokescreen?</li><li><br></li><li><br></li><li>How does the game of chess tie into to information security practises?</li><li><br></li><li><br></li><li>What is the CISOs role in reducing FUD (fear, uncertainty, doubt)?</li><li><br></li><li><br></li><li>Will current information  it pay for acts of war? Does it raise our collective stature?</li><li><br></li><li><br></li><li>Why is humility so important in the information security world?</li><li><br></li></ul><br/><p>The underlying message is that while it is late in the process now to do all the steps to protect your organisation, it’s never too late to get started!</p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/" rel="noopener noreferrer" target="_blank">HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine - SentinelOne</a></li><li><a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/" rel="noopener noreferrer" target="_blank">The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B07GD4MFW2/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers eBook : Greenberg, Andy: Kindle Store</a></li><li><a href="https://www.cnbc.com/2022/02/27/elon-musk-says-spacexs-internet-service-is-available-in-ukraine.html" rel="noopener noreferrer" target="_blank">Elon Musk says SpaceX's internet service is available in Ukraine</a></li><li><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-057a" rel="noopener noreferrer" target="_blank">Destructive Malware Targeting Organizations in Ukraine | CISA</a></li><li><a href="https://en.wikipedia.org/wiki/Morris_worm" rel="noopener noreferrer" target="_blank">Morris worm - Wikipedia</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079L5N2TC/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat eBook : Carlin, John P., Graff, Garrett M.: Kindle Store</a></li><li><a href="https://en.wikipedia.org/wiki/Moonlight_Maze" rel="noopener noreferrer" target="_blank">Moonlight Maze - Wikipedia</a></li><li><a href="https://arstechnica.com/information-technology/2017/05/new-shadow-brokers-0day-subscription-forces-high-risk-gamble-on-whitehats/" rel="noopener noreferrer" target="_blank">New Shadow Brokers 0-day subscription forces high-risk gamble on whitehats | Ars Technica</a></li><li><a href="https://arstechnica.com/information-technology/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/" rel="noopener noreferrer" target="_blank">An NSA-derived ransomware worm is shutting down computers worldwide | Ars Technica</a></li><li><a href="https://www.first.org/" rel="noopener noreferrer" target="_blank">FIRST - Improving Security Together</a></li><li><a href="https://www.scmagazine.com/news/apt/conti-ransomware-group-announces-support-for-russian-invasion-of-ukraine-threatens-retaliation" rel="noopener noreferrer" target="_blank">Conti ransomware group announces support for Russian invasion of Ukraine, threatens retaliation</a></li><li><a href="https://www.reuters.com/article/us-cyber-attack-maersk-idUSKBN19I1NO" rel="noopener noreferrer" target="_blank">Maersk says global IT breakdown caused by cyber attack | Reuters</a></li><li><a href="https://github.com/Netflix/chaosmonkey" rel="noopener noreferrer" target="_blank">GitHub - Netflix/chaosmonkey: Chaos Monkey is a resiliency tool that helps applications tolerate random instance failures.</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-36-how-do-you-sleep-at-night]]></link><guid isPermaLink="false">cf1422b5-0a7b-4595-a1f3-e9df90db752d</guid><itunes:image href="https://artwork.captivate.fm/e7cea978-c03a-407d-a982-a78445c7280e/cover.jpg"/><pubDate>Mon, 28 Feb 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/28d62b41-2e2f-43d3-b861-c505407fdf2e/cf1422b5-0a7b-4595-a1f3-e9df90db752d.mp3" length="48067535" type="audio/mpeg"/><itunes:duration>01:04:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:season>3</podcast:season></item><item><title>Security Super Agent</title><itunes:title>Security Super Agent</itunes:title><description><![CDATA[<p>This week’s episode was sparked by a recent TechCrunch article <a href="https://techcrunch.com/2022/02/01/free-agent-series-a/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/02/01/free-agent-series-a/</a> asking whether tech workers should have agents to negotiate their salaries. We took up the debate on this and a few adjacent topics including:</p><ul><li><br></li><li>The Great Resignation’s impact on working habits</li><li><br></li><li><br></li><li>Should security practitioners and leaders be represented by “agents” to negotiate better compensation for roles? </li><li><br></li><li><br></li><li>What are the ways that formal agents exacerbate bias and increase the gaps between levels?</li><li><br></li><li><br></li><li>The importance of networks for getting advice to help you be your own “agent”</li><li><br></li><li><br></li><li>Is it the Great Resignation or the Great Realisation?</li><li><br></li><li><br></li><li>How do ethics and values play into staff’s desire to go to or stay at a company?</li><li><br></li><li><br></li><li>At different levels in one’s career who can help be your agent of change? We should not be afraid to talk about our salaries and numbers</li><li><br></li></ul><br/><p>And yes, those are Pączki on Brian’s hat. If you are not sure what this about, take a look at the video version on our YouTube channel <a href="https://www.youtube.com/watch?v=CAYRL1flZic" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=CAYRL1flZic</a></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://techcrunch.com/2022/02/01/free-agent-series-a/" rel="noopener noreferrer" target="_blank">TechCrunch</a></li><li><a href="https://hbr.org/2021/09/who-is-driving-the-great-resignation" rel="noopener noreferrer" target="_blank">Who Is Driving the Great Resignation?</a></li><li><a href="https://www.npr.org/sections/money/2022/01/25/1075115539/the-great-resignation-more-like-the-great-renegotiation" rel="noopener noreferrer" target="_blank">The Great Resignation looks more like The Great Renegotiation : Planet Money : NPR</a></li><li><a href="https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-serves-all-americans" rel="noopener noreferrer" target="_blank">Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans’ | Business Roundtable</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Amazon.com: Books</a></li><li><a href="https://www.forbes.com/profile/scott-boras/?sh=395226476637" rel="noopener noreferrer" target="_blank">Scott Boras</a></li><li><a href="https://thenewstack.io/how-to-negotiate-the-tech-salary-you-deserve/" rel="noopener noreferrer" target="_blank">How to Negotiate the Tech Salary You Deserve – The New Stack</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B00NHQGVES/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Lego Movie 70819 Bad Cop Car Chase : Toys &amp; Games</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B002UM5BXW/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Kitchen Confidential: Adventures in the Culinary Underbelly eBook : Bourdain, Anthony: Kindle Store</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://cloudsecurityalliance.org/" rel="noopener noreferrer" target="_blank">Home | CSA</a></li><li><a href="https://abcnews.go.com/Technology/wireStory/google-work-ford-detroit-research-hub-82668255" rel="noopener noreferrer" target="_blank">Google to work with Ford on Detroit research hub - ABC News</a></li><li><a href="https://www.youtube.com/watch?v=aDVfgtZdcL0" rel="noopener noreferrer" target="_blank">Fun Fact | Undeniably Dairy - YouTube</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>This week’s episode was sparked by a recent TechCrunch article <a href="https://techcrunch.com/2022/02/01/free-agent-series-a/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/02/01/free-agent-series-a/</a> asking whether tech workers should have agents to negotiate their salaries. We took up the debate on this and a few adjacent topics including:</p><ul><li><br></li><li>The Great Resignation’s impact on working habits</li><li><br></li><li><br></li><li>Should security practitioners and leaders be represented by “agents” to negotiate better compensation for roles? </li><li><br></li><li><br></li><li>What are the ways that formal agents exacerbate bias and increase the gaps between levels?</li><li><br></li><li><br></li><li>The importance of networks for getting advice to help you be your own “agent”</li><li><br></li><li><br></li><li>Is it the Great Resignation or the Great Realisation?</li><li><br></li><li><br></li><li>How do ethics and values play into staff’s desire to go to or stay at a company?</li><li><br></li><li><br></li><li>At different levels in one’s career who can help be your agent of change? We should not be afraid to talk about our salaries and numbers</li><li><br></li></ul><br/><p>And yes, those are Pączki on Brian’s hat. If you are not sure what this about, take a look at the video version on our YouTube channel <a href="https://www.youtube.com/watch?v=CAYRL1flZic" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=CAYRL1flZic</a></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://techcrunch.com/2022/02/01/free-agent-series-a/" rel="noopener noreferrer" target="_blank">TechCrunch</a></li><li><a href="https://hbr.org/2021/09/who-is-driving-the-great-resignation" rel="noopener noreferrer" target="_blank">Who Is Driving the Great Resignation?</a></li><li><a href="https://www.npr.org/sections/money/2022/01/25/1075115539/the-great-resignation-more-like-the-great-renegotiation" rel="noopener noreferrer" target="_blank">The Great Resignation looks more like The Great Renegotiation : Planet Money : NPR</a></li><li><a href="https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-serves-all-americans" rel="noopener noreferrer" target="_blank">Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans’ | Business Roundtable</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Amazon.com: Books</a></li><li><a href="https://www.forbes.com/profile/scott-boras/?sh=395226476637" rel="noopener noreferrer" target="_blank">Scott Boras</a></li><li><a href="https://thenewstack.io/how-to-negotiate-the-tech-salary-you-deserve/" rel="noopener noreferrer" target="_blank">How to Negotiate the Tech Salary You Deserve – The New Stack</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B00NHQGVES/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Lego Movie 70819 Bad Cop Car Chase : Toys &amp; Games</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B002UM5BXW/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Kitchen Confidential: Adventures in the Culinary Underbelly eBook : Bourdain, Anthony: Kindle Store</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://cloudsecurityalliance.org/" rel="noopener noreferrer" target="_blank">Home | CSA</a></li><li><a href="https://abcnews.go.com/Technology/wireStory/google-work-ford-detroit-research-hub-82668255" rel="noopener noreferrer" target="_blank">Google to work with Ford on Detroit research hub - ABC News</a></li><li><a href="https://www.youtube.com/watch?v=aDVfgtZdcL0" rel="noopener noreferrer" target="_blank">Fun Fact | Undeniably Dairy - YouTube</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-35-security-super-agent]]></link><guid isPermaLink="false">765716cd-c922-431b-8aa7-0ef0633207e6</guid><itunes:image href="https://artwork.captivate.fm/6f7cc56a-b0b1-475d-98d7-c6c85e3f61ce/cover.jpg"/><pubDate>Tue, 15 Feb 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/931b8211-a42d-42ac-b72f-86061b78da75/765716cd-c922-431b-8aa7-0ef0633207e6.mp3" length="46381513" type="audio/mpeg"/><itunes:duration>01:02:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:season>3</podcast:season></item><item><title>From the Inside Out</title><itunes:title>From the Inside Out</itunes:title><description><![CDATA[<p>We got a message from a listener asking for some discussion about putting the data first and securing it with that mind - the inside out, rather than looking at the perimeter and infrastructure and working back toward the data - outside in.</p><p>And since we love our listeners and your feedback, we took the chance to cover this topic in depth. In the process we also covered:</p><ul><li><br></li><li>Data Loss Prevention - Is it possible to improve this without the painful data classification, startup work or culture change?</li><li><br></li><li><br></li><li>When doing data analysis for attacks (or fraud) you have to account for the fraud already baked in the normal you know today</li><li><br></li><li><br></li><li>We can’t meaningfully count on IP address for geography…thanks to security asking for more use of VPNs </li><li><br></li><li><br></li><li>The pros and cons and risks to ponder when securing data in on premise vs. cloud/SaaS arrangements</li><li><br></li><li><br></li><li>When is the right time to establish a security team in a growing company?  And how bad will the data sprawl be when they arrive?</li><li><br></li><li><br></li><li>Will the CTO/CIO and the CISO merge into a single role? Will the CIO report to the CISO eventually? It depends, of course, on the people and the organisation</li><li><br></li><li><br></li><li>Controls today may not be the controls we need for tomorrow</li><li><br></li><li><br></li><li>We try to secure things, but there’s also important value in good use of data to improve a business</li><li><br></li><li><br></li><li>Sunk cost fallacy and Security: when to burn it all down and start over</li><li><br></li><li><br></li><li>Audit is the best friend of the CISO: a new set of eyes and accountability partner makes all the difference</li><li><br></li></ul><br/><p>Dan also goes on a small tirade over the way security professionals use the term “the business” as something distinct from the security team that is absolutely part of the business itself. Enjoy that soapbox moment. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://secratic.com/2021/08/26/the-security-of-cloud-and-saas-in-2021/" rel="noopener noreferrer" target="_blank">The Security of Cloud Services and SaaS in 2021 – Part 1 – Secratic</a></li><li><a href="https://www.greatsecuritydebate.net/33" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 33: Log4Jelly of the Month Club</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://amzn.to/33GqEIV" rel="noopener noreferrer" target="_blank">Amazon.com: Rocket Fuel: The One Essential Combination That Will Get You More of What You Want from Your Business: 9781942952312: Wickman, Gino, Winters, Mark C.: Books</a></li><li><a href="https://thedecisionlab.com/biases/the-sunk-cost-fallacy/" rel="noopener noreferrer" target="_blank">The Sunk Cost Fallacy - The Decision Lab</a></li><li><a href="https://amzn.to/3zZRMP0" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://amzn.to/3ftHJbG" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li><li><a href="https://apple.news/AyS34pxaCS9OT5YvhkczXOQ" rel="noopener noreferrer" target="_blank">How Emotionally Intelligent People Use the 'Emergency Exit Rule' to Win Almost Every Argument</a></li><li><a href="https://www.darkreading.com/careers-and-people/why-cios-should-be-reporting-to-cisos" rel="noopener noreferrer" target="_blank">Why CIOs Should Report to CISOs</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>We got a message from a listener asking for some discussion about putting the data first and securing it with that mind - the inside out, rather than looking at the perimeter and infrastructure and working back toward the data - outside in.</p><p>And since we love our listeners and your feedback, we took the chance to cover this topic in depth. In the process we also covered:</p><ul><li><br></li><li>Data Loss Prevention - Is it possible to improve this without the painful data classification, startup work or culture change?</li><li><br></li><li><br></li><li>When doing data analysis for attacks (or fraud) you have to account for the fraud already baked in the normal you know today</li><li><br></li><li><br></li><li>We can’t meaningfully count on IP address for geography…thanks to security asking for more use of VPNs </li><li><br></li><li><br></li><li>The pros and cons and risks to ponder when securing data in on premise vs. cloud/SaaS arrangements</li><li><br></li><li><br></li><li>When is the right time to establish a security team in a growing company?  And how bad will the data sprawl be when they arrive?</li><li><br></li><li><br></li><li>Will the CTO/CIO and the CISO merge into a single role? Will the CIO report to the CISO eventually? It depends, of course, on the people and the organisation</li><li><br></li><li><br></li><li>Controls today may not be the controls we need for tomorrow</li><li><br></li><li><br></li><li>We try to secure things, but there’s also important value in good use of data to improve a business</li><li><br></li><li><br></li><li>Sunk cost fallacy and Security: when to burn it all down and start over</li><li><br></li><li><br></li><li>Audit is the best friend of the CISO: a new set of eyes and accountability partner makes all the difference</li><li><br></li></ul><br/><p>Dan also goes on a small tirade over the way security professionals use the term “the business” as something distinct from the security team that is absolutely part of the business itself. Enjoy that soapbox moment. </p><p><br></p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><br></p><p>Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.</p><p><br></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://secratic.com/2021/08/26/the-security-of-cloud-and-saas-in-2021/" rel="noopener noreferrer" target="_blank">The Security of Cloud Services and SaaS in 2021 – Part 1 – Secratic</a></li><li><a href="https://www.greatsecuritydebate.net/33" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 33: Log4Jelly of the Month Club</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://amzn.to/33GqEIV" rel="noopener noreferrer" target="_blank">Amazon.com: Rocket Fuel: The One Essential Combination That Will Get You More of What You Want from Your Business: 9781942952312: Wickman, Gino, Winters, Mark C.: Books</a></li><li><a href="https://thedecisionlab.com/biases/the-sunk-cost-fallacy/" rel="noopener noreferrer" target="_blank">The Sunk Cost Fallacy - The Decision Lab</a></li><li><a href="https://amzn.to/3zZRMP0" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://amzn.to/3ftHJbG" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li><li><a href="https://apple.news/AyS34pxaCS9OT5YvhkczXOQ" rel="noopener noreferrer" target="_blank">How Emotionally Intelligent People Use the 'Emergency Exit Rule' to Win Almost Every Argument</a></li><li><a href="https://www.darkreading.com/careers-and-people/why-cios-should-be-reporting-to-cisos" rel="noopener noreferrer" target="_blank">Why CIOs Should Report to CISOs</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-34-from-the-inside-out]]></link><guid isPermaLink="false">54ef91b4-4fa9-4394-a481-08a1fcafc977</guid><itunes:image href="https://artwork.captivate.fm/fe13e98d-f812-4860-a556-a4ab2f7402bd/cover.jpg"/><pubDate>Thu, 20 Jan 2022 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4539b1e4-aec5-48bc-9827-0667151056f3/54ef91b4-4fa9-4394-a481-08a1fcafc977.mp3" length="48533081" type="audio/mpeg"/><itunes:duration>01:05:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:season>3</podcast:season></item><item><title>Log4Jelly of the Month Club</title><itunes:title>Log4Jelly of the Month Club</itunes:title><description><![CDATA[<p>Some say that Log4J is the gift that keeps on giving, much like the Jelly of the Month Club. After the initial surge of discussion a couple weeks ago there were mitigations, a vaccine and multiple iterations of official patches to keep the issue at bay and the new ones that cropped up afterwards. Brian, Dan and Erik discuss the log4j vulnerability as it relates to enterprise systems, supportability, balancing the risk of patching and the ways that open-source software are used within the enterprise.</p><p>Join us this week as we cover:</p><ul><li><br></li><li>The Log4J vulnerability and saga in a nutshell</li><li><br></li><li><br></li><li>The pros and cons of waiting to patch until there's a stable one vs. patching again with each iteration and risk my system's stability</li><li><br></li><li><br></li><li>The critical need for system and application (and library) inventory and keeping up to date</li><li><br></li><li><br></li><li>How best to react when the media and public discussion picks up on a vulnerability and causes a stir</li><li><br></li><li><br></li><li>The challenges in the flurry of email and surveys from and to SaaS and service providers about their state on the vulnerability of the day</li><li><br></li><li><br></li><li>What is the cost of "free" when it comes to running (and maintaining) open source software like Log4j</li><li><br></li><li><br></li><li>How to make sure procurement departments are not just involved but include the risks of procurement decisions into the process</li><li><br></li><li><br></li><li>Are the external capability assessments like SOC2 able to move beyond perfunctory review by those asking for them</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cybereason.com/blog/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228" rel="noopener noreferrer" target="_blank">UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)</a></li><li><a href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md" rel="noopener noreferrer" target="_blank">log4j-affected-db/SOFTWARE-LIST.md at develop · cisagov/log4j-affected-db · GitHub</a></li><li><a href="https://www.wired.com/story/log4j-flaw-hacking-internet/" rel="noopener noreferrer" target="_blank">A Log4J Vulnerability Has Set the Internet 'On Fire' | WIRED</a></li><li><a href="https://www.wsj.com/articles/china-halts-alibaba-cybersecurity-cooperation-for-slow-reporting-of-threat-state-media-says-11640184511" rel="noopener noreferrer" target="_blank">Alibaba Employee First Spotted Log4j Software Flaw but Now the Company Is in Hot Water With Beijing - WSJ</a></li><li><a href="https://meltdownattack.com/" rel="noopener noreferrer" target="_blank">Meltdown and Spectre</a></li><li><a href="https://arstechnica.com/information-technology/2021/12/hackers-launch-over-840000-attacks-through-log4j-flaw/" rel="noopener noreferrer" target="_blank">Hackers launch over 840,000 attacks through Log4J flaw | Ars Technica</a></li><li><a href="https://kanbanize.com/lean-management/improvement/5-whys-analysis-tool" rel="noopener noreferrer" target="_blank">5 Whys: The Ultimate Root Cause Analysis Tool</a></li><li><a href="https://www.theguardian.com/world/2021/dec/03/us-state-department-officials-iphones-hacked-nso-group-spyware" rel="noopener noreferrer" target="_blank">NSO Group spyware used to hack at least nine US officials’ phones – report | Surveillance | The Guardian</a></li><li><a href="https://www.technologyreview.com/2021/12/17/1042692/log4j-internet-open-source-hacking/" rel="noopener noreferrer" target="_blank">The internet runs on free open-source software. Who pays to fix it? | MIT Technology Review</a></li><li><a href="https://www.merriam-webster.com/dictionary/perfunctory" rel="noopener noreferrer" target="_blank">Perfunctory Definition &amp; Meaning - Merriam-Webster</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Some say that Log4J is the gift that keeps on giving, much like the Jelly of the Month Club. After the initial surge of discussion a couple weeks ago there were mitigations, a vaccine and multiple iterations of official patches to keep the issue at bay and the new ones that cropped up afterwards. Brian, Dan and Erik discuss the log4j vulnerability as it relates to enterprise systems, supportability, balancing the risk of patching and the ways that open-source software are used within the enterprise.</p><p>Join us this week as we cover:</p><ul><li><br></li><li>The Log4J vulnerability and saga in a nutshell</li><li><br></li><li><br></li><li>The pros and cons of waiting to patch until there's a stable one vs. patching again with each iteration and risk my system's stability</li><li><br></li><li><br></li><li>The critical need for system and application (and library) inventory and keeping up to date</li><li><br></li><li><br></li><li>How best to react when the media and public discussion picks up on a vulnerability and causes a stir</li><li><br></li><li><br></li><li>The challenges in the flurry of email and surveys from and to SaaS and service providers about their state on the vulnerability of the day</li><li><br></li><li><br></li><li>What is the cost of "free" when it comes to running (and maintaining) open source software like Log4j</li><li><br></li><li><br></li><li>How to make sure procurement departments are not just involved but include the risks of procurement decisions into the process</li><li><br></li><li><br></li><li>Are the external capability assessments like SOC2 able to move beyond perfunctory review by those asking for them</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cybereason.com/blog/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228" rel="noopener noreferrer" target="_blank">UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)</a></li><li><a href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md" rel="noopener noreferrer" target="_blank">log4j-affected-db/SOFTWARE-LIST.md at develop · cisagov/log4j-affected-db · GitHub</a></li><li><a href="https://www.wired.com/story/log4j-flaw-hacking-internet/" rel="noopener noreferrer" target="_blank">A Log4J Vulnerability Has Set the Internet 'On Fire' | WIRED</a></li><li><a href="https://www.wsj.com/articles/china-halts-alibaba-cybersecurity-cooperation-for-slow-reporting-of-threat-state-media-says-11640184511" rel="noopener noreferrer" target="_blank">Alibaba Employee First Spotted Log4j Software Flaw but Now the Company Is in Hot Water With Beijing - WSJ</a></li><li><a href="https://meltdownattack.com/" rel="noopener noreferrer" target="_blank">Meltdown and Spectre</a></li><li><a href="https://arstechnica.com/information-technology/2021/12/hackers-launch-over-840000-attacks-through-log4j-flaw/" rel="noopener noreferrer" target="_blank">Hackers launch over 840,000 attacks through Log4J flaw | Ars Technica</a></li><li><a href="https://kanbanize.com/lean-management/improvement/5-whys-analysis-tool" rel="noopener noreferrer" target="_blank">5 Whys: The Ultimate Root Cause Analysis Tool</a></li><li><a href="https://www.theguardian.com/world/2021/dec/03/us-state-department-officials-iphones-hacked-nso-group-spyware" rel="noopener noreferrer" target="_blank">NSO Group spyware used to hack at least nine US officials’ phones – report | Surveillance | The Guardian</a></li><li><a href="https://www.technologyreview.com/2021/12/17/1042692/log4j-internet-open-source-hacking/" rel="noopener noreferrer" target="_blank">The internet runs on free open-source software. Who pays to fix it? | MIT Technology Review</a></li><li><a href="https://www.merriam-webster.com/dictionary/perfunctory" rel="noopener noreferrer" target="_blank">Perfunctory Definition &amp; Meaning - Merriam-Webster</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-33-log4jelly-of-the-month-club]]></link><guid isPermaLink="false">32f4acbf-bfd0-4122-857b-999f4624d1c9</guid><itunes:image href="https://artwork.captivate.fm/6396a5c9-5664-416c-b8f4-260b198ef9b5/cover.jpg"/><pubDate>Mon, 03 Jan 2022 14:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/723bb80c-be59-4ca6-9716-8ebe05ec702d/32f4acbf-bfd0-4122-857b-999f4624d1c9.mp3" length="47524194" type="audio/mpeg"/><itunes:duration>01:03:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>3</itunes:season><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:season>3</podcast:season></item><item><title>Sweet or Suite?</title><itunes:title>Sweet or Suite?</itunes:title><description><![CDATA[<p>It's a sports analogy-filled episode of The Great Security Debate, but don't let that scare you away. This week, we cover a whole host of topics, primarily focused on the ideas of simple vs. complex and best-of-breed vs. tightly integrated when dealing with technology, change, process or securing your environment. </p><ul><li><br></li><li>Pace of change in security is ridiculous right now</li><li><br></li><li><br></li><li>How does reducing complexity and technical debt improve security and technology?</li><li><br></li><li><br></li><li>(Said differently: simplicity is the heart of good security)</li><li><br></li><li><br></li><li>Tech is nothing without process or people (see <a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">Episode 29 - People Process and Product</a>) </li><li><br></li><li><br></li><li>Can security vendors be everything to everyone?  In what environments do "suites" give better security balance than "best of breed"?</li><li><br></li><li><br></li><li>What are the risks and benefits of a set of suite technologies vs. best of breed?</li><li><br></li><li><br></li><li>How does securing your organisation parallel with American Football?</li><li><br></li><li><br></li><li>What's changing in how we buy technology (and security technology)? Shorter contracts, even if it means less "savings"?</li><li><br></li><li><br></li><li>Should we invest in security technology heavily up front to win one battle at all costs, or plan for the long-term war?</li><li><br></li></ul><br/><p>Note that all American Football references were to games that had not yet been played at the time of recording. Congratulations, University of Michigan Wolverines on winning the Big Ten championship later that evening. </p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 29: People, Process and Product</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062060244/securitydebat-20" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li><li><a href="https://en.wikipedia.org/wiki/A_rising_tide_lifts_all_boats" rel="noopener noreferrer" target="_blank">A rising tide lifts all boats - Wikipedia</a></li><li><a href="https://www.youtube.com/watch?v=PTs6UY1G9wM" rel="noopener noreferrer" target="_blank">Progressive Insurance Commercial - How Not To Become Your Parents</a></li><li><a href="https://www.dailywire.com/news/agent-scott-boras-rips-mlb-system-following-braves-world-series-win" rel="noopener noreferrer" target="_blank">Agent Scott Boras Rips MLB System Following Braves World Series Win | The Daily Wire</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0739342231/securitydebat-20" rel="noopener noreferrer" target="_blank">What Got You Here Won't Get You There: How Successful People Become Even More Successful: Goldsmith, Marshall, Reiter, Mark, Goldsmith, Marshall: 9780739342237: Amazon.com: Books</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>It's a sports analogy-filled episode of The Great Security Debate, but don't let that scare you away. This week, we cover a whole host of topics, primarily focused on the ideas of simple vs. complex and best-of-breed vs. tightly integrated when dealing with technology, change, process or securing your environment. </p><ul><li><br></li><li>Pace of change in security is ridiculous right now</li><li><br></li><li><br></li><li>How does reducing complexity and technical debt improve security and technology?</li><li><br></li><li><br></li><li>(Said differently: simplicity is the heart of good security)</li><li><br></li><li><br></li><li>Tech is nothing without process or people (see <a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">Episode 29 - People Process and Product</a>) </li><li><br></li><li><br></li><li>Can security vendors be everything to everyone?  In what environments do "suites" give better security balance than "best of breed"?</li><li><br></li><li><br></li><li>What are the risks and benefits of a set of suite technologies vs. best of breed?</li><li><br></li><li><br></li><li>How does securing your organisation parallel with American Football?</li><li><br></li><li><br></li><li>What's changing in how we buy technology (and security technology)? Shorter contracts, even if it means less "savings"?</li><li><br></li><li><br></li><li>Should we invest in security technology heavily up front to win one battle at all costs, or plan for the long-term war?</li><li><br></li></ul><br/><p>Note that all American Football references were to games that had not yet been played at the time of recording. Congratulations, University of Michigan Wolverines on winning the Big Ten championship later that evening. </p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 29: People, Process and Product</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0062060244/securitydebat-20" rel="noopener noreferrer" target="_blank">The Innovator's Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books</a></li><li><a href="https://en.wikipedia.org/wiki/A_rising_tide_lifts_all_boats" rel="noopener noreferrer" target="_blank">A rising tide lifts all boats - Wikipedia</a></li><li><a href="https://www.youtube.com/watch?v=PTs6UY1G9wM" rel="noopener noreferrer" target="_blank">Progressive Insurance Commercial - How Not To Become Your Parents</a></li><li><a href="https://www.dailywire.com/news/agent-scott-boras-rips-mlb-system-following-braves-world-series-win" rel="noopener noreferrer" target="_blank">Agent Scott Boras Rips MLB System Following Braves World Series Win | The Daily Wire</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0739342231/securitydebat-20" rel="noopener noreferrer" target="_blank">What Got You Here Won't Get You There: How Successful People Become Even More Successful: Goldsmith, Marshall, Reiter, Mark, Goldsmith, Marshall: 9780739342237: Amazon.com: Books</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-32-sweet-or-suite]]></link><guid isPermaLink="false">3e216c50-e4e4-4149-914d-cea02a165498</guid><itunes:image href="https://artwork.captivate.fm/39800eb2-4d18-4781-bce1-f29434a6f38a/cover.jpg"/><pubDate>Mon, 06 Dec 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ede78802-a752-4f24-8105-02279d2486c6/3e216c50-e4e4-4149-914d-cea02a165498.mp3" length="46207932" type="audio/mpeg"/><itunes:duration>55:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:season>2</podcast:season><itunes:summary>It&amp;#39;s a sports analogy-filled episode of The Great Security Debate, but don&amp;#39;t let that scare you away. This week, we cover a whole host of topics, primarily focused on the ideas of simple vs. complex and best-of-breed vs. tightly integrated when dealing with technology, change, process or securing your environment. 



Pace of change in security is ridiculous right now

How does reducing complexity and technical debt improve security and technology?

(Said differently: simplicity is the heart of good security)

Tech is nothing without process or people (see https://www.greatsecuritydebate.net/29 (Episode 29 - People Process and Product)) 

Can security vendors be everything to everyone?  In what environments do &amp;quot;suites&amp;quot; give better security balance than &amp;quot;best of breed&amp;quot;?

What are the risks and benefits of a set of suite technologies vs. best of breed?

How does securing your organisation parallel with American Football?

What&amp;#39;s changing in how we buy technology (and security technology)? Shorter contracts, even if it means less &amp;quot;savings&amp;quot;?

Should we invest in security technology heavily up front to win one battle at all costs, or plan for the long-term war?



Note that all American Football references were to games that had not yet been played at the time of recording. Congratulations, University of Michigan Wolverines on winning the Big Ten championship later that evening. 


We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head over to https://bit.ly/gsdyoutube (https://bit.ly/gsdyoutube) and watch, subscribe and &amp;quot;like&amp;quot; the episodes.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.greatsecuritydebate.net/29 (The Great Security Debate Episode 29: People, Process and Product)
http://www.amazon.com/exec/obidos/ASIN/0062060244/securitydebat-20 (The Innovator&apos;s Dilemma: The Revolutionary Book That Will Change the Way You Do Business: Christensen, Clayton M.: 8601300047348: Amazon.com: Books)
https://en.wikipedia.org/wiki/A_rising_tide_lifts_all_boats (A rising tide lifts all boats - Wikipedia)
https://www.youtube.com/watch?v=PTs6UY1G9wM (Progressive Insurance Commercial - How Not To Become Your Parents)
https://www.dailywire.com/news/agent-scott-boras-rips-mlb-system-following-braves-world-series-win (Agent Scott Boras Rips MLB System Following Braves World Series Win | The Daily Wire)
http://www.amazon.com/exec/obidos/ASIN/0739342231/securitydebat-20 (What Got You Here Won&apos;t Get You There: How Successful People Become Even More Successful: Goldsmith, Marshall, Reiter, Mark, Goldsmith, Marshall: 9780739342237: Amazon.com: Books)</itunes:summary></item><item><title>The Infinite Game</title><itunes:title>The Infinite Game</itunes:title><description><![CDATA[<p>In security (and elsewhere) the long game is often overlooked in lieu of short-term advances and accomplishments. From building security into the culture of an organisation to setting goals and objectives for leaders and staff, being strategic in your security approach is critical.</p><p>In this episode we cover:</p><ul><li><br></li><li>How to balance an organisation's drive to shareholder value over the short term with the need to invest strategically in security, privacy and compliance</li><li><br></li><li><br></li><li> What are we doing wrong by throwing technology alone at security problems (and not looking at the process or people issues along the way)</li><li><br></li><li><br></li><li> Does proceduralising security or training up staff reduce the efficiency of the organisation or set up the org for longer-term efficiency?</li><li><br></li><li><br></li><li> Degrees vs. experience? And the ever deteriorating definition of "entry level"</li><li><br></li><li><br></li><li> The impact and importance of building the time in to train entry-level staff vs. hiring "ready now" experienced people (if you can find them at all)</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Amazon.com: Books</a></li><li><a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 29: People, Process and Product</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li><li><a href="https://www.gao.gov/assets/gao-22-105024.pdf" rel="noopener noreferrer" target="_blank">Education Should Take Additional Steps to Help Protect K-12 Schools from Cyber Threats</a></li><li><a href="https://www.infodocket.com/" rel="noopener noreferrer" target="_blank">Library Journal INFOdocket — Information Industry News from Gary Price</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0804136661/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Third Door: The Wild Quest to Uncover How the World's Most Successful People Launched Their Careers: 9780804136662: Banayan, Alex: Books</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>In security (and elsewhere) the long game is often overlooked in lieu of short-term advances and accomplishments. From building security into the culture of an organisation to setting goals and objectives for leaders and staff, being strategic in your security approach is critical.</p><p>In this episode we cover:</p><ul><li><br></li><li>How to balance an organisation's drive to shareholder value over the short term with the need to invest strategically in security, privacy and compliance</li><li><br></li><li><br></li><li> What are we doing wrong by throwing technology alone at security problems (and not looking at the process or people issues along the way)</li><li><br></li><li><br></li><li> Does proceduralising security or training up staff reduce the efficiency of the organisation or set up the org for longer-term efficiency?</li><li><br></li><li><br></li><li> Degrees vs. experience? And the ever deteriorating definition of "entry level"</li><li><br></li><li><br></li><li> The impact and importance of building the time in to train entry-level staff vs. hiring "ready now" experienced people (if you can find them at all)</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20" rel="noopener noreferrer" target="_blank">The Infinite Game: Sinek, Simon: 9780735213500: Amazon.com: Books</a></li><li><a href="https://www.greatsecuritydebate.net/29" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 29: People, Process and Product</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation</a></li><li><a href="https://www.gao.gov/assets/gao-22-105024.pdf" rel="noopener noreferrer" target="_blank">Education Should Take Additional Steps to Help Protect K-12 Schools from Cyber Threats</a></li><li><a href="https://www.infodocket.com/" rel="noopener noreferrer" target="_blank">Library Journal INFOdocket — Information Industry News from Gary Price</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/0804136661/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Third Door: The Wild Quest to Uncover How the World's Most Successful People Launched Their Careers: 9780804136662: Banayan, Alex: Books</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-31-the-infinite-game]]></link><guid isPermaLink="false">d0c109e8-9651-4678-9004-782a41aabf9f</guid><itunes:image href="https://artwork.captivate.fm/978425c2-8d30-4dfa-aba6-81312d6e7a78/cover.jpg"/><pubDate>Mon, 15 Nov 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/61a144d3-0353-467b-86cc-e669f7137ab1/d0c109e8-9651-4678-9004-782a41aabf9f.mp3" length="49937086" type="audio/mpeg"/><itunes:duration>01:00:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:season>2</podcast:season><itunes:summary>In security (and elsewhere) the long game is often overlooked in lieu of short-term advances and accomplishments. From building security into the culture of an organisation to setting goals and objectives for leaders and staff, being strategic in your security approach is critical.


In this episode we cover:



How to balance an organisation&amp;#39;s drive to shareholder value over the short term with the need to invest strategically in security, privacy and compliance

 What are we doing wrong by throwing technology alone at security problems (and not looking at the process or people issues along the way)

 Does proceduralising security or training up staff reduce the efficiency of the organisation or set up the org for longer-term efficiency?

 Degrees vs. experience? And the ever deteriorating definition of &amp;quot;entry level&amp;quot;

 The impact and importance of building the time in to train entry-level staff vs. hiring &amp;quot;ready now&amp;quot; experienced people (if you can find them at all)



We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head over to https://bit.ly/gsdyoutube (https://bit.ly/gsdyoutube) and watch, subscribe and &amp;quot;like&amp;quot; the episodes.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
http://www.amazon.com/exec/obidos/ASIN/073521350X/securitydebat-20 (The Infinite Game: Sinek, Simon: 9780735213500: Amazon.com: Books)
https://www.greatsecuritydebate.net/29 (The Great Security Debate Episode 29: People, Process and Product)
https://mcwt.org/ (Michigan Council of Women in Technology Foundation / Michigan council of women in technology foundation)
https://www.gao.gov/assets/gao-22-105024.pdf (Education Should Take Additional Steps to Help Protect K-12 Schools from Cyber Threats)
https://www.infodocket.com/ (Library Journal INFOdocket — Information Industry News from Gary Price)
http://www.amazon.com/exec/obidos/ASIN/0804136661/securitydebat-20 (Amazon.com: The Third Door: The Wild Quest to Uncover How the World&apos;s Most Successful People Launched Their Careers: 9780804136662: Banayan, Alex: Books)</itunes:summary></item><item><title>Monkeys On Your Back</title><itunes:title>Monkeys On Your Back</itunes:title><description><![CDATA[<p>Security has truly gone mainstream. From late night television jokes to state governors not knowing how technology works, as a profession and a vocation, we have arrived.</p><ul><li><br></li><li>Jimmy Fallon has jokes about security on his show</li><li><br></li><li><br></li><li>What are the implications of out of date security laws that define what it is to “hack” systems? Keep in mind that some were written as much as 30+ years ago!</li><li><br></li><li><br></li><li>Is it security’s job to know all the tools in place? Or the business to approach security to help make their tools secure?</li><li><br></li><li><br></li><li>Is viewing publicly available information or information pushed to your browser actually hacking, or is it legal/OK?</li><li><br></li><li><br></li><li>Creating laws that stand the test of time is hard. And subject to lots of lobbying.</li><li><br></li><li><br></li><li>CISO Liability and visibility based on the prominence of the role.  Does this lead to targeting to discredit? (think: false social media profiles and deepfakes)</li><li><br></li><li><br></li><li>Offensive techniques and  what happens when companies go offensive against attackers? </li><li><br></li><li><br></li><li>Prevention as a growing tactic by security teams - especially when life is on the line in the products we make</li><li><br></li><li><br></li><li>SPAM: is it food or is it email? </li><li><br></li><li><br></li><li>When is the right time to bring security into your startup? Weaving it in when it is young!</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.secureworld.io/industry-news/jimmy-fallon-jokes-cybersecurity-passwords" rel="noopener noreferrer" target="_blank">Jimmy Fallon's Hilarious Cybersecurity Jokes</a></li><li><a href="https://www.secureworld.io/industry-news" rel="noopener noreferrer" target="_blank">SecureWorld News</a></li><li><a href="https://portswigger.net/burp" rel="noopener noreferrer" target="_blank">Burp Suite - Application Security Testing Software - PortSwigger</a></li><li><a href="https://www.justice.gov/jm/jm-9-48000-computer-fraud" rel="noopener noreferrer" target="_blank">Computer Fraud and Abuse Act | JM | Department of Justice</a></li><li><a href="https://www.legislation.gov.uk/ukpga/1990/18/contents" rel="noopener noreferrer" target="_blank">Computer Misuse Act 1990</a></li><li><a href="https://www.theregister.com/2021/05/11/computer_misuse_act_review_priti_patel/" rel="noopener noreferrer" target="_blank">UK's Computer Misuse Act to be reviewed, says Home Secretary as she condemns ransomware payoffs • The Register</a></li><li><a href="https://www.npr.org/2020/06/15/876966569/american-paul-whelan-held-in-russia-on-spy-charges-is-sentenced-to-16-years" rel="noopener noreferrer" target="_blank">American Paul Whelan, Held In Russia On Spy Charges, Is Sentenced To 16 Years : NPR</a></li><li><a href="http://jolt.law.harvard.edu/digest/hiq-labs-v-linkedin-is-scraping-public-data-protected-speech" rel="noopener noreferrer" target="_blank">hiQ Labs v. LinkedIn: Is Scraping Public Data Protected Speech? - Harvard Journal of Law &amp; Technology</a></li><li><a href="https://www.natlawreview.com/article/hiq-files-opposition-brief-supreme-court-linkedin-cfaa-data-scraping-dispute" rel="noopener noreferrer" target="_blank">hiQ Labs v. LinkedIn on CFAA Data Scraping Litigation</a></li><li><a href="https://www.linkedin.com/in/renee-murphy-4b8bba/" rel="noopener noreferrer" target="_blank">Renee Murphy | LinkedIn</a></li><li><a href="https://www.wired.com/story/revil-ransomware-hack-sinclair-group-argentina-data-breach-security-news/" rel="noopener noreferrer" target="_blank">International Operation Knocks Notorious REvil Ransomware Group Offline | WIRED</a></li><li><a href="https://www.wsj.com/articles/ransomware-hackers-hospital-first-alleged-death-11633008116" rel="noopener noreferrer" target="_blank">A Hospital Hit by Hackers, a Baby in Distress: The Case of the First Alleged Ransomware Death - WSJ</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://pastebin.com/kMQAbcFa" rel="noopener noreferrer" target="_blank">Conti Statement 10.22.2021 - Pastebin.com</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Security has truly gone mainstream. From late night television jokes to state governors not knowing how technology works, as a profession and a vocation, we have arrived.</p><ul><li><br></li><li>Jimmy Fallon has jokes about security on his show</li><li><br></li><li><br></li><li>What are the implications of out of date security laws that define what it is to “hack” systems? Keep in mind that some were written as much as 30+ years ago!</li><li><br></li><li><br></li><li>Is it security’s job to know all the tools in place? Or the business to approach security to help make their tools secure?</li><li><br></li><li><br></li><li>Is viewing publicly available information or information pushed to your browser actually hacking, or is it legal/OK?</li><li><br></li><li><br></li><li>Creating laws that stand the test of time is hard. And subject to lots of lobbying.</li><li><br></li><li><br></li><li>CISO Liability and visibility based on the prominence of the role.  Does this lead to targeting to discredit? (think: false social media profiles and deepfakes)</li><li><br></li><li><br></li><li>Offensive techniques and  what happens when companies go offensive against attackers? </li><li><br></li><li><br></li><li>Prevention as a growing tactic by security teams - especially when life is on the line in the products we make</li><li><br></li><li><br></li><li>SPAM: is it food or is it email? </li><li><br></li><li><br></li><li>When is the right time to bring security into your startup? Weaving it in when it is young!</li><li><br></li></ul><br/><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.secureworld.io/industry-news/jimmy-fallon-jokes-cybersecurity-passwords" rel="noopener noreferrer" target="_blank">Jimmy Fallon's Hilarious Cybersecurity Jokes</a></li><li><a href="https://www.secureworld.io/industry-news" rel="noopener noreferrer" target="_blank">SecureWorld News</a></li><li><a href="https://portswigger.net/burp" rel="noopener noreferrer" target="_blank">Burp Suite - Application Security Testing Software - PortSwigger</a></li><li><a href="https://www.justice.gov/jm/jm-9-48000-computer-fraud" rel="noopener noreferrer" target="_blank">Computer Fraud and Abuse Act | JM | Department of Justice</a></li><li><a href="https://www.legislation.gov.uk/ukpga/1990/18/contents" rel="noopener noreferrer" target="_blank">Computer Misuse Act 1990</a></li><li><a href="https://www.theregister.com/2021/05/11/computer_misuse_act_review_priti_patel/" rel="noopener noreferrer" target="_blank">UK's Computer Misuse Act to be reviewed, says Home Secretary as she condemns ransomware payoffs • The Register</a></li><li><a href="https://www.npr.org/2020/06/15/876966569/american-paul-whelan-held-in-russia-on-spy-charges-is-sentenced-to-16-years" rel="noopener noreferrer" target="_blank">American Paul Whelan, Held In Russia On Spy Charges, Is Sentenced To 16 Years : NPR</a></li><li><a href="http://jolt.law.harvard.edu/digest/hiq-labs-v-linkedin-is-scraping-public-data-protected-speech" rel="noopener noreferrer" target="_blank">hiQ Labs v. LinkedIn: Is Scraping Public Data Protected Speech? - Harvard Journal of Law &amp; Technology</a></li><li><a href="https://www.natlawreview.com/article/hiq-files-opposition-brief-supreme-court-linkedin-cfaa-data-scraping-dispute" rel="noopener noreferrer" target="_blank">hiQ Labs v. LinkedIn on CFAA Data Scraping Litigation</a></li><li><a href="https://www.linkedin.com/in/renee-murphy-4b8bba/" rel="noopener noreferrer" target="_blank">Renee Murphy | LinkedIn</a></li><li><a href="https://www.wired.com/story/revil-ransomware-hack-sinclair-group-argentina-data-breach-security-news/" rel="noopener noreferrer" target="_blank">International Operation Knocks Notorious REvil Ransomware Group Offline | WIRED</a></li><li><a href="https://www.wsj.com/articles/ransomware-hackers-hospital-first-alleged-death-11633008116" rel="noopener noreferrer" target="_blank">A Hospital Hit by Hackers, a Baby in Distress: The Case of the First Alleged Ransomware Death - WSJ</a></li><li><a href="https://www.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://pastebin.com/kMQAbcFa" rel="noopener noreferrer" target="_blank">Conti Statement 10.22.2021 - Pastebin.com</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-30-monkeys-on-your-back]]></link><guid isPermaLink="false">8b959705-213f-43cc-81ce-21c53ea00a71</guid><itunes:image href="https://artwork.captivate.fm/5197215c-a6f5-42fe-b07f-daffd4f4a97f/cover.jpg"/><pubDate>Mon, 01 Nov 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/70c32150-d35b-4b7e-b368-2e14625f5f89/8b959705-213f-43cc-81ce-21c53ea00a71.mp3" length="43666591" type="audio/mpeg"/><itunes:duration>58:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><podcast:season>2</podcast:season></item><item><title>People, Process and Product</title><itunes:title>People, Process and Product</itunes:title><description><![CDATA[<p>In the adage "people, process, technology" the technology comes last in the list for a reason as it is only as good as the people and processes that surround and support it. In this week's Great Security Debate we cover a range of topics all focused on the importance (and impacts) of the people and the process as key to the success of security technology. Said differently we can throw all the tech in the world out there, and it does no good without the other two.</p><ul><li><br></li><li>Around the world, in some locations government drives commercial security innovation, and in others, commercial interests drive government security adoption. Where is that innovation coming from? </li><li><br></li><li><br></li><li>The recent rumblings that security insurance policies may soon come with "buy lists". What impacts on the efficacy of controls come when the tech is chosen for you. And how do we guarantee the genuineness of how such a formulary was created.</li><li><br></li><li><br></li><li>What can security learn and use to teach the wider business world about availability and resilience from the current supply chain impacts taking place in manufacturing or consumer goods after COVID-19? </li><li><br></li></ul><br/><p>Tune in to this week's episde to learn all about these and more. Show links below have the details of articles, items we cover in the episode. </p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes. </p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.pcisecuritystandards.org/" rel="noopener noreferrer" target="_blank">Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards</a></li><li><a href="https://www.bbc.com/news/technology-58665809" rel="noopener noreferrer" target="_blank">EU rules to force USB-C chargers for all phones - BBC News</a></li><li><a href="https://getbreakout.com/blog/what-is-one-piece-flow/" rel="noopener noreferrer" target="_blank">What is One-Piece Flow in the Production Process? | Breakout</a></li><li><a href="https://jalopnik.com/i-asked-experts-why-carmakers-cant-just-transition-to-n-1847739665" rel="noopener noreferrer" target="_blank">Why The Chip Shortage Is So Complex According To Experts</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079DWSYYB/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-serves-all-americans" rel="noopener noreferrer" target="_blank">Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans’ | Business Roundtable</a></li><li><a href="https://semiwiki.com/automotive/7695-iso-26262-people-process-and-product/" rel="noopener noreferrer" target="_blank">ISO 26262: People, Process and Product - SemiWiki</a></li><li><a href="https://automotiveisac.com/auto-isac-summit-2021/" rel="noopener noreferrer" target="_blank">Auto-ISAC Summit 2021 – Auto-ISAC</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>In the adage "people, process, technology" the technology comes last in the list for a reason as it is only as good as the people and processes that surround and support it. In this week's Great Security Debate we cover a range of topics all focused on the importance (and impacts) of the people and the process as key to the success of security technology. Said differently we can throw all the tech in the world out there, and it does no good without the other two.</p><ul><li><br></li><li>Around the world, in some locations government drives commercial security innovation, and in others, commercial interests drive government security adoption. Where is that innovation coming from? </li><li><br></li><li><br></li><li>The recent rumblings that security insurance policies may soon come with "buy lists". What impacts on the efficacy of controls come when the tech is chosen for you. And how do we guarantee the genuineness of how such a formulary was created.</li><li><br></li><li><br></li><li>What can security learn and use to teach the wider business world about availability and resilience from the current supply chain impacts taking place in manufacturing or consumer goods after COVID-19? </li><li><br></li></ul><br/><p>Tune in to this week's episde to learn all about these and more. Show links below have the details of articles, items we cover in the episode. </p><p>We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to <a href="https://bit.ly/gsdyoutube" rel="noopener noreferrer" target="_blank">https://bit.ly/gsdyoutube</a> and watch, subscribe and "like" the episodes. </p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.pcisecuritystandards.org/" rel="noopener noreferrer" target="_blank">Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards</a></li><li><a href="https://www.bbc.com/news/technology-58665809" rel="noopener noreferrer" target="_blank">EU rules to force USB-C chargers for all phones - BBC News</a></li><li><a href="https://getbreakout.com/blog/what-is-one-piece-flow/" rel="noopener noreferrer" target="_blank">What is One-Piece Flow in the Production Process? | Breakout</a></li><li><a href="https://jalopnik.com/i-asked-experts-why-carmakers-cant-just-transition-to-n-1847739665" rel="noopener noreferrer" target="_blank">Why The Chip Shortage Is So Complex According To Experts</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079DWSYYB/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-serves-all-americans" rel="noopener noreferrer" target="_blank">Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans’ | Business Roundtable</a></li><li><a href="https://semiwiki.com/automotive/7695-iso-26262-people-process-and-product/" rel="noopener noreferrer" target="_blank">ISO 26262: People, Process and Product - SemiWiki</a></li><li><a href="https://automotiveisac.com/auto-isac-summit-2021/" rel="noopener noreferrer" target="_blank">Auto-ISAC Summit 2021 – Auto-ISAC</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-29-people-process-and-product]]></link><guid isPermaLink="false">38b0984c-4512-4d7d-9b01-d6a95e317713</guid><itunes:image href="https://artwork.captivate.fm/3d9af5d1-9d05-4679-8214-90779e1f3a18/cover.jpg"/><pubDate>Wed, 13 Oct 2021 11:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1d172223-f3c2-4f49-9a48-7ea3680dbc46/38b0984c-4512-4d7d-9b01-d6a95e317713.mp3" length="47446415" type="audio/mpeg"/><itunes:duration>57:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:season>2</podcast:season><itunes:summary>In the adage &amp;quot;people, process, technology&amp;quot; the technology comes last in the list for a reason as it is only as good as the people and processes that surround and support it. In this week&amp;#39;s Great Security Debate we cover a range of topics all focused on the importance (and impacts) of the people and the process as key to the success of security technology. Said differently we can throw all the tech in the world out there, and it does no good without the other two.



Around the world, in some locations government drives commercial security innovation, and in others, commercial interests drive government security adoption. Where is that innovation coming from? 

The recent rumblings that security insurance policies may soon come with &amp;quot;buy lists&amp;quot;. What impacts on the efficacy of controls come when the tech is chosen for you. And how do we guarantee the genuineness of how such a formulary was created.

What can security learn and use to teach the wider business world about availability and resilience from the current supply chain impacts taking place in manufacturing or consumer goods after COVID-19? 



Tune in to this week&amp;#39;s episde to learn all about these and more. Show links below have the details of articles, items we cover in the episode. 


We also have a video channel on YouTube that airs the &amp;quot;with pictures&amp;quot; edition of the podcast. Please head over to https://bit.ly/gsdyoutube (https://bit.ly/gsdyoutube) and watch, subscribe and &amp;quot;like&amp;quot; the episodes. 
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.pcisecuritystandards.org/ (Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards)
https://www.bbc.com/news/technology-58665809 (EU rules to force USB-C chargers for all phones - BBC News)
https://getbreakout.com/blog/what-is-one-piece-flow/ (What is One-Piece Flow in the Production Process? | Breakout)
https://jalopnik.com/i-asked-experts-why-carmakers-cant-just-transition-to-n-1847739665 (Why The Chip Shortage Is So Complex According To Experts)
http://www.amazon.com/exec/obidos/ASIN/B079DWSYYB/securitydebat-20 (Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store)
https://www.businessroundtable.org/business-roundtable-redefines-the-purpose-of-a-corporation-to-promote-an-economy-that-serves-all-americans (Business Roundtable Redefines the Purpose of a Corporation to Promote ‘An Economy That Serves All Americans’ | Business Roundtable)
https://semiwiki.com/automotive/7695-iso-26262-people-process-and-product/ (ISO 26262: People, Process and Product - SemiWiki)
https://automotiveisac.com/auto-isac-summit-2021/ (Auto-ISAC Summit 2021 – Auto-ISAC)</itunes:summary></item><item><title>Stop, Collaborate and Pivot</title><itunes:title>Stop, Collaborate and Pivot</itunes:title><description><![CDATA[<p>Over the past 18 months, the way we work has changed including within the security field. On this episode of The Great Security Debate, Dan, Brian and Erik dig into some of the long-term implications of working today and beyond. </p><ul><li><br></li><li>From remote work to in-person or hybrid : what works best?</li><li><br></li><li><br></li><li>Does security have a talent shortage, and how is it exacerbated by leadership issues?</li><li><br></li><li><br></li><li>Was innovation and productivity stifled during COVID by remote work?</li><li><br></li><li><br></li><li>How to build strong remote teams and learning from the history of global remote teams?</li><li><br></li><li><br></li><li>Does remote work help or hurt the chances for smaller orgs to get good talent?</li><li><br></li><li><br></li><li>Is money the biggest driver for people in work? How does mission and team comfort play in?</li><li><br></li><li><br></li><li>Can we change culture of long-standing in-person culture enough to support remote/hybrid work?</li><li><br></li><li><br></li><li>Which is better to look at, certifications or experience?</li><li><br></li><li><br></li><li>What role does influence play in leadership and innovation, especially in non-management roles?</li><li><br></li></ul><br/><p>This episode is available in both audio and video formats. The video edition is on our YouTube channel along with a growing collection of video from previous episodes. <a href="https://youtu.be/p099pC4dh3A" rel="noopener noreferrer" target="_blank">https://youtu.be/p099pC4dh3A</a></p><p>Get notified via email when each new episode is published, and find out about exciting new projects from The Great Security Debate team. Sign up here: <a href="https://newsletter.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://newsletter.greatsecuritydebate.net</a></p><p><br></p><p>Thanks for listening! Tell your friends and let us know your comments, feedback and ideas for future Great Security Debates.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://rafeeqrehman.com/" rel="noopener noreferrer" target="_blank">Rafeeq Rehman - Personal Blog - Information Security | Entrepreneurship | Digital EnterprisesRafeeq Rehman – Personal Blog » Information Security | Entrepreneurship | Digital Enterprises</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B091LWPGCV/securitydebat-20" rel="noopener noreferrer" target="_blank">Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC): Rehman, Rafeeq: 9798733168166: Amazon.com: Books</a></li><li><a href="https://www.mckinsey.com/business-functions/organization/our-insights/great-attrition-or-great-attraction-the-choice-is-yours" rel="noopener noreferrer" target="_blank">Making the Great Attrition the Great Attraction | McKinsey</a></li><li><a href="https://www.theverge.com/2021/9/6/22659225/automated-hiring-software-rejecting-viable-candidates-harvard-business-school" rel="noopener noreferrer" target="_blank">Automated hiring software is mistakenly rejecting millions of viable job candidates - The Verge</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B01KTIEFEE/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Radical Candor: Be a Kick-Ass Boss Without Losing Your Humanity eBook : Scott, Kim: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B08H177WQP/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Think Again: The Power of Knowing What You Don't Know eBook : Grant, Adam: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079DWSYYB/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://news.gallup.com/businessjournal/150671/happiness-is-love-and-75k.aspx" rel="noopener noreferrer" target="_blank">Happiness is Love -- and $75,000</a></li><li><a href="https://www.colorado-security.com/" rel="noopener noreferrer" target="_blank">Colorado = Security</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B07XCG3BQM/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Leading Without Authority: How the New Power of Co-Elevation Can Break Down Silos, Transform Teams, and Reinvent Collaboration eBook : Ferrazzi, Keith, Weyrich, Noel: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1543614620/securitydebat-20" rel="noopener noreferrer" target="_blank">Leaders Eat Last: Simon Sinek, Simon Sinek: 0191091429112: Amazon.com: Books</a></li><li><a href="https://mentorcore.biz/2020/12/17/webinar-the-power-of-connection/" rel="noopener noreferrer" target="_blank">Webinar: The Power of Connection – Bridging the Divide – MentorCore</a></li><li><a href="https://www.bloomberg.com/news/articles/2021-05-04/bank-bosses-want-a-return-to-office-underlings-aren-t-so-sure" rel="noopener noreferrer" target="_blank">Bank Bosses Want Return to Office. Employees Want Flexibility to Work From Home - Bloomberg</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Over the past 18 months, the way we work has changed including within the security field. On this episode of The Great Security Debate, Dan, Brian and Erik dig into some of the long-term implications of working today and beyond. </p><ul><li><br></li><li>From remote work to in-person or hybrid : what works best?</li><li><br></li><li><br></li><li>Does security have a talent shortage, and how is it exacerbated by leadership issues?</li><li><br></li><li><br></li><li>Was innovation and productivity stifled during COVID by remote work?</li><li><br></li><li><br></li><li>How to build strong remote teams and learning from the history of global remote teams?</li><li><br></li><li><br></li><li>Does remote work help or hurt the chances for smaller orgs to get good talent?</li><li><br></li><li><br></li><li>Is money the biggest driver for people in work? How does mission and team comfort play in?</li><li><br></li><li><br></li><li>Can we change culture of long-standing in-person culture enough to support remote/hybrid work?</li><li><br></li><li><br></li><li>Which is better to look at, certifications or experience?</li><li><br></li><li><br></li><li>What role does influence play in leadership and innovation, especially in non-management roles?</li><li><br></li></ul><br/><p>This episode is available in both audio and video formats. The video edition is on our YouTube channel along with a growing collection of video from previous episodes. <a href="https://youtu.be/p099pC4dh3A" rel="noopener noreferrer" target="_blank">https://youtu.be/p099pC4dh3A</a></p><p>Get notified via email when each new episode is published, and find out about exciting new projects from The Great Security Debate team. Sign up here: <a href="https://newsletter.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://newsletter.greatsecuritydebate.net</a></p><p><br></p><p>Thanks for listening! Tell your friends and let us know your comments, feedback and ideas for future Great Security Debates.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://rafeeqrehman.com/" rel="noopener noreferrer" target="_blank">Rafeeq Rehman - Personal Blog - Information Security | Entrepreneurship | Digital EnterprisesRafeeq Rehman – Personal Blog » Information Security | Entrepreneurship | Digital Enterprises</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B091LWPGCV/securitydebat-20" rel="noopener noreferrer" target="_blank">Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC): Rehman, Rafeeq: 9798733168166: Amazon.com: Books</a></li><li><a href="https://www.mckinsey.com/business-functions/organization/our-insights/great-attrition-or-great-attraction-the-choice-is-yours" rel="noopener noreferrer" target="_blank">Making the Great Attrition the Great Attraction | McKinsey</a></li><li><a href="https://www.theverge.com/2021/9/6/22659225/automated-hiring-software-rejecting-viable-candidates-harvard-business-school" rel="noopener noreferrer" target="_blank">Automated hiring software is mistakenly rejecting millions of viable job candidates - The Verge</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B01KTIEFEE/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Radical Candor: Be a Kick-Ass Boss Without Losing Your Humanity eBook : Scott, Kim: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B08H177WQP/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Think Again: The Power of Knowing What You Don't Know eBook : Grant, Adam: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B079DWSYYB/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: The Infinite Game eBook : Sinek, Simon: Kindle Store</a></li><li><a href="https://news.gallup.com/businessjournal/150671/happiness-is-love-and-75k.aspx" rel="noopener noreferrer" target="_blank">Happiness is Love -- and $75,000</a></li><li><a href="https://www.colorado-security.com/" rel="noopener noreferrer" target="_blank">Colorado = Security</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/B07XCG3BQM/securitydebat-20" rel="noopener noreferrer" target="_blank">Amazon.com: Leading Without Authority: How the New Power of Co-Elevation Can Break Down Silos, Transform Teams, and Reinvent Collaboration eBook : Ferrazzi, Keith, Weyrich, Noel: Kindle Store</a></li><li><a href="http://www.amazon.com/exec/obidos/ASIN/1543614620/securitydebat-20" rel="noopener noreferrer" target="_blank">Leaders Eat Last: Simon Sinek, Simon Sinek: 0191091429112: Amazon.com: Books</a></li><li><a href="https://mentorcore.biz/2020/12/17/webinar-the-power-of-connection/" rel="noopener noreferrer" target="_blank">Webinar: The Power of Connection – Bridging the Divide – MentorCore</a></li><li><a href="https://www.bloomberg.com/news/articles/2021-05-04/bank-bosses-want-a-return-to-office-underlings-aren-t-so-sure" rel="noopener noreferrer" target="_blank">Bank Bosses Want Return to Office. Employees Want Flexibility to Work From Home - Bloomberg</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-28-stop-collaborate-and-pivot]]></link><guid isPermaLink="false">d9f60410-7ec7-4158-8420-d8f48dda9bf6</guid><itunes:image href="https://artwork.captivate.fm/086d0ee6-3dd9-4f95-a45d-a353a72e96be/cover.jpg"/><pubDate>Mon, 13 Sep 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cc35dfa9-4b87-4871-a706-40dc1d2c37f7/d9f60410-7ec7-4158-8420-d8f48dda9bf6.mp3" length="49976390" type="audio/mpeg"/><itunes:duration>01:00:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>2</podcast:season></item><item><title>Risks, Regulations, and Reputations</title><itunes:title>Risks, Regulations, and Reputations</itunes:title><description><![CDATA[<p>A recent visit by US companies to the White House sparked a debate between Dan, Brian and Erik about how to improve security. Was the result useful to the cause, or useful to the marketing goals of the attendees? The risks are high, but are the responses going to move the needle? We discuss on this week's Great Security Debate.</p><p>Leave some feedback, give a thumbs up, a star or whatever your favourite podcast app prefers, and tell your friends about the podcast. Thanks for being a listener!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden Administration and Private Sector Leaders Announce Ambitious Initiatives to Bolster the Nation’s Cybersecurity | The White House</a></li><li><a href="https://www.washingtonpost.com/technology/2021/08/25/white-house-cybersecurity-summit-apple-amazon/" rel="noopener noreferrer" target="_blank">Biden discusses cybersecurity with Amazon, Google, Apple CEOs at White House - The Washington Post</a></li><li><a href="https://www.nationalisacs.org/" rel="noopener noreferrer" target="_blank">National Council of ISACs</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://www.theregister.com/2021/08/26/big_tech_biden_cybersecurity_meeting/" rel="noopener noreferrer" target="_blank">Big tech proud as punch about cameos in Joe Biden's security theatre • The Register</a></li><li><a href="https://www.bbc.com/news/business-58230388" rel="noopener noreferrer" target="_blank">Why is there a chip shortage? - BBC News</a></li><li><a href="https://www.whatissixsigma.net/pfmea/" rel="noopener noreferrer" target="_blank">Process Failure Mode Effects Analysis (PFMEA) Explained</a></li><li><a href="https://www.whatissixsigma.net/dfmea/" rel="noopener noreferrer" target="_blank">What is Design Failure Mode and Effects Analysis (DFMEA)?</a></li><li><a href="https://www.enx.com/en-US/TISAX/" rel="noopener noreferrer" target="_blank">Welcome to TISAX&nbsp;· ENX Portal</a></li><li><a href="https://www.amazon.com/Outliers-Story-Success-Malcolm-Gladwell-ebook/dp/B001ANYDAO/ref=sr_1_1?crid=YIA9JD4APCTI&amp;dchild=1&amp;keywords=outliers+malcolm+gladwell&amp;qid=1630182664&amp;s=books&amp;sprefix=outliers+%2Cstripbooks%2C173&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Amazon.com: Outliers: The Story of Success eBook : Gladwell, Malcolm: Kindle Store</a></li><li><a href="https://www.amazon.com/Think-Again-Power-Knowing-What/dp/1984878107" rel="noopener noreferrer" target="_blank">Think Again: The Power of Knowing What You Don't Know: Grant, Adam: 9781984878106: Amazon.com: Books</a></li><li><a href="https://www.imdb.com/title/tt0816711/" rel="noopener noreferrer" target="_blank">World War Z (2013) - IMDb</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>A recent visit by US companies to the White House sparked a debate between Dan, Brian and Erik about how to improve security. Was the result useful to the cause, or useful to the marketing goals of the attendees? The risks are high, but are the responses going to move the needle? We discuss on this week's Great Security Debate.</p><p>Leave some feedback, give a thumbs up, a star or whatever your favourite podcast app prefers, and tell your friends about the podcast. Thanks for being a listener!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden Administration and Private Sector Leaders Announce Ambitious Initiatives to Bolster the Nation’s Cybersecurity | The White House</a></li><li><a href="https://www.washingtonpost.com/technology/2021/08/25/white-house-cybersecurity-summit-apple-amazon/" rel="noopener noreferrer" target="_blank">Biden discusses cybersecurity with Amazon, Google, Apple CEOs at White House - The Washington Post</a></li><li><a href="https://www.nationalisacs.org/" rel="noopener noreferrer" target="_blank">National Council of ISACs</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://www.theregister.com/2021/08/26/big_tech_biden_cybersecurity_meeting/" rel="noopener noreferrer" target="_blank">Big tech proud as punch about cameos in Joe Biden's security theatre • The Register</a></li><li><a href="https://www.bbc.com/news/business-58230388" rel="noopener noreferrer" target="_blank">Why is there a chip shortage? - BBC News</a></li><li><a href="https://www.whatissixsigma.net/pfmea/" rel="noopener noreferrer" target="_blank">Process Failure Mode Effects Analysis (PFMEA) Explained</a></li><li><a href="https://www.whatissixsigma.net/dfmea/" rel="noopener noreferrer" target="_blank">What is Design Failure Mode and Effects Analysis (DFMEA)?</a></li><li><a href="https://www.enx.com/en-US/TISAX/" rel="noopener noreferrer" target="_blank">Welcome to TISAX&nbsp;· ENX Portal</a></li><li><a href="https://www.amazon.com/Outliers-Story-Success-Malcolm-Gladwell-ebook/dp/B001ANYDAO/ref=sr_1_1?crid=YIA9JD4APCTI&amp;dchild=1&amp;keywords=outliers+malcolm+gladwell&amp;qid=1630182664&amp;s=books&amp;sprefix=outliers+%2Cstripbooks%2C173&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Amazon.com: Outliers: The Story of Success eBook : Gladwell, Malcolm: Kindle Store</a></li><li><a href="https://www.amazon.com/Think-Again-Power-Knowing-What/dp/1984878107" rel="noopener noreferrer" target="_blank">Think Again: The Power of Knowing What You Don't Know: Grant, Adam: 9781984878106: Amazon.com: Books</a></li><li><a href="https://www.imdb.com/title/tt0816711/" rel="noopener noreferrer" target="_blank">World War Z (2013) - IMDb</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-27-risks-regulations-and-reputations]]></link><guid isPermaLink="false">9c37d278-71a3-451a-90f6-f408482adbc3</guid><itunes:image href="https://artwork.captivate.fm/347e99f8-ea49-4b9c-8156-2da9432239dc/cover.jpg"/><pubDate>Sat, 28 Aug 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/440a6cad-ffe5-415d-8860-e8c733806b61/9c37d278-71a3-451a-90f6-f408482adbc3.mp3" length="43693158" type="audio/mpeg"/><itunes:duration>58:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>2</podcast:season><itunes:summary>A recent visit by US companies to the White House sparked a debate between Dan, Brian and Erik about how to improve security. Was the result useful to the cause, or useful to the marketing goals of the attendees? The risks are high, but are the responses going to move the needle? We discuss on this week&amp;#39;s Great Security Debate.


Leave some feedback, give a thumbs up, a star or whatever your favourite podcast app prefers, and tell your friends about the podcast. Thanks for being a listener!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/ (FACT SHEET: Biden Administration and Private Sector Leaders Announce Ambitious Initiatives to Bolster the Nation’s Cybersecurity | The White House)
https://www.washingtonpost.com/technology/2021/08/25/white-house-cybersecurity-summit-apple-amazon/ (Biden discusses cybersecurity with Amazon, Google, Apple CEOs at White House - The Washington Post)
https://www.nationalisacs.org/ (National Council of ISACs)
https://www.fsisac.com/ (Financial Services Information Sharing and Analysis Center)
https://www.theregister.com/2021/08/26/big_tech_biden_cybersecurity_meeting/ (Big tech proud as punch about cameos in Joe Biden&apos;s security theatre • The Register)
https://www.bbc.com/news/business-58230388 (Why is there a chip shortage? - BBC News)
https://www.whatissixsigma.net/pfmea/ (Process Failure Mode Effects Analysis (PFMEA) Explained)
https://www.whatissixsigma.net/dfmea/ (What is Design Failure Mode and Effects Analysis (DFMEA)?)
https://www.enx.com/en-US/TISAX/ (Welcome to TISAX · ENX Portal)
https://www.amazon.com/Outliers-Story-Success-Malcolm-Gladwell-ebook/dp/B001ANYDAO/ref=sr_1_1?crid=YIA9JD4APCTI&amp;dchild=1&amp;keywords=outliers+malcolm+gladwell&amp;qid=1630182664&amp;s=books&amp;sprefix=outliers+%2Cstripbooks%2C173&amp;sr=1-1 (Amazon.com: Outliers: The Story of Success eBook : Gladwell, Malcolm: Kindle Store)
https://www.amazon.com/Think-Again-Power-Knowing-What/dp/1984878107 (Think Again: The Power of Knowing What You Don&apos;t Know: Grant, Adam: 9781984878106: Amazon.com: Books)
https://www.imdb.com/title/tt0816711/ (World War Z (2013) - IMDb)</itunes:summary></item><item><title>It&apos;s Personal</title><itunes:title>It&apos;s Personal</itunes:title><description><![CDATA[<p>If you want to check out the new video edition of the podcast, please go to:</p><p><a href="https://youtu.be/FBBmA9YDNfQ" rel="noopener noreferrer" target="_blank">https://youtu.be/FBBmA9YDNfQ</a></p><p>where you can subscribe, give thumbs up and ring bells like YouTubers have been asking you to do for years. You know the drill.</p><p><br></p><p>Also, our apologies for the hum in the audio throughout the entire episode. The problem has been identified and the source (Dan) has been taken out back and schooled on the difference between mic-level and line-level audio feeds. He promises it won't happen again... often.</p><p><br></p><p>Now, on to the show.</p><p><br></p><p>This week, Dan, Brian and Erik tackle the recent changes announced by Apple regarding moves to protect children from online predators and from the passing of illegal material about children.  The project has three parts, each with its own benefits and concerns. We cover them each individually:</p><p><br></p><p>First, the scanning of messages inbound to minors (Under 18s) on a Apple Family Sharing account in which images are tested for inappropriateness, blurred and the child alerted that they may be about to look at something that they may want to reconsider. If they are under 13 and decide to view the image the parents are notified. This is an opt-in programme and parents decide whether or not to join for the family.</p><p><br></p><p>Next comes the proactive scanning of iCloud Photo Library stored at Apple. For a long time many have wondered why end-to-end encryption had not been put into iCloud, and this is a likely factor. The photos are tested against the hashes of a set of known images containing child pornography and issues are raised to the authorities. This is and has been happening on other cloud photo services including Microsoft and Flickr for some time.</p><p><br></p><p>Finally, and most controvertially from a privacy perspective, Apple is implementing a proactive test of the hashes ofphotos stored on customers' Apple devices against this same set of known images. In the US there is no law that prevents this but runs counter to the marketing emphasis Apple has placed on the privacy of data within their devices. The method is rather intricate and strives to prevent Apple from seeing anything unless it suspects there are systemic child pornography issues at bay.</p><p><br></p><p>These technology approaches change the game for prosecutors and law enforcement, and they expose issues earlier. But what happens when this capability gets expanded, or brought into law as mandatory for use against its citizens who speak out politically, or is taken over by bad actors? Look at the link in the show notes regarding the keys the TSA made for physical locks at the airport - every hole is a potential future vulnerability. Does the end justify the means? We discuss in depth on this week's Great Security Debate!</p><p><br></p><p>If you want to support the efforts of The Great Security Debate, please feel free to become a patron and get some cool benefits of supporting this independent show - <a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">https://www.patreon.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.apple.com/child-safety/" rel="noopener noreferrer" target="_blank">Child Safety - Apple</a> — Apple's official landing page for the new programs.</li><li><a href="https://www.missingkids.org/home" rel="noopener noreferrer" target="_blank">National Center for Missing and Exploited Children</a></li><li><a href="https://www.schneier.com/blog/archives/2015/09/tsa_master_keys.html" rel="noopener noreferrer" target="_blank">TSA Master Keys - Schneier on Security</a></li><li><a href="https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life" rel="noopener noreferrer" target="_blank">Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation</a></li><li><a href="https://9to5mac.com/2021/08/06/apple-says-any-expansion-of-csam-detection-outside-of-the-us-will-occur-on-a-per-country-basis/" rel="noopener noreferrer" target="_blank">Apple says any expansion of CSAM detection outside of the US will occur on a per-country basis - 9to5Mac</a></li><li><a href="https://thehackernews.com/2021/08/apple-to-scan-every-device-for-child.html" rel="noopener noreferrer" target="_blank">Apple to Scan Every Device for Child Abuse Content — But Experts Fear for Privacy</a></li><li><a href="https://www.forbes.com/sites/zakdoffman/2021/08/07/apple-iphone-users-shock-imessage-update-after-security-warning/?sh=4745c2677075" rel="noopener noreferrer" target="_blank">Why You Should Stop Using iMessage After Shock iPhone Update</a></li><li><a href="https://futurecrimesbook.com/" rel="noopener noreferrer" target="_blank">Future Crimes by Marc Goodman</a></li><li><a href="https://www.thorn.org/" rel="noopener noreferrer" target="_blank">We Build Tools to Defend Children From Sexual Abuse | Thorn</a></li><li><a href="https://www.nytimes.com/2021/08/11/opinion/apple-iphones-privacy.html" rel="noopener noreferrer" target="_blank">OpEd on Privacy Risks by Alex Stamos and Matthew Green </a> — Apple Wants to Protect Children. But It’s Creating Serious Privacy Risks.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>If you want to check out the new video edition of the podcast, please go to:</p><p><a href="https://youtu.be/FBBmA9YDNfQ" rel="noopener noreferrer" target="_blank">https://youtu.be/FBBmA9YDNfQ</a></p><p>where you can subscribe, give thumbs up and ring bells like YouTubers have been asking you to do for years. You know the drill.</p><p><br></p><p>Also, our apologies for the hum in the audio throughout the entire episode. The problem has been identified and the source (Dan) has been taken out back and schooled on the difference between mic-level and line-level audio feeds. He promises it won't happen again... often.</p><p><br></p><p>Now, on to the show.</p><p><br></p><p>This week, Dan, Brian and Erik tackle the recent changes announced by Apple regarding moves to protect children from online predators and from the passing of illegal material about children.  The project has three parts, each with its own benefits and concerns. We cover them each individually:</p><p><br></p><p>First, the scanning of messages inbound to minors (Under 18s) on a Apple Family Sharing account in which images are tested for inappropriateness, blurred and the child alerted that they may be about to look at something that they may want to reconsider. If they are under 13 and decide to view the image the parents are notified. This is an opt-in programme and parents decide whether or not to join for the family.</p><p><br></p><p>Next comes the proactive scanning of iCloud Photo Library stored at Apple. For a long time many have wondered why end-to-end encryption had not been put into iCloud, and this is a likely factor. The photos are tested against the hashes of a set of known images containing child pornography and issues are raised to the authorities. This is and has been happening on other cloud photo services including Microsoft and Flickr for some time.</p><p><br></p><p>Finally, and most controvertially from a privacy perspective, Apple is implementing a proactive test of the hashes ofphotos stored on customers' Apple devices against this same set of known images. In the US there is no law that prevents this but runs counter to the marketing emphasis Apple has placed on the privacy of data within their devices. The method is rather intricate and strives to prevent Apple from seeing anything unless it suspects there are systemic child pornography issues at bay.</p><p><br></p><p>These technology approaches change the game for prosecutors and law enforcement, and they expose issues earlier. But what happens when this capability gets expanded, or brought into law as mandatory for use against its citizens who speak out politically, or is taken over by bad actors? Look at the link in the show notes regarding the keys the TSA made for physical locks at the airport - every hole is a potential future vulnerability. Does the end justify the means? We discuss in depth on this week's Great Security Debate!</p><p><br></p><p>If you want to support the efforts of The Great Security Debate, please feel free to become a patron and get some cool benefits of supporting this independent show - <a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">https://www.patreon.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.apple.com/child-safety/" rel="noopener noreferrer" target="_blank">Child Safety - Apple</a> — Apple's official landing page for the new programs.</li><li><a href="https://www.missingkids.org/home" rel="noopener noreferrer" target="_blank">National Center for Missing and Exploited Children</a></li><li><a href="https://www.schneier.com/blog/archives/2015/09/tsa_master_keys.html" rel="noopener noreferrer" target="_blank">TSA Master Keys - Schneier on Security</a></li><li><a href="https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life" rel="noopener noreferrer" target="_blank">Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation</a></li><li><a href="https://9to5mac.com/2021/08/06/apple-says-any-expansion-of-csam-detection-outside-of-the-us-will-occur-on-a-per-country-basis/" rel="noopener noreferrer" target="_blank">Apple says any expansion of CSAM detection outside of the US will occur on a per-country basis - 9to5Mac</a></li><li><a href="https://thehackernews.com/2021/08/apple-to-scan-every-device-for-child.html" rel="noopener noreferrer" target="_blank">Apple to Scan Every Device for Child Abuse Content — But Experts Fear for Privacy</a></li><li><a href="https://www.forbes.com/sites/zakdoffman/2021/08/07/apple-iphone-users-shock-imessage-update-after-security-warning/?sh=4745c2677075" rel="noopener noreferrer" target="_blank">Why You Should Stop Using iMessage After Shock iPhone Update</a></li><li><a href="https://futurecrimesbook.com/" rel="noopener noreferrer" target="_blank">Future Crimes by Marc Goodman</a></li><li><a href="https://www.thorn.org/" rel="noopener noreferrer" target="_blank">We Build Tools to Defend Children From Sexual Abuse | Thorn</a></li><li><a href="https://www.nytimes.com/2021/08/11/opinion/apple-iphones-privacy.html" rel="noopener noreferrer" target="_blank">OpEd on Privacy Risks by Alex Stamos and Matthew Green </a> — Apple Wants to Protect Children. But It’s Creating Serious Privacy Risks.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-26-its-personal]]></link><guid isPermaLink="false">a5ce4033-5ac8-4c17-9369-f0317c6a7f47</guid><itunes:image href="https://artwork.captivate.fm/e0e7efdc-423e-428f-b7ee-3f970aaecec2/cover.jpg"/><pubDate>Mon, 09 Aug 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8f32dcdc-f890-4e5a-8061-ab63824c94ab/a5ce4033-5ac8-4c17-9369-f0317c6a7f47.mp3" length="45630741" type="audio/mpeg"/><itunes:duration>01:01:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:season>2</podcast:season></item><item><title>We&apos;ll See</title><itunes:title>We&apos;ll See</itunes:title><description><![CDATA[<p>Get notified in an email every time a new episode of The Great Security Debate drops, or when we announce in-person episode recordings (coming soon)! Sign up for our newsletter: <a href="https://newsletter.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://newsletter.greatsecuritydebate.net</a></p><p>Dan, Brian, and Erik find themselves debating whether or not the new up-to-$10M reward for information regarding ransomware and other attacks will make a material difference in the upward trend in technology as a weapon.</p><ul><li><br></li><li>What are some non-technical examples of ransomware (hint: it involves warm weather islands and boats and flags with skulls)</li><li><br></li><li><br></li><li>How will the new ransomware bounty work? Will it work at all?</li><li><br></li><li><br></li><li>Who sets the definition of "minimum viable security?" Who should and who can set that definition?</li><li><br></li><li><br></li><li>Can we get beyond human nature to take advantage of a situation that is beneficial to them?</li><li><br></li><li><br></li><li>What other economic impacts take place if we <em>can</em> eliminate bad actors (other than a lot of out-of-work security practitioners?)</li><li><br></li></ul><br/><p>Tune in and enjoy this episode of The Great Security Debate. Please let us know your thoughts by leaving rating feedback in your podcast app, and/or sending us an email to <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a>. Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.starz.com/us/en/series/black-sails/19568" rel="noopener noreferrer" target="_blank">Watch Black Sails Online: Stream Full Series on STARZ - Free Trial</a></li><li><a href="https://www.netflix.com/title/81035118" rel="noopener noreferrer" target="_blank">The Lost Pirate Kingdom | Netflix Official Site</a></li><li><a href="https://www.nytimes.com/2021/07/15/us/biden-reward-ransomware.html" rel="noopener noreferrer" target="_blank">$10 Million Reward Offered for Information on Ransomware Attacks - The New York Times</a></li><li><a href="https://www.philvenables.com/post/cybersecurity-and-the-curse-of-binary-thinking" rel="noopener noreferrer" target="_blank">Cybersecurity and the Curse of Binary Thinking</a></li><li><a href="https://www.amazon.com/Charlie-Wilsons-War-Tom-Hanks/dp/B001688V2E" rel="noopener noreferrer" target="_blank">Watch Charlie Wilson's War | Prime Video</a></li><li><a href="https://www.wsj.com/articles/the-fbis-advice-on-ransomware-dont-pay-but-tell-us-if-you-do-11623167330" rel="noopener noreferrer" target="_blank">The FBI’s Advice on Ransomware: Don’t Pay, but Tell Us if You Do - WSJ (Subscription required)</a></li><li><a href="https://www.sec.gov/whistleblower" rel="noopener noreferrer" target="_blank">SEC.gov | Office of the Whistleblower</a></li><li><a href="https://www.greatsecuritydebate.net/24" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 24: Back to Basics</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Get notified in an email every time a new episode of The Great Security Debate drops, or when we announce in-person episode recordings (coming soon)! Sign up for our newsletter: <a href="https://newsletter.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://newsletter.greatsecuritydebate.net</a></p><p>Dan, Brian, and Erik find themselves debating whether or not the new up-to-$10M reward for information regarding ransomware and other attacks will make a material difference in the upward trend in technology as a weapon.</p><ul><li><br></li><li>What are some non-technical examples of ransomware (hint: it involves warm weather islands and boats and flags with skulls)</li><li><br></li><li><br></li><li>How will the new ransomware bounty work? Will it work at all?</li><li><br></li><li><br></li><li>Who sets the definition of "minimum viable security?" Who should and who can set that definition?</li><li><br></li><li><br></li><li>Can we get beyond human nature to take advantage of a situation that is beneficial to them?</li><li><br></li><li><br></li><li>What other economic impacts take place if we <em>can</em> eliminate bad actors (other than a lot of out-of-work security practitioners?)</li><li><br></li></ul><br/><p>Tune in and enjoy this episode of The Great Security Debate. Please let us know your thoughts by leaving rating feedback in your podcast app, and/or sending us an email to <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a>. Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.starz.com/us/en/series/black-sails/19568" rel="noopener noreferrer" target="_blank">Watch Black Sails Online: Stream Full Series on STARZ - Free Trial</a></li><li><a href="https://www.netflix.com/title/81035118" rel="noopener noreferrer" target="_blank">The Lost Pirate Kingdom | Netflix Official Site</a></li><li><a href="https://www.nytimes.com/2021/07/15/us/biden-reward-ransomware.html" rel="noopener noreferrer" target="_blank">$10 Million Reward Offered for Information on Ransomware Attacks - The New York Times</a></li><li><a href="https://www.philvenables.com/post/cybersecurity-and-the-curse-of-binary-thinking" rel="noopener noreferrer" target="_blank">Cybersecurity and the Curse of Binary Thinking</a></li><li><a href="https://www.amazon.com/Charlie-Wilsons-War-Tom-Hanks/dp/B001688V2E" rel="noopener noreferrer" target="_blank">Watch Charlie Wilson's War | Prime Video</a></li><li><a href="https://www.wsj.com/articles/the-fbis-advice-on-ransomware-dont-pay-but-tell-us-if-you-do-11623167330" rel="noopener noreferrer" target="_blank">The FBI’s Advice on Ransomware: Don’t Pay, but Tell Us if You Do - WSJ (Subscription required)</a></li><li><a href="https://www.sec.gov/whistleblower" rel="noopener noreferrer" target="_blank">SEC.gov | Office of the Whistleblower</a></li><li><a href="https://www.greatsecuritydebate.net/24" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 24: Back to Basics</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-25-well-see]]></link><guid isPermaLink="false">f686160a-a050-4e3c-b457-f67a0003db59</guid><itunes:image href="https://artwork.captivate.fm/053a1c9b-4682-4744-9d70-a133d7dad6c8/cover.jpg"/><pubDate>Mon, 19 Jul 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0d779382-f13b-44de-a707-15861d7ec610/f686160a-a050-4e3c-b457-f67a0003db59.mp3" length="45467229" type="audio/mpeg"/><itunes:duration>01:00:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>2</podcast:season><itunes:summary>Get notified in an email every time a new episode of The Great Security Debate drops, or when we announce in-person episode recordings (coming soon)! Sign up for our newsletter: https://newsletter.greatsecuritydebate.net (https://newsletter.greatsecuritydebate.net)


Dan, Brian, and Erik find themselves debating whether or not the new up-to-$10M reward for information regarding ransomware and other attacks will make a material difference in the upward trend in technology as a weapon.



What are some non-technical examples of ransomware (hint: it involves warm weather islands and boats and flags with skulls)

How will the new ransomware bounty work? Will it work at all?

Who sets the definition of &amp;quot;minimum viable security?&amp;quot; Who should and who can set that definition?

Can we get beyond human nature to take advantage of a situation that is beneficial to them?

What other economic impacts take place if we can eliminate bad actors (other than a lot of out-of-work security practitioners?)



Tune in and enjoy this episode of The Great Security Debate. Please let us know your thoughts by leaving rating feedback in your podcast app, and/or sending us an email to feedback@greatsecuritydebate.net. Thanks for listening!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.starz.com/us/en/series/black-sails/19568 (Watch Black Sails Online: Stream Full Series on STARZ - Free Trial)
https://www.netflix.com/title/81035118 (The Lost Pirate Kingdom | Netflix Official Site)
https://www.nytimes.com/2021/07/15/us/biden-reward-ransomware.html ($10 Million Reward Offered for Information on Ransomware Attacks - The New York Times)
https://www.philvenables.com/post/cybersecurity-and-the-curse-of-binary-thinking (Cybersecurity and the Curse of Binary Thinking)
https://www.amazon.com/Charlie-Wilsons-War-Tom-Hanks/dp/B001688V2E (Watch Charlie Wilson&apos;s War | Prime Video)
https://www.wsj.com/articles/the-fbis-advice-on-ransomware-dont-pay-but-tell-us-if-you-do-11623167330 (The FBI’s Advice on Ransomware: Don’t Pay, but Tell Us if You Do - WSJ (Subscription required))
https://www.sec.gov/whistleblower (SEC.gov | Office of the Whistleblower)
https://www.greatsecuritydebate.net/24 (The Great Security Debate Episode 24: Back to Basics)</itunes:summary></item><item><title>Back to Basics</title><itunes:title>Back to Basics</itunes:title><description><![CDATA[<p>Recently a lot of newsworthy security incidents have taken place. A common thread through many is not that they were sophisticated or required lots of time to plan and execute, or even that the victim had not invested in a lot of whizbang security technology which led to them not noticing the attack. The common thread much more simple: that fundamental security measures were not being taken by the organisation. Things like turning off accounts when people left the organisation, removing disused technology from the network, and the reuse of passwords by staff amongst public-facing and internal systems.</p><p>The fundamentals make it easy for attackers to get into networks and systems, both enterprise and personal, and are all things that we can each work on individually and within our organisations to improve and make the attacks that much harder for the bad actors to execute. This week's episode discusses those fundamentals and how to approach them.</p><p>The "slide" that is often referenced in the episode comes from a talk that Dan gave to the National Information Standards Organisation (NISO) last week on why it was so important to maintain the security of their systems. The whole presentation deck is available at <a href="http://slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889" rel="noopener noreferrer" target="_blank">http://slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889</a> and the specific slide is on Slide 8. </p><p><br></p><p>Thanks for listening. You can subscribe to the podcast on your favourite podcast application or by visiting our website <a href="https://www.greatsecuritydebate.net/subscribe" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/subscribe</a>. Please let us know what you think by leaving a comment in the podcast application's rating section or emailing us <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592" rel="noopener noreferrer" target="_blank">The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win: Kim, Gene, Behr, Kevin, Spafford, George: 8601404253799: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Unicorn-Project-Developers-Disruption-Thriving-ebook/dp/B07QT9QR41/ref=sr_1_1?dchild=1&amp;keywords=unicorn+project&amp;qid=1624108947&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Amazon.com: The Unicorn Project: A Novel about Developers, Digital Disruption, and Thriving in the Age of Data eBook: Kim, Gene: Books</a></li><li><a href="https://netflix.github.io/chaosmonkey/" rel="noopener noreferrer" target="_blank">Home - Chaos Monkey</a></li><li><a href="https://www.greatsecuritydebate.net/21" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 21: Why Does My CISO Hate Me?</a></li><li><a href="https://www.slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889" rel="noopener noreferrer" target="_blank">Presentation: Security Is an Enabler, Not Securing Is an Inhibitor</a></li><li><a href="https://www.niso.org/events/2021/06/transforming-content-through-transformed-systems" rel="noopener noreferrer" target="_blank">Transforming Content Through Transformed Systems | NISO website</a></li><li><a href="https://www.bleepingcomputer.com/news/security/largest-us-propane-distributor-discloses-8-second-data-breach/" rel="noopener noreferrer" target="_blank">Largest US propane distributor discloses '8-second' data breach</a></li><li><a href="https://www.speakbydesign.com/private-coaching" rel="noopener noreferrer" target="_blank">Private Communication Coaching for Business Leaders &amp; Teams</a></li><li><a href="https://www.forrester.com/report/A+CISOs+First+100+Days/-/E-RES159295?objectid=RES159295" rel="noopener noreferrer" target="_blank">A CISO's First 100 Days</a></li><li><a href="https://www.cisecurity.org/controls/cis-controls-list/" rel="noopener noreferrer" target="_blank">The 18 CIS Controls</a></li><li><a href="https://asq.org/quality-resources/five-whys" rel="noopener noreferrer" target="_blank">Five Whys and Five Hows | ASQ</a></li><li><a href="https://cloud.google.com/beyondcorp/" rel="noopener noreferrer" target="_blank">BeyondCorp Zero Trust Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Recently a lot of newsworthy security incidents have taken place. A common thread through many is not that they were sophisticated or required lots of time to plan and execute, or even that the victim had not invested in a lot of whizbang security technology which led to them not noticing the attack. The common thread much more simple: that fundamental security measures were not being taken by the organisation. Things like turning off accounts when people left the organisation, removing disused technology from the network, and the reuse of passwords by staff amongst public-facing and internal systems.</p><p>The fundamentals make it easy for attackers to get into networks and systems, both enterprise and personal, and are all things that we can each work on individually and within our organisations to improve and make the attacks that much harder for the bad actors to execute. This week's episode discusses those fundamentals and how to approach them.</p><p>The "slide" that is often referenced in the episode comes from a talk that Dan gave to the National Information Standards Organisation (NISO) last week on why it was so important to maintain the security of their systems. The whole presentation deck is available at <a href="http://slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889" rel="noopener noreferrer" target="_blank">http://slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889</a> and the specific slide is on Slide 8. </p><p><br></p><p>Thanks for listening. You can subscribe to the podcast on your favourite podcast application or by visiting our website <a href="https://www.greatsecuritydebate.net/subscribe" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/subscribe</a>. Please let us know what you think by leaving a comment in the podcast application's rating section or emailing us <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592" rel="noopener noreferrer" target="_blank">The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win: Kim, Gene, Behr, Kevin, Spafford, George: 8601404253799: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Unicorn-Project-Developers-Disruption-Thriving-ebook/dp/B07QT9QR41/ref=sr_1_1?dchild=1&amp;keywords=unicorn+project&amp;qid=1624108947&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Amazon.com: The Unicorn Project: A Novel about Developers, Digital Disruption, and Thriving in the Age of Data eBook: Kim, Gene: Books</a></li><li><a href="https://netflix.github.io/chaosmonkey/" rel="noopener noreferrer" target="_blank">Home - Chaos Monkey</a></li><li><a href="https://www.greatsecuritydebate.net/21" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 21: Why Does My CISO Hate Me?</a></li><li><a href="https://www.slideshare.net/secratic/security-is-an-enabler-not-securing-is-an-inhibitor-249421889" rel="noopener noreferrer" target="_blank">Presentation: Security Is an Enabler, Not Securing Is an Inhibitor</a></li><li><a href="https://www.niso.org/events/2021/06/transforming-content-through-transformed-systems" rel="noopener noreferrer" target="_blank">Transforming Content Through Transformed Systems | NISO website</a></li><li><a href="https://www.bleepingcomputer.com/news/security/largest-us-propane-distributor-discloses-8-second-data-breach/" rel="noopener noreferrer" target="_blank">Largest US propane distributor discloses '8-second' data breach</a></li><li><a href="https://www.speakbydesign.com/private-coaching" rel="noopener noreferrer" target="_blank">Private Communication Coaching for Business Leaders &amp; Teams</a></li><li><a href="https://www.forrester.com/report/A+CISOs+First+100+Days/-/E-RES159295?objectid=RES159295" rel="noopener noreferrer" target="_blank">A CISO's First 100 Days</a></li><li><a href="https://www.cisecurity.org/controls/cis-controls-list/" rel="noopener noreferrer" target="_blank">The 18 CIS Controls</a></li><li><a href="https://asq.org/quality-resources/five-whys" rel="noopener noreferrer" target="_blank">Five Whys and Five Hows | ASQ</a></li><li><a href="https://cloud.google.com/beyondcorp/" rel="noopener noreferrer" target="_blank">BeyondCorp Zero Trust Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-24-back-to-basics]]></link><guid isPermaLink="false">e9b8fdcd-e75d-4e51-8362-4a9ab3539b97</guid><itunes:image href="https://artwork.captivate.fm/96807511-d6da-4fdb-83db-bf435ce9b460/cover.jpg"/><pubDate>Mon, 21 Jun 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/669aef3b-6a88-4c9c-895e-da1eef70623d/e9b8fdcd-e75d-4e51-8362-4a9ab3539b97.mp3" length="45311213" type="audio/mpeg"/><itunes:duration>01:00:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>2</podcast:season></item><item><title>It Depends</title><itunes:title>It Depends</itunes:title><description><![CDATA[<p>A wide range of cause and effect discussion in this week's episode. </p><ul><li><br></li><li>What happens when a cellphone gets compromised for one purpose and has unrelated, follow-on consequences? </li><li><br></li><li><br></li><li>Will there be material impact from the recent decrees, executive orders and vocal support by President Biden that additional focus is required on information security, ransomware and corruption? </li><li><br></li><li><br></li><li>What are the downstream impacts of paying, and not paying a ransom and what happens if they are prohibited by law? </li><li><br></li><li><br></li><li>Is doing the mininum amount of security OK, or is the minimum not really the required minimum? </li><li><br></li><li><br></li><li>And more on the security position on data lakes, too.</li><li><br></li></ul><br/><p>Join Erik, Brian and Dan as they count their pieces of flair and determine if we are the right fit to keep working at Flingers.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.businessinsider.com/jeff-bezos-phone-hacked-saudi-crown-prince-mbs-report-explained-2020-1?op=1" rel="noopener noreferrer" target="_blank">How Jeff Bezos' Phone Was Likely Hacked by Saudi Crown Prince MBS</a></li><li><a href="https://www.amazon.com/Dissident-Jamal-Kashoggi/dp/B08QTZBXG6/ref=sr_1_1?dchild=1&amp;keywords=the+dissident&amp;qid=1622898859&amp;rnid=2941120011&amp;s=movies-tv&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Watch The Dissident | Prime Video</a></li><li><a href="https://www.theguardian.com/world/2018/jan/30/anti-corruption-purge-nets-more-than-100bn-saudi-arabia-claims" rel="noopener noreferrer" target="_blank">Saudi Arabia claims anti-corruption purge recouped $100bn | Saudi Arabia | The Guardian</a></li><li><a href="https://www.theverge.com/22463257/amazon-sidewalk-privacy-how-to-opt-out" rel="noopener noreferrer" target="_blank">How to opt out of (or into) Amazon’s Sidewalk network - The Verge</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806735189365047296/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - It’s time for security teams to embrace security data lakes</a></li><li><a href="https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html" rel="noopener noreferrer" target="_blank">Hacking Airplanes - Schneier on Security</a></li><li><a href="https://www.scmagazine.com/home/solarwinds-hack/solarwinds-lawsuit-claims-private-equity-owners-sacrificed-cybersecurity-to-boost-short-term-profits/" rel="noopener noreferrer" target="_blank">SolarWinds lawsuit expands to include private equity owners</a></li><li><a href="https://www.theregister.com/2021/06/03/supreme_court_cfaa/" rel="noopener noreferrer" target="_blank">Supreme Court narrows Computer Fraud and Abuse Act: Misusing access not quite the same as breaking in • The Register</a></li><li><a href="https://www.cnn.com/2021/06/03/politics/supreme-court-cybercrime-law-case/index.html" rel="noopener noreferrer" target="_blank">Supreme Court sides with police officer who improperly searched license plate database - CNNPolitics</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806688806658473984/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - Fundamentals of Security &gt; Shiny Technology</a></li><li><a href="https://www.amazon.com/Office-Space-Blu-ray-Jennifer-Aniston/dp/B001KEW0US/ref=sr_1_3?dchild=1&amp;keywords=office+space&amp;qid=1622900358&amp;s=movies-tv&amp;sr=1-3" rel="noopener noreferrer" target="_blank">Amazon.com: Office Space [Blu-ray]: Jennifer Aniston, Ron Livingston, Mike Judge: Movies &amp; TV</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806731973231468544/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - Security Debt</a></li><li><a href="https://www.nytimes.com/2021/05/27/us/politics/biden-pipelines-cyberattacks.html" rel="noopener noreferrer" target="_blank">Biden to Require Pipeline Companies to Report Cyberattacks - The New York Times</a></li><li><a href="https://www.dorsey.com/newsresources/publications/client-alerts/2021/06/biden-describes-combating-corruption" rel="noopener noreferrer" target="_blank">Biden Describes Combating Corruption as National Security Priority, Orders Interagency Review to Bolster Anti-Corruption Tools including Private Sector Partnerships | News &amp; Resources | Dorsey</a></li><li><a href="https://www.entrepreneur.com/article/370631" rel="noopener noreferrer" target="_blank">Judge grants definitive suspension of the biometric data registry</a> — e grants definitive suspension of the biometric data registry</li><li><a href="https://www.dailymail.co.uk/sciencetech/article-9652289/amp/Tiktoks-new-privacy-policy-lets-harvest-biometric-data-including-faceprints-voiceprints.html" rel="noopener noreferrer" target="_blank">Tiktok's new privacy policy lets it harvest biometric data, including 'faceprints and voiceprints'</a></li><li><a href="https://cisomag.eccouncil.org/paying-ransom-is-now-illegal-u-s-dept-of-treasury-warns/" rel="noopener noreferrer" target="_blank">Companies Will be Prosecuted for Paying Ransom: U.S. Dept. of Treasury</a></li><li><a href="https://www.csoonline.com/article/3587108/us-treasury-department-ban-on-ransomware-payments-puts-victims-in-tough-position.html" rel="noopener noreferrer" target="_blank">US Treasury Department ban on ransomware payments puts victims in tough position | CSO Online</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>A wide range of cause and effect discussion in this week's episode. </p><ul><li><br></li><li>What happens when a cellphone gets compromised for one purpose and has unrelated, follow-on consequences? </li><li><br></li><li><br></li><li>Will there be material impact from the recent decrees, executive orders and vocal support by President Biden that additional focus is required on information security, ransomware and corruption? </li><li><br></li><li><br></li><li>What are the downstream impacts of paying, and not paying a ransom and what happens if they are prohibited by law? </li><li><br></li><li><br></li><li>Is doing the mininum amount of security OK, or is the minimum not really the required minimum? </li><li><br></li><li><br></li><li>And more on the security position on data lakes, too.</li><li><br></li></ul><br/><p>Join Erik, Brian and Dan as they count their pieces of flair and determine if we are the right fit to keep working at Flingers.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.businessinsider.com/jeff-bezos-phone-hacked-saudi-crown-prince-mbs-report-explained-2020-1?op=1" rel="noopener noreferrer" target="_blank">How Jeff Bezos' Phone Was Likely Hacked by Saudi Crown Prince MBS</a></li><li><a href="https://www.amazon.com/Dissident-Jamal-Kashoggi/dp/B08QTZBXG6/ref=sr_1_1?dchild=1&amp;keywords=the+dissident&amp;qid=1622898859&amp;rnid=2941120011&amp;s=movies-tv&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Watch The Dissident | Prime Video</a></li><li><a href="https://www.theguardian.com/world/2018/jan/30/anti-corruption-purge-nets-more-than-100bn-saudi-arabia-claims" rel="noopener noreferrer" target="_blank">Saudi Arabia claims anti-corruption purge recouped $100bn | Saudi Arabia | The Guardian</a></li><li><a href="https://www.theverge.com/22463257/amazon-sidewalk-privacy-how-to-opt-out" rel="noopener noreferrer" target="_blank">How to opt out of (or into) Amazon’s Sidewalk network - The Verge</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806735189365047296/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - It’s time for security teams to embrace security data lakes</a></li><li><a href="https://www.schneier.com/blog/archives/2015/04/hacking_airplan.html" rel="noopener noreferrer" target="_blank">Hacking Airplanes - Schneier on Security</a></li><li><a href="https://www.scmagazine.com/home/solarwinds-hack/solarwinds-lawsuit-claims-private-equity-owners-sacrificed-cybersecurity-to-boost-short-term-profits/" rel="noopener noreferrer" target="_blank">SolarWinds lawsuit expands to include private equity owners</a></li><li><a href="https://www.theregister.com/2021/06/03/supreme_court_cfaa/" rel="noopener noreferrer" target="_blank">Supreme Court narrows Computer Fraud and Abuse Act: Misusing access not quite the same as breaking in • The Register</a></li><li><a href="https://www.cnn.com/2021/06/03/politics/supreme-court-cybercrime-law-case/index.html" rel="noopener noreferrer" target="_blank">Supreme Court sides with police officer who improperly searched license plate database - CNNPolitics</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806688806658473984/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - Fundamentals of Security &gt; Shiny Technology</a></li><li><a href="https://www.amazon.com/Office-Space-Blu-ray-Jennifer-Aniston/dp/B001KEW0US/ref=sr_1_3?dchild=1&amp;keywords=office+space&amp;qid=1622900358&amp;s=movies-tv&amp;sr=1-3" rel="noopener noreferrer" target="_blank">Amazon.com: Office Space [Blu-ray]: Jennifer Aniston, Ron Livingston, Mike Judge: Movies &amp; TV</a></li><li><a href="https://www.linkedin.com/feed/update/urn:li:activity:6806731973231468544/" rel="noopener noreferrer" target="_blank">Post | Feed | LinkedIn - Security Debt</a></li><li><a href="https://www.nytimes.com/2021/05/27/us/politics/biden-pipelines-cyberattacks.html" rel="noopener noreferrer" target="_blank">Biden to Require Pipeline Companies to Report Cyberattacks - The New York Times</a></li><li><a href="https://www.dorsey.com/newsresources/publications/client-alerts/2021/06/biden-describes-combating-corruption" rel="noopener noreferrer" target="_blank">Biden Describes Combating Corruption as National Security Priority, Orders Interagency Review to Bolster Anti-Corruption Tools including Private Sector Partnerships | News &amp; Resources | Dorsey</a></li><li><a href="https://www.entrepreneur.com/article/370631" rel="noopener noreferrer" target="_blank">Judge grants definitive suspension of the biometric data registry</a> — e grants definitive suspension of the biometric data registry</li><li><a href="https://www.dailymail.co.uk/sciencetech/article-9652289/amp/Tiktoks-new-privacy-policy-lets-harvest-biometric-data-including-faceprints-voiceprints.html" rel="noopener noreferrer" target="_blank">Tiktok's new privacy policy lets it harvest biometric data, including 'faceprints and voiceprints'</a></li><li><a href="https://cisomag.eccouncil.org/paying-ransom-is-now-illegal-u-s-dept-of-treasury-warns/" rel="noopener noreferrer" target="_blank">Companies Will be Prosecuted for Paying Ransom: U.S. Dept. of Treasury</a></li><li><a href="https://www.csoonline.com/article/3587108/us-treasury-department-ban-on-ransomware-payments-puts-victims-in-tough-position.html" rel="noopener noreferrer" target="_blank">US Treasury Department ban on ransomware payments puts victims in tough position | CSO Online</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-23-it-depends]]></link><guid isPermaLink="false">3a3a991d-7fc2-490e-b794-1b7485fd1522</guid><itunes:image href="https://artwork.captivate.fm/92a71f6c-d4d9-421f-9ece-273e8403e865/cover.jpg"/><pubDate>Mon, 07 Jun 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/aea99efb-5b15-4a9d-b156-17cbb88f5800/3a3a991d-7fc2-490e-b794-1b7485fd1522.mp3" length="44580631" type="audio/mpeg"/><itunes:duration>59:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>2</podcast:season></item><item><title>Sidewalks and AirTags</title><itunes:title>Sidewalks and AirTags</itunes:title><description><![CDATA[<p>The news of the week includes discussion about some changes to Amazon's home devices including Echo and Ring with the activation of their Sidewalk Network on all those devices by default and the potential for both ubiquitous connectivity for IoT devices, and the possibiity of abuse of the data that is seen . Brian, Erik and Dan also talk about the impact that the launch of the new Apple Application Tracking Transparency (ATT) program which asks users if they want to be tracked (spoiler alert: they very much do not). This will impact ads and apps that depends on ads pretty heartily, and we debate the pros and cons. Enter the data lakes (troves of data just waiting to be mined by companies to find "interesting things" (or targets for attackers). </p><p>We really appreciate your feedback, both through subscribing and rating on your favourite podcast application, and by email to us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.sidewalklabs.com/" rel="noopener noreferrer" target="_blank">Home | Sidewalk Labs</a></li><li><a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GZ4VSNFMBDHLRJUK" rel="noopener noreferrer" target="_blank">Amazon.com Help: Enable or Disable Amazon Sidewalk for Your Account</a></li><li><a href="https://www.inc.com/jason-aten/amazons-sidewalk-network-is-turned-on-by-default-heres-how-to-turn-it-off.html" rel="noopener noreferrer" target="_blank">Amazon's Sidewalk Network Is Turned On by Default. Here's How to Turn It Off | Inc.com</a></li><li><a href="https://www.cnbc.com/2021/05/07/amazon-partners-with-tile-to-take-on-apple-airtags.html" rel="noopener noreferrer" target="_blank">Amazon partners with Tile to take on Apple AirTags</a></li><li><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">Amazon.com: Amazon Sidewalk: Amazon Devices &amp; Accessories</a></li><li><a href="https://www.reuters.com/article/us-tech-antitrust-apple-tile-idUSKBN21J72V" rel="noopener noreferrer" target="_blank">Tile says Apple's behavior is anticompetitive and has 'gotten worse, not better' | Reuters</a></li><li><a href="https://www.greatsecuritydebate.net/1" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 1: Privacy Drone</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The news of the week includes discussion about some changes to Amazon's home devices including Echo and Ring with the activation of their Sidewalk Network on all those devices by default and the potential for both ubiquitous connectivity for IoT devices, and the possibiity of abuse of the data that is seen . Brian, Erik and Dan also talk about the impact that the launch of the new Apple Application Tracking Transparency (ATT) program which asks users if they want to be tracked (spoiler alert: they very much do not). This will impact ads and apps that depends on ads pretty heartily, and we debate the pros and cons. Enter the data lakes (troves of data just waiting to be mined by companies to find "interesting things" (or targets for attackers). </p><p>We really appreciate your feedback, both through subscribing and rating on your favourite podcast application, and by email to us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p>Thanks for listening!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.sidewalklabs.com/" rel="noopener noreferrer" target="_blank">Home | Sidewalk Labs</a></li><li><a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GZ4VSNFMBDHLRJUK" rel="noopener noreferrer" target="_blank">Amazon.com Help: Enable or Disable Amazon Sidewalk for Your Account</a></li><li><a href="https://www.inc.com/jason-aten/amazons-sidewalk-network-is-turned-on-by-default-heres-how-to-turn-it-off.html" rel="noopener noreferrer" target="_blank">Amazon's Sidewalk Network Is Turned On by Default. Here's How to Turn It Off | Inc.com</a></li><li><a href="https://www.cnbc.com/2021/05/07/amazon-partners-with-tile-to-take-on-apple-airtags.html" rel="noopener noreferrer" target="_blank">Amazon partners with Tile to take on Apple AirTags</a></li><li><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">Amazon.com: Amazon Sidewalk: Amazon Devices &amp; Accessories</a></li><li><a href="https://www.reuters.com/article/us-tech-antitrust-apple-tile-idUSKBN21J72V" rel="noopener noreferrer" target="_blank">Tile says Apple's behavior is anticompetitive and has 'gotten worse, not better' | Reuters</a></li><li><a href="https://www.greatsecuritydebate.net/1" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 1: Privacy Drone</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-22-sidewalks-and-airtags]]></link><guid isPermaLink="false">faced208-c4e6-449f-b59f-20109914692b</guid><itunes:image href="https://artwork.captivate.fm/fa8dcfd5-a463-452f-b46e-b21a7bc3f98d/cover.jpg"/><pubDate>Mon, 24 May 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6c7cefe5-c935-4478-93fb-41b1795d9d5d/faced208-c4e6-449f-b59f-20109914692b.mp3" length="41096130" type="audio/mpeg"/><itunes:duration>54:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>2</podcast:season><itunes:summary>The news of the week includes discussion about some changes to Amazon&amp;#39;s home devices including Echo and Ring with the activation of their Sidewalk Network on all those devices by default and the potential for both ubiquitous connectivity for IoT devices, and the possibiity of abuse of the data that is seen . Brian, Erik and Dan also talk about the impact that the launch of the new Apple Application Tracking Transparency (ATT) program which asks users if they want to be tracked (spoiler alert: they very much do not). This will impact ads and apps that depends on ads pretty heartily, and we debate the pros and cons. Enter the data lakes (troves of data just waiting to be mined by companies to find &amp;quot;interesting things&amp;quot; (or targets for attackers). 


We really appreciate your feedback, both through subscribing and rating on your favourite podcast application, and by email to us at feedback@greatsecuritydebate.net


Thanks for listening!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.sidewalklabs.com/ (Home | Sidewalk Labs)
https://www.amazon.com/gp/help/customer/display.html?nodeId=GZ4VSNFMBDHLRJUK (Amazon.com Help: Enable or Disable Amazon Sidewalk for Your Account)
https://www.inc.com/jason-aten/amazons-sidewalk-network-is-turned-on-by-default-heres-how-to-turn-it-off.html (Amazon&apos;s Sidewalk Network Is Turned On by Default. Here&apos;s How to Turn It Off | Inc.com)
https://www.cnbc.com/2021/05/07/amazon-partners-with-tile-to-take-on-apple-airtags.html (Amazon partners with Tile to take on Apple AirTags)
https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011 (Amazon.com: Amazon Sidewalk: Amazon Devices &amp; Accessories)
https://www.reuters.com/article/us-tech-antitrust-apple-tile-idUSKBN21J72V (Tile says Apple&apos;s behavior is anticompetitive and has &apos;gotten worse, not better&apos; | Reuters)
https://www.greatsecuritydebate.net/1 (The Great Security Debate Episode 1: Privacy Drone)</itunes:summary></item><item><title>Why Does My CISO Hate Me?</title><itunes:title>Why Does My CISO Hate Me?</itunes:title><description><![CDATA[<p>We got asked by a listener to help answer the question, "Why Does My CISO Hate Me?" While we may not be privy to the exact situation in play there, we are pretty sure that no one's CISO truly hates them (but they may not be fond of all the things that everyone does all the time). In the debate today, we talk about some of the things that challenge CISOs including:</p><ul><li><br></li><li>Security is more than just confidentiality... there's also integrity and availability</li><li><br></li><li><br></li><li>Undocumented processes and changes make it hard to figure out where things go wrong</li><li><br></li><li><br></li><li>Security is a bidirectional partnership, not an Q&amp;A/task queue from the rest of the organisation, nor the acceptor of risks</li><li><br></li><li><br></li><li>Please ask questions if you are concerned about something or want more info, or even if something sort of smells fishy (or phishy). There are no such thing as stupid questions, only unasked ones.</li><li><br></li></ul><br/><p>We also highlight a number of the things that CISOs and security teams can improve on to build better and stronger relationships across the organisation, too, such as:</p><ul><li><br></li><li>Better listening and asking good questions</li><li><br></li><li><br></li><li>Understanding the business through servant leadership</li><li><br></li><li><br></li><li>Helping to determine what is most important to the business (and what needs to be protected)</li><li><br></li></ul><br/><p>We are all heading toward a common goal, so let's work together to accomplish it!</p><p><br></p><p>Thanks for listening. Until next time...</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Toyota-Way-Management-Principles-Manufacturer/dp/0071392319" rel="noopener noreferrer" target="_blank">Amazon.com: The Toyota Way: 14 Management Principles from the World's Greatest Manufacturer (8601404279935): Liker, Jeffrey: Books</a></li><li><a href="https://www.amazon.com/ITSM-Complete-Guide-Gerardus-Blokdyk/dp/0655914927/ref=sr_1_2?dchild=1&amp;keywords=ITSM&amp;qid=1619876969&amp;s=books&amp;sr=1-2" rel="noopener noreferrer" target="_blank">ITSM A Complete Guide - 2020 Edition: Gerardus Blokdyk: 9780655914921: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/ITIL-foundation-Axelos/dp/0113316070/ref=sr_1_2?dchild=1&amp;keywords=itIL+books&amp;qid=1619877304&amp;sr=8-2" rel="noopener noreferrer" target="_blank">ITIL Foundation, ITIL 4 Edition (ITIL 4 Foundation): AXELOS: 9780113316076: Amazon.com: Books</a></li><li><a href="https://echelonfront.com/jocko-willink/" rel="noopener noreferrer" target="_blank">Jocko Willink - Echelon Front</a></li><li><a href="https://www.nbc.com/saturday-night-live/video/nick-burns-your-companys-computer-guy/n11524" rel="noopener noreferrer" target="_blank">Watch Saturday Night Live Highlight: Nick Burns, Your Company's Computer Guy with Billy Bob Thornton - NBC.com</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>We got asked by a listener to help answer the question, "Why Does My CISO Hate Me?" While we may not be privy to the exact situation in play there, we are pretty sure that no one's CISO truly hates them (but they may not be fond of all the things that everyone does all the time). In the debate today, we talk about some of the things that challenge CISOs including:</p><ul><li><br></li><li>Security is more than just confidentiality... there's also integrity and availability</li><li><br></li><li><br></li><li>Undocumented processes and changes make it hard to figure out where things go wrong</li><li><br></li><li><br></li><li>Security is a bidirectional partnership, not an Q&amp;A/task queue from the rest of the organisation, nor the acceptor of risks</li><li><br></li><li><br></li><li>Please ask questions if you are concerned about something or want more info, or even if something sort of smells fishy (or phishy). There are no such thing as stupid questions, only unasked ones.</li><li><br></li></ul><br/><p>We also highlight a number of the things that CISOs and security teams can improve on to build better and stronger relationships across the organisation, too, such as:</p><ul><li><br></li><li>Better listening and asking good questions</li><li><br></li><li><br></li><li>Understanding the business through servant leadership</li><li><br></li><li><br></li><li>Helping to determine what is most important to the business (and what needs to be protected)</li><li><br></li></ul><br/><p>We are all heading toward a common goal, so let's work together to accomplish it!</p><p><br></p><p>Thanks for listening. Until next time...</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Toyota-Way-Management-Principles-Manufacturer/dp/0071392319" rel="noopener noreferrer" target="_blank">Amazon.com: The Toyota Way: 14 Management Principles from the World's Greatest Manufacturer (8601404279935): Liker, Jeffrey: Books</a></li><li><a href="https://www.amazon.com/ITSM-Complete-Guide-Gerardus-Blokdyk/dp/0655914927/ref=sr_1_2?dchild=1&amp;keywords=ITSM&amp;qid=1619876969&amp;s=books&amp;sr=1-2" rel="noopener noreferrer" target="_blank">ITSM A Complete Guide - 2020 Edition: Gerardus Blokdyk: 9780655914921: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/ITIL-foundation-Axelos/dp/0113316070/ref=sr_1_2?dchild=1&amp;keywords=itIL+books&amp;qid=1619877304&amp;sr=8-2" rel="noopener noreferrer" target="_blank">ITIL Foundation, ITIL 4 Edition (ITIL 4 Foundation): AXELOS: 9780113316076: Amazon.com: Books</a></li><li><a href="https://echelonfront.com/jocko-willink/" rel="noopener noreferrer" target="_blank">Jocko Willink - Echelon Front</a></li><li><a href="https://www.nbc.com/saturday-night-live/video/nick-burns-your-companys-computer-guy/n11524" rel="noopener noreferrer" target="_blank">Watch Saturday Night Live Highlight: Nick Burns, Your Company's Computer Guy with Billy Bob Thornton - NBC.com</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-21-why-does-my-ciso-hate-me]]></link><guid isPermaLink="false">6306abe8-ac27-40a7-8eac-6509a1519249</guid><itunes:image href="https://artwork.captivate.fm/6a0dd150-1ace-40f0-81df-e18293168eac/cover.jpg"/><pubDate>Sun, 02 May 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f0f078de-27f4-4e7e-b4c4-398797620712/6306abe8-ac27-40a7-8eac-6509a1519249.mp3" length="38847395" type="audio/mpeg"/><itunes:duration>51:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>2</podcast:season><itunes:summary>We got asked by a listener to help answer the question, &amp;quot;Why Does My CISO Hate Me?&amp;quot; While we may not be privy to the exact situation in play there, we are pretty sure that no one&amp;#39;s CISO truly hates them (but they may not be fond of all the things that everyone does all the time). In the debate today, we talk about some of the things that challenge CISOs including:



Security is more than just confidentiality... there&amp;#39;s also integrity and availability

Undocumented processes and changes make it hard to figure out where things go wrong

Security is a bidirectional partnership, not an QandA/task queue from the rest of the organisation, nor the acceptor of risks

Please ask questions if you are concerned about something or want more info, or even if something sort of smells fishy (or phishy). There are no such thing as stupid questions, only unasked ones.



We also highlight a number of the things that CISOs and security teams can improve on to build better and stronger relationships across the organisation, too, such as:



Better listening and asking good questions

Understanding the business through servant leadership

Helping to determine what is most important to the business (and what needs to be protected)



We are all heading toward a common goal, so let&amp;#39;s work together to accomplish it!


Thanks for listening. Until next time...
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.amazon.com/Toyota-Way-Management-Principles-Manufacturer/dp/0071392319 (Amazon.com: The Toyota Way: 14 Management Principles from the World&apos;s Greatest Manufacturer (8601404279935): Liker, Jeffrey: Books)
https://www.amazon.com/ITSM-Complete-Guide-Gerardus-Blokdyk/dp/0655914927/ref=sr_1_2?dchild=1&amp;keywords=ITSM&amp;qid=1619876969&amp;s=books&amp;sr=1-2 (ITSM A Complete Guide - 2020 Edition: Gerardus Blokdyk: 9780655914921: Amazon.com: Books)
https://www.amazon.com/ITIL-foundation-Axelos/dp/0113316070/ref=sr_1_2?dchild=1&amp;keywords=itIL+books&amp;qid=1619877304&amp;sr=8-2 (ITIL Foundation, ITIL 4 Edition (ITIL 4 Foundation): AXELOS: 9780113316076: Amazon.com: Books)
https://echelonfront.com/jocko-willink/ (Jocko Willink - Echelon Front)
https://www.nbc.com/saturday-night-live/video/nick-burns-your-companys-computer-guy/n11524 (Watch Saturday Night Live Highlight: Nick Burns, Your Company&apos;s Computer Guy with Billy Bob Thornton - NBC.com)</itunes:summary></item><item><title>It All Comes Down to Relationships (Guest Debater: Jessica Burn)</title><itunes:title>It All Comes Down to Relationships (Guest Debater: Jessica Burn)</itunes:title><description><![CDATA[<p>We open season 2 with a new format: guests! Our first guest, Jessica Burn, has been working closely with CISOs and the security industry at Forrester where she is a Senior Analyst covering the role of the CISO, Incident Response, Zero Trust Strategy and Continuous Controls Monitoring.</p><p>Dan, Erik, Brian and Jess use a new Forrester report about recommendations for security programs in 2021 as the basis for the discussion (and debate), including a few major themes:</p><ul><li><br></li><li>The impacts of the consolidation of technology, both in security and the wider tech arena</li><li><br></li><li><br></li><li>Balancing the monitoring and the privacy when tracking employees as they work remotely as a result of the pandemic</li><li><br></li><li><br></li><li>Securing what you sell both because you need to, but also because it is good for your business</li><li><br></li><li><br></li><li>Where are our inventories and why do we still generally fail at knowing what systems we have</li><li><br></li><li><br></li><li>Of course, third party risk management. It's a mandatory "slide 3" on every board presentation, of course.</li><li><br></li></ul><br/><p>We still debate, we still discuss, we still shift the discussion to automotive and manufacturing from time to time, but now we have some additional voices to add to the debate, too. Thanks so much, Jess!</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Good-They-Cant-Ignore-You/dp/1455509124" rel="noopener noreferrer" target="_blank">So Good They Can't Ignore You: Why Skills Trump Passion in the Quest for Work You Love: Newport, Cal: 8601420220263: Amazon.com: Books</a></li><li><a href="https://go.forrester.com/blogs/security-recommendations-2021-taking-stock-for-the-long-term/" rel="noopener noreferrer" target="_blank">Security Recommendations 2021: Taking Stock For The Long Term</a></li><li><a href="https://www.forrester.com/report/A+CISOs+First+100+Days/-/E-RES159295" rel="noopener noreferrer" target="_blank">A CISO's First 100 Days</a></li><li><a href="https://go.forrester.com/blogs/developer-security-champions-now-more-than-ever/" rel="noopener noreferrer" target="_blank">Developer Security Champions Are Needed Now More Than Ever</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://www.ls-isao.com/" rel="noopener noreferrer" target="_blank">Legal Services Information Sharing | LS-ISAO</a></li><li><a href="https://www.inc.com/michael-schneider/only-10-percent-of-people-are-natural-leaders-rest-of-us-have-to-work-on-developing-these-3-qualities.html?cid=sf01002&amp;fbclid=IwAR3I8HTQ_PtI4FStq4Pogp-VV_nVMPRSrH5IS_SZ0YxQ70Yh6fB8NYl63XA" rel="noopener noreferrer" target="_blank">Only 10 Percent of People Are Natural Leaders. The Rest of Us Have to Work on Developing These 3 Qualities | Inc.com</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>We open season 2 with a new format: guests! Our first guest, Jessica Burn, has been working closely with CISOs and the security industry at Forrester where she is a Senior Analyst covering the role of the CISO, Incident Response, Zero Trust Strategy and Continuous Controls Monitoring.</p><p>Dan, Erik, Brian and Jess use a new Forrester report about recommendations for security programs in 2021 as the basis for the discussion (and debate), including a few major themes:</p><ul><li><br></li><li>The impacts of the consolidation of technology, both in security and the wider tech arena</li><li><br></li><li><br></li><li>Balancing the monitoring and the privacy when tracking employees as they work remotely as a result of the pandemic</li><li><br></li><li><br></li><li>Securing what you sell both because you need to, but also because it is good for your business</li><li><br></li><li><br></li><li>Where are our inventories and why do we still generally fail at knowing what systems we have</li><li><br></li><li><br></li><li>Of course, third party risk management. It's a mandatory "slide 3" on every board presentation, of course.</li><li><br></li></ul><br/><p>We still debate, we still discuss, we still shift the discussion to automotive and manufacturing from time to time, but now we have some additional voices to add to the debate, too. Thanks so much, Jess!</p><p>Special Guest: Jessica Burn.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Good-They-Cant-Ignore-You/dp/1455509124" rel="noopener noreferrer" target="_blank">So Good They Can't Ignore You: Why Skills Trump Passion in the Quest for Work You Love: Newport, Cal: 8601420220263: Amazon.com: Books</a></li><li><a href="https://go.forrester.com/blogs/security-recommendations-2021-taking-stock-for-the-long-term/" rel="noopener noreferrer" target="_blank">Security Recommendations 2021: Taking Stock For The Long Term</a></li><li><a href="https://www.forrester.com/report/A+CISOs+First+100+Days/-/E-RES159295" rel="noopener noreferrer" target="_blank">A CISO's First 100 Days</a></li><li><a href="https://go.forrester.com/blogs/developer-security-champions-now-more-than-ever/" rel="noopener noreferrer" target="_blank">Developer Security Champions Are Needed Now More Than Ever</a></li><li><a href="https://www.fsisac.com/" rel="noopener noreferrer" target="_blank">Financial Services Information Sharing and Analysis Center</a></li><li><a href="https://www.ls-isao.com/" rel="noopener noreferrer" target="_blank">Legal Services Information Sharing | LS-ISAO</a></li><li><a href="https://www.inc.com/michael-schneider/only-10-percent-of-people-are-natural-leaders-rest-of-us-have-to-work-on-developing-these-3-qualities.html?cid=sf01002&amp;fbclid=IwAR3I8HTQ_PtI4FStq4Pogp-VV_nVMPRSrH5IS_SZ0YxQ70Yh6fB8NYl63XA" rel="noopener noreferrer" target="_blank">Only 10 Percent of People Are Natural Leaders. The Rest of Us Have to Work on Developing These 3 Qualities | Inc.com</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-20-it-all-comes-down-to-relationships-guest-debater-jessica-burn]]></link><guid isPermaLink="false">5a3b0d15-5c92-452b-887b-2a4a34d39091</guid><itunes:image href="https://artwork.captivate.fm/35b4ccea-b070-43f2-9fa4-95252b4105d0/cover.jpg"/><pubDate>Mon, 19 Apr 2021 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/993c91c2-4083-47ae-93e6-20185931f8b3/5a3b0d15-5c92-452b-887b-2a4a34d39091.mp3" length="46851906" type="audio/mpeg"/><itunes:duration>01:02:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>2</podcast:season><itunes:summary>We open season 2 with a new format: guests! Our first guest, Jessica Burn, has been working closely with CISOs and the security industry at Forrester where she is a Senior Analyst covering the role of the CISO, Incident Response, Zero Trust Strategy and Continuous Controls Monitoring.


Dan, Erik, Brian and Jess use a new Forrester report about recommendations for security programs in 2021 as the basis for the discussion (and debate), including a few major themes:



The impacts of the consolidation of technology, both in security and the wider tech arena

Balancing the monitoring and the privacy when tracking employees as they work remotely as a result of the pandemic

Securing what you sell both because you need to, but also because it is good for your business

Where are our inventories and why do we still generally fail at knowing what systems we have

Of course, third party risk management. It&amp;#39;s a mandatory &amp;quot;slide 3&amp;quot; on every board presentation, of course.



We still debate, we still discuss, we still shift the discussion to automotive and manufacturing from time to time, but now we have some additional voices to add to the debate, too. Thanks so much, Jess!
Special Guest: Jessica Burn.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.amazon.com/Good-They-Cant-Ignore-You/dp/1455509124 (So Good They Can&apos;t Ignore You: Why Skills Trump Passion in the Quest for Work You Love: Newport, Cal: 8601420220263: Amazon.com: Books)
https://go.forrester.com/blogs/security-recommendations-2021-taking-stock-for-the-long-term/ (Security Recommendations 2021: Taking Stock For The Long Term)
https://www.forrester.com/report/A+CISOs+First+100+Days/-/E-RES159295 (A CISO&apos;s First 100 Days)
https://go.forrester.com/blogs/developer-security-champions-now-more-than-ever/ (Developer Security Champions Are Needed Now More Than Ever)
https://www.fsisac.com/ (Financial Services Information Sharing and Analysis Center)
https://www.ls-isao.com/ (Legal Services Information Sharing | LS-ISAO)
https://www.inc.com/michael-schneider/only-10-percent-of-people-are-natural-leaders-rest-of-us-have-to-work-on-developing-these-3-qualities.html?cid=sf01002&amp;fbclid=IwAR3I8HTQ_PtI4FStq4Pogp-VV_nVMPRSrH5IS_SZ0YxQ70Yh6fB8NYl63XA (Only 10 Percent of People Are Natural Leaders. The Rest of Us Have to Work on Developing These 3 Qualities | Inc.com)</itunes:summary></item><item><title>Out of Office: One Year Later</title><itunes:title>Out of Office: One Year Later</itunes:title><description><![CDATA[<p>Exactly one year ago, most of the population of the US was given the word to begin to work from home. Security and technology teams were large parts of the preparation for this change, and were also largely able to move their operations to a home office for the duration of the last twelve months. The last year has been one of constant "on", whether due to changing technology requirements that need to be worked on, increasing incident and response, 10 hours per day in front of the camera on Zoom, and filling what used to be commutes with (wait for it) even more work.</p><p>Dan, Brian and Erik cover a lot of topics, including security of remote work, the mental health impacts of prolonged working remotely, looking out for ourselves and those in our lives, and reconnecting with those that we may have lost contact with over the years. The guys also share positive and negative observations about work/life from the past year, too.</p><p>Please subscribe and leave ratings or feedback in your favourite podcast application! It really helps the podcast out a lot when you do!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://www.hulu.com/movie/kid-90-f6944ad5-bd84-4093-99e8-5f1d1d44c787" rel="noopener noreferrer" target="_blank">Watch kid 90 Streaming Online | Hulu</a></li><li><a href="https://www.amazon.com/Smarter-Faster-Better-Transformative-Productivity-ebook/dp/B00Z3FRYB0" rel="noopener noreferrer" target="_blank">Smarter Faster Better: The Transformative Power of Real Productivity - Kindle edition by Duhigg, Charles. Health, Fitness &amp; Dieting Kindle eBooks @ Amazon.com.</a></li><li><a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful-ebook/dp/B07WF972WK/ref=sr_1_3?crid=2GT921FN9UNEJ&amp;dchild=1&amp;keywords=7+habits+of+highly+effective+people&amp;qid=1615731980&amp;s=digital-text&amp;sprefix=7+habits+of+%2Cdigital-text%2C175&amp;sr=1-3" rel="noopener noreferrer" target="_blank">Amazon.com: The 7 Habits of Highly Effective People: 30th Anniversary Edition eBook: Covey, Stephen R., Collins, Jim, Covey, Sean: Kindle Store</a></li><li><a href="https://www.kaizen.com/what-is-kaizen.html" rel="noopener noreferrer" target="_blank">What is KAIZEN™</a></li><li><a href="https://www.amazon.com/Algorithms-Oppression-Search-Engines-Reinforce/dp/1479837245" rel="noopener noreferrer" target="_blank">Algorithms of Oppression: How Search Engines Reinforce Racism: Noble, Safiya Umoja: 9781479837243: Amazon.com: Books</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Exactly one year ago, most of the population of the US was given the word to begin to work from home. Security and technology teams were large parts of the preparation for this change, and were also largely able to move their operations to a home office for the duration of the last twelve months. The last year has been one of constant "on", whether due to changing technology requirements that need to be worked on, increasing incident and response, 10 hours per day in front of the camera on Zoom, and filling what used to be commutes with (wait for it) even more work.</p><p>Dan, Brian and Erik cover a lot of topics, including security of remote work, the mental health impacts of prolonged working remotely, looking out for ourselves and those in our lives, and reconnecting with those that we may have lost contact with over the years. The guys also share positive and negative observations about work/life from the past year, too.</p><p>Please subscribe and leave ratings or feedback in your favourite podcast application! It really helps the podcast out a lot when you do!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://www.hulu.com/movie/kid-90-f6944ad5-bd84-4093-99e8-5f1d1d44c787" rel="noopener noreferrer" target="_blank">Watch kid 90 Streaming Online | Hulu</a></li><li><a href="https://www.amazon.com/Smarter-Faster-Better-Transformative-Productivity-ebook/dp/B00Z3FRYB0" rel="noopener noreferrer" target="_blank">Smarter Faster Better: The Transformative Power of Real Productivity - Kindle edition by Duhigg, Charles. Health, Fitness &amp; Dieting Kindle eBooks @ Amazon.com.</a></li><li><a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful-ebook/dp/B07WF972WK/ref=sr_1_3?crid=2GT921FN9UNEJ&amp;dchild=1&amp;keywords=7+habits+of+highly+effective+people&amp;qid=1615731980&amp;s=digital-text&amp;sprefix=7+habits+of+%2Cdigital-text%2C175&amp;sr=1-3" rel="noopener noreferrer" target="_blank">Amazon.com: The 7 Habits of Highly Effective People: 30th Anniversary Edition eBook: Covey, Stephen R., Collins, Jim, Covey, Sean: Kindle Store</a></li><li><a href="https://www.kaizen.com/what-is-kaizen.html" rel="noopener noreferrer" target="_blank">What is KAIZEN™</a></li><li><a href="https://www.amazon.com/Algorithms-Oppression-Search-Engines-Reinforce/dp/1479837245" rel="noopener noreferrer" target="_blank">Algorithms of Oppression: How Search Engines Reinforce Racism: Noble, Safiya Umoja: 9781479837243: Amazon.com: Books</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-19-out-of-office-one-year-later]]></link><guid isPermaLink="false">2dcb0031-f68d-4e63-8d43-3686efab91a3</guid><itunes:image href="https://artwork.captivate.fm/da009f46-88a2-425d-aa01-dfe359d08743/cover.jpg"/><pubDate>Mon, 15 Mar 2021 10:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5113b530-372b-4ba7-8905-4712a8dd50c7/2dcb0031-f68d-4e63-8d43-3686efab91a3.mp3" length="43433143" type="audio/mpeg"/><itunes:duration>57:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Exactly one year ago, most of the population of the US was given the word to begin to work from home. Security and technology teams were large parts of the preparation for this change, and were also largely able to move their operations to a home office for the duration of the last twelve months. The last year has been one of constant &amp;quot;on&amp;quot;, whether due to changing technology requirements that need to be worked on, increasing incident and response, 10 hours per day in front of the camera on Zoom, and filling what used to be commutes with (wait for it) even more work.


Dan, Brian and Erik cover a lot of topics, including security of remote work, the mental health impacts of prolonged working remotely, looking out for ourselves and those in our lives, and reconnecting with those that we may have lost contact with over the years. The guys also share positive and negative observations about work/life from the past year, too.


Please subscribe and leave ratings or feedback in your favourite podcast application! It really helps the podcast out a lot when you do!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://mentorcore.biz/ (MentorCore – Growth and Development at your Fingertips)
https://www.hulu.com/movie/kid-90-f6944ad5-bd84-4093-99e8-5f1d1d44c787 (Watch kid 90 Streaming Online | Hulu)
https://www.amazon.com/Smarter-Faster-Better-Transformative-Productivity-ebook/dp/B00Z3FRYB0 (Smarter Faster Better: The Transformative Power of Real Productivity - Kindle edition by Duhigg, Charles. Health, Fitness &amp; Dieting Kindle eBooks @ Amazon.com.)
https://www.amazon.com/Habits-Highly-Effective-People-Powerful-ebook/dp/B07WF972WK/ref=sr_1_3?crid=2GT921FN9UNEJ&amp;dchild=1&amp;keywords=7+habits+of+highly+effective+people&amp;qid=1615731980&amp;s=digital-text&amp;sprefix=7+habits+of+%2Cdigital-text%2C175&amp;sr=1-3 (Amazon.com: The 7 Habits of Highly Effective People: 30th Anniversary Edition eBook: Covey, Stephen R., Collins, Jim, Covey, Sean: Kindle Store)
https://www.kaizen.com/what-is-kaizen.html (What is KAIZEN™)
https://www.amazon.com/Algorithms-Oppression-Search-Engines-Reinforce/dp/1479837245 (Algorithms of Oppression: How Search Engines Reinforce Racism: Noble, Safiya Umoja: 9781479837243: Amazon.com: Books)</itunes:summary></item><item><title>The ABCs of CISOs</title><itunes:title>The ABCs of CISOs</itunes:title><description><![CDATA[<p>This week we look at the security organisation through the looking glass. From within the org, the leaders and the partners and product/service providers we work with, we dig into some of the ways that security works with the rest of the business and customers, and how the needs of each org changes over time and necessitates the need for different mindsets to support those needs from a security perspective. </p><ul><li><br></li><li>CISO tenure, churn and average age compared to other C-levels</li><li><br></li><li><br></li><li>How security applies to business value (or sometimes not in the obvious ways)</li><li><br></li><li><br></li><li>What's better on an RFP response? More detail, or just yes/no answers?</li><li><br></li><li><br></li><li>CISOs (and all security professionals) as storytellers</li><li><br></li><li><br></li><li>Relationships with security product vendors, VARs and others selling into organisations on how to build trust and transparency and turn from selling into true partnerships</li><li><br></li></ul><br/><p>Also, Dan successfully makes an automotive analogy; you can't miss that! </p><p>We name drop a few friends who have shared insights that led to our comments today. Check them out and give them wave and a thanks from us!</p><p><br></p><p><a href="https://www.linkedin.com/in/johnbingham/" rel="noopener noreferrer" target="_blank">John Bingham</a>, Chief Operating Officer at <a href="https://www.speakbydesign.com" rel="noopener noreferrer" target="_blank">Speak by Design</a></p><p><br></p><p><a href="https://www.linkedin.com/in/jpollard96/" rel="noopener noreferrer" target="_blank">Jeff Pollard</a>, VP &amp; Principal Analyst at Forrester - <a href="https://twitter.com/jeff_pollard2?s=20" rel="noopener noreferrer" target="_blank">https://twitter.com/jeff_pollard2?s=20</a></p><p><br></p><p>Enjoy the episode.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/15" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 15: Jobs (Not Woz)</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="https://medium.com/ciso-cyber-leaders/how-to-quantify-cyber-risk-in-a-somewhat-simple-way-8297bb60490b" rel="noopener noreferrer" target="_blank">How To Quantify Cyber Risk In A (Somewhat) Simple Way | by Opinionated Security | CISO &amp; Cyber Leaders | Medium</a></li><li><a href="https://go.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://www.ciodive.com/news/forrester-chief-information-security-officer-cyber/585682/" rel="noopener noreferrer" target="_blank">6 types of CISO and the companies they thrive in | CIO Dive</a></li><li><a href="https://www.linkedin.com/posts/jpollard96_busting-the-myth-of-the-two-year-ciso-tenure-activity-6766131278665277440-UMae/" rel="noopener noreferrer" target="_blank">Busting the Myth of the Two Year CISO Tenure</a></li><li><a href="https://www.intelligize.com/data-breaches-measurable-impact-long-term-stock-prices/" rel="noopener noreferrer" target="_blank">Data Breaches Will Impact Stock Prices Long-Term - Intelligize</a></li><li><a href="https://www.scmagazine.com/home/security-news/ransomware/was-kia-hit-by-ransomware-regardless-the-companys-resilience-is-under-the-microscope/" rel="noopener noreferrer" target="_blank">Ransomware attack or not, Kia's resilience is under the microscope</a></li><li><a href="https://www.speakbydesign.com/" rel="noopener noreferrer" target="_blank">Leader Communication Consulting &amp; Speaking Coach | Speak by Design</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>This week we look at the security organisation through the looking glass. From within the org, the leaders and the partners and product/service providers we work with, we dig into some of the ways that security works with the rest of the business and customers, and how the needs of each org changes over time and necessitates the need for different mindsets to support those needs from a security perspective. </p><ul><li><br></li><li>CISO tenure, churn and average age compared to other C-levels</li><li><br></li><li><br></li><li>How security applies to business value (or sometimes not in the obvious ways)</li><li><br></li><li><br></li><li>What's better on an RFP response? More detail, or just yes/no answers?</li><li><br></li><li><br></li><li>CISOs (and all security professionals) as storytellers</li><li><br></li><li><br></li><li>Relationships with security product vendors, VARs and others selling into organisations on how to build trust and transparency and turn from selling into true partnerships</li><li><br></li></ul><br/><p>Also, Dan successfully makes an automotive analogy; you can't miss that! </p><p>We name drop a few friends who have shared insights that led to our comments today. Check them out and give them wave and a thanks from us!</p><p><br></p><p><a href="https://www.linkedin.com/in/johnbingham/" rel="noopener noreferrer" target="_blank">John Bingham</a>, Chief Operating Officer at <a href="https://www.speakbydesign.com" rel="noopener noreferrer" target="_blank">Speak by Design</a></p><p><br></p><p><a href="https://www.linkedin.com/in/jpollard96/" rel="noopener noreferrer" target="_blank">Jeff Pollard</a>, VP &amp; Principal Analyst at Forrester - <a href="https://twitter.com/jeff_pollard2?s=20" rel="noopener noreferrer" target="_blank">https://twitter.com/jeff_pollard2?s=20</a></p><p><br></p><p>Enjoy the episode.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net/15" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 15: Jobs (Not Woz)</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="https://medium.com/ciso-cyber-leaders/how-to-quantify-cyber-risk-in-a-somewhat-simple-way-8297bb60490b" rel="noopener noreferrer" target="_blank">How To Quantify Cyber Risk In A (Somewhat) Simple Way | by Opinionated Security | CISO &amp; Cyber Leaders | Medium</a></li><li><a href="https://go.forrester.com/blogs/the-future-of-the-ciso-six-types-of-security-leaders/" rel="noopener noreferrer" target="_blank">The Future Of The CISO — Six Types Of Security Leaders</a></li><li><a href="https://www.ciodive.com/news/forrester-chief-information-security-officer-cyber/585682/" rel="noopener noreferrer" target="_blank">6 types of CISO and the companies they thrive in | CIO Dive</a></li><li><a href="https://www.linkedin.com/posts/jpollard96_busting-the-myth-of-the-two-year-ciso-tenure-activity-6766131278665277440-UMae/" rel="noopener noreferrer" target="_blank">Busting the Myth of the Two Year CISO Tenure</a></li><li><a href="https://www.intelligize.com/data-breaches-measurable-impact-long-term-stock-prices/" rel="noopener noreferrer" target="_blank">Data Breaches Will Impact Stock Prices Long-Term - Intelligize</a></li><li><a href="https://www.scmagazine.com/home/security-news/ransomware/was-kia-hit-by-ransomware-regardless-the-companys-resilience-is-under-the-microscope/" rel="noopener noreferrer" target="_blank">Ransomware attack or not, Kia's resilience is under the microscope</a></li><li><a href="https://www.speakbydesign.com/" rel="noopener noreferrer" target="_blank">Leader Communication Consulting &amp; Speaking Coach | Speak by Design</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-18-the-abcs-of-cisos]]></link><guid isPermaLink="false">7106202e-56e6-435f-8511-204cb3ff4a0c</guid><itunes:image href="https://artwork.captivate.fm/b0e6b2d0-6a77-48d5-92e7-4829d40be5c3/cover.jpg"/><pubDate>Sun, 28 Feb 2021 08:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/68a66c1b-0a17-4581-94af-25feb6cf523b/7106202e-56e6-435f-8511-204cb3ff4a0c.mp3" length="52057679" type="audio/mpeg"/><itunes:duration>01:09:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season></item><item><title>Our Favourite Things</title><itunes:title>Our Favourite Things</itunes:title><description><![CDATA[<p>It's Valentine's Day and you get presents. Dan, Brian and Erik discuss the books, people and tools that they each love and changed their lives. None are specifically security-related, so see what's been impactful on each of them in this episode. The links are an especially big part of the episode, so take a look in your podcast app or on the site (<a href="https://www.greatsecuritydebate.net/17" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/17</a>) to see all the recommendations and get more info about the topics and items covered.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cnn.com/2020/01/10/entertainment/neil-peart-rush-drummer-death-trnd/index.html" rel="noopener noreferrer" target="_blank">Neil Peart, the drummer and lyricist of Rush, has died at 67 - CNN</a></li><li><a href="https://www.amazon.com/Medium-Raw-Bloody-Valentine-People-ebook/dp/B003JBI2WU/ref=sr_1_6?dchild=1&amp;keywords=Anthony+Bourdain&amp;qid=1613313438&amp;rnid=2941120011&amp;s=books&amp;sr=1-6" rel="noopener noreferrer" target="_blank">Amazon.com: Medium Raw: A Bloody Valentine to the World of Food and the People Who Cook (P.S.) eBook: Bourdain, Anthony: Books</a></li><li><a href="https://www.cnn.com/2018/06/08/us/anthony-bourdain-obit/index.html" rel="noopener noreferrer" target="_blank">CNN's Anthony Bourdain dead at 61 - CNN</a></li><li><a href="https://www.amazon.com/Kitchen-Confidential-Updated-Adventures-Underbelly/dp/0060899220/ref=sr_1_1?dchild=1&amp;keywords=Kitchen+Confidential%3A+Adventures+in+the+Culinary+Underbelly&amp;qid=1613314123&amp;sr=8-1" rel="noopener noreferrer" target="_blank">Kitchen Confidential Updated Edition: Adventures in the Culinary Underbelly (P.S.): Bourdain, Anthony: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful/dp/0743269519" rel="noopener noreferrer" target="_blank">The 7 Habits of Highly Effective People: Powerful Lessons in Personal Change: Covey, Stephen R.: 9780743269513: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Hamilton-Revolution-Lin-Manuel-Miranda/dp/1455539740/ref=sr_1_5?dchild=1&amp;keywords=hamilton&amp;qid=1613313997&amp;sr=8-5" rel="noopener noreferrer" target="_blank">Hamilton: The Revolution: Miranda, Lin-Manuel, McCarter, Jeremy: 9781455539741: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Third-Door-Uncover-Successful-Launched/dp/0804136661/ref=sr_1_1?dchild=1&amp;keywords=the+third+door&amp;qid=1613314072&amp;sr=8-1" rel="noopener noreferrer" target="_blank">Amazon.com: The Third Door: The Wild Quest to Uncover How the World's Most Successful People Launched Their Careers (9780804136662): Banayan, Alex: Books</a></li><li><a href="https://www.corporatecomplianceinsights.com/security-career-connection/" rel="noopener noreferrer" target="_blank">Security Career Connection | Corporate Compliance Insights</a></li><li><a href="https://www.amazon.com/Born-Run-Hidden-Superathletes-Greatest/dp/0307279189/ref=sr_1_2?crid=101KBYFRX7YSF&amp;dchild=1&amp;keywords=born+to+run+book&amp;qid=1613311720&amp;sprefix=born+to+run%2Caps%2C184&amp;sr=8-2" rel="noopener noreferrer" target="_blank">Born to Run: A Hidden Tribe, Superathletes, and the Greatest Race the World Has Never Seen: McDougall, Christopher: 9780307279187: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Three-Cups-Tea-Mission-Promote/dp/0143038257" rel="noopener noreferrer" target="_blank">Three Cups of Tea: One Man's Mission to Promote Peace - One School at a Time: Greg Mortenson, David Oliver Relin: 9780143038252: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Alchemist-Paulo-Coelho/dp/0061122416" rel="noopener noreferrer" target="_blank">Amazon.com: The Alchemist (9780061122415): Paulo Coelho, Alan R. Clarke: Books</a></li><li><a href="https://danielayala.com/2019/07/01/secratic-a-personal-legend/" rel="noopener noreferrer" target="_blank">Secratic: A Personal Legend – Pragmatically Cynical</a></li><li><a href="https://www.amazon.com/Harold-Purple-Crayon-Books/dp/0064430227" rel="noopener noreferrer" target="_blank">Harold and the Purple Crayon (Purple Crayon Books): Johnson, Crockett, Johnson, Crockett: 9780064430227: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/What-Got-Here-Wont-There/dp/1401301304/ref=sr_1_1?crid=10ABB7FRDQDBP&amp;dchild=1&amp;keywords=what+got+you+here+wont+get+you+there&amp;qid=1613311957&amp;sprefix=what+got+you+here%2Caps%2C171&amp;sr=8-1" rel="noopener noreferrer" target="_blank">What Got You Here Won't Get You There: How Successful People Become Even More Successful: Goldsmith, Marshall, Reiter, Mark: 9781401301309: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Discover-Your-True-North-George/dp/1119082943/ref=sr_1_2?dchild=1&amp;keywords=true+north&amp;qid=1613315540&amp;s=books&amp;sr=1-2" rel="noopener noreferrer" target="_blank">Discover Your True North: George, Bill, Gergen, David: 9781119082941: Amazon.com: Books</a></li><li><a href="https://blog.hubspot.com/sales/not-to-do-list" rel="noopener noreferrer" target="_blank">What Warren Buffett Taught Me About Setting Goals</a></li><li><a href="https://www.imdb.com/title/tt0441773/" rel="noopener noreferrer" target="_blank">Kung Fu Panda (2008) - IMDb</a></li><li><a href="https://www.amazon.com/Sony-Radio-Listeners-Kit-ICF-SW7600GR/dp/B00009VSDM/ref=sr_1_2?dchild=1&amp;keywords=sony+world+radio&amp;qid=1613316322&amp;s=electronics&amp;sr=1-2" rel="noopener noreferrer" target="_blank">Amazon.com: Sony Radio Listeners Kit - ICF-SW7600GR AM/FM Shortwave World Band Radio: Electronics</a> — This is the model I use for world band listening and it is 10+ years old. Go get any world band radio to hear the world in your own home.</li><li><a href="https://www.linkedin.com/posts/activity-6764589333564469248-TjQu" rel="noopener noreferrer" target="_blank">Brian Schneble | Chili Cook Off Recipe</a></li><li><a href="https://www.amazon.com/KENSHIN-GYUTO-JAPANESE-KNIFE-240MM/dp/B01FCI14KE" rel="noopener noreferrer" target="_blank">Amazon.com: KENSHIN R2/SG2 GYUTO JAPANESE CHEF KNIFE 240MM: Kitchen &amp; Dining</a></li><li><a href="https://www.youtube.com/watch?v=MhrzUVBhrLQ" rel="noopener noreferrer" target="_blank">Samurai Hotel - SNL - YouTube</a></li><li><a href="http://websdr.org/" rel="noopener noreferrer" target="_blank">WebSDR - Listen to World Radio Online</a></li><li><a href="http://www.global-knife.com/" rel="noopener noreferrer" target="_blank">GLOBAL - The Official brand site | Professional Chef’s knives &amp; Japanese Specialist Knives</a></li><li><a href="https://www.tramontina.com/" rel="noopener noreferrer" target="_blank">Tramontina Store | Tramontina</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>It's Valentine's Day and you get presents. Dan, Brian and Erik discuss the books, people and tools that they each love and changed their lives. None are specifically security-related, so see what's been impactful on each of them in this episode. The links are an especially big part of the episode, so take a look in your podcast app or on the site (<a href="https://www.greatsecuritydebate.net/17" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net/17</a>) to see all the recommendations and get more info about the topics and items covered.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cnn.com/2020/01/10/entertainment/neil-peart-rush-drummer-death-trnd/index.html" rel="noopener noreferrer" target="_blank">Neil Peart, the drummer and lyricist of Rush, has died at 67 - CNN</a></li><li><a href="https://www.amazon.com/Medium-Raw-Bloody-Valentine-People-ebook/dp/B003JBI2WU/ref=sr_1_6?dchild=1&amp;keywords=Anthony+Bourdain&amp;qid=1613313438&amp;rnid=2941120011&amp;s=books&amp;sr=1-6" rel="noopener noreferrer" target="_blank">Amazon.com: Medium Raw: A Bloody Valentine to the World of Food and the People Who Cook (P.S.) eBook: Bourdain, Anthony: Books</a></li><li><a href="https://www.cnn.com/2018/06/08/us/anthony-bourdain-obit/index.html" rel="noopener noreferrer" target="_blank">CNN's Anthony Bourdain dead at 61 - CNN</a></li><li><a href="https://www.amazon.com/Kitchen-Confidential-Updated-Adventures-Underbelly/dp/0060899220/ref=sr_1_1?dchild=1&amp;keywords=Kitchen+Confidential%3A+Adventures+in+the+Culinary+Underbelly&amp;qid=1613314123&amp;sr=8-1" rel="noopener noreferrer" target="_blank">Kitchen Confidential Updated Edition: Adventures in the Culinary Underbelly (P.S.): Bourdain, Anthony: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Habits-Highly-Effective-People-Powerful/dp/0743269519" rel="noopener noreferrer" target="_blank">The 7 Habits of Highly Effective People: Powerful Lessons in Personal Change: Covey, Stephen R.: 9780743269513: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Hamilton-Revolution-Lin-Manuel-Miranda/dp/1455539740/ref=sr_1_5?dchild=1&amp;keywords=hamilton&amp;qid=1613313997&amp;sr=8-5" rel="noopener noreferrer" target="_blank">Hamilton: The Revolution: Miranda, Lin-Manuel, McCarter, Jeremy: 9781455539741: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Third-Door-Uncover-Successful-Launched/dp/0804136661/ref=sr_1_1?dchild=1&amp;keywords=the+third+door&amp;qid=1613314072&amp;sr=8-1" rel="noopener noreferrer" target="_blank">Amazon.com: The Third Door: The Wild Quest to Uncover How the World's Most Successful People Launched Their Careers (9780804136662): Banayan, Alex: Books</a></li><li><a href="https://www.corporatecomplianceinsights.com/security-career-connection/" rel="noopener noreferrer" target="_blank">Security Career Connection | Corporate Compliance Insights</a></li><li><a href="https://www.amazon.com/Born-Run-Hidden-Superathletes-Greatest/dp/0307279189/ref=sr_1_2?crid=101KBYFRX7YSF&amp;dchild=1&amp;keywords=born+to+run+book&amp;qid=1613311720&amp;sprefix=born+to+run%2Caps%2C184&amp;sr=8-2" rel="noopener noreferrer" target="_blank">Born to Run: A Hidden Tribe, Superathletes, and the Greatest Race the World Has Never Seen: McDougall, Christopher: 9780307279187: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Three-Cups-Tea-Mission-Promote/dp/0143038257" rel="noopener noreferrer" target="_blank">Three Cups of Tea: One Man's Mission to Promote Peace - One School at a Time: Greg Mortenson, David Oliver Relin: 9780143038252: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Alchemist-Paulo-Coelho/dp/0061122416" rel="noopener noreferrer" target="_blank">Amazon.com: The Alchemist (9780061122415): Paulo Coelho, Alan R. Clarke: Books</a></li><li><a href="https://danielayala.com/2019/07/01/secratic-a-personal-legend/" rel="noopener noreferrer" target="_blank">Secratic: A Personal Legend – Pragmatically Cynical</a></li><li><a href="https://www.amazon.com/Harold-Purple-Crayon-Books/dp/0064430227" rel="noopener noreferrer" target="_blank">Harold and the Purple Crayon (Purple Crayon Books): Johnson, Crockett, Johnson, Crockett: 9780064430227: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/What-Got-Here-Wont-There/dp/1401301304/ref=sr_1_1?crid=10ABB7FRDQDBP&amp;dchild=1&amp;keywords=what+got+you+here+wont+get+you+there&amp;qid=1613311957&amp;sprefix=what+got+you+here%2Caps%2C171&amp;sr=8-1" rel="noopener noreferrer" target="_blank">What Got You Here Won't Get You There: How Successful People Become Even More Successful: Goldsmith, Marshall, Reiter, Mark: 9781401301309: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Discover-Your-True-North-George/dp/1119082943/ref=sr_1_2?dchild=1&amp;keywords=true+north&amp;qid=1613315540&amp;s=books&amp;sr=1-2" rel="noopener noreferrer" target="_blank">Discover Your True North: George, Bill, Gergen, David: 9781119082941: Amazon.com: Books</a></li><li><a href="https://blog.hubspot.com/sales/not-to-do-list" rel="noopener noreferrer" target="_blank">What Warren Buffett Taught Me About Setting Goals</a></li><li><a href="https://www.imdb.com/title/tt0441773/" rel="noopener noreferrer" target="_blank">Kung Fu Panda (2008) - IMDb</a></li><li><a href="https://www.amazon.com/Sony-Radio-Listeners-Kit-ICF-SW7600GR/dp/B00009VSDM/ref=sr_1_2?dchild=1&amp;keywords=sony+world+radio&amp;qid=1613316322&amp;s=electronics&amp;sr=1-2" rel="noopener noreferrer" target="_blank">Amazon.com: Sony Radio Listeners Kit - ICF-SW7600GR AM/FM Shortwave World Band Radio: Electronics</a> — This is the model I use for world band listening and it is 10+ years old. Go get any world band radio to hear the world in your own home.</li><li><a href="https://www.linkedin.com/posts/activity-6764589333564469248-TjQu" rel="noopener noreferrer" target="_blank">Brian Schneble | Chili Cook Off Recipe</a></li><li><a href="https://www.amazon.com/KENSHIN-GYUTO-JAPANESE-KNIFE-240MM/dp/B01FCI14KE" rel="noopener noreferrer" target="_blank">Amazon.com: KENSHIN R2/SG2 GYUTO JAPANESE CHEF KNIFE 240MM: Kitchen &amp; Dining</a></li><li><a href="https://www.youtube.com/watch?v=MhrzUVBhrLQ" rel="noopener noreferrer" target="_blank">Samurai Hotel - SNL - YouTube</a></li><li><a href="http://websdr.org/" rel="noopener noreferrer" target="_blank">WebSDR - Listen to World Radio Online</a></li><li><a href="http://www.global-knife.com/" rel="noopener noreferrer" target="_blank">GLOBAL - The Official brand site | Professional Chef’s knives &amp; Japanese Specialist Knives</a></li><li><a href="https://www.tramontina.com/" rel="noopener noreferrer" target="_blank">Tramontina Store | Tramontina</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-17-our-favourite-things]]></link><guid isPermaLink="false">df894182-f666-46a9-8f39-2f346829ecf5</guid><itunes:image href="https://artwork.captivate.fm/d22e722d-3608-4e9d-8f2e-53b37f984cf8/cover.jpg"/><pubDate>Sun, 14 Feb 2021 13:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/10fcf8ab-07e8-417c-9e02-582e4fae5ecb/df894182-f666-46a9-8f39-2f346829ecf5.mp3" length="49251258" type="audio/mpeg"/><itunes:duration>01:06:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season></item><item><title>The Winds of Change</title><itunes:title>The Winds of Change</itunes:title><description><![CDATA[<p>The time for job change happens and there are a lot of things go along with it including. We cover a ton of them in this week's episode:</p><ul><li><br></li><li>The reasons to make a career change</li><li><br></li><li><br></li><li>Deciding the time is right to make a change (and how do you know)</li><li><br></li><li><br></li><li>Taking our own advice when it comes to our own career change</li><li><br></li><li><br></li><li>The importance of support of family to make more drastic changes</li><li><br></li><li><br></li><li>The power of self-reflection and the need to let go of the present to achieve the future</li><li><br></li><li><br></li><li>The importance of strong personal and community networking in career growth</li><li><br></li><li><br></li><li> Impostor syndrome</li><li><br></li><li><br></li><li> Certification overload in security and privacy</li><li><br></li><li><br></li><li> Letting someone you know that it may be time for them to make a change</li><li><br></li></ul><br/><p>And the quote of the day is from The Great One, Wayne Gretsky - you miss 100% of the shots you don't take!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://hpatton.medium.com/security-leadership-moving-on-d95f63818a5b" rel="noopener noreferrer" target="_blank">Security Leadership: Moving On. How to Know When It’s Time To Go | by Helen Patton | Jan, 2021 | Medium</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://www.colorado-security.com/" rel="noopener noreferrer" target="_blank">Colorado = Security</a> — If you are in Colorado and in security, click on Join our Slack Workspace at the bottom to join the Colorado=Security Slack!</li><li><a href="https://www.linkedin.com/posts/veronica-toscano-_six-months-ago-i-applied-for-a-chief-of-activity-6760348777871233024-R_4y/" rel="noopener noreferrer" target="_blank">Six Months Ago I Applied for a Chief of Staff Role</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://genius.com/Chumbawamba-tubthumping-lyrics" rel="noopener noreferrer" target="_blank">Chumbawamba – Tubthumping Lyrics | Genius Lyrics</a></li><li><a href="https://www.amazon.com/SPEED-TRUST-Thing-Changes-Everything/dp/1416549005" rel="noopener noreferrer" target="_blank">Speed of Trust: The One Thing That Changes Everything: Stephen M .R. Covey, Stephen R. Covey, Rebecca R. Merrill: 8601405449078: Amazon.com: Books</a></li><li><a href="https://erick.rudiak.com/ciso/my-favorite-cisos-arent-cisos/" rel="noopener noreferrer" target="_blank">My Favorite CISOs aren't CISOs</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The time for job change happens and there are a lot of things go along with it including. We cover a ton of them in this week's episode:</p><ul><li><br></li><li>The reasons to make a career change</li><li><br></li><li><br></li><li>Deciding the time is right to make a change (and how do you know)</li><li><br></li><li><br></li><li>Taking our own advice when it comes to our own career change</li><li><br></li><li><br></li><li>The importance of support of family to make more drastic changes</li><li><br></li><li><br></li><li>The power of self-reflection and the need to let go of the present to achieve the future</li><li><br></li><li><br></li><li>The importance of strong personal and community networking in career growth</li><li><br></li><li><br></li><li> Impostor syndrome</li><li><br></li><li><br></li><li> Certification overload in security and privacy</li><li><br></li><li><br></li><li> Letting someone you know that it may be time for them to make a change</li><li><br></li></ul><br/><p>And the quote of the day is from The Great One, Wayne Gretsky - you miss 100% of the shots you don't take!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://hpatton.medium.com/security-leadership-moving-on-d95f63818a5b" rel="noopener noreferrer" target="_blank">Security Leadership: Moving On. How to Know When It’s Time To Go | by Helen Patton | Jan, 2021 | Medium</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://www.colorado-security.com/" rel="noopener noreferrer" target="_blank">Colorado = Security</a> — If you are in Colorado and in security, click on Join our Slack Workspace at the bottom to join the Colorado=Security Slack!</li><li><a href="https://www.linkedin.com/posts/veronica-toscano-_six-months-ago-i-applied-for-a-chief-of-activity-6760348777871233024-R_4y/" rel="noopener noreferrer" target="_blank">Six Months Ago I Applied for a Chief of Staff Role</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://genius.com/Chumbawamba-tubthumping-lyrics" rel="noopener noreferrer" target="_blank">Chumbawamba – Tubthumping Lyrics | Genius Lyrics</a></li><li><a href="https://www.amazon.com/SPEED-TRUST-Thing-Changes-Everything/dp/1416549005" rel="noopener noreferrer" target="_blank">Speed of Trust: The One Thing That Changes Everything: Stephen M .R. Covey, Stephen R. Covey, Rebecca R. Merrill: 8601405449078: Amazon.com: Books</a></li><li><a href="https://erick.rudiak.com/ciso/my-favorite-cisos-arent-cisos/" rel="noopener noreferrer" target="_blank">My Favorite CISOs aren't CISOs</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-16-the-winds-of-change]]></link><guid isPermaLink="false">685e36a1-6288-407b-8e1b-606ed452a08b</guid><itunes:image href="https://artwork.captivate.fm/1301e3f7-f70e-439c-9bca-a1c215a918af/cover.jpg"/><pubDate>Sun, 31 Jan 2021 18:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/109416b7-0b8c-4e97-b0a3-153a61294799/685e36a1-6288-407b-8e1b-606ed452a08b.mp3" length="39048608" type="audio/mpeg"/><itunes:duration>51:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><itunes:summary>The time for job change happens and there are a lot of things go along with it including. We cover a ton of them in this week&amp;#39;s episode:



The reasons to make a career change

Deciding the time is right to make a change (and how do you know)

Taking our own advice when it comes to our own career change

The importance of support of family to make more drastic changes

The power of self-reflection and the need to let go of the present to achieve the future

The importance of strong personal and community networking in career growth

 Impostor syndrome

 Certification overload in security and privacy

 Letting someone you know that it may be time for them to make a change



And the quote of the day is from The Great One, Wayne Gretsky - you miss 100% of the shots you don&amp;#39;t take!
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://hpatton.medium.com/security-leadership-moving-on-d95f63818a5b (Security Leadership: Moving On. How to Know When It’s Time To Go | by Helen Patton | Jan, 2021 | Medium)
https://mentorcore.biz/ (MentorCore – Growth and Development at your Fingertips)
https://www.colorado-security.com/ (Colorado = Security) &amp;mdash; If you are in Colorado and in security, click on Join our Slack Workspace at the bottom to join the Colorado=Security Slack!
https://www.linkedin.com/posts/veronica-toscano-_six-months-ago-i-applied-for-a-chief-of-activity-6760348777871233024-R_4y/ (Six Months Ago I Applied for a Chief of Staff Role)
https://www.womsa.org/ (Home | WomSA)
https://genius.com/Chumbawamba-tubthumping-lyrics (Chumbawamba – Tubthumping Lyrics | Genius Lyrics)
https://www.amazon.com/SPEED-TRUST-Thing-Changes-Everything/dp/1416549005 (Speed of Trust: The One Thing That Changes Everything: Stephen M .R. Covey, Stephen R. Covey, Rebecca R. Merrill: 8601405449078: Amazon.com: Books)
https://erick.rudiak.com/ciso/my-favorite-cisos-arent-cisos/ (My Favorite CISOs aren&apos;t CISOs)</itunes:summary></item><item><title>Jobs (Not Woz)</title><itunes:title>Jobs (Not Woz)</itunes:title><description><![CDATA[<p>We are 9 months into a period in which many workers, including technology and security professionals, are still doing their jobs remotely. Some have moved away from their primary homes, often without letting their company know that this has happened. As business processes catch up with this change in approach, some companies are taking steps to a) formalise work from home as a more standard offering, b) determine how to pay people wherever they are in the country/world, c) decide if in-person culture is key to their ethos, and how to deal with the new focus on remote work.</p><p>In this week's debate, Brian, Erik and Dan chat look at these topics from the pros and the cons, and what it could be like if everyone stays remote, the benefits and risks of geographically independent pay scales, and more.</p><p>Please take a moment and subscribe to the podcast in your preferred podcast application, and while you are there give soime feedback, either via a rating, or a comment, or both! We want to hear your feedback and ideas, so you can also email us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net </a> or on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://newyork.cbslocal.com/2020/10/25/new-jersey-income-tax-vs-new-york/" rel="noopener noreferrer" target="_blank">Do New Jersey Residents Working From Home Still Have To Pay New York Income Taxes? – CBS New York</a></li><li><a href="https://www.geekwire.com/2020/microsoft-will-remove-user-names-productivity-score-feature-privacy-backlash/" rel="noopener noreferrer" target="_blank">Microsoft will remove user names from ‘Productivity Score’ feature after privacy backlash - GeekWire</a></li><li><a href="https://www.amazon.com/Silicon-American-Experience-Randall-MacLowry/dp/B00BD7MBK6" rel="noopener noreferrer" target="_blank">Watch Silicon Valley American Experience | Prime Video</a></li><li><a href="https://www.intel.com/content/www/us/en/history/museum-robert-noyce.html" rel="noopener noreferrer" target="_blank">Robert Noyce, Statesman of Silicon Valley</a></li><li><a href="https://www.amazon.com/Trillion-Dollar-Coach-Leadership-Playbook/dp/0062839268" rel="noopener noreferrer" target="_blank">Amazon.com: Trillion Dollar Coach: The Leadership Playbook of Silicon Valley's Bill Campbell (9780062839268): Schmidt, Eric, Rosenberg, Jonathan, Eagle, Alan: Books</a></li><li><a href="http://www.madehow.com/Volume-4/Orange-Juice.html" rel="noopener noreferrer" target="_blank">How orange juice is made - production process, making, used, processing, product, industry</a></li><li><a href="https://www.wsj.com/articles/these-tech-companies-are-paying-workers-the-same-rates-across-u-s-11609237800?mod=e2tw" rel="noopener noreferrer" target="_blank">These Tech Companies Are Paying Workers the Same Rates Across U.S. - WSJ</a></li><li><a href="https://m.signalvnoise.com/minimum-pay-at-basecamp-is-now-70000/" rel="noopener noreferrer" target="_blank">Minimum pay at Basecamp is now $70,000 - Signal v. Noise</a></li><li><a href="https://www.inc.com/justin-bariso/this-companys-new-2-sentence-remote-work-policy-is-best-ive-ever-heard.html?cid=sf01003" rel="noopener noreferrer" target="_blank">This Company's New 2-Sentence Remote Work Policy Is the Best I've Ever Heard</a> — Siemens's new remote work policy is a master class in emotional intelligence.</li></ul><br/>]]></description><content:encoded><![CDATA[<p>We are 9 months into a period in which many workers, including technology and security professionals, are still doing their jobs remotely. Some have moved away from their primary homes, often without letting their company know that this has happened. As business processes catch up with this change in approach, some companies are taking steps to a) formalise work from home as a more standard offering, b) determine how to pay people wherever they are in the country/world, c) decide if in-person culture is key to their ethos, and how to deal with the new focus on remote work.</p><p>In this week's debate, Brian, Erik and Dan chat look at these topics from the pros and the cons, and what it could be like if everyone stays remote, the benefits and risks of geographically independent pay scales, and more.</p><p>Please take a moment and subscribe to the podcast in your preferred podcast application, and while you are there give soime feedback, either via a rating, or a comment, or both! We want to hear your feedback and ideas, so you can also email us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net </a> or on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://newyork.cbslocal.com/2020/10/25/new-jersey-income-tax-vs-new-york/" rel="noopener noreferrer" target="_blank">Do New Jersey Residents Working From Home Still Have To Pay New York Income Taxes? – CBS New York</a></li><li><a href="https://www.geekwire.com/2020/microsoft-will-remove-user-names-productivity-score-feature-privacy-backlash/" rel="noopener noreferrer" target="_blank">Microsoft will remove user names from ‘Productivity Score’ feature after privacy backlash - GeekWire</a></li><li><a href="https://www.amazon.com/Silicon-American-Experience-Randall-MacLowry/dp/B00BD7MBK6" rel="noopener noreferrer" target="_blank">Watch Silicon Valley American Experience | Prime Video</a></li><li><a href="https://www.intel.com/content/www/us/en/history/museum-robert-noyce.html" rel="noopener noreferrer" target="_blank">Robert Noyce, Statesman of Silicon Valley</a></li><li><a href="https://www.amazon.com/Trillion-Dollar-Coach-Leadership-Playbook/dp/0062839268" rel="noopener noreferrer" target="_blank">Amazon.com: Trillion Dollar Coach: The Leadership Playbook of Silicon Valley's Bill Campbell (9780062839268): Schmidt, Eric, Rosenberg, Jonathan, Eagle, Alan: Books</a></li><li><a href="http://www.madehow.com/Volume-4/Orange-Juice.html" rel="noopener noreferrer" target="_blank">How orange juice is made - production process, making, used, processing, product, industry</a></li><li><a href="https://www.wsj.com/articles/these-tech-companies-are-paying-workers-the-same-rates-across-u-s-11609237800?mod=e2tw" rel="noopener noreferrer" target="_blank">These Tech Companies Are Paying Workers the Same Rates Across U.S. - WSJ</a></li><li><a href="https://m.signalvnoise.com/minimum-pay-at-basecamp-is-now-70000/" rel="noopener noreferrer" target="_blank">Minimum pay at Basecamp is now $70,000 - Signal v. Noise</a></li><li><a href="https://www.inc.com/justin-bariso/this-companys-new-2-sentence-remote-work-policy-is-best-ive-ever-heard.html?cid=sf01003" rel="noopener noreferrer" target="_blank">This Company's New 2-Sentence Remote Work Policy Is the Best I've Ever Heard</a> — Siemens's new remote work policy is a master class in emotional intelligence.</li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-15-jobs-not-woz]]></link><guid isPermaLink="false">b08949ec-aba2-483e-aed7-7544df545982</guid><itunes:image href="https://artwork.captivate.fm/4aff1969-3049-406b-9524-7d1d20ec6da7/cover.jpg"/><pubDate>Sun, 03 Jan 2021 18:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f6adf490-55a6-4c15-8e4c-466b7bebfb9e/b08949ec-aba2-483e-aed7-7544df545982.mp3" length="43868787" type="audio/mpeg"/><itunes:duration>58:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season></item><item><title>Sun and Breeze</title><itunes:title>Sun and Breeze</itunes:title><description><![CDATA[<p>A few weeks ago, a company called SolarWinds was discovered to have had some bad actors in placing things in their technology (code) for a while. How did it happen? What does it mean to others? We don't know all the answers yet but we do know that it means we will have to make some changes to things like those universally hated security questionnaires, and how we manage our own source code to ensure better security.</p><p>Along with a discussion about how cow stomachs relate to information security, and Brian's invoking of The Art of War, there's something for everyone in this epsiode.</p><p>Propeller head warning - this one's a bit more security "inside baseball" than other episodes as we dig into the recent SolarWinds technology attack and some of the ways that the technology and security practitioners can address issues that have been identified. It's still a "for everyone" episode, but we do go a little more in depth that we usually do in some parts. Let us know what you think!</p><p><br></p><p>Please take a moment and subscribe to the podcast in your preferred podcast application, and while you are there give soime feedback, either via a rating, or a comment, or both! We want to hear your feedback and ideas, so you can also email us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net </a> or on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714" rel="noopener noreferrer" target="_blank">Identifying UNC2452-Related Techniques for ATT&amp;CK | by Matt Malone | MITRE ATT&amp;CK® | Dec, 2020 | Medium</a></li><li><a href="https://www.amazon.com/Art-War-Sun-Tzu/dp/160459893X" rel="noopener noreferrer" target="_blank">The Art of War: Tzu, Sun, Giles, Lionel: 9781604598933: Amazon.com: Books</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>A few weeks ago, a company called SolarWinds was discovered to have had some bad actors in placing things in their technology (code) for a while. How did it happen? What does it mean to others? We don't know all the answers yet but we do know that it means we will have to make some changes to things like those universally hated security questionnaires, and how we manage our own source code to ensure better security.</p><p>Along with a discussion about how cow stomachs relate to information security, and Brian's invoking of The Art of War, there's something for everyone in this epsiode.</p><p>Propeller head warning - this one's a bit more security "inside baseball" than other episodes as we dig into the recent SolarWinds technology attack and some of the ways that the technology and security practitioners can address issues that have been identified. It's still a "for everyone" episode, but we do go a little more in depth that we usually do in some parts. Let us know what you think!</p><p><br></p><p>Please take a moment and subscribe to the podcast in your preferred podcast application, and while you are there give soime feedback, either via a rating, or a comment, or both! We want to hear your feedback and ideas, so you can also email us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net </a> or on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714" rel="noopener noreferrer" target="_blank">Identifying UNC2452-Related Techniques for ATT&amp;CK | by Matt Malone | MITRE ATT&amp;CK® | Dec, 2020 | Medium</a></li><li><a href="https://www.amazon.com/Art-War-Sun-Tzu/dp/160459893X" rel="noopener noreferrer" target="_blank">The Art of War: Tzu, Sun, Giles, Lionel: 9781604598933: Amazon.com: Books</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-14-sun-and-breeze]]></link><guid isPermaLink="false">bf3bc284-01ea-4807-942e-0154ed7ae7db</guid><itunes:image href="https://artwork.captivate.fm/5768a3b5-0c6f-4c93-aa73-c410dd52ace8/cover.jpg"/><pubDate>Tue, 29 Dec 2020 14:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b02b7ddb-81a0-4240-92cf-9f3eb8d6304b/bf3bc284-01ea-4807-942e-0154ed7ae7db.mp3" length="46581254" type="audio/mpeg"/><itunes:duration>01:02:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season><itunes:summary>A few weeks ago, a company called SolarWinds was discovered to have had some bad actors in placing things in their technology (code) for a while. How did it happen? What does it mean to others? We don&amp;#39;t know all the answers yet but we do know that it means we will have to make some changes to things like those universally hated security questionnaires, and how we manage our own source code to ensure better security.


Along with a discussion about how cow stomachs relate to information security, and Brian&amp;#39;s invoking of The Art of War, there&amp;#39;s something for everyone in this epsiode.


Propeller head warning - this one&amp;#39;s a bit more security &amp;quot;inside baseball&amp;quot; than other episodes as we dig into the recent SolarWinds technology attack and some of the ways that the technology and security practitioners can address issues that have been identified. It&amp;#39;s still a &amp;quot;for everyone&amp;quot; episode, but we do go a little more in depth that we usually do in some parts. Let us know what you think!


Please take a moment and subscribe to the podcast in your preferred podcast application, and while you are there give soime feedback, either via a rating, or a comment, or both! We want to hear your feedback and ideas, so you can also email us at feedback@greatsecuritydebate.net  or on Twitter at https://twitter.com/securitydebate (https://twitter.com/securitydebate)
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714 (Identifying UNC2452-Related Techniques for ATT&amp;CK | by Matt Malone | MITRE ATT&amp;CK® | Dec, 2020 | Medium)
https://www.amazon.com/Art-War-Sun-Tzu/dp/160459893X (The Art of War: Tzu, Sun, Giles, Lionel: 9781604598933: Amazon.com: Books)</itunes:summary></item><item><title>E-Phish-Ency</title><itunes:title>E-Phish-Ency</itunes:title><description><![CDATA[<p>One of the ways that companies have tried to improve education and awareness about the risks of phishing is the use of phishing tests to see if colleagues click on the link or open the suspect attachment in an unsuspecting yet controled environment. If they do, some instant education comes their way. There are those that think that this approach keeps the topic at the front of everyone's mind, and there are those that think that it can have the effect of chilling the relationship between IT/Security and the rest of the organisation. There are a lot of variables in the equation like how you respond when someone clicks on the phish, how you encourage reporting of potential phishing and more, so the answer is a resounding "it depends."</p><p>We also cover some of the increased security challenges that come with the now more common "working remotely," and what happens when you walk into an empty castle after having gotten past the moat and door, but there is no one inside to defend it.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.ansys.com/blog/what-is-dfmea" rel="noopener noreferrer" target="_blank">What Is DFMEA?</a></li><li><a href="https://quality-one.com/pfmea/" rel="noopener noreferrer" target="_blank">Process FMEA | Process Failure Mode &amp; Effects Analysis | Quality-One</a></li><li><a href="https://www.samuelthomasdavies.com/five-whys/" rel="noopener noreferrer" target="_blank">How to Overcome Obstacles by Using Toyota’s Five Whys Technique | Sam Thomas Davies</a></li><li><a href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196" rel="noopener noreferrer" target="_blank">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Zetter, Kim: 9780770436193: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber/dp/0451497899/ref=sr_1_1?crid=3W43EQ4UENQXC&amp;dchild=1&amp;keywords=the+perfect+weapon&amp;qid=1607180302&amp;s=books&amp;sprefix=the+perfect+wea%2Cstripbooks%2C178&amp;sr=1-1" rel="noopener noreferrer" target="_blank">The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age: Sanger, David E.: 9780451497895: Amazon.com: Books</a></li><li><a href="https://cloud.google.com/beyondcorp" rel="noopener noreferrer" target="_blank">BeyondCorp - Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592" rel="noopener noreferrer" target="_blank">The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win: Kim, Gene, Behr, Kevin, Spafford, George: 8601404253799: Amazon.com: Books</a></li><li><a href="https://www.hbo.com/documentaries/the-perfect-weapon" rel="noopener noreferrer" target="_blank">The Perfect Weapon - Watch the HBO Original Documentary | HBO</a></li><li><a href="https://www.sho.com/homeland" rel="noopener noreferrer" target="_blank">Homeland: Seasons, Episodes, Cast, Characters - Official Series Site | SHOWTIME</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>One of the ways that companies have tried to improve education and awareness about the risks of phishing is the use of phishing tests to see if colleagues click on the link or open the suspect attachment in an unsuspecting yet controled environment. If they do, some instant education comes their way. There are those that think that this approach keeps the topic at the front of everyone's mind, and there are those that think that it can have the effect of chilling the relationship between IT/Security and the rest of the organisation. There are a lot of variables in the equation like how you respond when someone clicks on the phish, how you encourage reporting of potential phishing and more, so the answer is a resounding "it depends."</p><p>We also cover some of the increased security challenges that come with the now more common "working remotely," and what happens when you walk into an empty castle after having gotten past the moat and door, but there is no one inside to defend it.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.ansys.com/blog/what-is-dfmea" rel="noopener noreferrer" target="_blank">What Is DFMEA?</a></li><li><a href="https://quality-one.com/pfmea/" rel="noopener noreferrer" target="_blank">Process FMEA | Process Failure Mode &amp; Effects Analysis | Quality-One</a></li><li><a href="https://www.samuelthomasdavies.com/five-whys/" rel="noopener noreferrer" target="_blank">How to Overcome Obstacles by Using Toyota’s Five Whys Technique | Sam Thomas Davies</a></li><li><a href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196" rel="noopener noreferrer" target="_blank">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Zetter, Kim: 9780770436193: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber/dp/0451497899/ref=sr_1_1?crid=3W43EQ4UENQXC&amp;dchild=1&amp;keywords=the+perfect+weapon&amp;qid=1607180302&amp;s=books&amp;sprefix=the+perfect+wea%2Cstripbooks%2C178&amp;sr=1-1" rel="noopener noreferrer" target="_blank">The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age: Sanger, David E.: 9780451497895: Amazon.com: Books</a></li><li><a href="https://cloud.google.com/beyondcorp" rel="noopener noreferrer" target="_blank">BeyondCorp - Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592" rel="noopener noreferrer" target="_blank">The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win: Kim, Gene, Behr, Kevin, Spafford, George: 8601404253799: Amazon.com: Books</a></li><li><a href="https://www.hbo.com/documentaries/the-perfect-weapon" rel="noopener noreferrer" target="_blank">The Perfect Weapon - Watch the HBO Original Documentary | HBO</a></li><li><a href="https://www.sho.com/homeland" rel="noopener noreferrer" target="_blank">Homeland: Seasons, Episodes, Cast, Characters - Official Series Site | SHOWTIME</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-13-e-phish-ency]]></link><guid isPermaLink="false">64eb2a29-6aa4-4bdd-a143-f2842531db6b</guid><itunes:image href="https://artwork.captivate.fm/12725810-4354-4b91-b106-efcd7331db66/cover.jpg"/><pubDate>Sat, 05 Dec 2020 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cfac2f1c-492d-4f33-b4b9-2f5346259abd/64eb2a29-6aa4-4bdd-a143-f2842531db6b.mp3" length="47006002" type="audio/mpeg"/><itunes:duration>01:02:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season><itunes:summary>One of the ways that companies have tried to improve education and awareness about the risks of phishing is the use of phishing tests to see if colleagues click on the link or open the suspect attachment in an unsuspecting yet controled environment. If they do, some instant education comes their way. There are those that think that this approach keeps the topic at the front of everyone&amp;#39;s mind, and there are those that think that it can have the effect of chilling the relationship between IT/Security and the rest of the organisation. There are a lot of variables in the equation like how you respond when someone clicks on the phish, how you encourage reporting of potential phishing and more, so the answer is a resounding &amp;quot;it depends.&amp;quot;


We also cover some of the increased security challenges that come with the now more common &amp;quot;working remotely,&amp;quot; and what happens when you walk into an empty castle after having gotten past the moat and door, but there is no one inside to defend it.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.ansys.com/blog/what-is-dfmea (What Is DFMEA?)
https://quality-one.com/pfmea/ (Process FMEA | Process Failure Mode &amp; Effects Analysis | Quality-One)
https://www.samuelthomasdavies.com/five-whys/ (How to Overcome Obstacles by Using Toyota’s Five Whys Technique | Sam Thomas Davies)
https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196 (Countdown to Zero Day: Stuxnet and the Launch of the World&apos;s First Digital Weapon: Zetter, Kim: 9780770436193: Amazon.com: Books)
https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber/dp/0451497899/ref=sr_1_1?crid=3W43EQ4UENQXC&amp;dchild=1&amp;keywords=the+perfect+weapon&amp;qid=1607180302&amp;s=books&amp;sprefix=the+perfect+wea%2Cstripbooks%2C178&amp;sr=1-1 (The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age: Sanger, David E.: 9780451497895: Amazon.com: Books)
https://cloud.google.com/beyondcorp (BeyondCorp - Enterprise Security  |  Google Cloud)
https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592 (The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win: Kim, Gene, Behr, Kevin, Spafford, George: 8601404253799: Amazon.com: Books)
https://www.hbo.com/documentaries/the-perfect-weapon (The Perfect Weapon - Watch the HBO Original Documentary | HBO)
https://www.sho.com/homeland (Homeland: Seasons, Episodes, Cast, Characters - Official Series Site | SHOWTIME)</itunes:summary></item><item><title>A Frictional Response</title><itunes:title>A Frictional Response</itunes:title><description><![CDATA[<p>A regular complaint by those who consume and use technology is that security adds friction to their process, which often means they get frustrated at the control put in their path, curse technology in general, or abandon the activity altogether. In today's episode, Dan, Erik and Brian explore the balance necessary to understand when certain controls (and the friction they add) are necessary, or can be made smoother. Each decision on reduction of friction has the potential for knock-on effects to the security, privacy and performance of the system and should be considered before making any change to the control. In some cases the conscious addition of friction is the better approach, too, especially to support transparency with users and enable meaningful, informed choices.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/RSA-SecurID-Authenticator-SID800-Pack/dp/B00CEZCNQI" rel="noopener noreferrer" target="_blank">Amazon.com: RSA SecurID Authenticator SID800 Key Fob (Pack of 25): Computers &amp; Accessories</a></li><li><a href="https://www.daymarksi.com/information-technology-navigator-blog/understanding-office-365-impossible-travel" rel="noopener noreferrer" target="_blank">Understanding Office 365 Impossible Travel</a></li><li><a href="https://cloud.google.com/beyondcorp/" rel="noopener noreferrer" target="_blank">BeyondCorp - Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li><li><a href="https://www.techrepublic.com/article/half-of-security-pros-would-rather-walk-barefoot-in-a-public-restroom-than-use-public-wi-fi/" rel="noopener noreferrer" target="_blank">Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi - TechRepublic</a></li><li><a href="https://www.amazon.com/Step2-KidAlert-V-W-S-Safety-Sign/dp/B0193MPQJA/ref=sr_1_6?crid=20WKN2WQ3KAFJ&amp;dchild=1&amp;keywords=children+at+play+sign&amp;qid=1605450766&amp;sprefix=children+at+play+%2Caps%2C171&amp;sr=8-6" rel="noopener noreferrer" target="_blank">Amazon.com: Step2 KidAlert V.W.S. Safety Sign: Toys &amp; Games</a></li><li><a href="https://www.macrumors.com/2020/10/28/ios-14-anti-tracking-prompt-antitrust-complaint/" rel="noopener noreferrer" target="_blank">iOS 14's Upcoming Anti-Tracking Prompt Sparks Antitrust Complaint in France - MacRumors</a></li><li><a href="https://www.bbc.com/news/technology-54838978" rel="noopener noreferrer" target="_blank">Popular app T&amp;Cs 'longer than Harry Potter' - BBC News</a></li><li><a href="https://www.michigan.gov/mdot/0,4616,7-151-9621_101547---,00.html" rel="noopener noreferrer" target="_blank">MDOT - CAV Corridor</a></li><li><a href="https://www.engadget.com/2017-09-14-amazon-waves-goodbye-to-its-one-click-purchase-patent.html" rel="noopener noreferrer" target="_blank">Amazon waves goodbye to its one-click purchase patent | Engadget</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>A regular complaint by those who consume and use technology is that security adds friction to their process, which often means they get frustrated at the control put in their path, curse technology in general, or abandon the activity altogether. In today's episode, Dan, Erik and Brian explore the balance necessary to understand when certain controls (and the friction they add) are necessary, or can be made smoother. Each decision on reduction of friction has the potential for knock-on effects to the security, privacy and performance of the system and should be considered before making any change to the control. In some cases the conscious addition of friction is the better approach, too, especially to support transparency with users and enable meaningful, informed choices.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/RSA-SecurID-Authenticator-SID800-Pack/dp/B00CEZCNQI" rel="noopener noreferrer" target="_blank">Amazon.com: RSA SecurID Authenticator SID800 Key Fob (Pack of 25): Computers &amp; Accessories</a></li><li><a href="https://www.daymarksi.com/information-technology-navigator-blog/understanding-office-365-impossible-travel" rel="noopener noreferrer" target="_blank">Understanding Office 365 Impossible Travel</a></li><li><a href="https://cloud.google.com/beyondcorp/" rel="noopener noreferrer" target="_blank">BeyondCorp - Enterprise Security &nbsp;|&nbsp; Google Cloud</a></li><li><a href="https://www.techrepublic.com/article/half-of-security-pros-would-rather-walk-barefoot-in-a-public-restroom-than-use-public-wi-fi/" rel="noopener noreferrer" target="_blank">Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi - TechRepublic</a></li><li><a href="https://www.amazon.com/Step2-KidAlert-V-W-S-Safety-Sign/dp/B0193MPQJA/ref=sr_1_6?crid=20WKN2WQ3KAFJ&amp;dchild=1&amp;keywords=children+at+play+sign&amp;qid=1605450766&amp;sprefix=children+at+play+%2Caps%2C171&amp;sr=8-6" rel="noopener noreferrer" target="_blank">Amazon.com: Step2 KidAlert V.W.S. Safety Sign: Toys &amp; Games</a></li><li><a href="https://www.macrumors.com/2020/10/28/ios-14-anti-tracking-prompt-antitrust-complaint/" rel="noopener noreferrer" target="_blank">iOS 14's Upcoming Anti-Tracking Prompt Sparks Antitrust Complaint in France - MacRumors</a></li><li><a href="https://www.bbc.com/news/technology-54838978" rel="noopener noreferrer" target="_blank">Popular app T&amp;Cs 'longer than Harry Potter' - BBC News</a></li><li><a href="https://www.michigan.gov/mdot/0,4616,7-151-9621_101547---,00.html" rel="noopener noreferrer" target="_blank">MDOT - CAV Corridor</a></li><li><a href="https://www.engadget.com/2017-09-14-amazon-waves-goodbye-to-its-one-click-purchase-patent.html" rel="noopener noreferrer" target="_blank">Amazon waves goodbye to its one-click purchase patent | Engadget</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-12-a-frictional-response]]></link><guid isPermaLink="false">a666bf31-916b-4e93-81e3-84f54b42a103</guid><itunes:image href="https://artwork.captivate.fm/e46324ad-26c5-4184-8c6a-2e115c4412e3/cover.jpg"/><pubDate>Sun, 15 Nov 2020 08:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/bfdce45a-ddcb-48ce-9025-d8d53eb05d6a/a666bf31-916b-4e93-81e3-84f54b42a103.mp3" length="49488257" type="audio/mpeg"/><itunes:duration>01:06:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season><itunes:summary>A regular complaint by those who consume and use technology is that security adds friction to their process, which often means they get frustrated at the control put in their path, curse technology in general, or abandon the activity altogether. In today&amp;#39;s episode, Dan, Erik and Brian explore the balance necessary to understand when certain controls (and the friction they add) are necessary, or can be made smoother. Each decision on reduction of friction has the potential for knock-on effects to the security, privacy and performance of the system and should be considered before making any change to the control. In some cases the conscious addition of friction is the better approach, too, especially to support transparency with users and enable meaningful, informed choices.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.amazon.com/RSA-SecurID-Authenticator-SID800-Pack/dp/B00CEZCNQI (Amazon.com: RSA SecurID Authenticator SID800 Key Fob (Pack of 25): Computers &amp; Accessories)
https://www.daymarksi.com/information-technology-navigator-blog/understanding-office-365-impossible-travel (Understanding Office 365 Impossible Travel)
https://cloud.google.com/beyondcorp/ (BeyondCorp - Enterprise Security  |  Google Cloud)
https://www.techrepublic.com/article/half-of-security-pros-would-rather-walk-barefoot-in-a-public-restroom-than-use-public-wi-fi/ (Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi - TechRepublic)
https://www.amazon.com/Step2-KidAlert-V-W-S-Safety-Sign/dp/B0193MPQJA/ref=sr_1_6?crid=20WKN2WQ3KAFJ&amp;dchild=1&amp;keywords=children+at+play+sign&amp;qid=1605450766&amp;sprefix=children+at+play+%2Caps%2C171&amp;sr=8-6 (Amazon.com: Step2 KidAlert V.W.S. Safety Sign: Toys &amp; Games)
https://www.macrumors.com/2020/10/28/ios-14-anti-tracking-prompt-antitrust-complaint/ (iOS 14&apos;s Upcoming Anti-Tracking Prompt Sparks Antitrust Complaint in France - MacRumors)
https://www.bbc.com/news/technology-54838978 (Popular app T&amp;Cs &apos;longer than Harry Potter&apos; - BBC News)
https://www.michigan.gov/mdot/0,4616,7-151-9621_101547---,00.html (MDOT - CAV Corridor)
https://www.engadget.com/2017-09-14-amazon-waves-goodbye-to-its-one-click-purchase-patent.html (Amazon waves goodbye to its one-click purchase patent | Engadget)</itunes:summary></item><item><title>Who You Gonna Call?</title><itunes:title>Who You Gonna Call?</itunes:title><description><![CDATA[<p>When bad things happen to the computers in your organisation, who is the first person you call? IT, the FBI, your general counsel, the insurance company? Today, Erik, Dan and Brian cover attacks, response and middle people negotiating with the attackers on your behalf.</p><p>Other topics discussed include:</p><ul><li><br></li><li>The risk of cheap IoT devices and long term support (or lack thereof),</li><li><br></li><li><br></li><li>Whose insurance policy covers the tree on your neighbour's land that falls and hits your house,</li><li><br></li><li><br></li><li>The law of unintended consequences when creating things, and </li><li><br></li><li><br></li><li>The joy of reading fake Amazon reviews</li><li><br></li></ul><br/><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.advanced-intel.com/post/an-interview-with-unkn-sheds-light-on-revil-s-operations-future-victims" rel="noopener noreferrer" target="_blank">An Interview with "UNKN" Sheds Light on REvil's Operations &amp; Future Victims</a></li><li><a href="https://grrcon.com/schedule/" rel="noopener noreferrer" target="_blank">Schedule - GrrCON</a></li><li><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-302a" rel="noopener noreferrer" target="_blank">Ransomware Activity Targeting the Healthcare and Public Health Sector | CISA</a></li><li><a href="https://www.tavour.com/" rel="noopener noreferrer" target="_blank">Tavour - Craft Beer Delivery</a></li><li><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">Amazon.com: Amazon Sidewalk: Amazon Devices &amp; Accessories</a></li><li><a href="https://www.cnbc.com/2020/09/06/amazon-reviews-thousands-are-fake-heres-how-to-spot-them.html" rel="noopener noreferrer" target="_blank">Amazon Reviews: Thousands are fake, here's how to spot them</a></li><li><a href="https://www.amazon.com/Sugar-Free-Gummy-Bear-1LB/dp/B00IF3DUW4/ref=sr_1_2?dchild=1&amp;keywords=haribo+sugar+free+bears&amp;qid=1604149931&amp;sr=8-2#customerReviews" rel="noopener noreferrer" target="_blank">Amazon.com : Sugar Free Gummy Bear 1LB Bag : Grocery &amp; Gourmet Food</a></li><li><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">Shodan</a></li><li><a href="https://gizmodo.com/tv-maker-vizio-to-pay-out-millions-after-secretly-colle-1792056140" rel="noopener noreferrer" target="_blank">TV Maker Vizio to Pay Out Millions After Secretly Collecting Customer Data</a></li><li><a href="https://variety.com/2020/digital/news/vizio-reorg-inscape-platform-business-1234816959/" rel="noopener noreferrer" target="_blank">Vizio Reorg Folds Inscape Data Operations Into Platform Business - Variety</a></li><li><a href="https://www.insurancejournal.com/blogs/academy-journal/2017/10/11/466847.htm" rel="noopener noreferrer" target="_blank">How Does the Homeowners’ Policy Deal with Trees?</a></li><li><a href="https://www.sec.gov/fast-answers/answersform8khtm.html" rel="noopener noreferrer" target="_blank">SEC.gov | Form 8-K</a></li><li><a href="https://usa.kaspersky.com/resource-center/threats/ransomware-wannacry" rel="noopener noreferrer" target="_blank">Ransomware WannaCry: All you need to know | Kaspersky</a></li><li><a href="https://www.theguardian.com/technology/2019/apr/20/marcus-hutchins-uk-ransomware-hero-pleads-guilty-to-us-hacking-charges" rel="noopener noreferrer" target="_blank">Marcus Hutchins: UK ransomware ‘hero’ pleads guilty to US hacking charges | Cybercrime | The Guardian</a></li><li><a href="https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/" rel="noopener noreferrer" target="_blank">The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet | WIRED</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>When bad things happen to the computers in your organisation, who is the first person you call? IT, the FBI, your general counsel, the insurance company? Today, Erik, Dan and Brian cover attacks, response and middle people negotiating with the attackers on your behalf.</p><p>Other topics discussed include:</p><ul><li><br></li><li>The risk of cheap IoT devices and long term support (or lack thereof),</li><li><br></li><li><br></li><li>Whose insurance policy covers the tree on your neighbour's land that falls and hits your house,</li><li><br></li><li><br></li><li>The law of unintended consequences when creating things, and </li><li><br></li><li><br></li><li>The joy of reading fake Amazon reviews</li><li><br></li></ul><br/><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.advanced-intel.com/post/an-interview-with-unkn-sheds-light-on-revil-s-operations-future-victims" rel="noopener noreferrer" target="_blank">An Interview with "UNKN" Sheds Light on REvil's Operations &amp; Future Victims</a></li><li><a href="https://grrcon.com/schedule/" rel="noopener noreferrer" target="_blank">Schedule - GrrCON</a></li><li><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-302a" rel="noopener noreferrer" target="_blank">Ransomware Activity Targeting the Healthcare and Public Health Sector | CISA</a></li><li><a href="https://www.tavour.com/" rel="noopener noreferrer" target="_blank">Tavour - Craft Beer Delivery</a></li><li><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">Amazon.com: Amazon Sidewalk: Amazon Devices &amp; Accessories</a></li><li><a href="https://www.cnbc.com/2020/09/06/amazon-reviews-thousands-are-fake-heres-how-to-spot-them.html" rel="noopener noreferrer" target="_blank">Amazon Reviews: Thousands are fake, here's how to spot them</a></li><li><a href="https://www.amazon.com/Sugar-Free-Gummy-Bear-1LB/dp/B00IF3DUW4/ref=sr_1_2?dchild=1&amp;keywords=haribo+sugar+free+bears&amp;qid=1604149931&amp;sr=8-2#customerReviews" rel="noopener noreferrer" target="_blank">Amazon.com : Sugar Free Gummy Bear 1LB Bag : Grocery &amp; Gourmet Food</a></li><li><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">Shodan</a></li><li><a href="https://gizmodo.com/tv-maker-vizio-to-pay-out-millions-after-secretly-colle-1792056140" rel="noopener noreferrer" target="_blank">TV Maker Vizio to Pay Out Millions After Secretly Collecting Customer Data</a></li><li><a href="https://variety.com/2020/digital/news/vizio-reorg-inscape-platform-business-1234816959/" rel="noopener noreferrer" target="_blank">Vizio Reorg Folds Inscape Data Operations Into Platform Business - Variety</a></li><li><a href="https://www.insurancejournal.com/blogs/academy-journal/2017/10/11/466847.htm" rel="noopener noreferrer" target="_blank">How Does the Homeowners’ Policy Deal with Trees?</a></li><li><a href="https://www.sec.gov/fast-answers/answersform8khtm.html" rel="noopener noreferrer" target="_blank">SEC.gov | Form 8-K</a></li><li><a href="https://usa.kaspersky.com/resource-center/threats/ransomware-wannacry" rel="noopener noreferrer" target="_blank">Ransomware WannaCry: All you need to know | Kaspersky</a></li><li><a href="https://www.theguardian.com/technology/2019/apr/20/marcus-hutchins-uk-ransomware-hero-pleads-guilty-to-us-hacking-charges" rel="noopener noreferrer" target="_blank">Marcus Hutchins: UK ransomware ‘hero’ pleads guilty to US hacking charges | Cybercrime | The Guardian</a></li><li><a href="https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/" rel="noopener noreferrer" target="_blank">The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet | WIRED</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-11-who-you-gonna-call]]></link><guid isPermaLink="false">e5f50d69-ef4f-4395-90e9-a7b04ea23662</guid><itunes:image href="https://artwork.captivate.fm/8550e6fe-d0ab-44ec-9d6b-ca14407261b6/cover.jpg"/><pubDate>Sat, 31 Oct 2020 08:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/000554a2-cb5a-4bed-a2cb-45f51ee3240e/e5f50d69-ef4f-4395-90e9-a7b04ea23662.mp3" length="48150413" type="audio/mpeg"/><itunes:duration>01:04:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season></item><item><title>Yippie Ki-Yay... Let&apos;s Hack the Gibson</title><itunes:title>Yippie Ki-Yay... Let&apos;s Hack the Gibson</itunes:title><description><![CDATA[<p>So many movies about technology and security, so little time. We start our with some of our favourite (and least favourite) security movies. We also wander into a few other areas including: data use and ethics, balancing when to let an attack happen vs. when to let it happen to not let on that you know, Shodan, Stuxnet, Wannacry and more. Check out the complete list of movies we discuss and mention in the links list below!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://medium.com/@cloudbric/we-analyze-13-hacks-in-the-1995-movie-hackers-and-how-they-compare-to-today-96abfd472db0" rel="noopener noreferrer" target="_blank">We Analyze 13 Hacks in the 1995 Movie ‘Hackers’ and How They Compare to Today | by Cloudbric | Medium</a></li><li><a href="https://www.imdb.com/title/tt0105435/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Sneakers (1992) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0244244/" rel="noopener noreferrer" target="_blank">Swordfish (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt4158110/" rel="noopener noreferrer" target="_blank">Mr. Robot (TV Series 2015–2019) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Hackers (1995) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Blackhat (2015) - IMDb</a></li><li><a href="https://www.sans.org/cyber-security-courses/?msc=main-nav" rel="noopener noreferrer" target="_blank">Cyber Security Courses | SANS Institute</a></li><li><a href="https://www.reuters.com/article/us-british-airways-cyber-fine-idUSKBN2711AX" rel="noopener noreferrer" target="_blank">British Airways hit with UK data watchdog's biggest-ever fine | Reuters</a></li><li><a href="https://www.greatsecuritydebate.net/6" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 6: Pippen and Jordan</a></li><li><a href="https://www.imdb.com/title/tt0086567/" rel="noopener noreferrer" target="_blank">WarGames (1983) - IMDb</a></li><li><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">Shodan</a></li><li><a href="https://censys.io/" rel="noopener noreferrer" target="_blank">Censys</a></li><li><a href="https://www.youtube.com/watch?v=PQJjx19sRbs" rel="noopener noreferrer" target="_blank">Bananaphone By Raffi - YouTube</a></li><li><a href="https://www.imdb.com/title/tt2084970/" rel="noopener noreferrer" target="_blank">The Imitation Game (2014) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0266987/?ref_=nv_sr_srsg_0" rel="noopener noreferrer" target="_blank">Spy Game (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0218817/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Antitrust (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0151804/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Office Space (1999) - IMDb</a></li><li><a href="https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/" rel="noopener noreferrer" target="_blank">The Complete List of Hacker And Cybersecurity Movies, Version 2.0</a></li><li><a href="https://www.imdb.com/title/tt0086393/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Superman III (1983) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt4287320/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Circle (2017) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0073802/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">Three Days of the Condor (1975) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0071360/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Conversation (1974) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0113957/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Net (1995) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0084827/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">TRON (1982) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0107290/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Jurassic Park (1993) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0087065/" rel="noopener noreferrer" target="_blank">Cloak &amp; Dagger (1984) - IMDb</a></li><li><a href="https://www.amazon.com/Ready-Player-One-Ernest-Cline-ebook/dp/B004J4WKUQ/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1603037145&amp;sr=8-2" rel="noopener noreferrer" target="_blank">Amazon.com: Ready Player One eBook: Cline, Ernest: Kindle Store</a></li><li><a href="https://www.amazon.com/Ready-Player-Two-Novel-Book-ebook/dp/B08BYWH6CS/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1603037169&amp;sr=8-3" rel="noopener noreferrer" target="_blank">Amazon.com: Ready Player Two: A Novel (Ready Player One Book 2) eBook: Cline, Ernest: Kindle Store</a></li><li><a href="https://www.imdb.com/title/tt1677720/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Ready Player One (2018) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0133093/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Matrix (1999) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0060028/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Star Trek (TV Series 1966–1969) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0090305/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Weird Science (1985) - IMDb</a></li><li><a href="https://www.youtube.com/watch?v=EeFZtXPUCxs" rel="noopener noreferrer" target="_blank">Danny Elfman On His "Embarrassing" Oingo Boingo Days - YouTube</a></li><li><a href="https://www.imdb.com/title/tt1059786/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Eagle Eye (2008) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0337978/" rel="noopener noreferrer" target="_blank">Die Hard 4.0 (2007) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0095016/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Die Hard (1988) - IMDb</a></li><li><a href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196" rel="noopener noreferrer" target="_blank">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Zetter, Kim: 9780770436193: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber-ebook/dp/B076Z29HG7/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=" rel="noopener noreferrer" target="_blank">The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age - Kindle edition by Sanger, David E.. Politics &amp; Social Sciences Kindle eBooks @ Amazon.com.</a></li><li><a href="https://usa.kaspersky.com/resource-center/threats/ransomware-wannacry" rel="noopener noreferrer" target="_blank">Ransomware WannaCry: All you need to know | Kaspersky</a></li><li><a href="https://www.hbo.com/documentaries/the-perfect-weapon" rel="noopener noreferrer" target="_blank">The Perfect Weapon - Watch the HBO Original Documentary | HBO</a></li><li><a href="https://www.imdb.com/title/tt4736550/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Great Hack (2019) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0091042/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">Ferris Bueller's Day Off (1986) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0089886/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Real Genius (1985) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0120660/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Enemy of the State (1998) - IMDb</a></li><li><a href="https://www.ibtimes.com/michigan-hacker-modifies-jail-records-get-friend-released-now-faces-jail-time-2623622" rel="noopener noreferrer" target="_blank">Michigan Hacker Modifies Jail Records To Get Friend Released, Now Faces Jail Time</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>So many movies about technology and security, so little time. We start our with some of our favourite (and least favourite) security movies. We also wander into a few other areas including: data use and ethics, balancing when to let an attack happen vs. when to let it happen to not let on that you know, Shodan, Stuxnet, Wannacry and more. Check out the complete list of movies we discuss and mention in the links list below!</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://medium.com/@cloudbric/we-analyze-13-hacks-in-the-1995-movie-hackers-and-how-they-compare-to-today-96abfd472db0" rel="noopener noreferrer" target="_blank">We Analyze 13 Hacks in the 1995 Movie ‘Hackers’ and How They Compare to Today | by Cloudbric | Medium</a></li><li><a href="https://www.imdb.com/title/tt0105435/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Sneakers (1992) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0244244/" rel="noopener noreferrer" target="_blank">Swordfish (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt4158110/" rel="noopener noreferrer" target="_blank">Mr. Robot (TV Series 2015–2019) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Hackers (1995) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt2717822/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Blackhat (2015) - IMDb</a></li><li><a href="https://www.sans.org/cyber-security-courses/?msc=main-nav" rel="noopener noreferrer" target="_blank">Cyber Security Courses | SANS Institute</a></li><li><a href="https://www.reuters.com/article/us-british-airways-cyber-fine-idUSKBN2711AX" rel="noopener noreferrer" target="_blank">British Airways hit with UK data watchdog's biggest-ever fine | Reuters</a></li><li><a href="https://www.greatsecuritydebate.net/6" rel="noopener noreferrer" target="_blank">The Great Security Debate Episode 6: Pippen and Jordan</a></li><li><a href="https://www.imdb.com/title/tt0086567/" rel="noopener noreferrer" target="_blank">WarGames (1983) - IMDb</a></li><li><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">Shodan</a></li><li><a href="https://censys.io/" rel="noopener noreferrer" target="_blank">Censys</a></li><li><a href="https://www.youtube.com/watch?v=PQJjx19sRbs" rel="noopener noreferrer" target="_blank">Bananaphone By Raffi - YouTube</a></li><li><a href="https://www.imdb.com/title/tt2084970/" rel="noopener noreferrer" target="_blank">The Imitation Game (2014) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0266987/?ref_=nv_sr_srsg_0" rel="noopener noreferrer" target="_blank">Spy Game (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0218817/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Antitrust (2001) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0151804/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Office Space (1999) - IMDb</a></li><li><a href="https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/" rel="noopener noreferrer" target="_blank">The Complete List of Hacker And Cybersecurity Movies, Version 2.0</a></li><li><a href="https://www.imdb.com/title/tt0086393/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Superman III (1983) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt4287320/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Circle (2017) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0073802/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">Three Days of the Condor (1975) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0071360/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Conversation (1974) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0113957/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Net (1995) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0084827/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">TRON (1982) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0107290/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Jurassic Park (1993) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0087065/" rel="noopener noreferrer" target="_blank">Cloak &amp; Dagger (1984) - IMDb</a></li><li><a href="https://www.amazon.com/Ready-Player-One-Ernest-Cline-ebook/dp/B004J4WKUQ/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1603037145&amp;sr=8-2" rel="noopener noreferrer" target="_blank">Amazon.com: Ready Player One eBook: Cline, Ernest: Kindle Store</a></li><li><a href="https://www.amazon.com/Ready-Player-Two-Novel-Book-ebook/dp/B08BYWH6CS/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=1603037169&amp;sr=8-3" rel="noopener noreferrer" target="_blank">Amazon.com: Ready Player Two: A Novel (Ready Player One Book 2) eBook: Cline, Ernest: Kindle Store</a></li><li><a href="https://www.imdb.com/title/tt1677720/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Ready Player One (2018) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0133093/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Matrix (1999) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0060028/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Star Trek (TV Series 1966–1969) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0090305/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Weird Science (1985) - IMDb</a></li><li><a href="https://www.youtube.com/watch?v=EeFZtXPUCxs" rel="noopener noreferrer" target="_blank">Danny Elfman On His "Embarrassing" Oingo Boingo Days - YouTube</a></li><li><a href="https://www.imdb.com/title/tt1059786/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Eagle Eye (2008) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0337978/" rel="noopener noreferrer" target="_blank">Die Hard 4.0 (2007) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0095016/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Die Hard (1988) - IMDb</a></li><li><a href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196" rel="noopener noreferrer" target="_blank">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Zetter, Kim: 9780770436193: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Perfect-Weapon-Sabotage-Fear-Cyber-ebook/dp/B076Z29HG7/ref=tmm_kin_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=" rel="noopener noreferrer" target="_blank">The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age - Kindle edition by Sanger, David E.. Politics &amp; Social Sciences Kindle eBooks @ Amazon.com.</a></li><li><a href="https://usa.kaspersky.com/resource-center/threats/ransomware-wannacry" rel="noopener noreferrer" target="_blank">Ransomware WannaCry: All you need to know | Kaspersky</a></li><li><a href="https://www.hbo.com/documentaries/the-perfect-weapon" rel="noopener noreferrer" target="_blank">The Perfect Weapon - Watch the HBO Original Documentary | HBO</a></li><li><a href="https://www.imdb.com/title/tt4736550/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">The Great Hack (2019) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0091042/?ref_=fn_al_tt_2" rel="noopener noreferrer" target="_blank">Ferris Bueller's Day Off (1986) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0089886/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Real Genius (1985) - IMDb</a></li><li><a href="https://www.imdb.com/title/tt0120660/?ref_=fn_al_tt_1" rel="noopener noreferrer" target="_blank">Enemy of the State (1998) - IMDb</a></li><li><a href="https://www.ibtimes.com/michigan-hacker-modifies-jail-records-get-friend-released-now-faces-jail-time-2623622" rel="noopener noreferrer" target="_blank">Michigan Hacker Modifies Jail Records To Get Friend Released, Now Faces Jail Time</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-10-yippie-ki-yay-lets-hack-the-gibson]]></link><guid isPermaLink="false">84c3fa8b-cae5-435a-ab98-41f988cc1fa8</guid><itunes:image href="https://artwork.captivate.fm/0a3ca0e1-acb2-4f5e-a454-09397ec02d4a/cover.jpg"/><pubDate>Sat, 17 Oct 2020 08:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f89f950e-1a9a-4882-8129-d6a53826ca62/84c3fa8b-cae5-435a-ab98-41f988cc1fa8.mp3" length="47892837" type="audio/mpeg"/><itunes:duration>01:04:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season></item><item><title>Privacy Drone 2: This Time It&apos;s Personal</title><itunes:title>Privacy Drone 2: This Time It&apos;s Personal</itunes:title><description><![CDATA[<p>In what will surely become a recurring topic, the discussion turns to the short-term vs. long-term implications of privacy decisions we each make, the ethics of collecting and using data, and whether a European model of privacy (or data protection as Dan reiterates we should be calling it) would help in the US.  We ask why we can't stop needing instant replies and gratification, is the value of the services we get worth the tradeoff for the data we are "paying" in order to use them, and more.  Erik even beats Dan to be the first to use his "It Depends" catchphrase, so you know it's going to be a lively discussion. </p><p>Privacy is on everyone's mind these days, and it's the topic of The Great Security Debate today.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Charlie-Wilsons-War-Extraordinary-Congress/dp/0802143415" rel="noopener noreferrer" target="_blank">Charlie Wilson's War: The Extraordinary Story of How the Wildest Man in Congress and a Rogue CIA Agent Changed the History of Our Times: Crile, George: 9780802143419: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Coddling-American-Mind-Intentions-Generation/dp/0735224897" rel="noopener noreferrer" target="_blank">The Coddling of the American Mind: How Good Intentions and Bad Ideas Are Setting Up a Generation for Failure: Lukianoff, Greg, Haidt, Jonathan: 9780735224896: Amazon.com: Books</a></li><li><a href="https://www.imdb.com/title/tt5497778/?ref_=ttep_ep1" rel="noopener noreferrer" target="_blank">"Black Mirror" Nosedive (TV Episode 2016) - IMDb</a></li><li><a href="https://www.amazon.com/Upload-Season-1/dp/B0858YGKZ4" rel="noopener noreferrer" target="_blank">Watch Upload - Season 1 | Prime Video</a></li><li><a href="https://www.secureworldexpo.com/industry-news/trump-biden-cybersecurity-encryption-privacy" rel="noopener noreferrer" target="_blank">Trump vs. Biden on Cybersecurity, Encryption, and Data Privacy</a></li><li><a href="https://iapp.org/news/a/privacy-and-information-security-the-territorial-challenges1/#:~:text=While%20the%20security%20of%20information,related%20to%20a%20subject's%20identity" rel="noopener noreferrer" target="_blank">Privacy and Information Security: The Territorial Challenges</a></li><li><a href="https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data" rel="noopener noreferrer" target="_blank">Regulating the internet giants - The world’s most valuable resource is no longer oil, but data | Leaders | The Economist</a></li><li><a href="https://www.cnet.com/how-to/amazon-sidewalk-is-coming-to-your-neighborhood-ble-900-mhz/" rel="noopener noreferrer" target="_blank">Amazon Sidewalk will create entire smart neighborhoods. Here's what you should know - CNET</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>In what will surely become a recurring topic, the discussion turns to the short-term vs. long-term implications of privacy decisions we each make, the ethics of collecting and using data, and whether a European model of privacy (or data protection as Dan reiterates we should be calling it) would help in the US.  We ask why we can't stop needing instant replies and gratification, is the value of the services we get worth the tradeoff for the data we are "paying" in order to use them, and more.  Erik even beats Dan to be the first to use his "It Depends" catchphrase, so you know it's going to be a lively discussion. </p><p>Privacy is on everyone's mind these days, and it's the topic of The Great Security Debate today.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Charlie-Wilsons-War-Extraordinary-Congress/dp/0802143415" rel="noopener noreferrer" target="_blank">Charlie Wilson's War: The Extraordinary Story of How the Wildest Man in Congress and a Rogue CIA Agent Changed the History of Our Times: Crile, George: 9780802143419: Amazon.com: Books</a></li><li><a href="https://www.amazon.com/Coddling-American-Mind-Intentions-Generation/dp/0735224897" rel="noopener noreferrer" target="_blank">The Coddling of the American Mind: How Good Intentions and Bad Ideas Are Setting Up a Generation for Failure: Lukianoff, Greg, Haidt, Jonathan: 9780735224896: Amazon.com: Books</a></li><li><a href="https://www.imdb.com/title/tt5497778/?ref_=ttep_ep1" rel="noopener noreferrer" target="_blank">"Black Mirror" Nosedive (TV Episode 2016) - IMDb</a></li><li><a href="https://www.amazon.com/Upload-Season-1/dp/B0858YGKZ4" rel="noopener noreferrer" target="_blank">Watch Upload - Season 1 | Prime Video</a></li><li><a href="https://www.secureworldexpo.com/industry-news/trump-biden-cybersecurity-encryption-privacy" rel="noopener noreferrer" target="_blank">Trump vs. Biden on Cybersecurity, Encryption, and Data Privacy</a></li><li><a href="https://iapp.org/news/a/privacy-and-information-security-the-territorial-challenges1/#:~:text=While%20the%20security%20of%20information,related%20to%20a%20subject's%20identity" rel="noopener noreferrer" target="_blank">Privacy and Information Security: The Territorial Challenges</a></li><li><a href="https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data" rel="noopener noreferrer" target="_blank">Regulating the internet giants - The world’s most valuable resource is no longer oil, but data | Leaders | The Economist</a></li><li><a href="https://www.cnet.com/how-to/amazon-sidewalk-is-coming-to-your-neighborhood-ble-900-mhz/" rel="noopener noreferrer" target="_blank">Amazon Sidewalk will create entire smart neighborhoods. Here's what you should know - CNET</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-9-privacy-drone-2-this-time-its-personal]]></link><guid isPermaLink="false">7457d43e-2de1-4a81-8940-53c240360c75</guid><itunes:image href="https://artwork.captivate.fm/a767bfd8-d37c-4a71-9730-00a60aa92553/cover.jpg"/><pubDate>Sat, 03 Oct 2020 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a56144f3-1f03-4ce8-a0a9-93c8024bac1e/7457d43e-2de1-4a81-8940-53c240360c75.mp3" length="42867649" type="audio/mpeg"/><itunes:duration>57:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season><itunes:summary>In what will surely become a recurring topic, the discussion turns to the short-term vs. long-term implications of privacy decisions we each make, the ethics of collecting and using data, and whether a European model of privacy (or data protection as Dan reiterates we should be calling it) would help in the US.  We ask why we can&amp;#39;t stop needing instant replies and gratification, is the value of the services we get worth the tradeoff for the data we are &amp;quot;paying&amp;quot; in order to use them, and more.  Erik even beats Dan to be the first to use his &amp;quot;It Depends&amp;quot; catchphrase, so you know it&amp;#39;s going to be a lively discussion. 


Privacy is on everyone&amp;#39;s mind these days, and it&amp;#39;s the topic of The Great Security Debate today.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.amazon.com/Charlie-Wilsons-War-Extraordinary-Congress/dp/0802143415 (Charlie Wilson&apos;s War: The Extraordinary Story of How the Wildest Man in Congress and a Rogue CIA Agent Changed the History of Our Times: Crile, George: 9780802143419: Amazon.com: Books)
https://www.amazon.com/Coddling-American-Mind-Intentions-Generation/dp/0735224897 (The Coddling of the American Mind: How Good Intentions and Bad Ideas Are Setting Up a Generation for Failure: Lukianoff, Greg, Haidt, Jonathan: 9780735224896: Amazon.com: Books)
https://www.imdb.com/title/tt5497778/?ref_=ttep_ep1 (&quot;Black Mirror&quot; Nosedive (TV Episode 2016) - IMDb)
https://www.amazon.com/Upload-Season-1/dp/B0858YGKZ4 (Watch Upload - Season 1 | Prime Video)
https://www.secureworldexpo.com/industry-news/trump-biden-cybersecurity-encryption-privacy (Trump vs. Biden on Cybersecurity, Encryption, and Data Privacy)
https://iapp.org/news/a/privacy-and-information-security-the-territorial-challenges1/#:~:text=While%20the%20security%20of%20information,related%20to%20a%20subject&apos;s%20identity (Privacy and Information Security: The Territorial Challenges)
https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data (Regulating the internet giants - The world’s most valuable resource is no longer oil, but data | Leaders | The Economist)
https://www.cnet.com/how-to/amazon-sidewalk-is-coming-to-your-neighborhood-ble-900-mhz/ (Amazon Sidewalk will create entire smart neighborhoods. Here&apos;s what you should know - CNET)</itunes:summary></item><item><title>Back to School</title><itunes:title>Back to School</itunes:title><description><![CDATA[<p>The school year is upon us. This week Erik, Brian and Dan are talking about things related to security and education. First, we cover the ongoing dilemma of which is better to establish and grow your career in security: certifications or experience. We also debate how traditional education (aka degrees) fit into the equation, and how to jump in if you have neither formal experience nor education and want to join the field... you'd never have guessed but "it depends!" Finally we talk about the challenges that K12 districts have managing security and privacy in normal times, let alone in the recent rush to move to remote learning so quickly.</p><p>We also spent a lot of time on mentoring and reaching out to people who are in the field for help, and some resources you can go to for info on mentoring, and the reminder that if you had mentors and those who helped you get where you are, to give back to those who will carry the torch next. Links to resources are in the links below.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://gitbook.zachgoebel.com/" rel="noopener noreferrer" target="_blank">Home - Zach's Book</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://cloudsecurityalliance.org/" rel="noopener noreferrer" target="_blank">Home | Cloud Security Alliance</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="https://www.sans.org/" rel="noopener noreferrer" target="_blank">Information Security Training | SANS Cyber Security Certifications &amp; Research</a></li><li><a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">Cybersecurity and IT Security Certifications and Training | (ISC)²</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>The school year is upon us. This week Erik, Brian and Dan are talking about things related to security and education. First, we cover the ongoing dilemma of which is better to establish and grow your career in security: certifications or experience. We also debate how traditional education (aka degrees) fit into the equation, and how to jump in if you have neither formal experience nor education and want to join the field... you'd never have guessed but "it depends!" Finally we talk about the challenges that K12 districts have managing security and privacy in normal times, let alone in the recent rush to move to remote learning so quickly.</p><p>We also spent a lot of time on mentoring and reaching out to people who are in the field for help, and some resources you can go to for info on mentoring, and the reminder that if you had mentors and those who helped you get where you are, to give back to those who will carry the torch next. Links to resources are in the links below.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://gitbook.zachgoebel.com/" rel="noopener noreferrer" target="_blank">Home - Zach's Book</a></li><li><a href="https://www.womsa.org/" rel="noopener noreferrer" target="_blank">Home | WomSA</a></li><li><a href="https://mentorcore.biz/" rel="noopener noreferrer" target="_blank">MentorCore – Growth and Development at your Fingertips</a></li><li><a href="https://cloudsecurityalliance.org/" rel="noopener noreferrer" target="_blank">Home | Cloud Security Alliance</a></li><li><a href="https://mcwt.org/" rel="noopener noreferrer" target="_blank">Michigan Council of Women in Technology Foundation / MCWT Foundation</a></li><li><a href="https://www.sans.org/" rel="noopener noreferrer" target="_blank">Information Security Training | SANS Cyber Security Certifications &amp; Research</a></li><li><a href="https://www.isc2.org/" rel="noopener noreferrer" target="_blank">Cybersecurity and IT Security Certifications and Training | (ISC)²</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-8-back-to-school]]></link><guid isPermaLink="false">c764cfa5-0f77-4648-8a06-97debceffd53</guid><itunes:image href="https://artwork.captivate.fm/24751b22-899f-4587-a075-b75a759aaac5/cover.jpg"/><pubDate>Sat, 12 Sep 2020 13:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e7ec29fc-1202-4651-b3b0-c3df68420c9c/c764cfa5-0f77-4648-8a06-97debceffd53.mp3" length="44919144" type="audio/mpeg"/><itunes:duration>59:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><itunes:summary>The school year is upon us. This week Erik, Brian and Dan are talking about things related to security and education. First, we cover the ongoing dilemma of which is better to establish and grow your career in security: certifications or experience. We also debate how traditional education (aka degrees) fit into the equation, and how to jump in if you have neither formal experience nor education and want to join the field... you&amp;#39;d never have guessed but &amp;quot;it depends!&amp;quot; Finally we talk about the challenges that K12 districts have managing security and privacy in normal times, let alone in the recent rush to move to remote learning so quickly.


We also spent a lot of time on mentoring and reaching out to people who are in the field for help, and some resources you can go to for info on mentoring, and the reminder that if you had mentors and those who helped you get where you are, to give back to those who will carry the torch next. Links to resources are in the links below.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://gitbook.zachgoebel.com/ (Home - Zach&apos;s Book)
https://www.womsa.org/ (Home | WomSA)
https://mentorcore.biz/ (MentorCore – Growth and Development at your Fingertips)
https://cloudsecurityalliance.org/ (Home | Cloud Security Alliance)
https://mcwt.org/ (Michigan Council of Women in Technology Foundation / MCWT Foundation)
https://www.sans.org/ (Information Security Training | SANS Cyber Security Certifications &amp; Research)
https://www.isc2.org/ (Cybersecurity and IT Security Certifications and Training | (ISC)²)</itunes:summary></item><item><title>Hold Me For Ransom</title><itunes:title>Hold Me For Ransom</itunes:title><description><![CDATA[<p>Ransomware is increasing. Brian, Dan and Erik discuss the evolution of ransomware, the preparation and the response, and the debate about whether to pay the ransom or not.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october" rel="noopener noreferrer" target="_blank">You’ll need a Facebook account to use future Oculus headsets - The Verge</a></li><li><a href="https://www.knowbe4.com/aids-trojan" rel="noopener noreferrer" target="_blank">AIDS Trojan | PC Cyborg | Original Ransomware | KnowBe4</a></li><li><a href="https://www.upguard.com/blog/wannacry" rel="noopener noreferrer" target="_blank">What is the WannaCry Ransomware Attack?</a></li><li><a href="https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/" rel="noopener noreferrer" target="_blank">Backdoors and Breaches</a></li><li><a href="https://www.nomoreransom.org/" rel="noopener noreferrer" target="_blank">The No More Ransom Project</a></li><li><a href="https://www.congress.gov/bill/99th-congress/house-bill/4718" rel="noopener noreferrer" target="_blank">H.R.4718 - 99th Congress (1985-1986): Computer Fraud and Abuse Act of 1986 | Congress.gov | Library of Congress</a></li><li><a href="https://www.ibm.com/security/digital-assets/cost-data-breach-report/?utm_medium=OSocial&amp;utm_source=Blog&amp;utm_content=000039JJ&amp;utm_term=10013747&amp;utm_id=SI-blog-1&amp;cm_mmc=OSocial_Blog-_-Portfolio%20Security_Security%20Conversation-_-WW_WW-_-SI-blog-1_ov76748&amp;cm_mmca1=000039JJ&amp;cm_mmca2=10013747#/" rel="noopener noreferrer" target="_blank">Cost of a Data Breach Report 2020 | IBM</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Ransomware is increasing. Brian, Dan and Erik discuss the evolution of ransomware, the preparation and the response, and the debate about whether to pay the ransom or not.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october" rel="noopener noreferrer" target="_blank">You’ll need a Facebook account to use future Oculus headsets - The Verge</a></li><li><a href="https://www.knowbe4.com/aids-trojan" rel="noopener noreferrer" target="_blank">AIDS Trojan | PC Cyborg | Original Ransomware | KnowBe4</a></li><li><a href="https://www.upguard.com/blog/wannacry" rel="noopener noreferrer" target="_blank">What is the WannaCry Ransomware Attack?</a></li><li><a href="https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/" rel="noopener noreferrer" target="_blank">Backdoors and Breaches</a></li><li><a href="https://www.nomoreransom.org/" rel="noopener noreferrer" target="_blank">The No More Ransom Project</a></li><li><a href="https://www.congress.gov/bill/99th-congress/house-bill/4718" rel="noopener noreferrer" target="_blank">H.R.4718 - 99th Congress (1985-1986): Computer Fraud and Abuse Act of 1986 | Congress.gov | Library of Congress</a></li><li><a href="https://www.ibm.com/security/digital-assets/cost-data-breach-report/?utm_medium=OSocial&amp;utm_source=Blog&amp;utm_content=000039JJ&amp;utm_term=10013747&amp;utm_id=SI-blog-1&amp;cm_mmc=OSocial_Blog-_-Portfolio%20Security_Security%20Conversation-_-WW_WW-_-SI-blog-1_ov76748&amp;cm_mmca1=000039JJ&amp;cm_mmca2=10013747#/" rel="noopener noreferrer" target="_blank">Cost of a Data Breach Report 2020 | IBM</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-7-hold-me-for-ransom]]></link><guid isPermaLink="false">fd8f4102-7c20-49ff-a00b-1ee1c802552d</guid><itunes:image href="https://artwork.captivate.fm/a39565b2-4153-42ba-a071-91bc0b21492a/cover.jpg"/><pubDate>Sun, 23 Aug 2020 08:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/11682aa2-936f-455f-aef6-39157ae65de3/fd8f4102-7c20-49ff-a00b-1ee1c802552d.mp3" length="57007552" type="audio/mpeg"/><itunes:duration>01:16:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Ransomware is increasing. Brian, Dan and Erik discuss the evolution of ransomware, the preparation and the response, and the debate about whether to pay the ransom or not.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october (You’ll need a Facebook account to use future Oculus headsets - The Verge)
https://www.knowbe4.com/aids-trojan (AIDS Trojan | PC Cyborg | Original Ransomware | KnowBe4)
https://www.upguard.com/blog/wannacry (What is the WannaCry Ransomware Attack?)
https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/ (Backdoors and Breaches)
https://www.nomoreransom.org/ (The No More Ransom Project)
https://www.congress.gov/bill/99th-congress/house-bill/4718 (H.R.4718 - 99th Congress (1985-1986): Computer Fraud and Abuse Act of 1986 | Congress.gov | Library of Congress)
https://www.ibm.com/security/digital-assets/cost-data-breach-report/?utm_medium=OSocial&amp;utm_source=Blog&amp;utm_content=000039JJ&amp;utm_term=10013747&amp;utm_id=SI-blog-1&amp;cm_mmc=OSocial_Blog-_-Portfolio%20Security_Security%20Conversation-_-WW_WW-_-SI-blog-1_ov76748&amp;cm_mmca1=000039JJ&amp;cm_mmca2=10013747#/ (Cost of a Data Breach Report 2020 | IBM)</itunes:summary></item><item><title>Pippen and Jordan</title><itunes:title>Pippen and Jordan</itunes:title><description><![CDATA[<p>On the debate today: it was overheard (over-read?) by one of the crew that security leaders and teams shoudl stop whining when security is not a “superstar” part of the business, but rather should focus on being a reliable supporting act that is there to prop up the actual “superstars.” There was a flawed comparison in this same read to the relationship between Scottie Pippen and Michael Jordan on the Chicago Bulls of the 90s. In the course of this episode we cover the “best” place for the security organisation to live, the need for CISOs and their teams to be at the table vs. the backoffce, quotes from Colin Powell and more.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://erick.rudiak.com/ciso/the-c-matters/" rel="noopener noreferrer" target="_blank">The "C" Matters or: How I Learned to Stop Worrying and Love the CISO Job</a></li><li><a href="https://themilitaryleader.com/priceless-colin-powell/" rel="noopener noreferrer" target="_blank">11 Priceless Colin Powell Quotes - The Military Leader</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>On the debate today: it was overheard (over-read?) by one of the crew that security leaders and teams shoudl stop whining when security is not a “superstar” part of the business, but rather should focus on being a reliable supporting act that is there to prop up the actual “superstars.” There was a flawed comparison in this same read to the relationship between Scottie Pippen and Michael Jordan on the Chicago Bulls of the 90s. In the course of this episode we cover the “best” place for the security organisation to live, the need for CISOs and their teams to be at the table vs. the backoffce, quotes from Colin Powell and more.</p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://erick.rudiak.com/ciso/the-c-matters/" rel="noopener noreferrer" target="_blank">The "C" Matters or: How I Learned to Stop Worrying and Love the CISO Job</a></li><li><a href="https://themilitaryleader.com/priceless-colin-powell/" rel="noopener noreferrer" target="_blank">11 Priceless Colin Powell Quotes - The Military Leader</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-6-pippen-and-jordan]]></link><guid isPermaLink="false">a1eab1f7-f95a-4931-89fc-223f47979346</guid><itunes:image href="https://artwork.captivate.fm/006a3294-6f80-4114-9f14-8fb4eae88d7d/cover.jpg"/><pubDate>Sat, 08 Aug 2020 10:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6fa945a2-eebf-4143-b615-aa5295f609e0/a1eab1f7-f95a-4931-89fc-223f47979346.mp3" length="43611465" type="audio/mpeg"/><itunes:duration>58:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><itunes:summary>On the debate today: it was overheard (over-read?) by one of the crew that security leaders and teams shoudl stop whining when security is not a “superstar” part of the business, but rather should focus on being a reliable supporting act that is there to prop up the actual “superstars.” There was a flawed comparison in this same read to the relationship between Scottie Pippen and Michael Jordan on the Chicago Bulls of the 90s. In the course of this episode we cover the “best” place for the security organisation to live, the need for CISOs and their teams to be at the table vs. the backoffce, quotes from Colin Powell and more.
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://erick.rudiak.com/ciso/the-c-matters/ (The &quot;C&quot; Matters or: How I Learned to Stop Worrying and Love the CISO Job)
https://themilitaryleader.com/priceless-colin-powell/ (11 Priceless Colin Powell Quotes - The Military Leader)</itunes:summary></item><item><title>Gripped With Fear</title><itunes:title>Gripped With Fear</itunes:title><description><![CDATA[<p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.backblaze.com/blog/the-3-2-1-backup-strategy/" rel="noopener noreferrer" target="_blank">Backup Strategies: Why the 3-2-1 Backup Strategy is the Best</a></li><li><a href="https://metro.org/event/data-privacy-big-tech-how-facebook-amazon-apple-netflix-and-google-deal-with-data-and-what-it-means-for-you/" rel="noopener noreferrer" target="_blank">Data Privacy + Big Tech: How Facebook, Amazon, Apple, Netflix, and Google Deal With Data (And What It Means for You) &nbsp; - METRO</a></li><li><a href="https://www.linkedin.com/posts/gabrielfriedlander_informationsecurity-securityawareness-activity-6692936815084662784-G1m-/" rel="noopener noreferrer" target="_blank">Wizer</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.backblaze.com/blog/the-3-2-1-backup-strategy/" rel="noopener noreferrer" target="_blank">Backup Strategies: Why the 3-2-1 Backup Strategy is the Best</a></li><li><a href="https://metro.org/event/data-privacy-big-tech-how-facebook-amazon-apple-netflix-and-google-deal-with-data-and-what-it-means-for-you/" rel="noopener noreferrer" target="_blank">Data Privacy + Big Tech: How Facebook, Amazon, Apple, Netflix, and Google Deal With Data (And What It Means for You) &nbsp; - METRO</a></li><li><a href="https://www.linkedin.com/posts/gabrielfriedlander_informationsecurity-securityawareness-activity-6692936815084662784-G1m-/" rel="noopener noreferrer" target="_blank">Wizer</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-5-gripped-with-fear]]></link><guid isPermaLink="false">8424fe6f-f51e-4612-952d-3d80abf00843</guid><itunes:image href="https://artwork.captivate.fm/5cd4a102-7efe-44dc-b787-e47cd3eb1846/cover.jpg"/><pubDate>Sun, 26 Jul 2020 09:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6ef67815-5780-42b0-9d88-49a2df2bf753/8424fe6f-f51e-4612-952d-3d80abf00843.mp3" length="43921212" type="audio/mpeg"/><itunes:duration>58:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><itunes:summary>https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.backblaze.com/blog/the-3-2-1-backup-strategy/ (Backup Strategies: Why the 3-2-1 Backup Strategy is the Best)
https://metro.org/event/data-privacy-big-tech-how-facebook-amazon-apple-netflix-and-google-deal-with-data-and-what-it-means-for-you/ (Data Privacy + Big Tech: How Facebook, Amazon, Apple, Netflix, and Google Deal With Data (And What It Means for You)   - METRO)
https://www.linkedin.com/posts/gabrielfriedlander_informationsecurity-securityawareness-activity-6692936815084662784-G1m-/ (Wizer)</itunes:summary></item><item><title>In The House (Or Not)</title><itunes:title>In The House (Or Not)</itunes:title><description><![CDATA[<p>Dan, Brian and Erik discuss the pros and cons of managed services for security vs. building similar capability internally, best of breed security vs. suite (for the 5th time since 1995), and education and awareness.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cbronline.com/interview/peter-yapp-schillings-interview" rel="noopener noreferrer" target="_blank">The Big Interview: Peter Yapp, Partner, Schillings and former NCSC Deputy Director: “Boards Need a CISO Who Reports Directly to Them, Rather than the CIO”</a></li><li><a href="https://www.linkedin.com/in/mbally/" rel="noopener noreferrer" target="_blank">Martin Bally | LinkedIn</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Dan, Brian and Erik discuss the pros and cons of managed services for security vs. building similar capability internally, best of breed security vs. suite (for the 5th time since 1995), and education and awareness.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.cbronline.com/interview/peter-yapp-schillings-interview" rel="noopener noreferrer" target="_blank">The Big Interview: Peter Yapp, Partner, Schillings and former NCSC Deputy Director: “Boards Need a CISO Who Reports Directly to Them, Rather than the CIO”</a></li><li><a href="https://www.linkedin.com/in/mbally/" rel="noopener noreferrer" target="_blank">Martin Bally | LinkedIn</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-4-in-the-house-or-not]]></link><guid isPermaLink="false">51347337-f10f-465b-ac12-edc1a91e8e80</guid><itunes:image href="https://artwork.captivate.fm/ffca1bdb-4c79-425a-8893-cfc686dda5c1/cover.jpg"/><pubDate>Sat, 04 Jul 2020 19:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fa9e4c1a-2710-40d7-8c2e-6637bb8a6125/51347337-f10f-465b-ac12-edc1a91e8e80.mp3" length="50692152" type="audio/mpeg"/><itunes:duration>01:08:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Dan, Brian and Erik discuss the pros and cons of managed services for security vs. building similar capability internally, best of breed security vs. suite (for the 5th time since 1995), and education and awareness.


Visit our website at https://www.greatsecuritydebate.net (https://www.greatsecuritydebate.net)

Contact us at feedback@greatsecuritydebate.net

Follow us on Twitter at https://twitter.com/securitydebate (https://twitter.com/securitydebate)
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.cbronline.com/interview/peter-yapp-schillings-interview (The Big Interview: Peter Yapp, Partner, Schillings and former NCSC Deputy Director: “Boards Need a CISO Who Reports Directly to Them, Rather than the CIO”)
https://www.linkedin.com/in/mbally/ (Martin Bally | LinkedIn)</itunes:summary></item><item><title>MVP vs. TSP</title><itunes:title>MVP vs. TSP</itunes:title><description><![CDATA[<p>Dan, Brian and Erik debate the pros and cons to starting a product (or even a project) fully focused on hitting MVP (minimum viable product) or focusing more on TSP (totally secure product). Spoiler alert: it's somewhere in the middle! Also covered: the importance of support, defence vs response, and the mission of the podcast.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://er.educause.edu/blogs/2020/3/thoughtfulness-in-a-pandemic" rel="noopener noreferrer" target="_blank">Thoughtfulness in a Pandemic</a></li><li><a href="https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices" rel="noopener noreferrer" target="_blank">HBR: Why Data Breaches Don’t Hurt Stock Prices</a></li><li><a href="https://www.amazon.com/Extreme-Ownership-U-S-Navy-SEALs/dp/1250067057" rel="noopener noreferrer" target="_blank">Extreme Ownership: How U.S. Navy SEALs Lead and Win (9781250067050): Willink, Jocko, Babin, Leif: Books</a></li><li><a href="https://www.amazon.com/Leaders-Eat-Last-Together-Others/dp/1591848016/ref=sr_1_1?dchild=1&amp;keywords=Leaders+Eat+Last&amp;qid=1592100999&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Leaders Eat Last: Why Some Teams Pull Together and Others Don't: Sinek, Simon: 9781591848011: Amazon.com: Books</a></li><li><a href="https://go.forrester.com/blogs/dont-reward-the-brilliant-jerk/" rel="noopener noreferrer" target="_blank">Don't Reward The Brilliant Jerk: The Role Of Culture In Employee Retention</a></li><li><a href="https://www.amazon.com/True-North-Discover-Authentic-Leadership/dp/0787987514" rel="noopener noreferrer" target="_blank">True North: Discover Your Authentic Leadership: Bill George, Peter Sims, David Gergen: 9780787987510: Amazon.com: Books</a></li><li><a href="https://www.youtube.com/watch?v=l7UnEGbHx78" rel="noopener noreferrer" target="_blank">Hang Out A Shingle - Starting Your Cybersecurity Company Feat. Daniel Ayala and Douglas Brush - YouTube</a></li><li><a href="https://www.amazon.com/Crucial-Conversations-Talking-Stakes-Second/dp/0071771328/ref=sr_1_1?dchild=1&amp;keywords=Crucial+Conversations&amp;qid=1592101093&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Crucial Conversations Tools for Talking When Stakes Are High, Second Edition: Patterson, Kerry, Grenny, Joseph, McMillan, Ron, Switzler, Al: 8580001040288: Amazon.com: Books</a></li><li><a href="https://wizer-training.com/" rel="noopener noreferrer" target="_blank">Wizer: Security Awareness Training</a></li><li><a href="https://www.linkedin.com/posts/sidragon1_dataintegrity-pollution-bigdata-activity-6676758042261889025-CMkI/" rel="noopener noreferrer" target="_blank">The Sixth Ocean!</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Dan, Brian and Erik debate the pros and cons to starting a product (or even a project) fully focused on hitting MVP (minimum viable product) or focusing more on TSP (totally secure product). Spoiler alert: it's somewhere in the middle! Also covered: the importance of support, defence vs response, and the mission of the podcast.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://er.educause.edu/blogs/2020/3/thoughtfulness-in-a-pandemic" rel="noopener noreferrer" target="_blank">Thoughtfulness in a Pandemic</a></li><li><a href="https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices" rel="noopener noreferrer" target="_blank">HBR: Why Data Breaches Don’t Hurt Stock Prices</a></li><li><a href="https://www.amazon.com/Extreme-Ownership-U-S-Navy-SEALs/dp/1250067057" rel="noopener noreferrer" target="_blank">Extreme Ownership: How U.S. Navy SEALs Lead and Win (9781250067050): Willink, Jocko, Babin, Leif: Books</a></li><li><a href="https://www.amazon.com/Leaders-Eat-Last-Together-Others/dp/1591848016/ref=sr_1_1?dchild=1&amp;keywords=Leaders+Eat+Last&amp;qid=1592100999&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Leaders Eat Last: Why Some Teams Pull Together and Others Don't: Sinek, Simon: 9781591848011: Amazon.com: Books</a></li><li><a href="https://go.forrester.com/blogs/dont-reward-the-brilliant-jerk/" rel="noopener noreferrer" target="_blank">Don't Reward The Brilliant Jerk: The Role Of Culture In Employee Retention</a></li><li><a href="https://www.amazon.com/True-North-Discover-Authentic-Leadership/dp/0787987514" rel="noopener noreferrer" target="_blank">True North: Discover Your Authentic Leadership: Bill George, Peter Sims, David Gergen: 9780787987510: Amazon.com: Books</a></li><li><a href="https://www.youtube.com/watch?v=l7UnEGbHx78" rel="noopener noreferrer" target="_blank">Hang Out A Shingle - Starting Your Cybersecurity Company Feat. Daniel Ayala and Douglas Brush - YouTube</a></li><li><a href="https://www.amazon.com/Crucial-Conversations-Talking-Stakes-Second/dp/0071771328/ref=sr_1_1?dchild=1&amp;keywords=Crucial+Conversations&amp;qid=1592101093&amp;s=books&amp;sr=1-1" rel="noopener noreferrer" target="_blank">Crucial Conversations Tools for Talking When Stakes Are High, Second Edition: Patterson, Kerry, Grenny, Joseph, McMillan, Ron, Switzler, Al: 8580001040288: Amazon.com: Books</a></li><li><a href="https://wizer-training.com/" rel="noopener noreferrer" target="_blank">Wizer: Security Awareness Training</a></li><li><a href="https://www.linkedin.com/posts/sidragon1_dataintegrity-pollution-bigdata-activity-6676758042261889025-CMkI/" rel="noopener noreferrer" target="_blank">The Sixth Ocean!</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-3-mvp-vs-tsp]]></link><guid isPermaLink="false">77d0f6a7-26d4-4d6b-9874-37ee55b90013</guid><itunes:image href="https://artwork.captivate.fm/af7ceb20-aebc-4baa-bde7-1d3e1a3a27c4/cover.jpg"/><pubDate>Sat, 13 Jun 2020 17:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7cbaeab2-a5e3-4ebc-a0d4-eb2f9d167c04/77d0f6a7-26d4-4d6b-9874-37ee55b90013.mp3" length="45465846" type="audio/mpeg"/><itunes:duration>01:00:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Dan, Brian and Erik debate the pros and cons to starting a product (or even a project) fully focused on hitting MVP (minimum viable product) or focusing more on TSP (totally secure product). Spoiler alert: it&amp;#39;s somewhere in the middle! Also covered: the importance of support, defence vs response, and the mission of the podcast.


Visit our website at https://www.greatsecuritydebate.net (https://www.greatsecuritydebate.net)

Contact us at feedback@greatsecuritydebate.net

Follow us on Twitter at https://twitter.com/securitydebate (https://twitter.com/securitydebate)
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://er.educause.edu/blogs/2020/3/thoughtfulness-in-a-pandemic (Thoughtfulness in a Pandemic)
https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices (HBR: Why Data Breaches Don’t Hurt Stock Prices)
https://www.amazon.com/Extreme-Ownership-U-S-Navy-SEALs/dp/1250067057 (Extreme Ownership: How U.S. Navy SEALs Lead and Win (9781250067050): Willink, Jocko, Babin, Leif: Books)
https://www.amazon.com/Leaders-Eat-Last-Together-Others/dp/1591848016/ref=sr_1_1?dchild=1&amp;keywords=Leaders+Eat+Last&amp;qid=1592100999&amp;s=books&amp;sr=1-1 (Leaders Eat Last: Why Some Teams Pull Together and Others Don&apos;t: Sinek, Simon: 9781591848011: Amazon.com: Books)
https://go.forrester.com/blogs/dont-reward-the-brilliant-jerk/ (Don&apos;t Reward The Brilliant Jerk: The Role Of Culture In Employee Retention)
https://www.amazon.com/True-North-Discover-Authentic-Leadership/dp/0787987514 (True North: Discover Your Authentic Leadership: Bill George, Peter Sims, David Gergen: 9780787987510: Amazon.com: Books)
https://www.youtube.com/watch?v=l7UnEGbHx78 (Hang Out A Shingle - Starting Your Cybersecurity Company Feat. Daniel Ayala and Douglas Brush - YouTube)
https://www.amazon.com/Crucial-Conversations-Talking-Stakes-Second/dp/0071771328/ref=sr_1_1?dchild=1&amp;keywords=Crucial+Conversations&amp;qid=1592101093&amp;s=books&amp;sr=1-1 (Crucial Conversations Tools for Talking When Stakes Are High, Second Edition: Patterson, Kerry, Grenny, Joseph, McMillan, Ron, Switzler, Al: 8580001040288: Amazon.com: Books)
https://wizer-training.com/ (Wizer: Security Awareness Training)
https://www.linkedin.com/posts/sidragon1_dataintegrity-pollution-bigdata-activity-6676758042261889025-CMkI/ (The Sixth Ocean!)</itunes:summary></item><item><title>Free Range Security</title><itunes:title>Free Range Security</itunes:title><description><![CDATA[<p>Dan, Brian and Erik discuss how to talk about security in ways that encourage end users to understand security and want to be part of the process, and the challenges of selling security products into security organisations.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Crossing-Chasm-3rd-Disruptive-Mainstream/dp/0062292986" rel="noopener noreferrer" target="_blank">Crossing the Chasm</a></li><li><a href="https://www.amazon.com/Never-Split-Difference-Negotiating-Depended/dp/0062407805" rel="noopener noreferrer" target="_blank">Never Split the Difference</a></li><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business-ebook/dp/B078Y98RG8/" rel="noopener noreferrer" target="_blank">The Phoenix Project</a></li><li><a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">Great Security Debate Website</a></li><li><a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">Great Security Debate Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Dan, Brian and Erik discuss how to talk about security in ways that encourage end users to understand security and want to be part of the process, and the challenges of selling security products into security organisations.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.amazon.com/Crossing-Chasm-3rd-Disruptive-Mainstream/dp/0062292986" rel="noopener noreferrer" target="_blank">Crossing the Chasm</a></li><li><a href="https://www.amazon.com/Never-Split-Difference-Negotiating-Depended/dp/0062407805" rel="noopener noreferrer" target="_blank">Never Split the Difference</a></li><li><a href="https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business-ebook/dp/B078Y98RG8/" rel="noopener noreferrer" target="_blank">The Phoenix Project</a></li><li><a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">Great Security Debate Website</a></li><li><a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">Great Security Debate Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-2-free-range-security]]></link><guid isPermaLink="false">f5cd2236-43ef-451c-834b-1868a34a9b5e</guid><itunes:image href="https://artwork.captivate.fm/9e3e9537-1104-41b9-8782-6c0685ba17f2/cover.jpg"/><pubDate>Sat, 30 May 2020 14:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6f69e380-c7c1-4136-ae90-73c017a57214/f5cd2236-43ef-451c-834b-1868a34a9b5e.mp3" length="43631157" type="audio/mpeg"/><itunes:duration>59:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Dan, Brian and Erik discuss how to talk about security in ways that encourage end users to understand security and want to be part of the process, and the challenges of selling security products into security organisations.


Visit our website at https://www.greatsecuritydebate.net (https://www.greatsecuritydebate.net)

Contact us at feedback@greatsecuritydebate.net

Follow us on Twitter at https://twitter.com/securitydebate (https://twitter.com/securitydebate)
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.amazon.com/Crossing-Chasm-3rd-Disruptive-Mainstream/dp/0062292986 (Crossing the Chasm)
https://www.amazon.com/Never-Split-Difference-Negotiating-Depended/dp/0062407805 (Never Split the Difference)
https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business-ebook/dp/B078Y98RG8/ (The Phoenix Project)
https://www.greatsecuritydebate.net (Great Security Debate Website)
https://twitter.com/securitydebate (Great Security Debate Twitter)</itunes:summary></item><item><title>Privacy Drone</title><itunes:title>Privacy Drone</itunes:title><description><![CDATA[<p>Episode 1: Privacy Drone. Dan, Brian and Erik discuss expectation of privacy; privacy as a business enabler; transparency and ethical increase of privacy and how much should leaders and legislators understand privacy innately.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">Great Security Debate Website</a></li><li><a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">Great Security Debate Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Episode 1: Privacy Drone. Dan, Brian and Erik discuss expectation of privacy; privacy as a business enabler; transparency and ethical increase of privacy and how much should leaders and legislators understand privacy innately.</p><p>Visit our website at <a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">https://www.greatsecuritydebate.net</a></p><p>Contact us at <a href="mailto:feedback@greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">feedback@greatsecuritydebate.net</a></p><p><br></p><p>Follow us on Twitter at <a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">https://twitter.com/securitydebate</a></p><p><a href="https://www.patreon.com/securitydebate" rel="noopener noreferrer" target="_blank">Support The Great Security Debate</a></p><p>Links:</p><ul><li><a href="https://www.greatsecuritydebate.net" rel="noopener noreferrer" target="_blank">Great Security Debate Website</a></li><li><a href="https://twitter.com/securitydebate" rel="noopener noreferrer" target="_blank">Great Security Debate Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://www.distillingsecurity.com/securitydebate/episode-1-privacy-drone]]></link><guid isPermaLink="false">640a1cea-a4ff-463c-a39c-6d5b738da4be</guid><itunes:image href="https://artwork.captivate.fm/864cf10b-a41c-4d30-bcba-396a5fa03111/cover.jpg"/><pubDate>Sat, 16 May 2020 17:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c0ddec92-bf34-42d4-88da-d007910ec88a/640a1cea-a4ff-463c-a39c-6d5b738da4be.mp3" length="50005619" type="audio/mpeg"/><itunes:duration>01:08:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Episode 1: Privacy Drone. Dan, Brian and Erik discuss expectation of privacy; privacy as a business enabler; transparency and ethical increase of privacy and how much should leaders and legislators understand privacy innately.


Visit our website at https://www.greatsecuritydebate.net (https://www.greatsecuritydebate.net)

Contact us at feedback@greatsecuritydebate.net

Follow us on Twitter at https://twitter.com/securitydebate (https://twitter.com/securitydebate)
https://www.patreon.com/securitydebate (Support The Great Security Debate)
Links:
https://www.greatsecuritydebate.net (Great Security Debate Website)
https://twitter.com/securitydebate (Great Security Debate Twitter)</itunes:summary></item></channel></rss>