loader from loading.io

Too Authentic - SCW #97

Security and Compliance Weekly (audio)

Release Date: 12/02/2021

Becoming the Avengers - SCW #99 show art Becoming the Avengers - SCW #99

Security and Compliance Weekly (audio)

Author of "Why CISOs Fail" is joining us today to tell us about the success of his first book as well as introduce us to his forthcoming book, "Security Hippie. Barak is best known for pioneering the concept of the virtual (or fractional) CISO model nearly two decades ago. Over the twenty years since then he has applied that model and strategy to building, managing and counseling security departments across countless and diverse organizations, including MuleSoft, Amplitude Analytics, Livenation/Ticketmaster, StubHub, Barnes and Noble, bebe Stores and many others. The goal of his new book is to...

info_outline
Under the Bus - SCW #98 show art Under the Bus - SCW #98

Security and Compliance Weekly (audio)

Ben Carr will lead us in a discussion about the origins of the role of CISO, roles/responsibilities, and what it's like to be a CISO. We'll touch on qualifications, organizational structure, its place in security and compliance, what it's like to be hero or scapegoat. All this and more!   Show Notes: Visit for all the latest episodes!   Follow us on Twitter: Like us on Facebook:

info_outline
Too Authentic - SCW #97 show art Too Authentic - SCW #97

Security and Compliance Weekly (audio)

There’s something happening here – and what it is ain’t exactly clear to O.G hackers like John Threat or our own Mr. Jeff Man. We’re going to devote an episode talking about how things used to be back in the day from a hacker/penetration perspective and discuss how things are today. Are things better? Worse? Depends on your attack vector, perhaps? Join us on Discord and participate in the discussion of what’s right and what’s wrong in our industry today and what can we do about it. All from a hacker’s perspective.   Show Notes: Visit for all the latest episodes!  ...

info_outline
A Good Mission - SCW #96 show art A Good Mission - SCW #96

Security and Compliance Weekly (audio)

In the early days of PCI there was an online column called StorefrontBacktalk which focused on retail and technology issues. The column provided valuable insights from various specialists on the interpretation and application of many of the more challenging security requirements found in PCI DSS which was reflected in its tag line, “Techniques, Tools and Tirade about Retail Technology and E-Commerce. The founder of the column, Evan Schuman, is a veteran journalist who has covered a wide range of technology, privacy and legal issues over the past three decades. Evan will give us his take on...

info_outline
Massive Damage - SCW #95 show art Massive Damage - SCW #95

Security and Compliance Weekly (audio)

CISA recently published guidance for how managed service providers (MSPs) should approach security for their operations based on the premise that cyber threat actors are known to target MSPs to reach their customers. MSPs provide remote management of customer IT and end-user systems and generally have direct access to their customers’ networks and data. By exploiting trust relationships in MSP networks, cyber threat actors can gain access to a large number of the victim MSP customers. The CISA Insights publication provides mitigation and hardening guidance for MSPs and their small- and...

info_outline
A Good Crisis - SCW #94 show art A Good Crisis - SCW #94

Security and Compliance Weekly (audio)

Join us on this episode of SCW for a general discussion about how to do this whole security/compliance thing better; how compliance really needs to come first; how it's all risk-based or should be RGC not GRC; legal and privacy issues/focus - and how they help or hinder the cause; other factors like burnout/gatekeeping/etc. that all contribute to our industry being overly focused/reliant on technology and don't handle the people/process part very well.   Show Notes: Visit for all the latest episodes!   Follow us on Twitter: Like us on Facebook:

info_outline
Diversity & Equality - SCW #93 show art Diversity & Equality - SCW #93

Security and Compliance Weekly (audio)

With cybersecurity skills already in short supply, the prospect of losing what little workforce there is to pull from to resignations (especially in the context of the ‘Great Resignation’), is a disturbing one. Rick McElroy will speak to the causes of security burnout and the steps organizations need to take to prevent the loss of the precious resource that is security talent. He will share supporting research findings from VMware's latest Global Incident Response Threat Report: Manipulating Reality.   Show Notes: Segment Resources:   Visit for all the latest episodes! Follow...

info_outline
Overly Prescriptive - SCW #92 show art Overly Prescriptive - SCW #92

Security and Compliance Weekly (audio)

Tony and Thomas will discuss the importance, value, and challenge of cross-mapping security frameworks, and the rationale and process used by CIS to create end support mapping, and some real-world examples and some real-life problems.   Show Notes: Visit for all the latest episodes!   Follow us on Twitter: Like us on Facebook:

info_outline
Different Directions - SCW #91 show art Different Directions - SCW #91

Security and Compliance Weekly (audio)

We’re getting closer to the Q1 2022 release of PCI DSS 4.0, which is expected to differ from the current PCI DSS 3.2.1 version in a few key ways. This includes giving organizations more options in how they become compliant, along with customized implementation. In this podcast, Chris Pin, VP of Privacy and Compliance at PKWARE, will discuss what customized implementation means for organizations, additional changes to 4.0, and why they’re important.   And, while PCI 3.2.1 won’t be retired until 2024, it’s a good idea for companies to get started now with their 4.0 compliance...

info_outline
This Is Fascinating - SCW #90 show art This Is Fascinating - SCW #90

Security and Compliance Weekly (audio)

Tune in for this discussion on social engineering and its merits on being recognized as a legitimate component of cyber security. We'll also dive into the whole notion of motive and intent as it pertains to deliberately misrepresenting yourself, or simply lying to your customer in order to get them to be more secure.   Show Notes: Segment Resources: The Aspies Guide to Social Engineering: from DEF CON 27 Social Engineering Village:   Visit for all the latest episodes! Follow us on Twitter: Like us on Facebook:

info_outline
 
More Episodes

There’s something happening here – and what it is ain’t exactly clear to O.G hackers like John Threat or our own Mr. Jeff Man. We’re going to devote an episode talking about how things used to be back in the day from a hacker/penetration perspective and discuss how things are today. Are things better? Worse? Depends on your attack vector, perhaps? Join us on Discord and participate in the discussion of what’s right and what’s wrong in our industry today and what can we do about it. All from a hacker’s perspective.

 

Show Notes: https://securityweekly.com/scw97

Visit https://www.securityweekly.com/scw for all the latest episodes!

 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly