Cybersecurity Risk Podcast Por Dr. Bill Souza arte de portada

Cybersecurity Risk

Cybersecurity Risk

De: Dr. Bill Souza
Escúchala gratis

Acerca de esta escucha

Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.

This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.

Here's what you'll learn:

  • Program and control assessments: Identify weaknesses in your current defenses.
  • Risk identification and mitigation: Proactively address threats before they strike.
  • Building a risk register: Track and prioritize your organization's vulnerabilities.
  • Crafting effective mitigation plans: Develop strategies to minimize cyber risk.
  • And much more!


Join us and learn how to navigate the ever-evolving cyber landscape with confidence.

© 2025 E|CE - Executive Cyber Education
Economía Educación Gestión Gestión y Liderazgo
Episodios
  • Unpacking Trump’s Cybersecurity Orders: Key Updates and What They Mean for National Security
    Jun 12 2025

    Send us a text

    President Trump Amends Cybersecurity Executive Orders: Key Impacts and Analysis

    In this episode, we delve into President Trump's recent amendments to Executive Orders 13694 and 14144, primarily focusing on enhancing national cybersecurity. We outline six key areas of impact, including specific threat identification, secure software development, post-quantum cryptography preparations, AI in cyber defense, modernizing federal systems, and defining scope in sanctions and applications. These proactive measures aim to strengthen the U.S. cybersecurity posture against foreign threats. Join the discussion and share your thoughts on these crucial changes.

    00:00 Introduction to Cybersecurity Amendments

    00:55 Key Fact 1: Updated Policy and Threat Landscape

    02:21 Key Fact 2: Enhancing Secure Software Development

    04:30 Key Fact 3: Preparing for Post-Quantum Cryptography

    06:44 Key Fact 4: Promoting Security with AI

    08:59 Key Fact 5: Modernizing Federal Systems

    11:10 Key Fact 6: Scope of Applications and Sanctions

    13:08 Conclusion and Final Thoughts



    Más Menos
    14 m
  • Optimizing SIEM Storage Costs: Effective Logging Strategies
    Jun 6 2025

    Send us a text

    Optimizing SIEM Storage Costs: Effective Logging Strategies

    Is storage really as cheap as people think? This episode delves into the true cost of storage in the context of Security Information and Event Management (SIEM) systems. We explore traditional logging practices and their impact on storage, especially with the rise of cloud computing and hybrid environments. The key focus is on identifying critical applications and underlying architectures to optimize logging processes, thus controlling operational costs without compromising security. Learn about the importance of strategic log triage and maintaining an efficient security posture in a complex IT landscape.

    00:00 Introduction: Is Storage Really Cheap?
    00:20 Understanding SIEM and Log Management
    01:08 Strategies for Managing Operational Costs
    01:46 Critical vs. Less Critical Systems
    02:30 The Importance of a Triage Process
    03:06 Conclusion: Balancing Cost and Security

    Más Menos
    3 m
  • One Insight from 1978 Could Change Your Cybersecurity Strategy
    Jun 2 2025

    Send us a text

    The Importance of Managerial Controls in Cybersecurity: Insights from 1978

    In this episode of Doctor's Advice, Dr. B discusses the critical idea presented by Steward Madnick in 1978, emphasizing that computer security can't rely solely on technical measures. Dr. B explains how operational computer security requires managerial controls, such as policies, standards, and procedures. The conversation highlights the importance of prioritizing the protection of systems that align with corporate objectives and customer service rather than randomly patching vulnerabilities. Dr. B urges examining internal processes and adapting strategies to focus on mission-based cybersecurity, especially in today's environment where deploying numerous systems and services through cloud computing has become remarkably easy.

    00:00 Introduction to Computer Security

    00:32 Madnick's 1978 Insight on Managerial Controls

    01:27 The Importance of Prioritizing Vulnerabilities

    03:28 Mission-Based Cybersecurity

    03:37 Challenges in Modern Cybersecurity

    04:29 The Need for Strategic Cybersecurity

    04:53 Criticality of Production Systems

    05:33 Reflecting on 1978 Principles in 2025

    06:23 Final Thoughts and Call to Action

    07:25 Conclusion and Subscription Reminder


    Dr. B.

    Más Menos
    8 m
adbl_web_global_use_to_activate_webcro805_stickypopup
Todavía no hay opiniones