Artwork

A tartalmat a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Calculus of IT - Episode 9 - 1/24/2024 - "IT Survival Guide Chapter 10 - Security"

2:43:51
 
Megosztás
 

Manage episode 397573548 series 3538190
A tartalmat a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

In Episode 9, Mike and Nate, along with returning guest Kevin Dushney and special guest Bob Litterer (CISO at Teradyne), discuss Chapter 10 of the IT Survival Guide, which is focused on the philosophy and initial activities behind the construction of a security stack at your new company. Though this chapter was written in late 2019, the paradigm introduced is still a pivotal moment in the start of your IT journey. Bob helps us uncover new insights into other considerations when it comes to security and how the industry at large is evolving.

We take a deep dive into AI as a pure revenue concept (which it is) and how one day it may be used for the betterment of humankind, how far away we may be from an alternative Hollywood, and the other usual stuff.

Podcast References:

The Markup.org report

The Pew Report

Post-chapter 10 analysis/reflection questions:

  1. Which perspective - technology, governance, or growth - should be prioritized in the first 90 days, and why?
  2. What challenges might arise in balancing security needs with business productivity, and how would you address them?
  3. From a technology and governance perspective, which phase 1 objectives should be the focus?
  4. How would you unite stakeholders to build consensus around a new security strategy?
  5. How would you prioritize addressing security gaps in systems, policies, procedures, and cultural awareness?
  6. Which stakeholder groups might resist changes in security approaches, and how would you gain their buy-in?
  7. What key questions need answers from stakeholders when planning your initial security strategy?
  8. How do you balance differing views on security within your strategy while ensuring adequate protection of the organization's assets?
  9. Which foundational elements of your security plan do you prioritize in the short term, and what is your implementation plan?
  10. How do you decide between using Managed Security Services Providers (MSSPs) and building internal security capabilities?
  11. Discuss the role of governance in ensuring adherence to security policies, procedures, and controls.
  12. As an IT leader, how do you stay updated on security threats and technologies and incorporate this knowledge into your planning?
  13. What approaches for raising security awareness have you found effective in educating the business and gaining stakeholder buy-in?

Support the show

The Calculus of IT website - https://www.thecoit.us
"The New IT Leader's Survival Guide" Book - https://www.longwalk.consulting/library
"The Calculus of IT" Book - https://www.longwalk.consulting/library
The COIT Merchandise Store - https://thecoit.myspreadshop.com
Buy us a Beer!! - https://www.buymeacoffee.com/thecalculusofit
Youtube - @thecalculusofit
Slack - Invite Link
Notta - The best audio transcriptions on the Internet
Email - nate@thecoit.us
Email - mike@thecoit.us

  continue reading

Fejezetek

1. Technical Idiocy (00:00:00)

2. Preamble: Meta Pixel (00:04:42)

3. Nate Reads Chapter 10 (00:28:00)

4. Chapter 10 Concludes - General Banter Continues (00:51:15)

48 epizódok

Artwork
iconMegosztás
 
Manage episode 397573548 series 3538190
A tartalmat a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

In Episode 9, Mike and Nate, along with returning guest Kevin Dushney and special guest Bob Litterer (CISO at Teradyne), discuss Chapter 10 of the IT Survival Guide, which is focused on the philosophy and initial activities behind the construction of a security stack at your new company. Though this chapter was written in late 2019, the paradigm introduced is still a pivotal moment in the start of your IT journey. Bob helps us uncover new insights into other considerations when it comes to security and how the industry at large is evolving.

We take a deep dive into AI as a pure revenue concept (which it is) and how one day it may be used for the betterment of humankind, how far away we may be from an alternative Hollywood, and the other usual stuff.

Podcast References:

The Markup.org report

The Pew Report

Post-chapter 10 analysis/reflection questions:

  1. Which perspective - technology, governance, or growth - should be prioritized in the first 90 days, and why?
  2. What challenges might arise in balancing security needs with business productivity, and how would you address them?
  3. From a technology and governance perspective, which phase 1 objectives should be the focus?
  4. How would you unite stakeholders to build consensus around a new security strategy?
  5. How would you prioritize addressing security gaps in systems, policies, procedures, and cultural awareness?
  6. Which stakeholder groups might resist changes in security approaches, and how would you gain their buy-in?
  7. What key questions need answers from stakeholders when planning your initial security strategy?
  8. How do you balance differing views on security within your strategy while ensuring adequate protection of the organization's assets?
  9. Which foundational elements of your security plan do you prioritize in the short term, and what is your implementation plan?
  10. How do you decide between using Managed Security Services Providers (MSSPs) and building internal security capabilities?
  11. Discuss the role of governance in ensuring adherence to security policies, procedures, and controls.
  12. As an IT leader, how do you stay updated on security threats and technologies and incorporate this knowledge into your planning?
  13. What approaches for raising security awareness have you found effective in educating the business and gaining stakeholder buy-in?

Support the show

The Calculus of IT website - https://www.thecoit.us
"The New IT Leader's Survival Guide" Book - https://www.longwalk.consulting/library
"The Calculus of IT" Book - https://www.longwalk.consulting/library
The COIT Merchandise Store - https://thecoit.myspreadshop.com
Buy us a Beer!! - https://www.buymeacoffee.com/thecalculusofit
Youtube - @thecalculusofit
Slack - Invite Link
Notta - The best audio transcriptions on the Internet
Email - nate@thecoit.us
Email - mike@thecoit.us

  continue reading

Fejezetek

1. Technical Idiocy (00:00:00)

2. Preamble: Meta Pixel (00:04:42)

3. Nate Reads Chapter 10 (00:28:00)

4. Chapter 10 Concludes - General Banter Continues (00:51:15)

48 epizódok

Minden epizód

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv