Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by CISO Tradecraft®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Tradecraft® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#198 - Securing the Business Processes

21:54
 
Share
 

Manage episode 440211090 series 2849492
Content provided by CISO Tradecraft®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Tradecraft® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.

7 critical business processes common to most organizations.

  1. Book
  2. Order
  3. Bill
  4. Pay
  5. Ship
  6. Close
  7. Communicate

Transcripts

https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h

Chapters

  • 00:00 Introduction to Securing the Business
  • 00:12 Begin Podcast
  • 01:08 Understanding Critical Business Processes
  • 02:23 Identifying and Prioritizing Business Functions
  • 03:00 Real-World Example: Restaurant Booking System
  • 04:57 Decision Making in Crisis Situations
  • 10:38 Mapping Confidentiality, Integrity, and Availability
  • 19:42 Conclusion and Final Thoughts
  continue reading

236 episodes

Artwork
iconShare
 
Manage episode 440211090 series 2849492
Content provided by CISO Tradecraft®. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CISO Tradecraft® or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.

7 critical business processes common to most organizations.

  1. Book
  2. Order
  3. Bill
  4. Pay
  5. Ship
  6. Close
  7. Communicate

Transcripts

https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h

Chapters

  • 00:00 Introduction to Securing the Business
  • 00:12 Begin Podcast
  • 01:08 Understanding Critical Business Processes
  • 02:23 Identifying and Prioritizing Business Functions
  • 03:00 Real-World Example: Restaurant Booking System
  • 04:57 Decision Making in Crisis Situations
  • 10:38 Mapping Confidentiality, Integrity, and Availability
  • 19:42 Conclusion and Final Thoughts
  continue reading

236 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play