Cover image of show ByteWise

ByteWise

Podcast by Daniela Parker

English

Business

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About ByteWise

Unraveling the (con)fusion between Tech & Risk Management

All episodes

46 episodes

episode S2E20 Shadow AI and the Haunted Supply Chain artwork

S2E20 Shadow AI and the Haunted Supply Chain

With Daniela away, Glen and Brian are running the show! 🤡 They kick things off by breaking down a recent NPM (Node Package Manager) supply chain attack that targets open-source developers through social engineering. This spirals into a larger discussion about the "spiderweb of trouble" within modern software supply chains and the massive, often invisible, risks posed by Shadow IT and Shadow AI. The hosts provide practical, actionable advice for organizations trying to govern tools they don't even know their employees are using, emphasizing that the AI genie isn't going back in the bottle.   Key Topics Discussed   * (01:55) Announcement: Join Glen, Brian, and Daniela for their social engineering workshop at SaintCon in Utah! * (02:30) The NPM Attack: A deep dive into the ongoing supply chain attack where hackers use stolen developer credentials to inject malicious code into widely used open-source packages. * (05:15) The Spiderweb of Trouble: How vulnerabilities in small, third-party components can create massive, tangled risks for organizations, even if they aren't using the components directly. * (12:18) Software Bill of Materials (SBOM): A crucial tool for vetting vendors and understanding the security maturity of the products you buy. If a vendor can't provide one, that's a red flag. 🚩 * (14:05) Shadow AI & Shadow IT: The things you don't know about are the scariest. The hosts discuss the risks of unsanctioned apps and AI tools operating within your environment. * (17:21) You Can't Just "Turn Off" AI: Why blocking AI is like fighting a house fire with a squirt gun. Governance through policy and training is the only realistic path forward. * (29:40) A Cautionary Tale: A classic real-world example of how a critical business process became dependent on unsupported Shadow IT, leading to panic when it inevitably broke.   Actionable Advice & Key Takeaways   * Ask for an SBOM: When procuring software, ask vendors for a Software Bill of Materials (SBOM) to get a clear picture of what's inside their product. * Create an AI Policy: Since you can't block AI everywhere, focus on governance. Develop a clear Acceptable Use Policy to give employees guardrails for using AI tools safely. * Provide Sanctioned Tools: Enable your team to work efficiently by providing a sanctioned, private AI environment where they can safely use sensitive company data. * Go Hunting for Shadows: Use DNS monitoring and review company credit card expenses to identify unsanctioned third-party applications and services being used in your organization. * Build a Security Culture: Technical controls aren't enough. Foster a strong security culture where employees understand the why behind the policies and feel empowered to make smart decisions about data.

30 Sep 2025 - 33 min
episode S2E19: ByteWise - Credit Union Edition artwork

S2E19: ByteWise - Credit Union Edition

In this special Credit Union Edition of the ByteWise Podcast, Daniela, Brian, and Glen are joined by Tom Costello, CEO of Upstreme, to unpack the future of the Automated Cybersecurity Examination Tool (ACET) and its impact on credit unions. For years, ACET has been the standard tool for cybersecurity self-assessments, but with its foundation—the FFIEC’s Cybersecurity Assessment Tool (CAT)—now officially sunset, credit unions must prepare for what comes next. What We Cover * ACET’s Rise and Sunset: Why the tool was created, its limitations, and why regulators are moving away from it. * Alternative Frameworks: Deep dive into the top three contenders—NIST CSF 2.0, the CRI Profile, and the CIS Controls—and what each offer. * Credit Union Realities: Challenges for smaller institutions, including ISE framework considerations, resource constraints, and scaling expectations. * Transition Strategies: Practical advice on mapping from ACET to modern frameworks, avoiding common mistakes, and creating a smooth shift. * Bigger Picture: How technologies like AI and Zero Trust Architecture are reshaping InfoSec, and why now is the perfect moment for credit unions to reframe cyber risk conversations with boards and leadership. * Risk & Governance: Connecting frameworks to enterprise risk management, risk appetite, and governance functions—ensuring cyber strategy aligns with organizational strategy. Key Quotes * “All frameworks are wrong. Some of them are just more useful than others.” – Tom Costello * “The biggest mistake is doing nothing and sticking with ACET.” – Tom Costello Resources & Links * NIST Cybersecurity Framework 2.0 [https://www.nist.gov/cyberframework] * Financial Services CRI Profile [https://cyberriskinstitute.org/the-profile/] * CIS Controls [https://www.cisecurity.org/controls/v8] * Upstreme [https://www.upstreme.com/] * Connect with Tom [https://www.linkedin.com/in/tom-costello-upstreme/]

16 Sep 2025 - 31 min
episode S2E18 Cybersecurity Awareness on a Shoestring Budget artwork

S2E18 Cybersecurity Awareness on a Shoestring Budget

Welcome back to ByteWise! October is right around the corner and it is Cybersecurity Awareness Month. This episode is packed with budget-friendly, creative ideas to boost security awareness in your organization and personal life. The four key themes of this year's Cybersecurity Awareness Month: strong passwords, multi-factor authentication (MFA), recognizing phishing, and updating software. The hosts discuss why these "usual suspects" are still critical topics. They explore the importance of MFA not just at work but on personal accounts like email and online banking. To make learning engaging, they brainstorm several low-cost activities: * "Build Your Digital Fortress" Workshop: A hands-on session to walk employees through setting up MFA on their personal accounts. * The MFA Rollout Race: A friendly competition between departments to see who can get the highest adoption rate, with winners receiving fun, inexpensive prizes like stickers or 3D-printed trinkets. * "Password Creation Cook-Off": A challenge encouraging employees to create the most creative and strong passphrase, using online tools to "score" their strength. * The "Set It and Forget It" Campaign: A drive to teach people how to enable automatic software updates on their personal devices to ensure they are always protected. * "Reverse Phishing" Challenge: An innovative activity where employees are challenged to create their own convincing (but harmless) phishing email to better understand the psychology and tactics used by attackers. The conversation also touches on the importance of using password managers, following NIST guidelines for password creation, and the critical need for leadership buy-in to make any awareness campaign successful. The key is to make security training engaging, positive, and presented in bite-sized, low-cost pieces to ensure it resonates with everyone.

1 Sep 2025 - 31 min
episode S2E17 ByteWise: Unplugged artwork

S2E17 ByteWise: Unplugged

In a departure from their usual tech-focused topics, Brian, Daniela, and Glen get personal in this Friday afternoon chat. They pull back the curtain on the realities of stress in the high-stakes world of IT and InfoSec. The team shares how stress manifests for them, the challenge of disconnecting in an "always-on" world, and the short-term and long-term strategies they use to decompress—from hobbies and workouts to the simple power of a supportive chat with colleagues. This is a candid conversation about setting boundaries, managing team stress, and remembering not to sweat the small stuff. Discussion Points * How does stress show up for you? The team discusses the physical and emotional signs, from a short fuse to shoulders up by your ears. * Short-Term Fixes: The hosts share their go-to methods for immediate stress relief, including workouts, setting down the phone, and finding humor in work memes. * The "24/7 Briefcase": A discussion on how technology, especially smartphones, has erased the line between work and home life, making it harder than ever to truly disconnect. * The Vacation Paradox: Can you ever really be "on vacation" when you're always reachable? The team shares stories of feeling anxious while trying to be offline. * Long-Term Decompression: It's not just about a quick fix. The hosts dive into the hobbies and activities that provide a real escape, like working on antique cars, smoking meat, camping, and hiking. * The Power of Your People: The importance of having a sounding board and connecting with peers who understand the unique pressures of the industry. * When Stress Bleeds into the Team: As leaders, how do you manage your own stress without it negatively impacting your team? The group talks about empathy, owning your mistakes, and putting challenges into perspective. Call to Action We want to hear from you! How do you decompress and disconnect from the pressures of work? Share your tips and strategies with us on LinkedIn and Facebook.

19 Aug 2025 - 30 min
episode S2E16 The BIA Battle - Required Compliance vs. Perceived Value artwork

S2E16 The BIA Battle - Required Compliance vs. Perceived Value

In this episode of ByteWise, the team welcomes back Mark Carroll, founder of the Enterprise Risk Management master's program at Boston University, to tackle the controversial Business Impact Analysis (BIA). They explore why BIAs are non-negotiable for regulated industries, how to demonstrate their value in other sectors, and what separates a "check-the-box" BIA from a truly effective one. Mark shares real-world examples and practical strategies for navigating disagreements, managing stakeholder expectations, and aligning business needs with IT capabilities to build a resilient organization.   Guest   * Mark Carroll [https://www.linkedin.com/in/mark-carroll-5785962/]: Founder of the Enterprise Risk Management master's program at Boston University. With a rich background in IT, risk management, and business continuity, Mark brings decades of practical experience to the discussion.   Episode Highlights   Mark begins by defining the Business Impact Analysis (BIA) as a process of understanding business functions, assessing the impact of their loss, and analyzing what is required to restore them. He quickly distinguishes between organizations where a BIA is a choice versus a requirement. For regulated industries like banking or those with ISO requirements, the BIA is non-negotiable "table stakes" for legal operation. For others, it becomes a value-based decision, where the organization must be convinced of its worth as the cornerstone for any effective recovery activity. The conversation then moves to what separates a good BIA from a poor one. Mark warns against the superficial "Survey Monkey" approach where everyone simply declares their systems critical. A truly effective BIA requires a deep dive to challenge assumptions and differentiate between what is merely important and what is truly mission-critical for survival. This analysis must reconcile discrepancies, such as a department requesting a four-hour recovery time while simultaneously holding a week's worth of inventory. A significant portion of the discussion is dedicated to the human element of the BIA process. Navigating disagreements and gaining buy-in is crucial. Mark shares a practical strategy: begin the BIA with receptive departments to build momentum and create advocates for the process, leaving more resistant stakeholders for last. He illustrates the challenges with an anecdote about a finance department demanding unnecessary resources, highlighting how a fact-based approach and senior-level escalation are sometimes required to overcome myopic views. Finally, the team explores the common disconnect between the recovery time objectives (RTOs) desired by the business and the actual recovery capabilities of the IT department and third-party vendors. A BIA forces this critical conversation, pushing for alignment through solutions like increasing inventory, dedicating more IT resources to specific functions, or developing manual workarounds. The reality of vendor contracts often dictates the true RTO, forcing the business to either pay more for faster service or accept the contractual risk. The key takeaway from the discussion is that a well-executed BIA is essential for making the tough but necessary distinction between what's important and what's critical. As Mark aptly puts it, when a crisis hits, his job isn't to perform his day-to-day risk functions; it's to "carry water" for the people executing the recovery of truly critical operations.

4 Aug 2025 - 29 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.