The State of Enterprise IT Security
Podcast by Brad Bussie
This podcast is free to listen on all podcast players and the Podimo App without a subscription.
All episodes
30 episodesIn this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions. Topics Covered: * The evolution of Google SecOps and the role of Chronicle and Siemplify * What is SecOps? A Simplified Explanation * The Broken promise of SIEM and how SecOps is evolving * Best practices for implementing effective SecOps in modern enterprises * The Future of SecOps: AI and Cloud-Native Solutions Key Takeaways: * Google SecOps integrates advanced threat intel and automation to improve security efficiency. * SIEM tools have evolved, but many organizations still struggle with data hygiene and correlating meaningful alerts. * The future of SecOps lies in risk-based, cloud-native solutions, combining AI with human oversight for smarter, faster decision-making. Mentions & References: * Google Chronicle and Siemplify (now part of Google SecOps) * Threat Intel through the Mandiant acquisition * VirusTotal integration for enhanced threat detection Time Stamps with Highlights: * 00:00 - Introduction to Enterprise IT Security * 01:04 - Meet the experts: Brad Bussie and Svetla Yankova * 02:00 - Exploring the evolving landscape of SecOps * 03:40 - The journey of Google SecOps: From secret moonshot project to powerful tool * 05:44 - Understanding SecOps: A simplified explanation * 07:17 - The rise of automation and AI in security operations * 10:24 - The evolution of SecOps technology and Google’s role * 15:18 - The broken promise of SIEM: Why many systems fall short * 20:00 - How SIEM is evolving with automation, SOAR, and AI * 26:30 - Best practices for effective SecOps implementation * 30:45 - The future of SecOps: AI, automation, and risk-aware solutions Follow Us: * LinkedIn: https://www.linkedin.com/company/e360solutions [https://www.linkedin.com/company/e360solutions] * Facebook: https://www.facebook.com/e360solution [https://www.facebook.com/e360solution] * X (Twitter): https://twitter.com/e360_solutions [https://twitter.com/e360_solutions] * YouTube: https://www.youtube.com/@e360solutions [https://www.youtube.com/@e360solutions] About the Show: The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity trends. About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises. Visit us: www.e360.com [http://www.e360.com] * (00:00) - Introduction to Enterprise IT Security * (01:04) - Meet the Experts: Brad Bussie and Svetla Yankova * (01:36) - Exploring the Evolving Landscape of SecOps * (02:58) - The Google SecOps Journey * (05:44) - Understanding SecOps: A Simplified Explanation * (08:22) - The Evolution of SecOps Technology * (15:18) - The Broken Promise of SIEM * (26:30) - Best Practices for Effective SecOps Implementation * (29:56) - The Future of SecOps: AI and Cloud-Native Solutions * (34:45) - Conclusion and Final Thoughts
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this wild west environment, protect their organizations from unseen threats, and ensure that AI innovations don't outpace security measures. Tune in to learn practical strategies for balancing AI adoption with robust security practices. Topics Covered: * The rapid adoption of AI in businesses and its implications for security. * What Shadow AI is and why it’s a growing concern. * How security teams can keep up with the fast-paced AI environment. * Practical tips for implementing AI governance and controls. * The changing dynamic between business users and security leaders. Key Takeaways: * AI adoption is accelerating across industries, making it crucial for security teams to adapt. * Shadow AI poses significant risks if not managed properly. * Security leaders must be proactive in implementing tools and strategies to protect their organizations. * Collaboration between business users and security teams is more important than ever. Time Stamps: * [00:00] Introduction and overview * [01:18] The current state of AI adoption in businesses * [10:34] The risks of Shadow AI and how to manage it * [16:44] How security teams can stay ahead in the AI era * [31:15] Real-world examples of AI transforming business practices * [32:44] The future of AI in business and the role of security teams Follow Us: * LinkedIn: https://www.linkedin.com/company/e360solutions [https://www.linkedin.com/company/e360solutions] * Facebook: https://www.facebook.com/e360solution [https://www.facebook.com/e360solution] * X (Twitter): https://twitter.com/e360_solutions [https://twitter.com/e360_solutions] * YouTube: https://www.youtube.com/@e360solutions [https://www.youtube.com/@e360solutions] About the Show: The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends. About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise. Visit us: www.e360.com [http://www.e360.com/] * (00:00) - Introduction and Potential Risks of GenAI * (01:54) - Black Hat Insights and Shadow AI * (06:32) - AI Security Implementation Challenges * (17:58) - Live Demo: GenAI in Marketing * (24:43) - Security Considerations for AI * (40:25) - Future of AI and Closing
Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader cybersecurity themes. Topics Covered: * The CrowdStrike incident and its impact on organizations * Broader implications for other cybersecurity platforms * Strategies for ensuring cyber resiliency Key Takeaways: * Understand the details and scale of the CrowdStrike incident and how it affected organizations globally. * Learn about the broader implications for other cybersecurity platforms and the importance of cyber resiliency. * Gain insights into strategies for ensuring business continuity and preventing future widespread disruptions. Mentions & References: * CrowdStrike incident * Microsoft updates and blue screen issues * Strategies for IT resilience and redundancy Time Stamps with Highlights: * 00:00 - Introduction: Brad Bussie and Erin Carpenter discuss the episode's agenda * 01:37 - The CrowdStrike incident: Overview and impact * 04:00 - Broader implications for other cybersecurity platforms * 09:00 - Ensuring cyber resiliency: Lessons learned * 12:25 - Strategies for IT resilience and redundancy * 18:00 - Potential legal implications and GDPR considerations * 23:00 - Communicating with the board and stakeholders * 29:00 - Final thoughts and recommendations Follow Us: * LinkedIn https://www.linkedin.com/company/e360solutions [https://www.linkedin.com/company/e360solutions] * Facebook https://www.facebook.com/e360solution [https://www.facebook.com/e360solution] * X (Twitter) https://twitter.com/e360_solutions [https://twitter.com/e360_solutions] * YouTube https://www.youtube.com/@e360solutions [https://www.youtube.com/@e360solutions] About the Show: The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends. About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise. Visit us: www.e360.com [http://www.e360.com/]
In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape. Topics Covered: * Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public safety. Brad explores the importance of protecting personal data, particularly in public services, and offers measures to prevent such breaches. * Cybersecurity in the Automotive Industry: A new study finds cybersecurity as the top concern among automotive manufacturers. With the rise of connected cars and autonomous driving, Brad delves into the vulnerabilities these technologies introduce and the steps manufacturers are taking to safeguard vehicles. * Untrained Users Weaken Cyber Defense: Untrained users are often the greatest weakness in a cyber defense plan. Brad explains how human error leads to significant security breaches and the importance of comprehensive cybersecurity training to mitigate these risks. Key Takeaways: * Robust data protection measures are essential for public services handling sensitive information. * The automotive industry's integration of digital technologies requires stringent cybersecurity practices. * Investing in cybersecurity training and fostering a security-aware culture can significantly reduce human error-related breaches. Mentions & References: * Baltimore City's 311 services data breach * High-profile automotive cybersecurity incidents (Jeep Cherokee and Tesla's autopilot system) * 2016 Democratic National Committee hack * Equifax data breach Time Stamps with Highlights: * [00:00] Introduction and Overview * [00:45] Data Breach in Baltimore: A Case Study * [05:44] Cybersecurity in the Automotive Industry * [11:08] Untrained Users Weaken Cyber Defense * [16:42] Conclusion and Final Thoughts Follow Us: * LinkedIn: https://www.linkedin.com/company/e360solutions [https://www.linkedin.com/company/e360solutions] * Facebook: https://www.facebook.com/e360solution [https://www.facebook.com/e360solution] * X (Twitter): https://twitter.com/e360_solutions [https://twitter.com/e360_solutions] * YouTube: https://www.youtube.com/@e360solutions [https://www.youtube.com/@e360solutions] About the Show: The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends. About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise. Visit us: www.e360.com [http://www.e360.com/] * (00:00) - Introduction and Overview * (01:05) - Data Breach in Baltimore: A Case Study * (06:04) - Cybersecurity in the Automotive Industry * (11:28) - The Human Factor in Cybersecurity * (17:02) - Conclusion and Final Thoughts
In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security. Topics Covered: * Risks involved with being a Chief Information Security Officer * Reasons behind the failure of AI initiatives and next steps * Benefits of tuning threat intelligence to your business vertical Key Takeaways: 1. CISO Challenges: The immense responsibilities and pressures CISOs face, including legal, regulatory, and reputational risks. 2. AI Initiative Failures: Common pitfalls in AI projects such as poor data governance, inadequate security measures, and integration challenges with legacy systems. 3. Tailored Threat Intelligence: How tuning threat intelligence to specific business verticals can significantly enhance cybersecurity posture and proactive threat management. Mentions & References: * NIST AI Framework * OWASP Top 10 for LLM Time Stamps with Highlights: * [00:00:00] Introduction and Overview: High accountability and stress for CISOs. * [00:01:30] Risks of Being a CISO: High stakes, accountability, and evolving threat landscape. * [00:07:44] Challenges in AI Initiatives: Reasons AI initiatives fail and what steps to take next. * [00:13:31] Tuning Threat Intelligence: Benefits of tailored threat intelligence for different business verticals. * [00:22:01] Conclusion and Final Thoughts: Summarizing the importance of proactive security measures. Follow Us: * LinkedIn: https://www.linkedin.com/company/e360solutions [https://www.linkedin.com/company/e360solutions] * Facebook: https://www.facebook.com/e360solution [https://www.facebook.com/e360solution] * X (Twitter): https://twitter.com/e360_solutions [https://twitter.com/e360_solutions] * YouTube: https://www.youtube.com/@e360solutions [https://www.youtube.com/@e360solutions] About the Show: The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends. About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise. Visit us: www.e360.com [www.e360.com] * (00:00) - Introduction and Overview * (01:30) - Risks of Being a CISO * (07:44) - Challenges in AI Initiatives * (13:31) - Tuning Threat Intelligence to Your Business * (22:01) - Conclusion and Final Thoughts
Available everywhere
Listen to Podimo on your phone, tablet, computer or car!
A universe of audio entertainment
Thousands of audiobooks and exclusive podcasts
No ads
Don't waste time listening to ad breaks when listening to Podimo's content.