What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
IndustrialCyber.webp 2024-05-22 23:00:00 (Déjà vu) Épisode 29: «Le jeu du dilemme»: libérer le pouvoir de l'éthique et la bonne cybersécurité par le jeu
EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY
(lien direct)
Bienvenue pour compromettre les positions! Le podcast technologique qui demande aux professionnels non-cybersécurité ce que nous, dans l'industrieCyber ​​Menaces! & nbsp; Nous sommes à nouveau rejoints par dr bettina palazzo a expert en éthique commerciale !Elle travaille avec les responsables de la conformité pour créer une culture d'intégrité qui se concentre sur le leadership et les dimensions comportementales de la conformité. Dans cet épisode, "Le jeu du dilemme": déchaîner le pouvoir de l'éthique et la bonne cybersécurité par le jeu ", nous plongeons dans les complexités du pouvoirDynamique au sein des organisations, explorant l'efficacité des politiques et le rôle des normes éthiques dans les milieux d'entreprise et personnelle. Nous remettons en question l'efficacité de l'ajout de réglementations en réponse aux crises éthiques et souligne l'importance du contexte culturel pour façonner les responsabilités envers la cybersécurité. Ensuite, notre discussion s'étend à la nécessité d'embrasser les nuances locales tout en maintenant les normes éthiques universelles , et les limites des solutions systémiques dans un paysage diversifié et évolutif. Et enfin, cet épisode présente également le "jeu de dilemme", une approche innovante pour améliorer la compréhension et l'application des textes politiques à travers des scénarios du monde réel, favorisant une culture d'intégrité etLa sécurité psychologique où la communication ouverte et la confiance sont primordiales. Cet épisode stimulant est un incontournable pour toute personne intéressée par l'intersection de la culture, de l'éthique et du comportement organisationnel. ShowRemarques cyber-attaques et activités boursières par onur kemal tosun \\ 'Le plus grand risque de cyber est la complaisance, pas les pirates \' - Le commissaire à l'information britannique émet un avertissement en tant que société de construction amendé et Pound; 4,4 millions. ico comment foutreun aéroport (podcast) Importance des essais et erreurs avec Stefan Gaillard par Christian Hunt sur le Dr Bettina Palazzo Bettina est tombé sur le thème de l'éthique des affaires au début des années 90 et a rapidement découvert que c'est un sujet tellement riche et excitant qu'elle n'a jamais cessé de faire autre chose & # 8211;au moins professionnellement.Elle a souffert de l'effort lourdeur mais gratifiant de se faire la tête autour des fondements philosophiques et économiques de l'éthique des affaires, a remporté un prix pour son doctorat.thèse et est parti au coucher du soleil pour rejoindre KPMG.Là, elle a aidé à créer leurs services de conseil en éthique commerciale.Un travail de pionnier dur à ce moment-là!Après un court détour vers le conseil stratégique en gestion, elle est retournée à sa véritable passion et a commencé son propre conseil en éthique commerciale en 2000. Au fil des ans, Bettina a appris que vous ne pouvez pas mettre l'éthique dans les listes de contrôle et les processus et que les sociétés contraires à l'éthique font des gens malheureux.Le désir de créer des cultures d'entreprise qui rendent le travail amusant et significatif au lieu de terribles et Conference ★★★
IndustrialCyber.webp 2024-05-15 23:00:00 Épisode 28: Les règles sans relations créent une rébellion: pourquoi l'éthique compte en cybersécurité
EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome back to season 3! To kick things off we are joined by Dr Bettina Palazzo a business ethics expert! She works with compliance managers to create a culture of integrity that focuses on the leadership and behavioural dimensions of compliance. She states that unethical organisations make people unhappy - and we couldn\'t agree more. So she has dedicated her life work to helping organisations create cultures that make work fun and meaningful. Ethics is such an important subject when it comes to business because poor ethical decisions can mean poor compliance, and ultimately, can lead to poor security decisions. So how do you build a culture that is comfortable with having honest conversations about ethics?Well that\'s what we will explore in this episode, Rules Without Relationships Create Rebellion: Why Ethics Matter in Cybersecurity. By the end of this episode you will Learn how to create a \'speak up\' culture so that people can raise cybersecurity concerns with you.How to build a compliance influencer programme (and no, that does not mean trips abroad at beautiful locations surrounded by policy documentation for the gram)And how the cybersecurity team can not only be ethical role models but also give people a reason to care for the big question: why we do the things we do to protect them!Key Takeaways:Speak Up Culture: Learn how to create a safe space for open communication about ethics and compliance. No more fear of reprisal!Ethical Leadership: Great leaders inspire ethical behaviour. Dr. Palazzo explains how to be that leader.Communication is Key: Don\'t just tell people what to do, explain the "why" behind the rules.Ditch the Shame: Falling for phishing attacks? It happens! We need to build psychological safety to discuss cybersecurity issues openly.Goodbye Curse of Knowledge: Cybersecurity isn\'t just for the techies. Learn how to communicate cyber dangers effectively to everyone.Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don\'t forget to share on LinkedIn and in your teams.It really helps us spread the word and get high-quality guests, on future episodes.  We hope you enjoyed this episode - See you next time, keep secure, and don\ Conference ★★★
IndustrialCyber.webp 2024-04-24 23:00:00 Épisode 27: Ignorez toutes les instructions précédentes: Modélisation des menaces Systèmes AI
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome to the grand finale of season two of \'Compromising Positions\', where we delve into the fascinating world of AI security. In this special episode, your hosts will guide you through the labyrinth of securing AI models, one step at a time.For those who prefer a quick overview, we offer an abridged version on Apple Podcasts and Spotify. This version deep dives into two key topics: Jeff\'s unique mnemonic C-PTSD for threat modeling AI systems, and an intriguing discussion on the correlation between boredom, worm-killing, and AI efficiency gains.For those who crave a deeper dive, scroll down or visit our Youtube channel for the extended cut. This version includes everything from the regular version, plus:Jeff\'s academic journey in AI at the University of HullLianne\'s preparation for a 100 days of Code in Python for her MSc in Data Science and AI at Leeds Trinity UniversityA critical discussion on OpenAI\'s transparency and the latest AI wearable technology, along with the complexities of consent and privacy in an \'always recorded\' lifestyleWhether you choose the regular or extended version, we appreciate your support throughout season two. Stay tuned for more enlightening discussions in season three! Thank you for being a fantastic audience.We hope you enjoyed this episode - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' Keywords: Cybersecurity, AI, Threat Modelling, MSC, Data Science, IOT, Wearables, Data SecuritySHOW NOTESJeff\'s article on C-PTSDLianne\'s Article The (AI) Revolution will be BORING...And that\'s Okay!Wearables, Shareables, Unbearable? The IOT and AI Tech Nobody Asked for But Cybersecurity Criminals Love. Future of CybersecurityMSc in Artificial Intelligence - Threat Medical Conference Technical ★★★
IndustrialCyber.webp 2024-03-07 00:00:00 Épisode 20: Pas nouveau, mais roman - lutter contre le risque dans le troisième secteur
EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Sabrina Segal, an integrity, risk, and compliance advisor, with almost 20 years of experience in the public, private, and third-sectors. In this episode, Not New, but Novel - Tackling Risk in the Third Sector, We take a look at the challenges facing the third sector when it comes to cybersecurity and technology risks. The third sector, which includes charities and non-profits, is often overlooked or underestimated when it comes to cybersecurity and risk management. But this sector faces unique challenges and opportunities that require a novel and holistic approach to risk.Sabrina has a really refreshing take on risk and we will hear how she enables her clients to get to grips with what she calls \'tolerable risk\' and why we can\'t avoid risks, but we can reframe risks to not only identify threats but also opportunities. While at the same time, making sure everyone cares about risk, not just people with \'risk manager\' in their title! Key Takeaways:Forget Risk Appetite and Risk Matrices - Embrace \'risk awareness\' tailored to your mission and your organisation\'s objectivesIdentify Your \'Tolerable Risk\' - Risk can\'t be avoided but we can identify and work within our \'risk tolerance\' for better informed decisionsRisk is a Two-Sided Coin - It\'s not just about threats but opportunities too, and it\'s much easier for people to get excited about opportunities than threats!Don\'t Greenwash Those “Charity Days” - Forget painting the fence, litter picking or sorting cans, instead donate your cybersecurity expertise for maximum impactRisk Is Everyone\'s Job - Ditch the \'risk manager\' title and empower everyone to be a risk champion!Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don\'t forget to share on LinkedIn and in your teams.It really helps us spread the word and get high-quality guests, on future episodes.  We hope you enjoyed this episode - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' Keywords: third sector, risk management, cybersecurity, charities, non-profits, risk awareness, tolerable risk, cyber threats, data privacy, ethical considerationsJeff Watkins and Lianne Potter delivering their new talk on AI and Cybersecurity for The Future of Cybersecurity Conference [V Ransomware Conference ★★
IndustrialCyber.webp 2023-11-09 00:00:00 Épisode 7: Si les données sont la nouvelle huile, comment empêcher les déversements de données?
EPISODE 7: If Data is the new oil, how do we prevent data spills?
(lien direct)
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats with your hosts Lianne Potter and Jeff Watkins! This week we have a very special guest, Reema Vadoliya. Reema is the passionate business founder of data consultancy, People of Data, a gifted storyteller, and a professional problem-solver. In this episode, Reema shares her insights on how to collaborate more effectively between cybersecurity and data professionals. She emphasizes the importance of empathetic communication, how sometimes quantifying risks is about gut feeling, not just metrics… We look at how we can use data-driven storytelling to engage and educate people about cybersecurity, including how to make our phishing simulation stats not only more interesting to non-cybersecurity people but also how to make it actually drive meaningful behavioural changes.Top 5 Takeaways for Building a Strong Data Culture and Cybersecurity:1. Collaboration is key: The best way to ensure data security is by fostering good relationships between cybersecurity and data teams. Encourage open communication and explain the importance of keeping data safe.2. Empathy is crucial: To solve problems effectively, it\'s important to understand the actual problem. Avoid closed questions and focus on the "why" behind the issue.3. Checklists can help: Consistent, repeatable, and reusable rules of engagement can prevent insecure practices and reduce the need for constant consultation with the security team.4. Quantifying risks is complex: Sometimes, you need to rely on gut feeling to balance a complex risk landscape. Business analysts can help identify potential risks that may have been overlooked.5. Start small: Building a strong data culture takes time. Start by removing barriers that make data feel unobtainable and use storytelling to help people understand complex concepts. Make better use of phishing data to tell better stories and improve outcomes.Links to everything we discuss in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our youtube channel, and don\'t forget to share on LinkedIin and in your teams. It really helps us spread the word and get high-quality guests, like Reema, on future episodes.  We hope you enjoyed episode 7, If Data is the new oil, how do we prevent data spills?  - See you next time, keep secure, and don\'t forget to ask yourself, \'Am I the compromising position here?\' Show NotesThe phrase \'Data is the new oil\' was coined by Clive Humby in 2006. In this, he meant that data, like oil, needs refinement and processing to turn it into something useful. We couldn\'t find the original conference in which Humby said this, but I did find an interesting ar Conference Technical Uber ★★★
IndustrialCyber.webp 2023-10-18 23:00:00 Épisode 4: Code Red - Autonomiser les ingénieurs pour sécuriser nos pipelines CI / CD
Episode 4 : CODE RED - Empowering engineers to secure our ci/cd pipelines
(lien direct)
Dans cet épisode, notre invité Josh Nesbitt, CTO de Glean A Leeds Edtech Startup, partage ses idées sur la sécurisation des données des personnes vulnérables, l'importance deAccessibilité et conformité dans les produits prêts pour la production, et les défis de la réalisation de l'utilisabilité, des fonctionnalités et de la sécurité de concert. & nbsp; & nbsp; Rejoignez-nous alors que nous démysrions les idées fausses courantes autour de l'agile et explorons comment les équipes de sécurité peuvent être plus créatives dans leur approche.Nous parlerons de la façon d'utiliser des outils et de l'engagement pour obtenir des ingénieurs et des équipes de sécurité sur la même page. & Nbsp; Les liens vers tout ce que Josh a discuté dans cet épisode se trouve dans les notes de l'émission et si vous avez aimé le spectacle, veuillez nous laisser un avis et partager sur Linkediin ou dans vos équipes, cela nous aide vraiment à faire passer le motet obtenir des invités de haute qualité, comme Josh, sur les épisodes futurs. & nbsp; Nous espérons que vous avez appréciéCet épisode - à la prochaine fois, restez en sécurité, et n'oubliez pas de vous demander: \\ 'suis-je une position compromettante ici? \' & nbsp; Show Notes Tool Conference Technical ★★
Last update at: 2024-06-28 17:07:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter