Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/c8/80/bc/c880bc75-ebe5-69a6-2f02-95ec898dd65d/mza_9657604514211488056.png/600x600bb.jpg
Heavy Strategy
Packet Pushers
116 episodes
1 week ago
To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »
Show more...
Technology
RSS
All content for Heavy Strategy is the property of Packet Pushers and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/c8/80/bc/c880bc75-ebe5-69a6-2f02-95ec898dd65d/mza_9657604514211488056.png/600x600bb.jpg
HS098: Just Following Orders?
Heavy Strategy
33 minutes 34 seconds
7 months ago
HS098: Just Following Orders?
What do you do when your colleagues or senior leaders ask you to do something illegal? It’s hardly hypothetical; recent years have seen high-profile firings and convictions of CIOs and CISOs who’ve been ordered to break the law. John and Johna discuss steps that tech leaders can take if they’re put on the spot. Episode... Read more »
Heavy Strategy
To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »