Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Human-Centered Security
Voice+Code
59 episodes
2 months ago
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
RSS
All content for Human-Centered Security is the property of Voice+Code and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
Show more...
Technology
Business
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/52/0a/0e/520a0eff-89cc-a832-7c4f-3c7f68946110/mza_3178598440720731732.jpg/600x600bb.jpg
Complexity Undermines Security With Bill Bonney, Gary Hayslip, and Matt Stamper
Human-Centered Security
47 minutes
1 year ago
Complexity Undermines Security With Bill Bonney, Gary Hayslip, and Matt Stamper

What do CISOs have to say about the security tools their teams use?:

“When we introduce a level of complexity in the system, it undermines security. Every moment wasted trying to use a tool effectively benefits the adversary.” - Matt Stamper


In this episode, we talk to cybsecurity leaders Bill Bonney, Gary Hayslip, and Matt Stamper about:

  • The ever-evolving role of the CISO and what CISOs care about most.
  • What product teams designing security software need to understand:
    • Security tools need to operate across varied ecosystems (which means your product team needs to understand those ecosystems).
    • Complexity is the enemy of security. Yes, UX matters.
    • Context-switching means security teams waste time. Instead, security tools need to present the right information at the right time.
    • Why CISOs are excited to leverage AI in security tools—and what concerns them the most.

Bill Bonney, Gary Hayslip, and Matt Stamper are seasoned CISOs and cybersecurity leaders. They are co-founders of the CISO Desk Reference Guide—a series of books including topics such as security policy, third-party risk, privacy, and incident response—which provide actionable insights for security leaders.

Human-Centered Security
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.