Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
All content for Security Program Transformation Podcast is the property of Sidekick Security and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
From Cost Center to Business Driver: Making Security a Strategic Asset
Security Program Transformation Podcast
1 hour 16 minutes 11 seconds
1 year ago
From Cost Center to Business Driver: Making Security a Strategic Asset
In this conversation, Robert Wood, CEO of Sidekick Security, interviews Tyler Healy, CISO of DigitalOcean, discussing the evolution of security leadership, the importance of security as an enabler for business growth, and the dynamics of building a security team. They explore the challenges of engaging with customers, fostering internal relationships, and the balance between security and usability. Tyler shares insights on incident management, materiality assessments, and the significance of understanding how a business makes money to effectively align security initiatives with organizational goals.
Takeaways
Security teams must engage with customers regularly.
Understanding business incentives is crucial for security leaders.
Security should be seen as an enabler, not a cost center.
Building relationships across departments enhances security effectiveness.
Product security should empower developers with the right tools.
Usability is key to successful security implementations.
Incident management processes must include materiality assessments.
Availability impacts must be considered in security discussions.
Third-party risks need to be managed proactively.
Security leaders should balance technical skills with effective communication.
Chapters
00:00 Introduction to Security Leadership
06:02 Navigating Security as an Enabler
09:56 Building a Security Team from the Ground Up
15:54 Engaging with Customers and Stakeholders
20:00 Fostering Internal Relationships for Security
Security Program Transformation Podcast
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.