Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/db/7a/5b/db7a5b3a-6b35-3897-5c23-168bc7125049/mza_15829073792230652826.jpg/600x600bb.jpg
Attributive Security
Martin Hopkins, Maurice Smit
14 episodes
2 months ago
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
Show more...
Business
Technology,
Society & Culture
RSS
All content for Attributive Security is the property of Martin Hopkins, Maurice Smit and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
Show more...
Business
Technology,
Society & Culture
Episodes (14/14)
Attributive Security
#14 Is Vertical Systemic Risk a One-Way Street?
3 years ago
39 minutes 30 seconds

Attributive Security
#13 Blindsided by an Unknown Unknown
3 years ago
36 minutes 30 seconds

Attributive Security
#12 The World is in Flux, Are You Ready to Adapt?
4 years ago
39 minutes 34 seconds

Attributive Security
#11 Risk Management is a Game of Snakes AND Ladders
4 years ago
38 minutes 26 seconds

Attributive Security
#10 Supply Chain Risk (with Vincent Thiele)
4 years ago
47 minutes 27 seconds

Attributive Security
#9 Privacy: Security's New Clothes?
4 years ago
39 minutes 38 seconds

Attributive Security
#8 Certifications - Value or Vanity
4 years ago
35 minutes 4 seconds

Attributive Security
#7 Risk & Risk Appetite (with Jaco Jacobs)
4 years ago
41 minutes 19 seconds

Attributive Security
#6 Zero Trust - Revolutionary, Evolutionary or Snake Oil? (with Chris Blunt)
4 years ago
45 minutes 29 seconds

Attributive Security
#5 SWOT - Context, Capability, Challenge & Course
5 years ago
32 minutes 39 seconds

Attributive Security
#4 Business Risk & Risk Ownership (with Bill Schultz)
5 years ago
40 minutes 43 seconds

Attributive Security
#3 Compliance
5 years ago
29 minutes 51 seconds

Attributive Security
#2 Ransomware
5 years ago
46 minutes 43 seconds

Attributive Security
#1 Trust
In the light of recurring instances of security issues in foundational components of modern IT and software stacks, and the superfast world our businesses are operating in, Maurice and Martin talk about trust. What can it mean to say we trust a vendor or a partner? Can we ever really trust one of the Internet giants? Can we secure trust? Join us as we explore the role of trust in organisational cyber security.
Show more...
5 years ago
47 minutes 23 seconds

Attributive Security
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.