#CISOlife

SideChannel Managing Partner Brian Haugli knows what it’s like to live the #cisolife. In the #cisolife podcast, he brings his unique perspective into conversations with cyber leaders from across industry and government. Watch the latest below and follow #cisolife.

https://sidechannel.com/people-will-find-a-way/ #cisolife Follow us - Website - http://www.sidechannel.com LinkedIn - http://linkedin.sidechannel.com YouTube ...
Nick (CTO at RealCISO.io) and I talk about the DoD's move to allow CMMC costs be covered and what actual costs look like for a gap analysis based on IPC's ...
Introducing the new SideChannel website! Check out the link below to learn more about our services and how we can help protect your organization's digital ...
We review how a ransomware attack can play out, or more importantly, how does it happen in the first place. The news of Colonial Pipeline Ransomware, ...
Here I break down how a company like Colonial Pipeline, who just made the news for being ransomware and impacting 45% of the fuel delivery to the US East ...
How to use a 9 block approach to assess all your vendors on cybersecurity. Join Brian Haugli of #CISOlife in building the SideChannel 9 block approach to third ...
Watch this sneak peek of the podcast recorded with Igor Volovich for C-Vision International. #cisolife Follow us - Website - http://www.sidechannel.com LinkedIn ...
Join us as we are back in the studio for new episodes. Spring 2021. We talk cybersecurity, CMMC, controls, compliance, mentoring, leadership and all things ...
A preview video from an upcoming discussion with Andrew Gelina of Syrinx Consulting for the Underserved Podcast. #cybersecurity #leadership #cisolife Follow ...
Join us for a Fireside chat on CMMC, brought to you by the CMMC-CoE Honest Broker of Cyber Capabilities that leverages standards, design expertise, and ...
Powered by Restream https://restream.io/
Dom, Dutch, and Brian cover Bernie memes, behavior issues in cyber risk management, small business concerns, post ransomware support options, when and ...
Industry-leading coaching techniques and assessments supported by expertise in Human Resources, Talent Management and Organizational Development We ...
Supply Chain Risk Management (ID.SC-5) Response and recovery planning and testing are conducted with suppliers and third-party providers Is response and ...
Supply Chain Risk Management (ID.SC-4) Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to ...
Supply Chain Risk Management 3 (ID.SC-3) Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the ...
Supply Chain Risk Management (ID.SC-2) Suppliers and third party partners of information systems, components, and services are identified, prioritized, and ...
Supply Chain Risk Management (ID.SC-1) Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by ...
Risk Management Strategy 3 (ID.RM-3) The organization's determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk ...
Risk Management Strategy 2 (ID.RM-2) Organizational risk tolerance is determined and clearly expressed Are there policies and procedures to upgrade existing ...
Risk Management Strategy 1 (ID.RM-1) Risk management processes are established, managed, and agreed to by organizational stakeholders Is there a ...
With RealCISO, we're reducing the time and cost to readiness. Start today for free at https://realciso.io We've combined an easy to use technology with our expert ...
New cloud platform to assess your cybersecurity posture and begin finding the right solutions to address gaps. Used with NIST CSF, PCI, SOC2, NIST 800-171, ...
In this show I overview the top aspects of backups and their importance to you cybersecurity strategy. Are you even doing them? Have you tested them...ever?
A very light CISOlife with return guests Dom Vogel and Dutch Schwartz. What happens when we get together and openly discuss the cyber industry? Tune in to ...
Great interview with AccidentalCISO from Twitter (https://twitter.com/AccidentalCISO) We chat about the CISO, employee engagement, mental health for infosec, ...
Join Dutch Schwartz and I as we discuss pre COVID cyber risks, being the business enabler and risk management. We also cover what the new water cooler talk ...
Dutch Schwartz sat down with me to talk people over process and technology. Does it fit my pre/post COVID risk management theory? Here's a short clip from ...
Dom sits down to talk shop. How are things in the great north of Vancouver? What are most SMBs still looking for with cybersecurity and how can they address ...
NIST Cybersecurity Framework Risk Assessment 6 (ID.RA-6) Risk responses are identified and prioritized Does the plan of action call out remedial security ...
NIST Cybersecurity Framework Risk Assessment 5 (ID.RA-5) Threats, vulnerabilities, likelihoods, and impacts are used to determine risk Has a risk management ...
NIST Cybersecurity Framework Risk Assessment 4 (ID.RA-4) Potential business impacts and likelihoods are identified Is the risk assessment plan updated ...
NIST Cybersecurity Framework Risk Assessment 3 (ID.RA-3) Threats, both internal and external, are identified and documented Are potential security threats, ...
I've been asked by a lot of people how my studio works and if I'm writing backwards. Watch this video to see all the behind the scenes of the CISOlife studio.
Marketing intern Jameer Robinson joins me at CISOlife YouTube and Podcast to discuss his summer #cybersecurity internship, college goals, and career path.
I was honored to be back on this show with Renee Small, ☁️ Christophe Foulon, CISSP CRISC ☁️ and this time with Hacker Valley Studio hosts Chris Cochran ...
Off the top of the head thoughts and back from vacation. Here I overview why vacation's are much needed to avoid burnout and how most organizations are ...
Powered by Restream https://restream.io/ SideChannel Live Stream - #CISOlife.
Welcome back to CISOlife. I sit down with Yaron Levi, CISO at Blue Cross Blue Shield Kansas City (not just Kansas! Thank Yaron) We talk about his view on ...
We specialize in advising small businesses, mid-market companies, non-profit corporations, venture capitalist portfolios, startups, municipalities and ...
SideChannel Live Stream - #CISOlife.
NIST CSF - Identify - Risk Assessment 2 (ID.RA-2) Threat and vulnerability information is received from information sharing forums and sources Are system ...
Recorded from the 5/27/2020 LinkedIn Live stream. Allan Alford and I sit down to discuss examples from our past of where NIST CSF controls were missed or not ...
Interview with Jennifer Pilat, VP Strategy at MxD. MxD is the Department of Defense's National Center for CyberSecurity in Manufacturing (NCCM).
Follow us - Website - http://www.sidechannel.com LinkedIn - http://linkedin.sidechannel.com YouTube - http://youtube.sidechannel.com Facebook ...
Today we get a chance to sit with Leslie Weinstein, found of CMMC Consulting (https://www.cmmcconsultingllc.com). We talk the DoD standard, CMMC-AB ...
The 45-year-old father of infant twins returned from the RSA conference in San Francisco with coronavirus. His symptoms worsened, and within days, he was ...
CISOlife - Full discussion with Karl Sharman, VP at BeecherMadden on #recruiting, #cybersecurity, #interviews, and all things in the world of job hunting.
Guest today is Ron Ford, DHS/CISA Cybersecurity Advisor - New England. Cybersecurity leader in New England for the Cybersecurity and Infrastructure ...
CISOlife by SideChannel Security "Work the Curve" How are we going to prepare for a possible second wave or just better prepare for another forced remote ...