Frameworks and Relationships

Archive for the ‘Podcasts’ Category

Frameworks and Relationships

Posted by

“Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in the cybersecurity field. Wolfgang shares his expertise on creating effective security programs, fostering trust within teams, and navigating the challenges of the CISO role. Tune in to gain valuable insights on cybersecurity strategy and the significance of collaborative relationships in achieving security goals.”

Empathy, kindness, and behavior economics on We Hack Purple Podcast

Posted by

Tanya Janca invited me onto her We Hack Purple Podcast to discuss vulnerabilities beyond code. Along the way, we cover behavior economics and the importance of empathy in cybersecurity design. “Kindness is the original security principle” makes an appearance, as we talk about how all this and more applies to building better products.

Our conversation was sponsored by the Diana Initiative, a conference committed to helping all those underrepresented in Information Security.

 


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

IT security then and now, on IT and the D podcast

Posted by

Ten years ago, I was the first guest on IT in the D podcast. (I won’t go back and listen. It’s like looking at photos of yourself in high school.) I was there to promote the BSides Detroit conference. Now that I’m doing another conference this year, they invited me back to talk about what’s changed in ten years. Take a listen.

IT Security Then and Now, Securing Relationships with Wolfgang Goerlich, Cybersecurity Strategist. This week we met with Wolfgang Goerlich. Not only is he a well respected CISO, he was our guest on Episode 1 (and episode 112). We had fun catching up, talking about security then vs. now, changes in philosophy, and mocked marketing jargon for commonly used tech. We ended by talking about Securing Sexuality, his conference and podcast, prompted by his wife, who is a relationship and sexuality therapist.


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

The Application Security Podcast — Security beyond vulnerabilities

Posted by

“Wolf joins us to talk about some security things that will stretch your mind, like security beyond vulnerabilities, how apps intended functionality can be misused, data privacy, and nudges and behavior science. Wolf challenged my thinking in this episode and pointed out a new area of threat modeling I had never considered. We hope you enjoy this conversation with… J. Wolfgang Goerlich.”

 

Have a listen here: https://www.youtube.com/watch?v=oZe0Sp9JU3s


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

 

Securing Sexuality Podcast Episode 15: Balls, Shaft, and Flippers

Posted by

From it’s origins as outlaw entertainment to its modern iteration as a somewhat old fashioned family-friendly activity, join Stef and Wolf at the Seattle Pinball Museum as they discuss what lessons we can learn about life, love, and lust from a decades old game.


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

The Imposter Syndrome Network Podcast

Posted by

I’m on the Imposter Syndrome Network with Zoe Rose and Chris Grundemann this week. I’m emphasizing trust and relationships in the imposter syndrome conversation. “If they trust you, you can have a degree of freedom to interact, explore, to get it right. But if they don’t, it doesn’t matter how good you are. They are going to doubt you.”

I also cover my imposter syndrome coaching framework: good imposter syndrome, bad imposter syndrome, and systemic imposter syndrome. The good is where you’re feeling the pressure to up your game, where you’re in a room with many brilliant people. The bad is where you let imposter syndrome prevent you from taking opportunities and when it gets in the way of you going into that room. Finally, there is the systemic challenges where the reason you feel like an imposter is because the culture, the people in the room, are actively making you feel like you don’t belong.

“It’s intrinsic, as leaders, to help people move towards good imposter syndrome and recognize and address systemic. If everyone on your team is being a jerk to a few coworkers, doesn’t matter how much you can tell them ‘be confident, you’re okay, you belong here.’ They’re not going to feel it, and it’s really on you as the manager to address that.”

This is my advice to leaders helping people through imposter syndrome. Understand which of the three — good, bad, systemic — and act accordingly. There is always a reason someone is feeling the way they do, and if it’s systemic, it’s on us to address it.

Imposter Syndrome Network

Have a listen here: https://www.buzzsprout.com/2016832/11567691


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

IDentity Now Podcast

Posted by

I was a guest recently on the IDentity Now podcast, channeling Burning Chrome: When tech hits the streets.

“J Wolfgang Goerlich, Advisory CISO for Cisco joins us to discuss real-world security and how it translates into the field. Wolf uncovers the challenges he’s faced throughout his career, implementing security by design, looking at both the usability and defensibility use cases and how the cyber-physical threat environment has evolved. Finally, his advice to CISOs’s to improve their overall security posture.”

“When technology hits the streets, it doesn’t always get used the way that security people predict it will be.”

Have a listen here: https://omny.fm/shows/identitytoday/when-tech-hits-the-streets


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Securing Bridges with Alyssa Miller

Posted by

Alyssa Miller invited me to join her on the Securing Bridges podcast. We talked about board conversations, building roadmaps, the power of storytelling, and the use of metrics. Somehow, security geese and free phish, wizards and alchemy, cottage core and goblin mode also came up. Somehow. But hey? What else would you expect when I’m on a coffee-fueled rant?

To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

In Scope podcast: The Department of No

Posted by

I was a guest recently on the In Scope podcast: Security doesn’t have to be the department of no.

“In this episode, Mike welcomes Wolfgang Goerlich aka “Wolf” Advisory CISO at Cisco. Join us they discuss the tendency within security to disregard the human element leading to a lack of adhering to security protocols and working around those protocols. When this happens, we see a correlation to a human need not being met. If that is understood and considered, the result is the development of much better security products all around.”

In Scope Podcast: J Wolfgang Goerlich

Have a listen here: https://scopesecurity.com/a-conversation-with-wolfgang-goerlich-security-doesnt-have-to-be-the-department-of-no/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Always On Podcast: Secure and Trusted Access at Scale

Posted by

I was a guest recently on the Always On Podcast.

“The past year has brought about an enormous shift in how we work which has led to security issues on a much broader scale. On this episode of Always On, Wolfgang Goerlich from Duo joins me to discuss how organizations are handling secure access and deploying trusted access at scale. You won’t want to miss our review of a secure outcome study, so press play to listen.”

You will want to hear this episode if you are interested in…

  • Trusted access [1:22]
  • The challenges that customers are seeing with the remote workforce [4:18]
  • Learning what Duo can do for an organization [9:45]
  • Improving the user experience [18:50]
  • Intangibles that customers are getting from Duo [25:04]
  • The outcomes of a secure outcome study [30:18]

Have a listen here: https://nwncarousel.com/podcast/secure-and-trusted-access-at-scale/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.