video - All Articles - CISO Platform2024-03-29T14:54:31Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/videoCybersecurity Meetup – 2023 Cybersecurity Predictionshttps://www.cisoplatform.com/profiles/blogs/cybersecurity-meetup-2023-cybersecurity-predictions2023-07-10T18:30:36.000Z2023-07-10T18:30:36.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/12143851086?profile=RESIZE_400x&width=400"></div><div><p style="text-align:center;"><iframe title="YouTube video player" src="https://www.youtube.com/embed/pxcTzzr47pM" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p>Check the calendar as Richard Stiennon and I discuss the forward-looking cybersecurity predictions for 2023 and beyond! With several decades of knowledge and experience between us, we take a pragmatic look into the crystal ball.</p><p>Those who have an understanding of what is coming will have an advantage to deal with the risks and seize the opportunities.</p></div>Nation States are Shifting the Cybersecurity Landscapehttps://www.cisoplatform.com/profiles/blogs/nation-states-are-shifting-the-cybersecurity-landscape2022-12-07T19:52:38.000Z2022-12-07T19:52:38.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/10905321462?profile=RESIZE_400x&width=400"></div><div><p style="text-align:center;"><iframe title="YouTube video player" src="https://www.youtube.com/embed/-c1dsluxRfM" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p>Nations that invest in and conduct offensive cyber-attacks are fundamentally changing the cybersecurity landscape for everyone!</p></div>3 Tips to Maximize Cybersecurity Valuehttps://www.cisoplatform.com/profiles/blogs/3-tips-to-maximize-cybersecurity-value2022-07-11T18:33:22.000Z2022-07-11T18:33:22.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/10638867854?profile=RESIZE_400x&width=400"></div><div><p style="text-align:center;"><iframe title="YouTube video player" src="https://www.youtube.com/embed/ZvIC7XBB7dA" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p class="graf graf--p">Delivering maximum value is a momentous challenge for cybersecurity organizations. It takes a decisive effort to organize and prioritize the proper goals that are meaningful to the business, and establish operational excellence to deliver effectiveness and efficiency. But running a good risk program that manages the defensive posture by addressing internal vulnerabilities is not enough. There are external factors that have a profound impact on the likelihood of attack and business factors that matter to the executive suite which could represent a competitive advantage to the corporate bottom line.</p><p class="graf graf--p">Here are my 3 tips to strategically enhance a cybersecurity team’s long-term value-proposition to the organization.</p><p class="graf graf--p">It comes down to three tiers of progress. Build, Compare, and Compete.<br />First, we must build a sustainably effective, comprehensive, and highly efficient cybersecurity capability. This is the most important step that every cybersecurity leader works towards on a daily basis.</p><img class="graf-image" src="https://cdn-images-1.medium.com/max/800/1*ORMERmT4p7HDHUMIQdCABA.png" alt="1*ORMERmT4p7HDHUMIQdCABA.png" /><p class="graf graf--p">Although the core of this work is fundamental to our operational existence, we need to pay attention to aspects often ignored, including the concept of aligning efficiency to financial optimizations and disproportionate resource allocation weighted to the most likely attacks. It is also crucial to see cybersecurity as a never-ending endeavor that must be incorporated into the overall everyday business processes and goals.</p><p class="graf graf--p">Sustainability is another key objective that is often overlooked while distracted by short-term battles. CISOs must plan for financial constraints, evolving threats, shifting technology landscapes, confusing regulations, and rising expectations of security to ensure longevity. Cybersecurity cannot continue to impose ever greater expense, friction, and frustration on the organization. A breaking point will be reached if proper strategic planning is not employed.</p><p class="graf graf--p"><br />Second, and this is where we diverge from what most CISOs focus upon, is about Comparing your organization to others in your sector. We must understand the attacker’s perspective. When they look for their next victim, they are evaluating who is best to target. By looking at your organization in contrast to others, you can understand how you appear in the landscape, and if you are in the pack or falling behind. You don’t want to be the easy prey.</p><p class="graf graf--p">Third, cybersecurity in operations, products, and services is becoming a Competitive advantage in many fields. The expectation of digital security, privacy, and safety, is rising as a purchase and loyalty factor with consumers. This is where cybersecurity can help the organization compete and therefore contribute to fulfilling the business goals (like revenue, market share, upselling, and more).</p><p class="graf graf--p">Cybersecurity can be a differentiating factor in many ways, including non-traditional competition. Savvy companies like Apple and Microsoft are maneuvering to improve their bottom line! Cybersecurity has the opportunity to not only enable, but contribute to corporate goals. Explore the potential and align as necessary to deliver value in new ways!</p><p class="graf graf--p"><br />Those are my 3 high-level tips to maximize cybersecurity value. By achieving success in these domains, you will be far ahead of others in being able to communicate sustainability and value for your cybersecurity program.</p><p class="graf graf--p graf--empty"> </p><p class="graf graf--p">Drop me a note if you need help or have questions. To learn more in-depth about each area, subscribe to my <a class="markup--anchor markup--p-anchor" href="https://www.youtube.com/c/CybersecurityInsights" target="_blank">Cybersecurity Insights channel</a> where I will be posting videos and interviews that detail the challenges and best practices.</p><p class="graf graf--p graf--empty"> </p></div>Video Presentation: Why Cybersecurity is Not Fixed Yethttps://www.cisoplatform.com/profiles/blogs/video-presentation-why-cybersecurity-is-not-fixed-yet2021-12-03T19:13:55.000Z2021-12-03T19:13:55.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9876805500?profile=RESIZE_400x&width=400"></div><div><p><iframe title="YouTube video player" src="https://www.youtube.com/embed/ktccJvjL8h4" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p class="graf graf--p">I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is being applied. Sharing a replay of the presentation where I discuss cybersecurity history, root causes, shifting landscapes, persistent mistakes, industry struggles, attacker’s advantage, how the worst is still to come, and show a framework that has some merit for future optimization.</p><h3 class="graf graf--h3">Chapters are listed below, for easier navigation</h3><ul class="postList"><li class="graf graf--li">00:00 Talking about my background (boring! — skip this)</li><li class="graf graf--li">01:31 Root causes of cybersecurity</li><li class="graf graf--li">02:17 History of the changing landscape</li><li class="graf graf--li">03:33 Chain reaction cycle</li><li class="graf graf--li">04:01 Big data factors</li><li class="graf graf--li">06:05 Tech convergence</li><li class="graf graf--li">06:52 Technology is just a tool</li><li class="graf graf--li">07:53 Cybersecurity impacts on the physical world</li><li class="graf graf--li">10:07 Industry struggles</li><li class="graf graf--li">11:38 Technology scales and so do risks</li><li class="graf graf--li">13:04 Attacker’s advantage</li><li class="graf graf--li">15:08 Cause and effect cycles</li><li class="graf graf--li">16:13 Dante’s Inferno of impacts</li><li class="graf graf--li">18:06 Obstacles versus opposition</li><li class="graf graf--li">20:05 Required Sun Tzu quote</li><li class="graf graf--li">20:25 Strategic cybersecurity framework</li></ul><p class="graf graf--p">I put out a new video about every week on various cybersecurity topics, risks, ideas, events and best practices. If you like these cybersecurity videos and are interested in more cybersecurity insights, rants, and strategic viewpoints, please click the Like button and Subscribe to the Cybersecurity Insights channel! <a class="markup--anchor markup--p-anchor" href="https://www.youtube.com/c/CybersecurityInsights" target="_blank">https://www.youtube.com/c/CybersecurityInsights</a></p><h3 class="graf graf--h3">Follow me on:</h3><ul class="postList"><li class="graf graf--li">LinkedIn: <a class="markup--anchor markup--li-anchor" href="https://www.linkedin.com/today/author/matthewrosenquist" target="_blank">https://www.linkedin.com/today/author/matthewrosenquist</a></li><li class="graf graf--li">Medium: <a class="markup--anchor markup--li-anchor" href="https://medium.com/@matthew.rosenquist" target="_blank">https://medium.com/@matthew.rosenquist</a></li><li class="graf graf--li">Twitter (@Matt_Rosenquist): <a class="markup--anchor markup--li-anchor" href="https://twitter.com/Matt_Rosenquist" target="_blank">https://twitter.com/Matt_Rosenquist</a></li></ul></div>Video Interview: Winning Hearts and Minds for Security with Naomi Buckwalterhttps://www.cisoplatform.com/profiles/blogs/video-interview-winning-hearts-and-minds-for-security-with-naomi-2021-11-10T19:17:10.000Z2021-11-10T19:17:10.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9788479490?profile=RESIZE_400x&width=400"></div><div><p style="text-align:center;"><iframe title="YouTube video player" src="https://www.youtube.com/embed/4eDea9EKYMg" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p class="graf graf--p">One of the greatest challenges for a cybersecurity leader is to convey the present digital risks upward to the c-suite and Board of Directors. Representing to executive leadership the value of security, which protects the organization’s assets, reputation, capabilities, and people, is vital to gain necessary support or quell resistance for cybersecurity initiatives.</p><p class="graf graf--p">In today’s <a class="markup--anchor markup--p-anchor" href="https://www.youtube.com/c/CybersecurityInsights" target="_blank">Cybersecurity Insights podcast</a>, I am talking with Naomi Buckwalter about how to communicate cybersecurity to the Board. Naomi is a virtual CISO, Director of Information Security, and the founder of the Cybersecurity Gatebreakers Foundation. She brings a wealth of experience, insights, and solid recommendations for cybersecurity leaders.</p><p class="graf graf--p">Follow Naomi on LinkedIn: <a class="markup--anchor markup--p-anchor" href="https://www.linkedin.com/in/naomi-buckwalter/" target="_blank">https://www.linkedin.com/in/naomi-buckwalter/</a></p><p class="graf graf--p graf--empty"> </p><p class="graf graf--p">Please click the Like button if you found this insightful and subscribe to the Cybersecurity Insights channel for more interviews, best-practices, rants, and strategic viewpoints. <a class="markup--anchor markup--p-anchor" href="https://www.youtube.com/c/CybersecurityInsights" target="_blank">https://www.youtube.com/c/CybersecurityInsights</a></p><p class="graf graf--p">Follow me on:</p><ul class="postList"><li class="graf graf--li">LinkedIn: <a class="markup--anchor markup--li-anchor" href="https://www.linkedin.com/today/author/matthewrosenquist" target="_blank">https://www.linkedin.com/today/author/matthewrosenquist</a></li><li class="graf graf--li">Medium: <a class="markup--anchor markup--li-anchor" href="https://medium.com/@matthew.rosenquist" target="_blank">https://medium.com/@matthew.rosenquist</a></li><li class="graf graf--li">Twitter (@Matt_Rosenquist): <a class="markup--anchor markup--li-anchor" href="https://twitter.com/Matt_Rosenquist" target="_blank">https://twitter.com/Matt_Rosenquist</a></li></ul></div>Video Replay - Closing the Cyber Skills Gap Panel Discussionhttps://www.cisoplatform.com/profiles/blogs/video-replay-closing-the-cyber-skills-gap-panel-discussion2021-11-04T03:48:51.000Z2021-11-04T03:48:51.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9765548057?profile=RESIZE_400x&width=400"></div><div><p><iframe title="YouTube video player" src="https://www.youtube.com/embed/HVG_y--9Ssw" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p><br />The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. The “Closing the Cyber Skills Gap” panel featured Davina Pruitt, Naomi Buckwalter, and was moderated by Matthew Rosenquist on Oct 21st 2021.</p><p>One of the most pressing challenges for the digitally connected and transforming world is the undermining of security and trust. Cybersecurity is the barrier protecting our systems, data, privacy, services, and capabilities. But the threats far exceed the capacity of those professionals that guard against their attacks. We are experiencing a momentous deficit in the talent pool, with mounting demands growing every year.</p><p>The panel discusses how to reverse the situation and sustainably satisfy the human resources needed to make our evolving digital world secure.</p><ul><li>Dr. Davina Pruitt-Mentle <a href="https://www.linkedin.com/in/davina-pruitt-mentle-ph-d-0010759/">https://www.linkedin.com/in/davina-pruitt-mentle-ph-d-0010759/</a></li><li>Naomi Buckwalter <a href="https://www.linkedin.com/in/naomi-buckwalter/">https://www.linkedin.com/in/naomi-buckwalter/</a></li><li>Matthew Rosenquist <a href="https://www.linkedin.com/in/matthewrosenquist/">https://www.linkedin.com/in/matthewrosenquist/</a></li></ul><p> </p><p> </p></div>Why Trust in Digital Tech is the Key to Future Innovation - Hexcon21 Session by Matthew Rosenquisthttps://www.cisoplatform.com/profiles/blogs/why-trust-in-digital-tech-is-the-key-to-future-innovation-hexcon22021-09-29T06:28:21.000Z2021-09-29T06:28:21.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/9622926490?profile=RESIZE_400x&width=400"></div><div><p><iframe title="YouTube video player" src="https://www.youtube.com/embed/Qn0Q14vtaEo" width="560" height="315" frameborder="0" allowfullscreen=""></iframe></p><p><span>I </span>was honored to speak at the Hexcon21 cybersecurity virtual conference this year and wanted to repost my presentation for all who did not get a chance to watch the live event.</p><p><span>I discussed why trust in digital technology is the key to sustaining a future where digital innovation and adoption continue to thrive.</span></p><p><span>This year’s </span><a href="https://www.hexnode.com/events/hexcon21/"><span>Hexcon21 Conference</span></a><span>, attended by thousands, delivered insights, perspectives, and training for cybersecurity audiences.</span></p></div>Privacy is at risk when security fails - especially for surveillance camerashttps://www.cisoplatform.com/profiles/blogs/yyy2020-12-29T22:24:57.000Z2020-12-29T22:24:57.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><p><iframe width="560" height="315" src="https://www.youtube.com/embed/77w-g1KzCAc?wmode=opaque" frameborder="0" allowfullscreen=""></iframe></p><p>A recent incident involving city surveillance video data highlights some of the criminal privacy risks of public camera and biometric programs. Without strong cybersecurity, everyone’s privacy could be undermined by cyber attackers, criminals, and malicious insiders.</p></div>