Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2023

Human Psychology on Immediate Threats | Bec McKeown

Bec McKeown explains how the brain prioritizes immediate threats by filtering out irrelevant information. She discusses how various situations, such as sudden realizations or encountering a ransomware attack, trigger physiological reactions like palpitations, sweating, and a sense of dread. Bec McKeown also mentions how during intense moments like a car accident, the brain's cognitive processes make time seem to slow down as it focuses solely on the threat, excluding all other details. This phenomenon is referred to as cognitive narrowing.

Fight, Flight, or Freeze | The Human Psychology of Security

Bec McKeown explains the intricate process of how this tiny brain structure, the amygdala, sends chemical signals down the spinal cord to the adrenal gland, resulting in the production of adrenaline. Explore the intriguing phenomenon of the freeze response and how it relates to the delicate balance between heightened adrenaline and reduced rationality. Learn about the evolutionary significance of this mechanism, which once helped our ancestors escape from saber-toothed tigers but now responds to various modern threats.

Cognitive Fitness: Cybersecurity Perspective on Complex VUCA Environments

Cybersecurity is a dynamic, ever-evolving space where traditional approaches often fall short. To thrive in this environment, one must cultivate the ability to think differently and harness cognitive skills to a higher degree than in many other fields. Bec McKeown emphasizes cognitive fitness through the lens of the cybersecurity realm's complex VUCA (Volatility, Uncertainty, Complexity, Ambiguity) environment.

The Human Psychology Behind Cybersecurity with Bec McKeown

Welcome to Razorwire, the podcast that explores the intricate world of cybersecurity. I'm Jim, your host, and on this episode, we have a fascinating guest joining us: Bec McKeown, a renowned expert in the psychology behind security. This episode is a must-listen for cybersecurity professionals for three key reasons: Firstly, Bec delves into the challenges of conducting investigations and spotting deception in the cybersecurity field. Her insights will equip you with the tools to identify suspicious behaviour, such as stealing or leaking sensitive information.

Penetration Testing and Digital Operational Resilience Act (DORA)

In this enlightening discussion with expert Paul Dwyer, we explore the changing landscape of penetration testing within the context of the Digital Operational Resilience Act (DORA). Paul addresses the concern of traditional, snapshot-in-time penetration testing being costly and asks whether this will drive organizations towards more regular and ongoing testing to enhance security. The answer is a resounding "yes." DORA includes a dedicated section that mandates various types of tests, ranging from standard assessments to highly specific threat lab penetration testing.

Organizational Resilience: Insights from Paul Dwyer on DORA

Discover the critical components of organizational resilience with expert Paul Dwyer in this enlightening discussion centered around the Digital Operational Resilience Act (DORA). Paul emphasizes the fundamental aspect of resilience, which revolves around rigorous testing, learning from those tests, and implementing improvements. It's about proving that you've not only conducted tests but have also adapted and grown from the experience.

DORA Act: Understanding Criminal Penalties with Paul Dwyer

Join us in this eye-opening discussion with renowned expert Paul Dwyer as we delve into the Digital Operational Resilience Act (DORA) and its potential criminal penalties. Paul sheds light on the accuracy of claims regarding potential prison sentences under DORA. Indeed, the legislation includes provisions for criminal penalties, making it essential for organizations to fully grasp its implications.

DORA: Digital Operational Resilience Act w/ Paul Dwyer

Paul Dwyer on how DORA or Digital Operational Resilience Act affects organizations in the EU. GUEST BIOS Paul C Dwyer Paul C Dwyer stands among the world’s leading cybersecurity, risk, and compliance authorities. As CEO of Cyber Risk International, he excels in corporate and enterprise security, crafting cyber defence programs, and safeguarding business operations for clients. He also serves as the founder and President of the ICTTF International Cyber Threat Task Force, leading a community of over 30,000 professionals in their mission to combat cyber threats and promote industry diversity.

DORA Act: Cybersecurity Is An Investment | Paul Dwyer

Paul Dwyer talks about cybersecurity as an investment. The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union. GUEST BIOS.

The DORA Act: Transforming Digital Operational Resilience in Cybersecurity

The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union.

DORA Compliance Made Clear: Essential Training for Safeguarding Financial Institutions w/ Paul Dwyer

Welcome to Razorwire, the podcast that cuts through the noise and delivers the sharpest insights in the industry. I'm your host, Jim, and I am thrilled to have you join us for another episode packed with cutting-edge information. Now, I know you're constantly bombarded with countless podcasts and resources vying for your attention, but let me give you three compelling reasons why Razorwire should be at the top of your playlist. Firstly, we have a very special guest today: Paul C Dwyer.

Real-World Security Testing: Uncovering Vulnerabilities in Uninterrupted Power Supplies

Think your organization's security is rock-solid? It's time to put it to the real-world test! In this eye-opening video, we share a fascinating story of a security assessment that revealed some shocking vulnerabilities. When a company claimed to have a secure environment, they decided to take it a step further and put their confidence to the test. They asked, "Are you sure you want this real-world?" And the answer was a resounding "Yes!".

The Importance of Defense and Depth in Cybersecurity

In today's digital landscape, defense and depth are absolutely crucial for the security of any organization. Join us as we delve into the world of cybersecurity with Arctic Wolf and explore the significance of this foundational concept. We'll take a deep dive into various aspects of defense and depth, including its role in safeguarding endpoint devices, securing network infrastructure, and protecting cloud resources. In a rapidly evolving threat landscape, it's essential to leave no stone unturned when it comes to security.

From Security Onions to Icebergs: Evolving Cybersecurity Strategies

Join us on a journey through the evolution of cybersecurity strategies! 🌐🛡️ Back in the day, we used to refer to it as the "security onion," where each layer represented a different piece of the puzzle, all in an effort to protect the precious asset at the core—your data or critical servers. But times have changed, and with the shift to the cloud and modern technology, we've adopted a new analogy: the "security iceberg.".

Endpoint Security: More Than Just Windows Machines

Let's talk endpoint security with a dose of reality! 🛡️💻 In this eye-opening discussion, we explore the concept that attackers ultimately aim for an endpoint. But here's the catch: defining what an endpoint means in today's complex digital landscape isn't as straightforward as it seems. If your idea of an endpoint is limited to just Windows machines, you might be in for a surprise. There's a lot more to it! 🌐

Harnessing Artificial Intelligence as a Tool, Not a Solo Hero | Arctic Wolf

Join Chris Fielder, an expert from Arctic Wolf, as he shares insights into their approach to artificial intelligence. At Arctic Wolf, they have a strong appreciation for AI, but they've got a unique perspective – they use AI as a tool, not a standalone solution. Chris will walk you through why they believe it's crucial to keep humans in the loop when working with AI. Without that human touch, AI can create more noise than actionable insights. Think of it as having a brilliant assistant by your side, but it still needs your guidance to truly shine.

Power of AI: Your InfoSec Professional's Trusty Sidekick

Ever wondered what the future of information security looks like? 🤖🔐 In this video, we're diving deep into the concept of having an AI companion for your InfoSec professional. Picture it: Your InfoSec expert is the brains of the operation, making all the critical decisions to keep your data safe. But right there on their shoulder is a trusty AI sidekick, analyzing mountains of data faster than you can blink and serving up all the info needed for those informed decisions.

Cybersecurity Secrets: How AI Keeps Us Safe

Hey there! Today, we're diving into the exciting world of cybersecurity and AI! 🚀 We're on a mission to find out how we can catch those sneaky digital bad guys. We did some cool research and found out that the reason people are going all-in on AI and machine learning is pretty interesting. It's because there aren't enough super-smart folks to do the job the old-fashioned way!

Balancing Commuting and Environmental Impact | Remote Work

We explore the evolving dynamics of commuting and its significance in today's world. Join us as we delve into the critical considerations of commuting's impact on both the environment and people's lives, all from the perspective of a manager striving to meet objectives. Discover how recent changes have reshaped the way we work, emphasizing the positive shifts towards more objective-driven management practices.

The Evolution of Network Perimeters | Remote Work

In this video, we delve into the fascinating journey of network perimeters. Remember when the traditional network barrier seemed impenetrable? Join us as we explore how the shift to remote work initially signaled the demise of the conventional network perimeter. But guess what? We're not done with this story. With the return to office spaces, we're witnessing the resurgence of a more traditional network approach. However, it's clear that the landscape has forever changed. When was the last time you heard the term LAN thrown around?

Privacy and Boundaries in Remote Work: The Webcam Conundrum

As remote work becomes the new normal, the question of privacy and boundaries has taken centre stage. Join us for an engaging discussion on the challenges of webcam surveillance in the digital age. In this video, we share intriguing anecdotes and thought-provoking scenarios that shed light on the delicate balance between oversight and respecting personal space. Discover the story of a colleague juggling work and family life, where a simple shift in perspective led to a crucial realization about safeguarding privacy. We delve into the implications of capturing personal moments on corporate servers and the potential ethical concerns that arise.

Manage by Objectives | The New Normal

In today's rapidly evolving business landscape, a significant challenge has emerged for managers—the shift from traditional hands-on management to a more objective-based approach. Join us in this insightful discussion as we explore how managers are navigating this transition, realizing that the days of "managing by walking around" are giving way to a new era of leadership. In this video, we delve into the experiences of managers who've grappled with the realization that physical proximity is no longer the cornerstone of effective leadership. Discover the strategies they're adopting to ensure their teams thrive in this changing environment, where success is measured by outcomes rather than constant oversight. If you're a manager seeking to understand how to remain relevant and impactful in the modern workplace, this video is a must-watch. Embrace the paradigm shift and learn to manage by objectives, fostering a culture of achievement and innovation.