Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Unlocking Competitive Edge: Leveraging Cybersecurity and Privacy Protection in Retail #podcast

Discover how cybersecurity and privacy protection have become pivotal elements in gaining a competitive edge, especially for organizations like retailers. In this video, we explore the significance of building trust with both customers and employees by demonstrating robust security measures in handling sensitive data. Learn how prioritizing cyber and privacy protection can set businesses apart and strengthen their reputation in the marketplace.

Heightened Awareness: The Growing Importance of Cybersecurity in Today's World | Razorthorn Security

Join us as we explore the evolving landscape of cybersecurity and the growing emphasis on it in recent years. From protecting personal identity to countering threats from hackers and nation-states, cybersecurity has become a top priority for individuals and organizations alike. Explore how heightened awareness has led to greater investment in cybersecurity technologies and strategies, reshaping the way we interact with digital security in today's interconnected world.

The Billion Dollar Cost of Cybercrime: Lessons from the LockBit Takedown

The recent LockBit group take down has shown the world at large the cost of cybercrime. Initially it was reported that just over $100 million had been gathered through the nefarious acts of this particular group but, as I suspected, that initial figure was just a drop in the ocean. It turns out that the real figure was in excess of $1 billion dollars over the last four years, and I still suspect this may be more.

Exploring the Complexity of Cyber Maturity Measurement Insights from the Two Types of Organizations

In this thought-provoking video, we tackle the formidable challenge of measuring cyber maturity within organizations. With a poignant quote attributing two types of organizations - those cognizant of their cyber breaches and those oblivious - we delve into the intricacies of this digital landscape. It's an exploration of the harsh reality that virtually every entity, particularly large enterprises, faces cyber threats, emphasizing the prevalence of intrusions even in seemingly secure networks. As we unravel the complexities of cyber resilience, we confront the sobering realization that insurance may not offer a panacea in safeguarding against cyber risks. Join us on this insightful journey as we navigate the turbulent waters of cybersecurity, offering insights and strategies for fortifying organizational defenses in an ever-evolving threat landscape.

Unraveling the Third-Party Supplier Web: Managing Generational Complexity || Razorthorn Security

In this video, we dive into the intricate layers of third-party supplier networks, transcending the immediate concerns of dealing with organizations to confront the complexities of second, third, and even fourth generations of suppliers. Join us as we navigate through the evolving landscape of supplier relationships and explore strategies for managing the labyrinthine "mishmash" of third-party involvement.

The Expanding Web of Organizational Supply Chains and Security Risks || Razorthorn Security

In this video, we delve into the intricate web of organizational supply chains and the heightened complexities they bring to the realm of cybersecurity. With the interconnected nature of modern businesses, from retailers to manufacturers to insurers, the reliance on numerous other entities introduces a myriad of potential vulnerabilities. Join us as we explore the evolving landscape of malicious activities and data breaches, highlighting the exponential growth in complexity over the past two decades.

Cyber Trends in Identity and Access Management with Simon Moffatt || Razorthorn Security

Hello Razorwire listeners! It's your host Jim here, and in today's fascinating episode, we sit down with cybersecurity veteran Simon Moffatt. With two decades under his belt in the dynamic field of identity and access management, Simon unpacks the complexities of cyber protection in our modern age. From the evolution of technology to the murky waters of liability and insurance in cybersecurity, Simon's insights shed light on the challenges and trends we face.

Unlocking Security: MFA vs. Passwords | Navigating Compliance Challenges || Razorthorn Security

Ditching passwords for a more secure future with Multi-Factor Authentication (MFA)! Explore the realm of technical feasibility and compliance requirements. Discover why it's crucial to go beyond the words and address the true intent of security measures. Join the conversation as we delve into the legal intricacies hashed out in court. Don't miss this insightful discussion on revolutionizing your approach to online security!

Decoding Cybersecurity: Pipelines vs. Power Grid | Unveiling the Unique Challenges in Legislation

Dive into the fascinating realm of cybersecurity with our latest exploration, as we dissect the historical focus on electricity grids versus the unique challenges posed by pipelines. Traditionally, issues on the electricity grid have captured immediate attention, often portrayed in Hollywood hacking scenes with dramatic attempts to switch off lights. However, the landscape shifts when it comes to pipelines.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.

Redefining Compliance: Navigating the Shift to Risk-Based Controls | EU NIS Directive Insights

Embark on a journey through the evolving landscape of cybersecurity compliance as we uncover the challenges inherent in traditional frameworks. The stark reality is that compliance doesn't automatically equate to effectively managing organizations' risks and specific threats.

Navigating Cybersecurity Compliance: The Need for GRC Tools and Strategic Oversight #podcast

Delve into the complex world of cybersecurity compliance with our latest video, where we address the crucial question: How do you effectively track and manage diverse compliance requirements across the board? In an era where adhering to one set of regulations might not align with another, the need for a comprehensive GRC (Governance, Risk, and Compliance) tool becomes paramount.

Cybersecurity Dilemma: Balancing Government Involvement Without Sacrificing Security Budgets

Unravel the cybersecurity dilemma in our latest video, where we explore the complex relationship between government involvement and corporate cybersecurity programs. Many cybersecurity leaders may express reluctance when asked about government intervention, fearing the additional burdens of setting up new compliance wings and diverting resources from tangible security budgets.

Legislative Challenges: Navigating Knee-Jerk Reactions in Cybersecurity || Razorthorn Security

Explore the pitfalls of knee-jerk legislative reactions in the ever-evolving landscape of cybersecurity in our latest video. Delve into the challenges faced by organizations as they grapple with sudden directives that often emerge as a response to unforeseen events. The knee-jerk nature of some legislation raises crucial questions about the consultation process, leaving cybersecurity professionals wondering if insights from the infosec world were considered.

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.

Navigating Deep Fakes and Geopolitical Risks in 2024: The AI Defensive Edge || Razorthorn Security

Dive into the complex world of deep fakes and the looming geopolitical risks of the upcoming year in my latest video. From the potential misinformation campaigns during elections to the role of AI, I explore how these elements intertwine and impact our digital landscape. AI is not just a potential threat; it can also be a formidable defense. I discuss the emergence of AI-driven products designed to counteract misinformation and the evolving landscape of AI battling AI. Are we stepping into a future reminiscent of sci-fi, where machines combat each other, leaving humans out of the crossfire?

Prioritizing Cybersecurity Training in 2024: From Corporations to Individuals | Razorthorn Security

In 2024, let's make cybersecurity training a top priority! Join me in exploring the crucial need for training initiatives, from corporate security teams down to individual laptop users. In this video, we discuss the importance of fostering a culture of security awareness, ensuring everyone can recognize the signs of potential threats. From corporate environments to personal devices, cybersecurity is a shared responsibility. I address the significance of providing training that goes beyond making everyone a hacker but equips them with the knowledge to identify and respond to potential risks.