Artwork

Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

CISO vs. CTO: The Battle for Your Security Budget

44:53
 
Share
 

Manage episode 465016155 series 3618231
Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy?

In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares.

Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene.

If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light.

The conversation then shifts to the ever-evolving dance between CISOs and CTOs, where roles can blur depending on factors like company size and regulatory pressure.

From personal anecdotes that highlight real-world adaptations to the subtle ways these roles overlap, we explore how today’s CISOs often juggle legal, technical, and operational responsibilities, while CTOs focus on infrastructure and operations.

It’s a fascinating look at how businesses align these positions to stay compliant, efficient, and secure.

Finally, we dig into the transformative power of technology and the competitive edge that emerges when security is woven into every phase of software development.

The CIA triad—confidentiality, integrity, availability—gets a fresh spin here as a must-have foundation for any robust security strategy.

And with identity management playing a starring role, it’s clear that integrating security from the ground up is more than just a best practice—it’s a recipe for success in our hyper-connected world.

Tune in to discover how prioritizing security can set your organization apart and why seamless identity management might just be the key to thriving in the digital age.

Thank you for watching / listening!
Connect with us on LinkedIn:
- Evan: https://www.linkedin.com/in/evanmorgan/
- Paul: https://www.linkedin.com/in/pm01/

  continue reading

Chapters

1. S1E11 - CISO vs. CTO: Defining Roles and Responsibilities in Security (00:00:00)

2. Cybersecurity Professionals on the New Year (00:00:16)

3. Defining Roles (00:12:20)

4. The Evolution of Cybersecurity Roles (00:17:37)

5. Cybersecurity and Business Competitive Advantage (00:23:08)

6. Roles and Responsibilities in Cybersecurity (00:30:48)

23 episodes

Artwork
iconShare
 
Manage episode 465016155 series 3618231
Content provided by Evan & Paul. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Evan & Paul or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy?

In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares.

Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene.

If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light.

The conversation then shifts to the ever-evolving dance between CISOs and CTOs, where roles can blur depending on factors like company size and regulatory pressure.

From personal anecdotes that highlight real-world adaptations to the subtle ways these roles overlap, we explore how today’s CISOs often juggle legal, technical, and operational responsibilities, while CTOs focus on infrastructure and operations.

It’s a fascinating look at how businesses align these positions to stay compliant, efficient, and secure.

Finally, we dig into the transformative power of technology and the competitive edge that emerges when security is woven into every phase of software development.

The CIA triad—confidentiality, integrity, availability—gets a fresh spin here as a must-have foundation for any robust security strategy.

And with identity management playing a starring role, it’s clear that integrating security from the ground up is more than just a best practice—it’s a recipe for success in our hyper-connected world.

Tune in to discover how prioritizing security can set your organization apart and why seamless identity management might just be the key to thriving in the digital age.

Thank you for watching / listening!
Connect with us on LinkedIn:
- Evan: https://www.linkedin.com/in/evanmorgan/
- Paul: https://www.linkedin.com/in/pm01/

  continue reading

Chapters

1. S1E11 - CISO vs. CTO: Defining Roles and Responsibilities in Security (00:00:00)

2. Cybersecurity Professionals on the New Year (00:00:16)

3. Defining Roles (00:12:20)

4. The Evolution of Cybersecurity Roles (00:17:37)

5. Cybersecurity and Business Competitive Advantage (00:23:08)

6. Roles and Responsibilities in Cybersecurity (00:30:48)

23 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play