Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Third Party Risk Management Doesn’t Stop When the Contract is Executed
Manage episode 428178679 series 3450013
In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity.
88 episodes
Manage episode 428178679 series 3450013
In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity.
88 episodes
All episodes
×


1 From Homicide to Hackers: Fixing Cybersecurity’s Broken Model 34:58

1 This Isn't the Wolf of Wall Street: Recruitment, Rewired 36:14


1 A Confluence of Errors and a Little Help From Friends 32:00

1 Cyber Truths, Intelligence Myths, and Life after the NSA 33:42


1 Silent Risk - How Do We Figure Out What We Don't Know? 13:16

1 Telling YOUR Story Within Your Organization 27:14

1 The Concerning Impact of Cybersecurity on National Security 36:12

1 Meet an Attorney Who Keeps CISOs Out of Legal Hot Water 31:43

1 Addressing Cybersecurity’s Education and Engagement Challenges 26:21

1 Fresh Perspectives from a Future Cybersecurity Leader 25:10

1 What the Trump Administration Could Mean for Cybersecurity 37:14

1 Building Business Resilience in the Face of Risk 29:44


1 How Security Advisors Support Sales — Without Actually Selling 29:56

1 An Uncommon Cybersecurity Question: What Makes Your Soul Sing? 28:27

1 Wanna Tackle Third-Party Risk? Collaborate, Collaborate, Collaborate! 31:01

1 You Can't Ease off the Security Gas Pedal — Especially in Healthcare 28:25

1 CISOs Need to Tell Good Stories and the Right Allies to Help Tell Them 30:35

1 Third Party Risk Management Doesn’t Stop When the Contract is Executed 31:01

1 An Honest Look at Diversity and Inclusion in the Security Industry 25:08

1 If You’re Not Leading With Empathy, Are You Really Leading? 23:57

1 The Trials and Tribulations of a Virtual CISO and Startup Advisor 30:33

1 Getting the Cybersecurity Budget you Need Doesn't Just Happen 31:31

1 The Risk & Reels Mix Tape — Some of our Favorite Guests 33:34

1 From Outsider to Cybersecurity Insider — Leaning into the Power of Transitions 30:20

1 Are You Really You? The Fascinating World of Identity Access Management 29:47

1 Everything is an Endpoint — and Other Zero Trust Insight 26:17

1 We Really Need to Shake S*** Up in Cybersecurity Research and Insight 31:39

1 Yes, CISOs Should Be Ethical — But Maybe We Stop Lying To Them 46:24

1 Turtles All the Way Down — Looking for Third-Party Risk in DORA 32:46

1 Enough With the Cybersecurity Gatekeeping — Be a Genuine Mentor 32:17

1 Hey, Cybersecurity Pros: Complexity is the Enemy of Execution 31:57

1 Navigating Bias — Cybersecurity’s Crooked Mirror 33:08

1 Helping CISOs Communicate Their Way To Positive Outcomes 30:10

1 The Art of Throwing the (Calculated) Cybersecurity Hail Mary 33:14

1 What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity 30:58


1 What Better Time Than Now? (And Other Considerations for Aspiring Security Professionals) 28:28

1 Why “Always Be Collaborating” Should Overshadow “Always Be Closing” in Security Sales 27:17


1 AppSec Ain’t Easy — But it Doesn’t Have to be Impossible 30:07

1 Want to be a Successful CISO? Know Your Audience 31:06

1 There’s No Excuse to Ignore Supply Chain Cyber Risk 31:55


1 The Art of Managing — and Communicating — Third-party Security Risks 31:26


1 Pearls of Wisdom from a ‘Been There, Done That’ CISO 40:11


1 The Funniest — or “Least Boring” — Man in Cybersecurity 38:45


1 The Unpredictable Career Trajectory of a Cyber Professional 34:49






1 Can You See the Real Threats? | S2 Ep. 9 with Patrick Garrity 34:03

1 Tackling Risk | S2 Ep. 8 with Tomás Maldonado 33:29

1 Building a Successful Security Program from Scratch | S2 Ep. 7 with George Al-Koura 39:02

1 The Overlap of Physical Security into Digital | S2 Ep. 6 with Angela Dogan 35:54

1 Security Operations: Learning what works | S2 Ep. 5 with Anton Chuvakin 37:54

1 Security Architecture and what the structure entails | S2 Ep. 4 with Evgeniy Kharam 43:08

1 Why open standards matter for streamlined cybersecurity | S2 Ep. 3 with David Mahdi 42:01

1 Prioritizing cybersecurity in the world of CISO burnout | S2 Ep. 2 with Rob Black 43:05

1 Cybersecurity in the realm of Higher Education around the world | S2 Ep. 1 with Luqman Kondeth 37:06

1 The Bright Future of Public/Private Partnership in Cybersecurity | SEASON 1 FINALE Ep. 17 with Bailey Bickley 35:14

1 From the Military to IT and Cybersecurity | Ep. 16 with Lewis Heuermann 42:33

1 Investing in Cyber and AI in 2023 | Ep. 15 with Rick Grinnell 37:57

1 Cybersecurity in Higher Education – over the years and today | Ep. 14 with Gretchen Ruck 36:34

1 The People of Cyber: Diversity, Education and Empowerment | Ep. 13 with Juliana Vida 47:27

1 How to use cybersecurity tools properly to meet regulations | Ep. 12 with Larry Whiteside 41:41

1 Building a third-party risk program from the ground up | Ep. 11 with Tom Garrubba 1:11:05

1 Threat Modeling in STRIDE, the basis for cybersecurity. | Ep. 10 with Matt Stamper 38:31

1 Productive risk processes = *truly* reducing risk. How has TPRM shifted? | Ep. 9 with Bob Maley 33:38

1 Talking with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security | Ep. 8 with Mike Brown 41:13

1 With a plethora of emerging AI, where does the cybersecurity industry stand? | Ep. 7 with Eric Cowperthwaite 46:03

1 Managing the risk you quantify is half the battle | Ep. 6 with David Elfering 30:28

1 It’s the dog that caught the car - how can security programs properly mature? | Ep. 5 with Dave Lewis 39:29

1 The anatomy of the 2023 Black Kite Third Party Breach Report | Ep. 4 with Ferhat Dikbiyik 35:28

1 “We’ve always done it that way.” Why we *shouldn’t.* | Ep. 3 with Patti Titus 36:41

1 Security starts with people. Process requires purpose. | Ep. 2 with Brian Reed 35:24


1 Introducing Risk and Reels: A Cybersecurity Podcast 1:05
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.