Compromising Positions - A Cyber Security Podcast podcast

Compromising Positions - A Cyber Security Podcast

Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by Developers, User Researchers, Designers, Product Owners, Data Scientists, Cloud Specialists, Scrum Masters, C-Suite Execs, AI/MI boffins, and many, many more non-security positions! This is a podcast aim to get you thinking about security without boring you to death! Join our two hosts, Lianne Potter, Cyber Anthropologist and Head of Security Operations at a major retailer and Jeff Watkins, CTO at XDesign for this informal, frank, and at times anarchic look at what people really think about cybersecurity in organisations and what cybersecurity people should ACTUALLY be doing.

Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by Developers, User Researchers, Designers, Product Owners, Data Scientists, Cloud Specialists, Scrum Masters, C-Suite Execs, AI/MI boffins, and many, many more non-security positions! This is a podcast aim to get you thinking about security without boring you to death! Join our two hosts, Lianne Potter, Cyber Anthropologist and Head of Security Operations at a major retailer and Jeff Watkins, CTO at XDesign for this informal, frank, and at times anarchic look at what people really think about cybersecurity in organisations and what cybersecurity people should ACTUALLY be doing.

 

#33

EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with S...

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! For the longest time podcast host, Lianne Potter has been saying: “Cybersecurity has a PR problem!” So what better way of tackling this problem than to get on the show an actual PR and marketing expert? This week we are joined by Sarah Evans, the head of digital PR at Energy PR. Sarah has over 12 years of experience in SEO, digital PR, digital marketing, content and social media. In this episode ‘Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital’ - we’re going to learn how to target our cybersecurity message for maximum effect, how to rebuild your team's image, learn what marketing and PR really think about cybersecurity, and learn how to be prepared during a public cybersecurity incident with a 101 on crisis comms. We will also shed off our desire to the the hero in the story and transition in a more useful role, that of cybersecurity sage as we deep dive into brand personas! SHOW NOTES ABOUT SARAH EVANS Sarah Evans has over 12 years of experience in SEO, digital PR, digital marketing, content, social. Currently working as a digital PR specialist, she’s worked on audience profiling, insights, comms and campaigns for a broad mix of B2B and B2C brands including Gousto, Rowse, AXA and Goodyear. She puts her curiosity for data and creativity at the heart of her team and has spoken at events for PR Moment and Google on SEO, content and attribution. She loves data, tea and puns LINKS FOR SARAH EVANS Energy PR’s [website] (https://www.energypr.co.uk/) Sarah’s [LinkedIn] (https://%20https//www.linkedin.com/in/sarahevans6/) ... Read more

05 Jun 2024

41 MINS

41:38

05 Jun 2024


#32

EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFEC...

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by James Charlesworth, a seasoned Director of Engineering at Pendo with 15 years of experience in software engineering. James is also the creator of the Train to Code YouTube channel, where he shares a wealth of excellent training videos on software development. In this episode, Say Goodbye to ‘Git Blame’: Building Collaborative and Secure Software Development Lifecycles, we dive into some great topics aimed at saying goodbye to the blame game and hello to good app and product sec! James talks us through his process of building up cross-functional empathy between his engineering function and the security team; why the engineering team might not be the best team to speak to if you’ve got a lot of vulnerable code and a step-by-step guide on how he excels in delivering product security in his organisation. Key Takeaways: Empathy-Driven Collaboration: James emphasises the importance of empathy when aligning priorities across inter-departmental teams. Whether it’s engineering or cybersecurity, understanding why people request specific tasks is crucial. Shared Ownership of the Codebase: Forget the notion of “that engineer’s code.” James advocates for a hyper-collaborative approach where everyone takes responsibility for the codebase. Avoid the blame game (say goodbye to ‘Git Blame!’) and recognise that collective ownership leads to better outcomes. Coding Literacy for All: Should security professionals learn to code? Absolutely! While not everyone needs to be an expert, having a basic understanding of coding helps bridge communication gaps. It enables security teams to comprehend technical issues and collaborate effectively with developers. What is Product Security?: Product security isn’t an afterthought; it’s embedded throughout the development process. Prioritising security ensures a robust and reliable end product. Learning from Errors: James encourages learning from coding errors early in the software development lifecycle. Cowboy Coders and Robust Processes: James shares his thoughts on “cowboy coders”—those who cut corners. SHOW NOTES [Train to Code YouTube Channel] (https://www.youtube.com/@traintocode) ABOUT JAMES CHARLESWORTH James is a Director of Engineering at Pendo, where he also serves as the site lead for the Sheffield office. With 15 years of experience in software engineering, he is committed to Pendo's mission to elevate the world's experience with software. An author and public speaker, James is passionate about diversifying the tech industry and actively works to help individuals from various backgrounds enter the field of software engineering. In addition to his role at Pendo, he also organizes the Sheffield AI Meetup, further fostering a community around artificial intelligence. James is not just a lifelong computer nerd; he's a leader committed to making an impact in technology and community. LINKS FOR JAMES CHARLESWORTH James’ [website] (https://traintocode.com/) James’ [LinkedIn] (https://www.linkedin.com/in/jamesjcharlesworth/) ... Read more

29 May 2024

36 MINS

36:46

29 May 2024


#31

EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! We are joined again by Dr Bettina Palazzo a business ethics expert! She works with compliance managers to create a culture of integrity that focuses on the leadership and behavioural dimensions of compliance. In this episode, “The Dilemma Game”: Unleashing The Power of Ethics and Good Cybersecurity Through Play”, we delve into the complexities of power dynamics within organisations, exploring the efficacy of policies and the role of ethical standards in both corporate and personal settings. We question the effectiveness of merely adding regulations in response to ethical crises and stresses the importance of cultural context in shaping responsibilities towards cybersecurity. Then our discussion extends to the necessity of embracing local nuances while maintaining universal ethical standards, and the limits of systemic solutions in a diverse, evolving landscape. And finally, this episode also introduces the "dilemma game," an innovative approach to enhance understanding and application of policy texts through real-world scenarios, fostering a culture of integrity and psychological safety where open communication and trust are paramount. This thought-provoking episode is a must-listen for anyone interested in the intersection of culture, ethics, and organisational behaviour. Show Notes [Cyber-attacks and stock market activity] (https://www.sciencedirect.com/science/article/abs/pii/S1057521921001319) By Onur Kemal Tosun [‘Biggest cyber risk is complacency, not hackers’] (https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/10/biggest-cyber-risk-is-complacency-not-hackers/) - UK Information Commissioner issues warning as construction company fined £4.4 million. ICO [How to fuck up an airport] (https://www.radiospaetkauf.com/ber/) (Podcast) [On the Importance of Trial and Error with Stefan Gaillard] (https://www.humanriskpodcast.com/stefan-gaillard-on-the-importance/) By Christian Hunt About dr Bettina Palazzo Bettina stumbled on the topic of business ethics in the early 90s and soon found out that it is such a rich and exciting topic that she never stopped doing anything else – at least professionally. She suffered through the cumbersome but rewarding effort of getting her head around the philosophical and economical foundations of business ethics, won a prize for her PhD. thesis and rode off into the sunset to join KPMG. There she helped to build their business ethics consulting services. Tough pioneer work at that time! After a short detour into strategic management consulting, she returned to her true passion and started her own business ethics advisory in 2000. Over the years Bettina has learned that you cannot press ethics into checklists and processes and that unethical companies make unhappy people. The desire to create corporate cultures that make work fun and meaningful instead of dreadful and depressing drives everything she does. Fun facts: Bettina also has a blog about her city of the heart Rome and dances salsa. She met her husband, Guido Palazzo, on a business ethics conference and they have two almost grown sons. LINKS FOR DR Bettina Palazzo Dr Palazzo’s [website] (https://bettinapalazzo.com/) Dr Palazzo’s [LinkedIn] (https://www.linkedin.com/in/bettina-palazzo/) ... Read more

22 May 2024

23 MINS

23:23

22 May 2024


#30

EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome back to season 3! To kick things off we are joined by Dr Bettina Palazzo a business ethics expert! She works with compliance managers to create a culture of integrity that focuses on the leadership and behavioural dimensions of compliance. She states that unethical organisations make people unhappy - and we couldn’t agree more. So she has dedicated her life work to helping organisations create cultures that make work fun and meaningful. Ethics is such an important subject when it comes to business because poor ethical decisions can mean poor compliance, and ultimately, can lead to poor security decisions. So how do you build a culture that is comfortable with having honest conversations about ethics? Well that’s what we will explore in this episode, Rules Without Relationships Create Rebellion: Why Ethics Matter in Cybersecurity. By the end of this episode you will Learn how to create a ‘speak up’ culture so that people can raise cybersecurity concerns with you. How to build a compliance influencer programme (and no, that does not mean trips abroad at beautiful locations surrounded by policy documentation for the gram) And how the cybersecurity team can not only be ethical role models but also give people a reason to care for the big question: why we do the things we do to protect them! Key Takeaways: Speak Up Culture: Learn how to create a safe space for open communication about ethics and compliance. No more fear of reprisal! Ethical Leadership: Great leaders inspire ethical behaviour. Dr. Palazzo explains how to be that leader. Communication is Key: Don't just tell people what to do, explain the "why" behind the rules. Ditch the Shame: Falling for phishing attacks? It happens! We need to build psychological safety to discuss cybersecurity issues openly. Goodbye Curse of Knowledge: Cybersecurity isn't just for the techies. Learn how to communicate cyber dangers effectively to everyone. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, compliance, leadership, psychological safety SHOW NOTES Dr Palazzo’s [Compliance Influencer Programme] (https://the%20compliance%20influencer%20programme%20https//bettinapalazzo.com/compliance-influencer-online-program/) Oh Behave by [Cybsafe] (https://www.cybsafe.com/whitepapers/cybersecurity-attitudes-and-behaviors-report) Vote for us in the [European Cybersecurity Blogger Awards!] (https://www.eskenzipr.com/european-cybersecurity-blogger-awards/) ABOUT DR BETTINA PALAZZO Bettina stumbled on the topic of business ethics in the early 90s and soon found out that it is such a rich and exciting topic that she never stopped doing anything else – at least professionally. She suffered through the cumbersome but rewarding effort of getting her head around the philosophical and economical foundations of business ethics, won a prize for her PhD. thesis and rode off into the sunset to join KPMG. There she helped to build their business ethics consulting services. Tough pioneer work at that time! After a short detour into strategic management consulting, she returned to her true passion and started her own business ethics advisory in 2000. Over the years Bettina has learned that you cannot press ethics into checklists and processes and that unethical companies make unhappy people. The desire to create corporate cultures that make work fun and meaningful instead of dreadful and depressing drives everything she does. Fun facts: Bettina also has a blog about her city of the heart Rome and dances salsa. She met her husband, Guido Palazzo, on a business ethics conference and they have two almost grown sons. LINKS FOR DR BETTINA PALAZZO Dr Palazzo’s [website] (https://bettinapalazzo.com/) Dr Palazzo’s [LinkedIn] (https://www.linkedin.com/in/bettina-palazzo/) ... Read more

15 May 2024

28 MINS

28:44

15 May 2024


#29

EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome to the grand finale of season two of ‘Compromising Positions’, where we delve into the fascinating world of AI security. In this special episode, your hosts will guide you through the labyrinth of securing AI models, one step at a time. For those who prefer a quick overview, we offer an abridged version on Apple Podcasts and Spotify. This version deep dives into two key topics: Jeff’s unique mnemonic C-PTSD for threat modeling AI systems, and an intriguing discussion on the correlation between boredom, worm-killing, and AI efficiency gains. For those who crave a deeper dive, scroll down or visit our Youtube channel for the extended cut. This version includes everything from the regular version, plus: Jeff’s academic journey in AI at the University of Hull Lianne’s preparation for a 100 days of Code in Python for her MSc in Data Science and AI at Leeds Trinity University A critical discussion on OpenAI’s transparency and the latest AI wearable technology, along with the complexities of consent and privacy in an ‘always recorded’ lifestyle Whether you choose the regular or extended version, we appreciate your support throughout season two. Stay tuned for more enlightening discussions in season three! Thank you for being a fantastic audience. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: Cybersecurity, AI, Threat Modelling, MSC, Data Science, IOT, Wearables, Data Security SHOW NOTES Jeff’s article on [C-PTSD] (https://www.linkedin.com/pulse/dont-let-your-ai-get-c-ptsd-navigating-labyrinth-threats-jeff-watkins-2jhke/) Lianne’s Article [The (AI) Revolution will be BORING...And that's Oka] (https://www.linkedin.com/pulse/ai-revolution-boringand-thats-okay-lianne-potter-fjprf/) y! Wearables, Shareables, Unbearable? The IOT and AI Tech Nobody Asked for But Cybersecurity Criminals Love. [Future of Cybersecurity] (https://youtu.be/gTsJ8_VDZLs?si=P9_zKhtZ21HK5d8W) MSc in Artificial Intelligence - [University of Hull] (https://online.hull.ac.uk/online-msc-in-artificial-intelligence?utm_term=msc%20ai%20hull&utm_campaign=SL+%7C+Hull+%7C+Search+%7C+Artificial+Intelligence+%7C+UK+%7C+May+24&utm_source=adwords&utm_medium=ppc&gad_source=1&gclid=Cj0KCQjw8pKxBhD_ARIsAPrG45ne-Ur6-hkn5X3zRQG6eGzEArnKDPkC7UE1qrUgcgYF5nGbDlrAws8aAm-oEALw_wcB&gclsrc=aw.ds) MSc in Data Science and Artificial Intelligence - [Leeds Trinity University] (https://www.leedstrinity.ac.uk/courses/postgraduate/data-science-and-artificial-intelligence/?utm_campaign=nn-postgraduate-annual-campaign-2024&utm_source=google&utm_medium=dsa&utm_term=&campaign_id=20608279353&gad_source=1&gclid=Cj0KCQjw8pKxBhD_ARIsAPrG45msVGV6gNLJWTHNlKFMN1jt9rG03xejWmBiFPCfD56xIZmJpevF1BwaAs1kEALw_wcB) Python Crash Course [by Eric Matthes] (https://www.amazon.co.uk/Python-Crash-Course-3Rd-Matthes/dp/1718502702/ref=asc_df_1718502702/?tag=googshopuk-21&linkCode=df0&hvadid=570229818468&hvpos=&hvnetw=g&hvrand=2070399618794849777&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9046327&hvtargid=pla-1654671714701&psc=1&mcid=d54cd2f8d1043cb89210bb5d38ee54eb&th=1&psc=1) [Codewars] (https://www.amazon.co.uk/Python-Crash-Course-3Rd-Matthes/dp/1718502702/ref=asc_df_1718502702/?tag=googshopuk-21&linkCode=df0&hvadid=570229818468&hvpos=&hvnetw=g&hvrand=2070399618794849777&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9046327&hvtargid=pla-1654671714701&psc=1&mcid=d54cd2f8d1043cb89210bb5d38ee54eb&th=1&psc=1) In Praise of Boring AI [by Ethan Mollick] (https://www.oneusefulthing.org/p/in-praise-of-boring-ai) Season Two Playlist - [Youtube] (https://www.youtube.com/watch?v=fV55HCq3wtQ&list=PLm167M6OX_jC5h8DuefixrkoH1po8ftGf&pp=iAQB) Vote for us! [European Cybersecurity Blogger Awards] (https://docs.google.com/forms/d/e/1FAIpQLSc-qrL_CcUGtAnl6jZ3fbugkAOP4UhlwYvZcO0iBWupzHN5fQ/viewform) and [The Real Cyber Awards] (https://www.therealcyberawards.co.uk/enter) ABOUT LIANNE POTTER As the Head of SecOps for the largest greenfield technology transformation project in Europe, Lianne is building a leading edge security team from scratch to meet the needs of a modern retail organisation while empowering her team to think innovatively to create new standards in best practices. Lianne has delivered talks across the globe to share her vision for a new type of security function. Drawing upon her expertise as a cyber-anthropologist (through her consultancy, The Anthrosecurist), her practical experience as a security-focused software developer and as a security practitioner; Lianne combines the human and the technical aspects of security to evangelise a cultural security transformation. She is on the advisory board for a community enterprise aimed at encouraging diversity in tech, is a published author, podcast regular and Host of Cybersecurity Podcast Compromising Positions, and won Computing.com’s Security Specialist of the Year for her work on human-centric approaches to security. In 2021 she won two awards for Security Leader of the Year 2021 and Woman of the Year in the Enterprise category and in 2023 she won Cyber Personality of the Year in The Real Cyber Awards. She is doing a Masters in AI and Data Science in 2024. LINKS FOR LIANNE [LinkedIn] (https://www.linkedin.com/in/liannep/) [Compromising Positions Podcast] (https://www.compromisingpositions.co.uk/) ABOUT JEFF WATKINS Jeff is Chief Product and Technology Officer for xDesign. He is a lifelong technologist with nearly 25 years’ experience in the industry, first having started coding at age 6. Having worked in the Financial Services, Healthcare and Retail industries, on enterprise and national scale programmes. Over the years he has become increasingly interested in Cybersecurity and AI and how both will shape our future, both technologically and the human impact. Jeff has founded multiple CyberSecurity teams and is currently working on several new pieces around the secure development and deployment of Generative AI based solutions. He is a tech blogger, writer, podcaster and host of Compromising Positions and public speaker, having recently keynote at the Webinale international web conference in Berlin. Jeff has a Masters in Cybersecurity and will be starting his Masters in AI and Data Science in 2024. LINKS FOR JEFF [Linkedin] (https://www.linkedin.com/in/jeff-watkins-5167111/) [Compromising Positions Podcast] (https://www.compromisingpositions.co.uk/) ... Read more

24 Apr 2024

37 MINS

37:09

24 Apr 2024


#28

EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Dr David Burkus, one of the world’s leading business thinkers and best-selling author of five books on the topic of business and leadership. Dr Burkus has worked with the leadership teams of some internationally known names such as PepsiCo, Adobe and NASA. In this episode, “It’s a Wonderful Hack! Building a high-performance cybersecurity team“, we discuss the three elements of the “Team Culture Triad”: common understanding, psychological safety and prosocial purpose, and how these elements are the backbone of every successful team. We delve into how interpersonal trust is a reciprocal process, that trust needs to be met with respect and an open mind, and how we can build a culture that learns from mistakes and people feel safe to challenge at all levels in the business. We also discuss how being part of a team is more like chess than checkers. We can’t treat all people like they have the same skills or ways of working, we’re a team yes, but it’s a team of individuals. And the “It’s a Wonderful Life” test. A brilliant thought experiment to show the impact of your team’s contributions, which may not always be tied to revenue. Key Takeaways: Try a Little Tenderness: Empathy is important, but it's not just about feeling someone else's pain. To truly collaborate effectively, you need to understand your teammates on a deeper level, including their unique strengths, weaknesses, and working styles. By achieving this common understanding, you can anticipate their responses and adjust your approach to optimize teamwork. Hey Boss, your Idea Sucks: When was the last time someone in your team challenged your decision? If it was a while ago, you might want to take a look if you’re building a team that fosters psychological safety. Developing Pro-Social Purpose: A team that prioritizes collective success over individual gain fosters a collaborative environment. When team members are driven by a common purpose, they're more likely to support each other and work towards shared goals. This sense of purpose strengthens the team and empowers individuals to contribute their best work. It’s a Wonderful Life: Imagine if your cybersecurity team didn't exist. What would the consequences be? While this exercise helps you identify potential negative impacts, it's equally important to consider the positive contributions your team makes. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, storytelling, psychology, networking, silos, purpose, psychological safety, leadership Show Notes Dr Burkus has an awe-inspiring career as an author. You can check out his books on [ Amazon] (https://www.amazon.co.uk/s?k=David+Burkus&i=audible&ref=dp_byline_sr_audible_1) The importance of psychological safety by [ Amy Edmondson] (https://www.kingsfund.org.uk/insight-and-analysis/videos/importance-psychological-safety) Melina Palmer’s [episode] (https://www.compromisingpositions.co.uk/podcast/episode-9-what-your-cybersecurity-team-wants-and-cant-tell-you-becuase-they-need-more-behavioural-science?rq=melina) The Five Dysfunctions of a Team: A Leadership Fable by [Patrick M. Lencioni] (https://www.amazon.co.uk/Five-Dysfunctions-Team-Leadership-Lencioni/dp/0787960756) The beautiful Hyde Park Picture House Cinema in Leeds - [GO NOW] (https://hpph.co.uk/) Get your Die Hard Christmas Advent Calendar at [ETSY] (https://www.etsy.com/uk/listing/1336738357/hans-gruber-advent-nakatomi-plaza?ga_order=most_relevant&ga_search_type=all&ga_view_type=gallery&ga_search_query=die+hard+advent+calender&ref=sc_gallery-1-7&pro=1&sts=1&search_preloaded_img=1&plkey=02ebee3db38845008fea9924af2fab14b1e09f7b%3A1336738357) Vote for us! [European Cybersecurity Blogger Awards ] (https://docs.google.com/forms/d/e/1FAIpQLSc-qrL_CcUGtAnl6jZ3fbugkAOP4UhlwYvZcO0iBWupzHN5fQ/viewform) About dr David Burkus One of the world’s leading business thinkers, Dr. David Burkus’ forward-thinking ideas and bestselling books are helping leaders build their best team ever. He is the bestselling author of five books about business and leadership. His books have won multiple awards and have been translated into dozens of languages. Since 2017, Burkus has been ranked multiple times as one of the world’s top business thought leaders. His insights on leadership and teamwork have been featured in the Wall Street Journal, Harvard Business Review, USAToday, Fast Company, the Financial Times, Bloomberg BusinessWeek, CNN, the BBC, NPR, and CBS This Morning. A former business school professor, Burkus now works with leaders from organizations across all industries, including PepsiCo, Fidelity, Adobe, and NASA. LINKS FOR dr David Burkus Dr Burkus’ [Linkedin] (https://www.linkedin.com/in/davidburkus/) Dr Burkus’ [Website] (https://davidburkus.com/) Dr Burkus’ [TikTok] (https://www.tiktok.com/@davidburkus) (No dancing unfortunately) ... Read more

17 Apr 2024

27 MINS

27:15

17 Apr 2024


#27

EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION

Welcome to Compromising Positions! This week we are joined by Dr David Burkus, one of the world’s leading business thinkers and best-selling author of five books on the topic of business and leadership. Dr Burkus has worked with the leadership teams of some internationally known names such as PepsiCo, Adobe and NASA.In this episode, “Storytelling Superconnectors: Unleashing Purpose Beyond Metrics in Your Cybersecurity Function”, Dr Burkus challenges the concept of Dunbar’s Number as we discuss the power of human networks, and how finding the superconnectors in your organisation will help you get your cybersecurity agenda in front of the right people. Indulging in a bit of schadenfreude, Dr Burkus shows us how we can use the hacks and breaches of our competitors to demonstrate our value and purpose offering to the c-suite and he also shares his unique insights on breaking down siloes, and harnessing the power of positive engagement in the workplace.And as if that wasn’t enough (!) how to move away from just metrics to make your security function shine! If you want to change the way your organisation sees your security team, this is the episode for you! This is a two part episode (this is part one!) so don’t forget to check back in next week to hear the whole interview! Key Takeaways: Find your Superconnectors: Superconnectors are individuals who have lots of powerful connections and can help you expand your network quickly. By networking with superconnectors, you can find new opportunities and build purpose-driven teams in the cybersecurity function. Embrace the Power of Storytelling: Facts and figures are important, but stories resonate on a deeper level. Security teams can leverage storytelling to educate employees about cybersecurity threats, celebrate successes, and foster a sense of shared purpose. Break Down Silos: Challenge the stereotype of security as the "office police." Focus on collaboration and highlight the positive contributions your team makes in protecting the organization. Aim for a 3:1 ratio of positive interactions to negative ones to build trust and rapport. Learn from Your Competitors' Misfortunes: While celebrating wins is important, so is learning from failures. Use competitor breaches as a springboard for threat intelligence exercises, demonstrating the value your team brings in proactively preventing such attacks. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, storytelling, psychology, networking, silos, purpose SHOW NOTES Dr Burkus has an awe-inspiring career as an author. You can check out his books on [ Amazon] (https://www.amazon.co.uk/s?k=David+Burkus&i=audible&ref=dp_byline_sr_audible_1) Dunbar's number: Why we can only maintain 150 relationships. [BBC] (https://www.bbc.com/future/article/20191001-dunbars-number-why-we-can-only-maintain-150-relationships) Wham, Bam, That’s a Scam Series by [ Atomic Shrimps] (https://www.youtube.com/playlist?list=PLk5KvJPikK01BBq2jam_nmEEGx5kWMAbC) Freakonomics: A Rogue Economist Explores the Hidden Side of Everything [by Steven D. Levitt and Stephen J. Dubner] (https://www.amazon.co.uk/Freakonomics-Economist-Explores-Hidden-Everything/dp/0141019018/ref=asc_df_0141019018/?tag=googshopuk-21&linkCode=df0&hvadid=310979557093&hvpos=&hvnetw=g&hvrand=8771721038439325498&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9046327&hvtargid=pla-416687833149&psc=1&mcid=51f61638a1ff3fa7a47929b2ab62f11a&th=1&psc=1) MGM Ransomware Attack. [A write up by Bleeping Computer] (https://www.bleepingcomputer.com/news/security/mgm-resorts-ransomware-attack-led-to-100-million-loss-data-theft/) Nominate us in the European Cybersecurity Blogger Awards (we’re going for ‘Best Newcomer’ [Google Form Here (it’s safe, promise)] (https://docs.google.com/forms/d/e/1FAIpQLSc-qrL_CcUGtAnl6jZ3fbugkAOP4UhlwYvZcO0iBWupzHN5fQ/viewform) ABOUT DR DAVID BURKUS One of the world’s leading business thinkers, Dr. David Burkus’ forward-thinking ideas and bestselling books are helping leaders build their best team ever. LINKS FOR DR DAVID BURKUS Dr Burkus’ [Linkedin] (https://www.linkedin.com/in/davidburkus/) Dr Burkus’ [Website] (https://davidburkus.com/) Dr Burkus’ [TikTok] (https://www.tiktok.com/@davidburkus) (No dancing unfortunately) ... Read more

10 Apr 2024

28 MINS

28:50

10 Apr 2024


#26

EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP B...

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Jenn Calland, a seasoned Data Analyst, Analytics Engineer, former Platform Engineer and Full Stack Developer with expertise spanning Google Cloud, Looker, BigQuery, and many other technologies. In this episode, Data, Data Everywhere, But How Do We Make It Safe to Share? We are going explore the relationship between data, cybersecurity and our personal and organisational desire for convenience which can sometimes lead to insecure and risky behaviour. Jenn warns data analysts about working under the assumption that by the time they get their hands on the data, that it’s all ‘safe and secure.’ She cautions the data team that they shouldn’t think they don’t need to be ‘secure’ because it has been taken care of either by the cloud providers, compliance or the security team themselves - but in fact, we all need to be accountable in our data/security journey. We also discussed the challenges around anonymising data and the handling of medical data, how AI is changing things and what security teams can do to make sure we collaborate with the data team in a way that works for all parties involved. Key Takeaways: Data Security is a Journey, Not a Destination: Just like data travels through a lifecycle, so too should your security measures before any data hits the databases. In Cloud we Trust?: Can we ever be certain our data is secure in the cloud? It’s crucial to scrutinize who is looking at the data and how it got there. Data Security is a Team Sport: From GDPR compliance to the psychological impact of data breaches, understand the human side of data security and why it matters to your business through communication and collaboration. Security vs Convenience: The trade-off of security for convenience is a real risk to data handling. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, data, cloud security, GDPR, AI, data privacy SHOW NOTES [Darknet Diaries] (https://darknetdiaries.com/episode/2/) (a fantastic cybersecurity podcast) did a brilliant episode on the VTech Hack Learn more about Sir Tim Berners-Lee’s data project, [Inrupt] (https://www.inrupt.com/) ABOUT JENN CALLAND Jenn Calland is a seasoned Data Analyst, Analytics Engineer, former Platform Engineer and Full Stack Developer with expertise spanning Google Cloud, Looker, BigQuery, and many other technologies. Not only recognized for her technical acumen, Jenn is a fervent advocate for Diversity & Inclusion in tech. Her leadership and mentorship have made significant strides in promoting supportive work environments especially for Women in Tech, emphasizing the balance between career and personal responsibilities. LINKS FOR JENN CALLAND Jenn’s [L] (https://www.linkedin.com/in/rebeccamckeowncpsychol/) [inkedIn] (https://www.linkedin.com/in/jenn-c-2b3bb116/) Jenn’s [X (aka Twitter)] (https://x.com/jennlyle?s=20) account ... Read more

03 Apr 2024

35 MINS

35:42

03 Apr 2024


#25

EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training

Last episode we ended by talking with Bec about how cybercriminals leverage the fight-or-flight response and get you to do things you wouldn’t normally do, like share bank details, through amygdala hijacking. Bec concluded the episode by giving us some great advice on how we can retrain ourselves NOT to be so reactive and hopefully, stop ourselves from doing something rash. In this episode, Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training, we’re going to build upon what Bec discussed last week, a cyber psychology 101 if you will, and see how we practically apply key psychological concepts like cognitive agility, convergent and divergent thinking and meta-cognitive skills to things like tabletop exercises and security awareness training. Key Takeaways: Embrace Cognitive Agility: The world is too complex for a one-size-fits-all approach. Learn when to adapt and think critically in the face of unexpected situations. Awareness does not equal change in behaviour: One size doesn't fit all, and quantitative is usually valued over qualitative, which needs to change. Leverage Divergent and Convergent Thinking: Don't just train for specific scenarios. Develop the flexibility to both explore diverse solutions and converge on the best course of action when the time comes. Build Diverse Teams: Groupthink can be your worst enemy in a crisis. Foster diverse perspectives within your team to avoid this critical blindspot. Make Reflective Learning a Priority: Learn from every experience, good or bad. Debrief after incidents and ask: What went well? What didn't? How can we improve? Focus on Impact Skills, Not Just Technical Knowledge: Decision-making, communication, and collaboration are the foundational skills needed to navigate complex cyber threats. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, training, incident response, crisis management, soft skills, impact skills, cognitive agility, reflective learning, diverse teams, behavioural change SHOW NOTES Full show notes can be found here: https://www.compromisingpositions.co.uk/podcast/episode-23-awareness-does-not-equal-behavioural-change-rethinking-cybersecurity-training ABOUT BEC MCKEOWN Bec McKeown CPsychol is the Founder and Director of [Mind Science] (https://mindscienceltd.co.uk/) , an independent organisation that works with cyber security professionals. She helps businesses to advance the human aspect of system resilience, so a collaborative culture of innovative thinking and an agile threat response becomes the norm. As a Chartered Psychologist with extensive experience of carrying out applied research for organisations including the UK Ministry of Defence, Bec has gained a unique perspective on the ways humans react in times of crisis. She works at both operational and strategic levels, with a focus on situational awareness, decision-making and problem-solving in complex environments. LINKS FOR BEC MCKEOWN Bec’s [LinkedIn] (https://www.linkedin.com/in/rebeccamckeowncpsychol/) [Mind Science LTD] (https://www.mindscienceltd.co.uk/) ... Read more

28 Mar 2024

34 MINS

34:44

28 Mar 2024


#24

EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent organisation that works with cybersecurity professionals In this episode, Hands Off My Amygdala! The Psychology Behind Cybersecurity, we are going to hear about Bec’s varied and interesting career in advising people in highly stressful situations to be reflective and not reactive, and how they cannot only learn from their actions but become masters of them. This episode is a smorgasbord of psychological concepts that will make you think twice about how you normally run your security awareness programme and but also your tabletop exercise too. And crucially, learn why people act the way they do during an actual cybersecurity incident. Key Takeaways: The curse of knowledge: Understanding what it's like to not understand cybersecurity from a technical perspective can be an advantage in helping you communicate better. By putting yourself in the shoes of the listener, you can convey complex ideas in a way that is easy to understand and relatable Zero trust: While zero trust may make sense from a technical standpoint, it can lead to frustration and workarounds when it hinders employees. Theory Y suggests that people given more agency and autonomy are likely to work well, if not harder, than when constantly surveilled. Just culture: Accepting that mistakes will be made and analysing the steps that lead to that mistake happening with a view of learning how to avoid it without blame can improve the learning culture. Most people don't come to work to be malicious, if a mistake happens it is due to other factors like stress or bad processes. Microlearning: Nobody wants to sit in training for three hours! Microlearning helps by breaking up information into bite-sized chunks that are easy to digest. It's also important to account for different learning styles and provide information in various formats. Amygdala hijacking: Cybercriminals leverage amygdala hijacking, which occurs when the amygdala activates the fight-or-flight response when there is no serious threat to a person's safety. It's essential to recognize the contextual cue that led you to act that way and develop strategies to deal with it before it happens. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, curse of knowledge, covid, zero trust, psychology, reciprocity, autonomy, security awareness, military, learning styles, gamification, leader boards, crisis, tabletop exercises, amygdala hijacking SHOW NOTES [Immersive Labs] (https://www.immersivelabs.com/press/test-your-cyber-mettle-for-free-immersive-labs-community-is-now-in-public-beta/) Bec’s Article in [Immersive Labs] (https://www.immersivelabs.com/media_coverage/building-workforce-resiliency-with-cyber-psychologist-bec-mckeown/) on Workforce Resiliency Christian Hunt’s episode - [Compromising Positions] (https://podcasts.apple.com/us/podcast/episode-2-christian-hunt-and-the-human-os/id1709533581?i=1000630245360) Article on Theory X and Theory Y - [Mind Tools] (https://www.mindtools.com/adi3nc1/theory-x-and-theory-y) Influence by [Robert Cialdini] (https://www.amazon.co.uk/Influence-New-Expanded-Psychology-Persuasion/dp/0063138794/ref=asc_df_0063138794/?tag=googshopuk-21&linkCode=df0&hvadid=500792593882&hvpos=&hvnetw=g&hvrand=16168833951429407559&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9046327&hvtargid=pla-1211825204069&psc=1&mcid=f937b4b20ec43649b8e5fa158bcafc1c&th=1&psc=1) Actionable Gamification - [ Yu-Kai Chou] (https://www.amazon.co.uk/Actionable-Gamification-Beyond-Points-Leaderboards/dp/1511744049/ref=asc_df_1511744049/?tag=googshopuk-21&linkCode=df0&hvadid=310081590442&hvpos=&hvnetw=g&hvrand=6031784153437235802&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9046327&hvtargid=pla-471899539915&psc=1&mcid=9f8604a6c12a3c3390be13c1f9a7422e&th=1&psc=1) ABOUT BEC MCKEOWN Bec McKeown CPsychol is the Founder and Director of [Mind Science] (https://mindscienceltd.co.uk/) , an independent organisation that works with cyber security professionals. She helps businesses to advance the human aspect of system resilience, so a collaborative culture of innovative thinking and an agile threat response becomes the norm. As a Chartered Psychologist with extensive experience of carrying out applied research for organisations including the UK Ministry of Defence, Bec has gained a unique perspective on the ways humans react in times of crisis. She works at both operational and strategic levels, with a focus on situational awareness, decision-making and problem-solving in complex environments. LINKS FOR BEC MCKEOWN Bec’s [LinkedIn] (https://www.linkedin.com/in/rebeccamckeowncpsychol/) [Mind Science LTD] (https://www.mindscienceltd.co.uk/) ... Read more

21 Mar 2024

33 MINS

33:06

21 Mar 2024


#23

EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Manageme...

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Sabrina Segal, an integrity, risk, and compliance advisor, with almost 20 years of experience in the public, private, and third-sectors. In this week’s episode, Bringing the Curtain Down on Risk Theatre and Applauding objective-centred Risk Management, Sabrina shares with us, a quite frankly amazing model to work from: The OCRM, Objective-centred Risk Management. This model a great antidote to what Sabrina describes as ‘risk theatre’ which is the performance of risk governance activities, without real substance or accountability but with the dangerous consequence of making an organisation still feel like they have ‘done something’ when really it’s not worth the paper, or Excel doc, it is written on.This approach is scalable, practical, and effective, and it can help you achieve your goals while managing your risks and opportunities. Key Takeaways: Shift the Focus: Ditch the risk register and start with your objectives. What are you trying to achieve? What could stop you? This simple change aligns risk with your mission and drives informed decision-making. Price Your Risks: Don't just identify risks, quantify them. Calculate the resource and software costs associated with each. This transparency reveals your true risk appetite and exposes gaps between rhetoric and reality. Go-No-Go Decisions: OCRM empowers you to make clear, objective decisions based on risk pricing. Is the potential upside worth the cost? This eliminates wasted time and resources on low-impact risks. Psychological safety: How to create an environment where employees feel empowered to speak up and challenge the status quo, even about risks. The "halo effect": How the good work of charities and non-profits can sometimes mask poor risk management practices. Utilising External Board Members: How to ensure they have the full picture and can effectively advise on cyber risks. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: cybersecurity, risk management, objective-centred, OCRM, risk appetite, RACI, psychological safety, halo effect, board members, third sector, technical challenges. SHOW NOTES Tim Leech’s [LinkedIn] (https://www.linkedin.com/in/tim-leech-01950013/) A Post Sabrina did on [Objective Mapping] (https://www.linkedin.com/posts/smsegal_ngos-riskmanagement-risk-activity-6906894632501022721-Fi1H/?utm_source=linkedin_share&utm_medium=member_desktop_web) The Halo-effect with Isabel de Bruin Cardoso - [Tolerable Risk Podcast] (https://podcasts.google.com/feed/aHR0cHM6Ly9iZWVuZXJzNzY3LnBvZG9tYXRpYy5jb20vcnNzMi54bWw/episode/aHR0cHM6Ly93d3cucG9kb21hdGljLmNvbS9wb2RjYXN0cy9iZWVuZXJzNzY3L2VwaXNvZGVzLzIwMjMtMDktMjVUMjNfMDBfMDAtMDdfMDA?sa=X&ved=0CAUQkfYCahcKEwjomMafmsSEAxUAAAAAHQAAAAAQAg) Governance, Strategy and Risk with Claris D’Cruz - [Tolerable Risk Podcast] (https://podcasts.google.com/feed/aHR0cHM6Ly9iZWVuZXJzNzY3LnBvZG9tYXRpYy5jb20vcnNzMi54bWw/episode/aHR0cHM6Ly93d3cucG9kb21hdGljLmNvbS9wb2RjYXN0cy9iZWVuZXJzNzY3L2VwaXNvZGVzLzIwMjMtMDgtMDdUMjJfMDBfMDAtMDdfMDA?sa=X&ved=0CAUQkfYCahcKEwjomMafmsSEAxUAAAAAHQAAAAAQAg) ABOUT SABRINA M. SEGAL Sabrina M. Segal is an integrity, risk, and compliance advisor,international development and humanitarian assistance professional,licensed US attorney, and Certified Fraud Examiner with almost 20 years of experience in the public, private, and third-sectors. Sabrina's focus is risk in the third-sector as the impact of risk management, when done poorly, can be devastating to both third-sector organizations and the beneficiaries they serve. Sabrina is an active writer on LinkedIn and hosts the Tolerable Risk podcast. LINKS FOR SABRINA M. SEGAL Sabrina’s [ LinkedIn] (https://www.linkedin.com/in/smsegal/) Sabrina’s Podcast, [Tolerable Risk] (https://podcasts.google.com/feed/aHR0cHM6Ly9iZWVuZXJzNzY3LnBvZG9tYXRpYy5jb20vcnNzMi54bWw?sa=X&ved=0CAMQ4aUDahcKEwiYgL-P36SAAxUAAAAAHQAAAAAQNA) ... Read more

14 Mar 2024

30 MINS

30:34

14 Mar 2024


#22

EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by Sabrina Segal, an integrity, risk, and compliance advisor, with almost 20 years of experience in the public, private, and third-sectors. In this episode, Not New, but Novel - Tackling Risk in the Third Sector, We take a look at the challenges facing the third sector when it comes to cybersecurity and technology risks. The third sector, which includes charities and non-profits, is often overlooked or underestimated when it comes to cybersecurity and risk management. But this sector faces unique challenges and opportunities that require a novel and holistic approach to risk. Sabrina has a really refreshing take on risk and we will hear how she enables her clients to get to grips with what she calls ‘tolerable risk’ and why we can’t avoid risks, but we can reframe risks to not only identify threats but also opportunities. While at the same time, making sure everyone cares about risk, not just people with ‘risk manager’ in their title! Key Takeaways: Forget Risk Appetite and Risk Matrices - Embrace ‘risk awareness’ tailored to your mission and your organisation’s objectives Identify Your ‘Tolerable Risk’ - Risk can’t be avoided but we can identify and work within our ‘risk tolerance’ for better informed decisions Risk is a Two-Sided Coin - It’s not just about threats but opportunities too, and it’s much easier for people to get excited about opportunities than threats! Don’t Greenwash Those “Charity Days” - Forget painting the fence, litter picking or sorting cans, instead donate your cybersecurity expertise for maximum impact Risk Is Everyone’s Job - Ditch the ‘risk manager’ title and empower everyone to be a risk champion! Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Keywords: third sector, risk management, cybersecurity, charities, non-profits, risk awareness, tolerable risk, cyber threats, data privacy, ethical considerations Jeff Watkins and Lianne Potter delivering their new talk on AI and Cybersecurity for The Future of Cybersecurity Conference [VIDEO] in Manchester 2024 - [WEARABLE, SHAREABLE… UNBEARABLE? THE IOT AND AI TECH NOBODY ASKED FOR BUT CYBERCRIMINALS LOVE!] (https://www.youtube.com/watch?v=gTsJ8_VDZLs) Lianne Potter appearing on legendary Cybersecurity podcast Smashing Security, [358: Hong Kong hijinks, pig butchers, and poor ransomware gangs] (https://podcasts.apple.com/gb/podcast/hong-kong-hijinks-pig-butchers-and-poor-ransomware-gangs/id1195001633?i=1000644510605) An Article on the Cyber Risks Associated with the United Nations (UN) Sharing Biometric Refugee Data, [The Conversation] (https://theconversation.com/registering-refugees-using-personal-information-has-become-the-norm-but-cybersecurity-breaches-pose-risks-to-people-giving-sensitive-biometric-data-208166) ABOUT SABRINA M. SEGAL Sabrina M. Segal is an integrity, risk, and compliance advisor,international development and humanitarian assistance professional,licensed US attorney, and Certified Fraud Examiner with almost 20 years of experience in the public, private, and third-sectors. Sabrina's focus is risk in the third-sector as the impact of risk management, when done poorly, can be devastating to both third-sector organizations and the beneficiaries they serve. Sabrina is an active writer on LinkedIn and hosts the Tolerable Risk podcast. LINKS FOR SABRINA M. SEGAL Sabrina’s [ LinkedIn] (https://www.linkedin.com/in/smsegal/) Sabrina’s Podcast, [Tolerable Risk] (https://podcasts.google.com/feed/aHR0cHM6Ly9iZWVuZXJzNzY3LnBvZG9tYXRpYy5jb20vcnNzMi54bWw?sa=X&ved=0CAMQ4aUDahcKEwiYgL-P36SAAxUAAAAAHQAAAAAQNA) ... Read more

07 Mar 2024

31 MINS

31:08

07 Mar 2024


#21

EPISODE 19: Fun With Purpose: A Scrum Guide!

Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we are joined by Amy Kouppas, a Scrum Master, D&I lead, and founder of a Women’s Health & Wellbeing group at Sky. We are talking about all things agile and scrum! Most organisations have some form of agile methodologies, and the likelihood is, yours does too but what is it? What is Kanban? What is Scrum? What does a Scrum master do and why are they always sprinting? Amy helps us answer these questions and more in this episode: Fun with Purpose - A Scrum Guide! In this Episode we cover: Scrum Master: Coach, Not Boss: Ditch the project manager stereotype. A scrum master is a facilitator, coach, and mentor, guiding the team towards self-organisation and autonomy. Their ultimate goal? To make themselves obsolete by fostering a team that thrives independently. Empowerment & Creativity: Scrum unleashes the full potential of your team. They become accountable, empowered, and free to be creative within the sprint framework. This fosters a culture of continuous improvement where everyone contributes to success. Documentation - Enough is Enough: The agile manifesto doesn't advocate for zero documentation. It emphasises "just enough" documentation. Focus on clear, concise information that supports transparency and efficient collaboration. Retrospectives with a Twist: Retrospectives are the beating heart of scrum. Make them engaging and fun with themes, games, and even time capsules. This playful approach fosters honest reflection and continuous improvement. Links to everything we discussed in this episode can be found in the show notes and if you liked the show, please do leave us a review. Follow us on all good podcasting platforms and via our YouTube channel, and don't forget to share on LinkedIn and in your teams. It really helps us spread the word and get high-quality guests, on future episodes. We hope you enjoyed this episode - See you next time, keep secure, and don’t forget to ask yourself, ‘Am I the compromising position here?’ Show Notes [The Agile Manifesto] (https://agilemanifesto.org/) Jeff’s quote source for ‘If You’re Not Keeping Score, You’re Just Practicing’ is attributed to Chris McChesney A [Video] (https://youtu.be/UhvFLgd3IzA?si=cRr-rMhWZo54wRpC) of Lianne and Jeff’s talk on Ab(user) Stories and Ab(use) cases The stat 1 cybersecurity professional per 100 developers can be found in Toby Irvine’s article [The Ratio] (https://www.linkedin.com/pulse/ratio-toby-irvine/) About AMY KOUPPAS Amy Kouppas is a Scrum Master and D&I Lead for Digital technology at Sky, with a passion for squad wellbeing. She is also a Cribologist and Founder of the Leeds Site Women's Health and Wellbeing Group. Amy's personal brand is "fun with purpose," and she aspires to be a mentor and coach to others and champion her women's wellbeing group and festival one day. In addition, she dreams of owning an animal shelter. LINKS FOR AMY KOUpPAS [Amy’s LinkedIn] (https://www.linkedin.com/in/amy-kouppas-8191a2118/) Keywords: cybersecurity, scrum, agile, team management, empowerment, continuous improvement, retrospectives, collaboration, documentation ... Read more

29 Feb 2024

38 MINS

38:53

29 Feb 2024