BSW #295 – ChatGPT: Cybersecurity’s Savior or Devil?
Full Audio
View Show IndexSegments
1. ChatGPT: Cybersecurity’s Savior or Devil? – BSW #295
Lots of press lately regarding ChatGPT and its impact on cybesecurity. Some say it will help us fight adversaries, while others say it will only make adversaries more sophisticated. Lot's of FUD on both sides of the discussion. BSW hosts debate the pros and cons of ChatGPT (and other AI) to truly understand its impact and what we, as security leaders, need to know.
Announcements
Don't forget to check out our library of on-demand webcasts & technical trainings at securityweekly.com/ondemand.
Hosts
2. Leadership Pressures, Security Leaders Leaving Security Roles, How to Empower Teams – BSW #295
In the leadership and communications section, Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape, Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025, How to Empower Teams, and more!
Announcements
Security Weekly listeners save $100 on their RSA Conference 2023 Full Conference Pass! RSA Conference will take place April 24-27 in San Francisco and on demand. To register using our discount code, please visit https://securityweekly.com/rsac2023 and use the code 53UCYBER! We hope to see you there!
Hosts
- 1. Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
The key takeaways from this year’s global risk research are:
- This year’s survey indicates the highest level of risk we have observed in all 11 years we have conducted this study
- The economy is top of mind
- People and culture are once again at the top of the agenda
- The 10-year outlook presages disruptive times ahead
- The largest risk increases foretell a story of a changing world
- Companies having to hunker down over the near-term should also keep an eye on preparing for the future
- 2. Why CISOs change jobs
Being a CISO is a hard job. You must constantly balance business, technology, and regulatory requirements against things like employee and adversary behavior. You can be a superstar, build a world-class cybersecurity program, and follow best practices, providing exceptional protection for the organization. Despite this excellence, a single employee can click on a malicious web link, share a password, or misconfigure an asset, leading directly to a successful cyberattack. When this happens, it's your fault.
- 3. Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025
By 2025, nearly half of cybersecurity leaders will change jobs, 25% for different roles entirely due to multiple work-related stressors, according to Gartner, Inc.
- 4. Measuring cybersecurity: The what, why, and how
Most stakeholders usually have questions around risk, compliance, or assurance. Unfortunately, such questions usually cannot be answered using a single data point. Fortunately, there are a wide range of things that security practitioners can measure in order to address stakeholder questions and concerns. These can be broadly categorized under:
- Controls: Measures that are put in place to counter threats and reduce information risk
- Assets: Any item that is of value or is owned by the organization
- Vulnerabilities: Weaknesses in the system that can be exploited by a threat
- Threat events: Actions initiated by a threat capable of causing harm to assets
- Security incidents: Events that successfully impacted the business in terms of disruption, downtime, system shutdown, data breach, phishing, ransomware etc.
- 5. Leadership Skills — How to Empower Teams
Empowering groups may be a crucial facet of effective leadership and might greatly contribute to the success of a corporation. Once team members feel authorized and area unit given the autonomy and resources to require possession of their work and responsibilities, they’re additionally intended, productive, and engaged. We will cowl the subsequent main points:
- Defining “ownership” within the context of labor and discussing the advantages of team members WHO take possession.
- The role of leadership in empowering groups and specific actions that leaders will fancy foster a culture of possession.
- The role of team members in taking possession of their work and responsibilities and tips for doing therefore.
- The benefits of empowering groups and therefore the impact it will wear the organization as a full
- 6. 7 Elements of a Sincere Apology (And How to Offer One)
According to a British survey, 84% of respondents consider the following a “proper apology.”
“I sincerely apologize.”
In that same survey, only 51% considered the phrase “I can only apologize” to be a proper apology—a huge difference of 33%.
Both have the words “I” and “apologize,” so why are these two phrases perceived differently?