Podcasts

Episode #10: Cyber Resilience By Design

Travis Wong, Resilience’s VP of Customer Engagement, and Tas Jalali, Head of Cybersecurity at AC Transit, discuss cyber insurance and business objectives.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Podcast #10: Cyber Resilience By Design

Much of operational security (SecOps) involves investing in, deploying, and managing controls and their aftermath. When those efforts tie to a bonafide security strategy we call them tactics. Apart from a strategy, SecOps efforts are at best compliance processes or at worst security theater. What makes a security strategy meaningful? A business objective. The objective we are proposing for the industry is: Making The Business Resilient To Material Losses. That objective drives goals, strategy and tactics. It’s how a companies executives, board, and security practitioners can create a business that is “Cyber Resilient By Design.”

On the go? Listen to our podcast on your favorite platforms.

You might also like

Risk-based vendor tiering that actually works

Risk-based vendor tiering that actually works

Welcome back to the Resilience third-party management series. In our first three posts, we covered why third-party vendor discovery matters, how to locate vendors across your environment, and which high-risk vendor categories most organizations overlook. Now we turn to the next step: prioritizing those vendors based on actual cyber risk—not contract spend. Most vendor management […]

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

How to prepare your organization for a post-quantum world

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

Cyber Resilience starts here.

Request Demo