Podcasts

Episode #10: Cyber Resilience By Design

Travis Wong, Resilience’s VP of Customer Engagement, and Tas Jalali, Head of Cybersecurity at AC Transit, discuss cyber insurance and business objectives.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Podcast #10: Cyber Resilience By Design

Much of operational security (SecOps) involves investing in, deploying, and managing controls and their aftermath. When those efforts tie to a bonafide security strategy we call them tactics. Apart from a strategy, SecOps efforts are at best compliance processes or at worst security theater. What makes a security strategy meaningful? A business objective. The objective we are proposing for the industry is: Making The Business Resilient To Material Losses. That objective drives goals, strategy and tactics. It’s how a companies executives, board, and security practitioners can create a business that is “Cyber Resilient By Design.”

On the go? Listen to our podcast on your favorite platforms.

You might also like

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

New insights on the evolving threat landscape, from our 2025 Midyear Cyber Risk Report 

The cybersecurity world is experiencing an unexpected paradox in 2025. While cyber insurance claims in the Resilience portfolio dropped by 53% in the first half of the year—suggesting that organizations are getting better at preventing attacks—the financial damage from successful incidents has actually increased. Our latest 2025 Midyear Cyber Risk Report reveals that when cybercriminals […]

The seven places you should be looking when building your vendor list

The seven places you should be looking when building your vendor list

In our first post, we established why comprehensive vendor discovery matters and how most organizations approach it incorrectly. Today, we’re diving into the practical mechanics: the seven data streams that can reveal vendor relationships hiding in your existing systems. The key insight is to start with data you already have rather than surveys or questionnaires. […]

Cyber Resilience starts here.

Request Demo