Podcasts

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Jacquelyn Schneider, Director of the Hoover Wargaming and Crisis Initiative, and Davis Hake, Co-Founder and Vice President of Policy at Resilience, discuss how private and public sectors influence and implement emerging cyber-security policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Policies inform security. Indeed, emerging policies could also threaten security if they are not well thought out by “the policy people.” In this session we learn the who and what of the policy people. How do they get involved with policy work that in turn affects our work, and how can we as security leaders start incorporating emerging policy concerns in our operational work and strategies.

On the go? Listen to our podcast on your favorite platforms.

You might also like

Resilience Names James C. Rivizzo Head of North American Distribution and Strategy

Resilience Names James C. Rivizzo Head of North American Distribution and Strategy

New York, NY, August 6, 2025 – Resilience, the leading cyber risk company, announced the appointment of James C. Riviezzo as Head of North American Distribution and Strategy. This key hire supports Resilience’s evolution in the cyber risk market as the company continues to pair top-rated cyber insurance and tech E&O policies with its award-winning […]

Your cyber insurance policy could be a target

Your cyber insurance policy could be a target

Organizations invest heavily in cyber insurance policies to shield their businesses from evolving threats, but many overlook a critical vulnerability: the security of the insurance policy documents themselves. While these policies are designed to protect you from cyber threats, they can become powerful weapons when they fall into the wrong hands. Over the past year, […]

A complete guide to domain spoofing

A complete guide to domain spoofing

Domain spoofing is a cyberattack technique most commonly used in phishing and fraud, where criminals impersonate a legitimate organization’s domain name to deceive users. Think of it as digital identity theft at scale: Attackers make fraudulent emails or websites appear as if they originate from your trusted company domain, tricking victims into revealing sensitive data, […]

Cyber Resilience starts here.

Request Demo