Podcasts

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Jacquelyn Schneider, Director of the Hoover Wargaming and Crisis Initiative, and Davis Hake, Co-Founder and Vice President of Policy at Resilience, discuss how private and public sectors influence and implement emerging cyber-security policies.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #8: Exploring Public Cyber Policy and Incentives for the Private Sector

Policies inform security. Indeed, emerging policies could also threaten security if they are not well thought out by “the policy people.” In this session we learn the who and what of the policy people. How do they get involved with policy work that in turn affects our work, and how can we as security leaders start incorporating emerging policy concerns in our operational work and strategies.

On the go? Listen to our podcast on your favorite platforms.

You might also like

The vendors you’re probably missing

The vendors you’re probably missing

While the seven data streams from our previous post will capture the majority of your vendor relationships, they’re primarily designed to find digital services and traditional procurement relationships. Today, we’re exploring the vendor categories that fall through the cracks of most discovery programs, as well as why they often represent some of your highest-risk relationships. […]

How to prepare your organization for a post-quantum world

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

When will quantum decryption become practical?

When will quantum decryption become practical?

As part of Cybersecurity Awareness Month, we’re publishing this three-part series that distills a highly technical topic into strategic insights for leaders. Part 1 explained why quantum decryption poses a threat to current encryption systems. Part 2 lays out credible timelines for when the disruption may arrive. Part 3 will offer practical guidance on how […]

Cyber Resilience starts here.

Request Demo