Uncovering Hidden Risks: Ep 11 - Cybersecurity 101: What Are the Three Pillars of a Robust Strategy

Thomas Fox - Compliance Evangelist
Contact
Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization’s success. In this episode, host Erica Toelle talks to Nashid Shaker, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital See more +
Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization’s success. In this episode, host Erica Toelle talks to Nashid Shaker, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth, leveraging a multidisciplinary background in strategic planning and cybersecurity.

In This Episode, You Will Learn:

1. When it’s time to re-evaluate your cybersecurity strategy

2. What cybersecurity leaders should think about today to prepare for a future that will use AI.

3. Predictions for cybersecurity in the next 2–4 years.

Some Questions We Ask:

1. What is the top risk that organizations tend to overlook?

2. What are some tips for how cybersecurity leaders should engage with the C-suite?

3. Can cybersecurity contribute to an organization’s bottom line or mission?

Resources:

View Nash Shaker on LinkedIn | https://www.linkedin.com/in/nashid-shaker-mba-38711258/

View Antonio Maio on LinkedIn | https://www.linkedin.com/in/antonio-maio-b082191/

View Erica Toelle on LinkedIn | https://www.linkedin.com/in/ericatoelle/

Related Microsoft Podcasts:

Listen to: Afternoon Cyber Tea with Ann Johnson | https://thecyberwire.com/podcasts/afternoon-cyber-tea

Listen to: Security Unlocked | https://thecyberwire.com/podcasts/security-unlocked

Listen to: Security Unlocked: CISO Series with Bret Arsenault | https://thecyberwire.com/podcasts/security-unlocked-ciso-series

Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Connect with the Compliance Podcast Network at:

LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/

Facebook: https://www.facebook.com/compliancepodcastnetwork/

YouTube: https://www.youtube.com/@CompliancePodcastNetwork

Twitter: https://twitter.com/tfoxlaw

Instagram: https://www.instagram.com/voiceofcompliance/

Website: https://compliancepodcastnetwork.net/ See less -

Embed
Copy

Other MultiMedia by Thomas Fox - Compliance Evangelist

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Thomas Fox - Compliance Evangelist | Attorney Advertising

Written by:

Thomas Fox - Compliance Evangelist
Contact
more
less

Thomas Fox - Compliance Evangelist on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide