If we don’t understand the purpose of a privacy policy, why should we bother reading it? We’re claiming the cyber ignorance defense on the latest episode of CISO/Security Vendor Relationship Podcast.

This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Roger Hale (@haleroger), CISO in residence, YL Ventures.

Mike Johnson, co-host, CISO/Security Vendor Relationship Podcast, Roger Hale, CISO in residence, YL Ventures, David Spark, producer, CISO Series

Got feedback? Join the conversation on LinkedIn.

Thanks to this week’s podcast sponsor Zix

Zix simplifies administration and reporting with a single management interface. Configuring, deploying, and monitoring email security and unified archiving services has never been easier – or faster. ZixSuite combines a cloud-based email threat protection, email encryption, and unified business communications archiving, all backed by Zix’s gold standard 24/7/365 support.

On this week’s episode

How CISOs are digesting the latest security news

We’re blowing it with general cybersecurity education. According to a study by the Pew Internet Research Center, most Americans don’t understand or can’t identify basic cybersecurity concepts such as two-factor authentication, private browsing, or the purpose of a privacy policy. We talk a lot about the important of education and it appears we’re not doing a good job. What are some creative ways we can dramatically improve these numbers?

Mike Johnson, co-host, CISO/Security Vendor Relationship Podcast and Roger Hale, CISO in residence, YL Ventures

Hey, you’re a CISO, what’s your take on this?

Cai Thomas, Tessian, has an article on TechRadar on the dangers of sending corporate work via personal email accounts. He outlines the issues. As per the previous story, chances are very high people are completely unaware of the risk their placing the company in by forwarding corporate email to personal accounts. No amount of education is going to solve this problem. What are the systems that companies can and should setup to give people a better alternative than sending emails to personal accounts?

What’s Worse?!

How damaging can not having a seat on the board be?

Ask a CISO

Nick Sorensen, Whistic, asks, “What do you see the most proactive vendors doing to prepare for vendor security reviews from their customers?”

“Your bank account has been frozen.” That’s now an old chestnut in the scamming world, but it thrives through increasingly sophisticated spoofing activities that include a banks’ real phone number and real-looking pop-up websites for password refresh requests. Even IT experts can get caught by these things occasionally, as some have even confessed on this very podcast series.

This level of relentless innovation is worth keeping front of mind when considering the amounts of data that Internet of Things devices are creating but that organizations have no plan or space for. IBM, Forrester, and others have suggested that maybe 1 percent of data generated from IoT connectivity is being used, mostly for immediate learning or predictive activities.

As organizations formulate their Distributed/ Immutable/ Ephemeral strategies for future resilience and for choosing what data to store and protect, a key question should always be, “What’s happening to the rest of it?” Data always has value, somewhere, somehow.

Check out lots more cloud security tips sponsored by OpenVPN, provider of next-gen secure and scalable communication software. OpenVPN Access Server keeps your company’s data safe with end-to-end encryption, secure remote access, and extension for your centralized UTM.

First 90 days of a CISO

Today is Roger’s first official day as a CISO in residence at YL Ventures. What the heck does that mean, and how does that differ from being an operational CISO?