Security Masterminds

Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, & Culture, with special guest, Joanna Burkey

March 17, 2023 Security Masterminds Season 2 Episode 3
Security Masterminds
Unlock Maximum Cybersecurity: 3 Crucial Steps to Enhance Your Capabilities, Coverage, & Culture, with special guest, Joanna Burkey
Show Notes Chapter Markers

Check out our new LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/

Joanna Burkey's imparts her wisdom to help other professionals develop a successful cybersecurity program, emphasizing the importance of thought diversity and exposure to all aspects of the business. What other advice does she have to offer?

"We need to be overseeing and ultimately accountable for the right culture of governance to be happening in our companies."

Joanna Burkey is the CISO of HP, Inc. and has been in the cybersecurity field for over 25 years, working in a variety of roles from software development to CISO. She has seen the evolution of the field firsthand and provides valuable insights into the most pressing issues and trends across the industry.

In this episode, you will learn:

  • Exploring the essential cybersecurity capabilities to ensure effective coverage
  • Examining the culture and networking elements of the cybersecurity field
  • Investigating the role and responsibilities of the Chief Executive Officer in cybersecurity
  • Understanding the identity and trust issues surrounding cybersecurity

About Joanna Burkey

Show Notes 

Connect with us:

Website: securitymasterminds.buzzsprout.com

KnowBe4 Resources:

This show's sound is edited by ProPodcastSolutions -https://propodcastsolutions.com/
Show Notes created with Capsho - www.capsho.com

Introduction
Cybersecurity Origin Story
CISO Role and Culture Evolved Over the Years
Does a CISO Need A Technical or Business Background?
What Advice For Being a CISO
CISO Viewing Risk
Challenges in a Diverse Work Environment?
Different Cultures Impact Technology?
CyberSecurity Management Advice
Key Processes For Productivity
Three Key Trends in Cybersecurity?
Greatest Fail & Lesson Learned
Favorite Book
Conclusion