Monday Sep 16, 2024
#198 - Securing the Business Processes
G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.
7 critical business processes common to most organizations.
- Book
- Order
- Bill
- Pay
- Ship
- Close
- Communicate
Transcripts
https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h
Chapters
- 00:00 Introduction to Securing the Business
- 00:12 Begin Podcast
- 01:08 Understanding Critical Business Processes
- 02:23 Identifying and Prioritizing Business Functions
- 03:00 Real-World Example: Restaurant Booking System
- 04:57 Decision Making in Crisis Situations
- 10:38 Mapping Confidentiality, Integrity, and Availability
- 19:42 Conclusion and Final Thoughts
Comments (0)
To leave or reply to comments, please download free Podbean or
No Comments
To leave or reply to comments,
please download free Podbean App.