Human Skills That Define Tomorrow’s CISO with Matthew Rosenquist of Cybersecurity Insights
Cybersecurity’s human dimension takes center stage as we welcome Matthew Rosenquist, CISO, Cybersecurity Strategist and Advisor at Cybersecurity Insights. Hosts Aaron Lentz and Tim York guide the discussion, which explores the evolving role of CISOs, the realities of consolidation and AI’s increasing impact, ranging from bridging talent gaps to changing threat profiles.Key Takeaways:00:00 Introduction.01:43 The market’s consolidation cycle disrupts legacy expectations.06:28 CISOs must be influential at both board and business levels.10:55 Technical and business leadership gaps are systemic.14:54 Security features convert freemium users to revenue.18:21 Basic protections boost small businesses’ security posture.22:52 Revenue drivers define an effective security strategy.27:01 Unrealistic entry-level job requirements stall progress.30:59 Upskilling launches junior talent into future leadership.35:19 AI elevates both security analysts and adversaries.43:34 Behavioral awareness defends better than firewalls alone.Resources Mentioned:Matthew Rosenquisthttps://www.linkedin.com/in/matthewrosenquistCybersecurity Insights | LinkedInhttps://www.linkedin.com/company/cybersecurityinsightsCybersecurity Insights | Websitehttps://www.cybersecurityinsights.us/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
--------
47:40
--------
47:40
Student Experience Meets Cybersecurity Strategy with Zach Lewis of University of Health Sciences and Pharmacy in St. Louis
On this episode, hosts Aaron Lentz and Tim York sit down with Zach Lewis, Chief Information Officer and Chief Information Security Officer of the University of Health Sciences and Pharmacy in St. Louis. Zach discusses leading his university through a ransomware attack, how he balances security with student experience in a nonprofit environment, and why open conversations about breaches are vital for the industry.Key Takeaways:00:00 Introduction.02:06 Zach's book chronicles the university's LockBit ransomware experience.06:54 Password managers fail when Active Directory authentication becomes unavailable.09:00 Companies now want cybersecurity leaders who understand breach environments.14:27 Campus card systems integrate everything from dining to Grubhub.20:24 AI coding tools represent emerging technological capabilities worth exploring.23:54 Universities should teach students proper AI tool integration techniques.28:45 Technical revolutions require flexible pivoting from established security plans.37:36 Small organizations benefit from outsourcing 24/7 SOC monitoring.42:48 Legacy applications must evolve, or organizations get left behind.Resources Mentioned:Aaron Lentzhttps://www.linkedin.com/in/aaron-lentz/Tim Yorkhttps://www.linkedin.com/in/tim-york-b80b23a/Zach Lewishttps://www.linkedin.com/in/zacharylewis1University of Health Sciences and Pharmacy in St. Louis | LinkedInhttps://www.linkedin.com/school/uhspUniversity of Health Sciences and Pharmacy in St. Louis | Websitehttps://www.uhsp.edu“Locked Up” by Zachary Lewishttps://www.amazon.com/Locked-Cybersecurity-Mitigation-Real-World-Ransomware/dp/1394357044Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
--------
47:02
--------
47:02
Challenging AI Threats and Strengthening Human Vigilance with Steve Cobb of SecurityScorecard
On this episode, Tim York and Aaron Lentz talk to Steve Cobb, CISO of SecurityScorecard and a founding member of the CarolinaCISO. Steve shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential. He also discusses mentoring the next generation of cyber talent, the importance of foundational skills and his leadership approach rooted in curiosity, communication and service.Key Takeaways:00:00 Introduction.06:48 Deepfakes are now impersonating public officials to influence real-world decisions.09:39 “Trust but verify” is essential in a world where video calls can be faked.12:54 Organizations are rushing into AI at the cost of security and thoughtfulness.16:27 Cultural assumptions about trust make US users especially vulnerable to deception.20:51 We’re wired to seek connection; shifting to suspicion at work is counterintuitive but necessary.23:36 Threat actors are focused on hacking people, not just tech.26:15 Competitive cyber events train youth in real-world collaboration and red/blue team skills.35:03 Strong cyber teams are grounded in foundational skills: networking, cloud and OS.39:51 Communication, both up and down the chain, is a critical skill for cyber leaders.40:30 Servant leadership — building trust and supporting the team — creates stronger, more resilient organizations.Resources Mentioned:Tim Yorkhttps://www.linkedin.com/in/tim-york-b80b23a/Aaron Lentzhttps://www.linkedin.com/in/aaron-lentz/Steve Cobbhttps://www.linkedin.com/in/wscobb/SecurityScorecard | LinkedInhttps://www.linkedin.com/company/security-scorecard/SecurityScorecard | Websitehttps://securityscorecard.com/CarolinaCISO | LinkedInhttps://www.linkedin.com/company/carolinaciso/CarolinaCISO | Websitehttps://www.carolinaciso.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
--------
44:15
--------
44:15
Creating Psychological Safety in Security Teams with Susanne Senoff of PROS
On this episode, hosts Tim York and Jackie Henrich talk to Susanne Senoff, CISO of PROS, about making security human, building trust through connection and leading with authenticity. Susanne shares lessons from her unconventional career path, her views on psychological safety and how she builds resilient, empowered teams in high-stakes environments.Key Takeaways:(03:56) Making security fun starts with creating psychological safety and room for humor — even in high-pressure environments.(11:29) Serving internal and external customers while driving meaningful security impact.(13:44) Missed connections in security often stem from a lack of listening and failure to understand business constraints.(15:58) Moving from individual contributor to leader means learning how to create impact through others.(20:39) When expectations are clear and support is real, people rise to the challenge.(24:41) Realizing the value of asking for help and knowing what energizes you.(34:22) Mentorship often comes through informal moments, not structured relationships.(40:14) Not all mentors give good advice. Leadership means filtering input and trusting your gut.(45:00) Engaging with “grumpy gooses” is a fast path to trust and alignment because of their honesty.Resources Mentioned:Susanne Senoffhttps://www.linkedin.com/in/susanne-elizer-senoff-575ba96/PROS | LinkedInhttps://www.linkedin.com/company/pros/PROS | Websitehttps://pros.com/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
--------
58:35
--------
58:35
The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce
Hosts Aaron Lentz and Tim York talk to Scott Ostrander, Vice President and Chief Information Security Officer of SPS Commerce and Founding Member of MinnesotaCISO.With the experience that comes with two decades at Medtronic and now leading security at a SaaS company, Scott shares how he builds trust, manages risk and leads with empathy in fast-paced environments. He breaks down the limitations of access reviews, how AI is reshaping identity verification and why listening matters more than immediate change. From deepfake threats to third-party visibility and vendor partnerships, Scott offers pragmatic insights and people-centered leadership advice for today’s CISOs.Key Takeaways:(05:39) Deleting your biometric data reduces exposure if companies are sold or breached.(11:09) Culture and identity shape how security decisions are made in business.(16:30) Effective change depends on alignment and trust with the existing team.(26:32) AI deepfakes now challenge the reliability of identity verification.(28:22) Most organizations lack a clear view of their third-party risk landscape.(38:45) The real risk in access reviews is denying needed access.(43:46) Determining who has access to what remains difficult across SaaS ecosystems.(48:31) Trusted vendors offer insight and partnership, not just a sales pitch.(52:32) Trust builds when vendors stop selling and start listening.Resources Mentioned:Scott Ostranderhttps://www.linkedin.com/in/scott-ostrander-46846a8/SPS Commerce | LinkedInhttps://www.linkedin.com/company/sps-commerce/SPS Commerce | Websitehttps://www.spscommerce.com/MinnesotaCISO | LinkedInhttps://www.linkedin.com/company/minnesotaciso/MinnesotaCISO | Websitehttps://minnesotaciso.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
Over Authenticate This! The Cybersecurity Leadership Podcast
“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats.
“Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.
Luister naar Authenticate This! The Cybersecurity Leadership Podcast, Darknet Diaries en vele andere podcasts van over de hele wereld met de radio.net-app