Powered by RND
PodcastsTechnologieAuthenticate This! The Cybersecurity Leadership Podcast

Authenticate This! The Cybersecurity Leadership Podcast

iC Consult
Authenticate This! The Cybersecurity Leadership Podcast
Nieuwste aflevering

Beschikbare afleveringen

5 van 6
  • The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce
    Hosts Aaron Lentz and Tim York talk to Scott Ostrander, Vice President and Chief Information Security Officer of SPS Commerce and Founding Member of MinnesotaCISO.With the experience that comes with two decades at Medtronic and now leading security at a SaaS company, Scott shares how he builds trust, manages risk and leads with empathy in fast-paced environments. He breaks down the limitations of access reviews, how AI is reshaping identity verification and why listening matters more than immediate change. From deepfake threats to third-party visibility and vendor partnerships, Scott offers pragmatic insights and people-centered leadership advice for today’s CISOs.Key Takeaways:(05:39) Deleting your biometric data reduces exposure if companies are sold or breached.(11:09) Culture and identity shape how security decisions are made in business.(16:30) Effective change depends on alignment and trust with the existing team.(26:32) AI deepfakes now challenge the reliability of identity verification.(28:22) Most organizations lack a clear view of their third-party risk landscape.(38:45) The real risk in access reviews is denying needed access.(43:46) Determining who has access to what remains difficult across SaaS ecosystems.(48:31) Trusted vendors offer insight and partnership, not just a sales pitch.(52:32) Trust builds when vendors stop selling and start listening.Resources Mentioned:Scott Ostranderhttps://www.linkedin.com/in/scott-ostrander-46846a8/SPS Commerce | LinkedInhttps://www.linkedin.com/company/sps-commerce/SPS Commerce | Websitehttps://www.spscommerce.com/MinnesotaCISO | LinkedInhttps://www.linkedin.com/company/minnesotaciso/MinnesotaCISO | Websitehttps://minnesotaciso.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
    --------  
    54:38
  • Protecting People, Not Just Data with Rich Rhodes of Choice Bank
    On this episode, hosts Aaron Linz and Tim York talk to Rich Rhodes, Chief Information Security Officer of Choice Bank. Rich shares how his people-first philosophy shapes the way he leads security programs, especially during high-stress moments like bank mergers, regulatory pressure and pandemic-era team isolation. Drawing from years in financial services and community work, Rich explains why fundamentals matter, how humor builds trust and why he believes security is 90% people.Key Takeaways:(04:30) Volunteer work revealed the real-world consequences of identity loss.(07:56) Cybersecurity leadership must center the human experience, not just controls.(09:33) Managing conflict in security teams requires empathy and intentional restraint.(16:09) Employee well-being and development are critical responsibilities of CISOs.(18:25) Regular communication and transparency help unify distributed teams.(27:04) Large-scale IAM implementations demand urgency and cross-functional alignment.(30:55) Creative morale boosters can protect team mental health during crises.Resources Mentioned:Rich Rhodeshttps://www.linkedin.com/in/rich-rhodes-cissp-pcip-1b35755/Choice Bank | LinkedInhttps://www.linkedin.com/company/choicebank/Choice Bank | Websitehttps://bankwithchoice.com/Meals on Wheels | Websitehttps://meals-on-wheels.com/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit https://ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
    --------  
    34:52
  • Why Calm Leadership Wins During Cyber Crises with Andrew Wilder of Vetcor
    Hosts Aaron Lentz and Tim York talk to Andrew Wilder, Chief Security Officer of Vetcor. With three CISO roles under his belt — including at Nestlé — Andrew shares how he evolved from a command-and-control leader to a collaborative influencer of change. He discusses the importance of identity hygiene, working with the C-suite and why taking your own notes is a secret weapon for long-term leadership. From mentoring through CyberUp to partnering with startups, Andrew offers real stories and practical advice for modern cybersecurity leaders.Key Takeaways:(04:41) Dormant accounts and poor identity hygiene are common cybersecurity challenges.(08:46) Understand the level of change before accepting a leadership role.(11:52) Mature CISOs accept business risk decisions and move forward.(16:29) Staying calm in a cyber crisis helps lead a team with clarity.(21:54) Agentic AI offers efficiency but brings big change challenges.(27:27) Automate last — after you question, delete, simplify and accelerate.(32:13) Overpermissioned accounts are prime for data exfiltration.(38:02) Strong relationships beat cold outreach every time.(40:26) Cyber insurance now drives many security tool decisions.(43:13) Partnerships give CISOs tools, team growth and ecosystem security.(46:34) Trusting AI blindly is a dangerous mistake.Resources Mentioned:Aaron Lentzhttps://www.linkedin.com/in/aaron-lentz/Tim Yorkhttps://www.linkedin.com/in/tim-york-b80b23a/Andrew Wilderhttps://www.linkedin.com/in/apwilder/Vetcorhttps://www.linkedin.com/company/vetcor/CyberUphttps://wecyberup.org/InfraGard https://www.infragard.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
    --------  
    51:30
  • Transforming Security Through Storytelling with Julie Myerholtz of Brunswick Corporation
    On this episode, Julie Myerholtz, Chief Information Security Officer of Brunswick Corporation, shares her approach to identity security, leadership and security culture. She explains why people, not tools, are the first line of defense, how gamification improves security awareness and why identity security must evolve to address non-human identities and just-in-time access.Key Takeaways:(09:10) A strong mentor can shape an effective approach to identity security.(12:17) A formal IT degree isn’t required for a successful cybersecurity career.(13:52) Cybersecurity plays a direct role in keeping business operations running.(17:41) Executives need impact, not technical details, in security reporting.(20:27) Security’s success is invisible — failure is when people take notice.(23:40) Security must align with business risk, not just technical threats.(29:08) Identity security is the foundation of digital defense.(32:50) Legacy identity debt creates major security challenges.(36:17) Non-human identities must be managed like human accounts.(39:42) Security incentives drive faster user adoption of new systems.(43:00) Daytime deployments keep support teams available for issues.Resources Mentioned:Julie Myerholtz -https://www.linkedin.com/in/jmyerholtz/Brunswick Corporation -https://www.linkedin.com/company/brunswick-corporation/CyberArk -https://www.cyberark.com/Retail and Hospitality ISAC -https://rhisac.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
    --------  
    47:36
  • The Hard Truth About Security Leadership with Corey Kaemming of Valvoline Inc.
    On this episode, Corey Kaemming, Sr. Director of Information Security at Valvoline Inc., joins the conversation to share his leadership philosophy, the evolution of identity security and the real challenges security professionals face today. From the overuse of buzzwords to vendor consolidation, Corey provides a candid look at what works — and what doesn’t — in building a strong security program.Key Takeaways:(06:36) Corey’s leadership philosophy is rooted in listening first and building trust.(10:58) Early mentorship conveys the importance of preparation and empathy.(13:07) Identity security touches every part of the business and drives operations.(18:49) Breaking into identity security requires hands-on experience and adaptability.(23:59) Security leaders must communicate in ways that resonate with executives.(27:47) Running security for a company's divestiture requires trust and precision.(30:44) People resist security changes, but tying them to business outcomes helps.(37:38) Too many identity tools create complexity and strain resources.(42:29) Security isn’t a one-time fix — it demands constant attention and updates.(53:56) Zero trust is widely used but often misunderstood in execution.Resources Mentioned:Corey Kaemming -https://www.linkedin.com/in/corey-kaemming/Valvoline Inc. -https://www.linkedin.com/company/valvoline/Evanta -https://www.evanta.com/Signal -https://signal.org/Retail & Hospitality ISAC (RH-ISAC) -https://rhisac.org/Thank you for listening to “Authenticate This!: The Cybersecurity Leadership Podcast.” Be sure to leave us a review and subscribe so you don’t miss an episode. For more information, visit ic-consult.com.#Cybersecurity #IdentityManagement #InformationSecurity #IAM #IdentityAccessManagement
    --------  
    56:36

Meer Technologie podcasts

Over Authenticate This! The Cybersecurity Leadership Podcast

“Authenticate This!: The Cybersecurity Leadership Podcast” uncovers what shapes the digital landscape, exploring not only the technical side of cybersecurity, but how identity shapes security strategies, influences organizational dynamics and drives leadership decisions in this high-stakes field. We discuss real-world challenges and actionable strategies to empower listeners to become stronger leaders and more effective defenders against the ever-evolving landscape of cyber threats. “Authenticate This!” brings you insights and inspiration to stay one step ahead in safeguarding our digital future.
Podcast website

Luister naar Authenticate This! The Cybersecurity Leadership Podcast, Tech Update | BNR en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies
Social
v7.19.0 | © 2007-2025 radio.de GmbH
Generated: 7/2/2025 - 5:48:41 AM