How to become a World Class CISO (Chief Information Security Officer) | Life of a CISO Episode 1

แชร์
ฝัง

ความคิดเห็น • 41

  • @Salty4eva
    @Salty4eva 2 ปีที่แล้ว +1

    Always good stuff @Eric! I’m taking a ton of notes.

  • @goatlens
    @goatlens ปีที่แล้ว

    Great video Dr. Cole. Just beginning my cybersecurity career. I have a lot of time to get skin in the game but I am gaining a lot of insight on what I should expect to accomplish this position I want for myself.

  • @WatsonInfosec
    @WatsonInfosec 3 ปีที่แล้ว +5

    This was hard core and on point, I really learned a lot with this talk. Thanks Dr. Cole!

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว +1

      Glad this was relevant to you.

  • @freddymercado506
    @freddymercado506 4 ปีที่แล้ว +1

    Very good video and recommend for those that are in senior management and well as those security practitioners to watch. Love the transfer the risk segment. Will watch the rest.

    • @DrEricCole
      @DrEricCole  4 ปีที่แล้ว +1

      Thank you for the feedback. Many times organizations make security harder than it needs to be but the risk transfer is an easy way to make sure those that have the authority also have the responsibility.

  • @JonathanAmbriz
    @JonathanAmbriz 2 ปีที่แล้ว

    So glad I found this channel. I want to be a CISO one day.

  • @golanpeled8960
    @golanpeled8960 3 ปีที่แล้ว +1

    thank you, I really enjoyed , a time well spent.

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      You're welcome! Glad you enjoyed it.

  • @minhtrihuynh2292
    @minhtrihuynh2292 3 ปีที่แล้ว +2

    That's great. Your sharing is so practical and useful.

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      Glad it was helpful! Thanks for watching!

  • @blazinchannel5943
    @blazinchannel5943 4 ปีที่แล้ว +4

    This was an awesome video Dr. Cole, I really hope you release at least 10 more of these 30 min videos :-)!!!

    • @DrEricCole
      @DrEricCole  4 ปีที่แล้ว

      That's the plan! thank you for watching.

  • @akiram6131
    @akiram6131 4 ปีที่แล้ว

    I agree with what Dr. Cole mentioned. AM

    • @DrEricCole
      @DrEricCole  4 ปีที่แล้ว

      Thank you for watching

  • @arulpr49
    @arulpr49 ปีที่แล้ว

    Wowwww... great point for my future interviews
    if you can achive 100% security there wont be a funtionality

  • @AdamAdam-jh7fw
    @AdamAdam-jh7fw 3 ปีที่แล้ว +1

    Great video 👍 thanks

  • @Theicebergx
    @Theicebergx 3 ปีที่แล้ว +1

    Great Video

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      That's very nice of you to say.

  • @mblackburn725
    @mblackburn725 2 ปีที่แล้ว

    Great introduction Eric, I'm following your work and look to forward to more CISO knowledge. Take care

  • @middleverse3838
    @middleverse3838 3 ปีที่แล้ว +4

    Hi Eric, what advice would you give me as a recently graduated software developer if I wanted to gain the skills required to be a CISO or other positions adept at handling company-wide security? I feel like there is no one path that I see, people come from penetration testing, network, sys admins, devs, etc. So I'm a bit overwhelmed trying to figure out a "career" path. Thank you!

  • @terencejerahuni6796
    @terencejerahuni6796 3 ปีที่แล้ว +1

    Thank you so much

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      You're most welcome! Thanks for watching!

  • @conorc4594
    @conorc4594 3 ปีที่แล้ว +2

    Now this is an INTRO! HAHAHAHAHA Great job! wow.

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      Thanks for watching!

  • @WilsonSecurityGroup
    @WilsonSecurityGroup 3 ปีที่แล้ว +2

    I do disagree with the phone example. The FBI has extracted data from phones that were lit on fire, and can get a warrant to retrieve data from the service provider. Even though something may be non-functional doesn't mean it is secure or that it contains no risk. What is non functioning to a business might be a treasure trove for someone else.

    • @DrEricCole
      @DrEricCole  3 ปีที่แล้ว

      Thanks for sharing your opinion :)

    • @matthewmerchant1495
      @matthewmerchant1495 ปีที่แล้ว +1

      A security control needs to make it more expensive to the adversary than the worth of the data that would be compromised. If you have a nation state as your adversary, then you need to go to great lengths to make that the case.

  • @jyotihacker9224
    @jyotihacker9224 ปีที่แล้ว

    Hey sir love from india . And I'm just 12 passed i wanna become a ciso can you share best roadmap

  • @conorc4594
    @conorc4594 3 ปีที่แล้ว

    5:10 oh god

  • @Wake_tf_upppp
    @Wake_tf_upppp 8 หลายเดือนก่อน

    lol Buffet definitely invested in Bitcoin , great video tho

    • @Wake_tf_upppp
      @Wake_tf_upppp 8 หลายเดือนก่อน

      either he is playing the upside or the downside cause hes got connections.

  • @adamchace
    @adamchace 2 ปีที่แล้ว

    The bodyguard humble brag 🤦‍♂️

  • @hemanthkumar-xf8ki
    @hemanthkumar-xf8ki 3 ปีที่แล้ว +2

    That mobile example is just a waste of time.

  • @tommytankkify
    @tommytankkify 8 หลายเดือนก่อน

    He looks stressful and pressured! LOL!!! CISO?!?!

  • @Vic-dl7wq
    @Vic-dl7wq 4 ปีที่แล้ว +1

    The real question is what is an ISO?

    • @DrEricCole
      @DrEricCole  4 ปีที่แล้ว +2

      An ISO is an information security officer. In some organizations “chief” before a title has a special meaning and often has corporate responsibility and/or liability. Therefore in those cases the person who is responsible for security would be given a title of ISO (information security officer) because CISO (chief information security officer) would be to senior.

    • @Vic-dl7wq
      @Vic-dl7wq 4 ปีที่แล้ว

      Thanks for the reply Dr. E. What about organizations with both a CISO and ISO? Is this somewhat redundant?

    • @trentrodriguez9287
      @trentrodriguez9287 4 ปีที่แล้ว

      @ Vic
      The Chief Information Security Officer is an executive position within a company whose role is to lead the junior Information Security Officers and talk to the CEO.

  • @conorc4594
    @conorc4594 3 ปีที่แล้ว

    You need to ensure your functionality is well defined. Then it can only be used in distinct ways, and cannot be abused..... that doesnt imply it's "zero functionality".... so I kinda disagree here, Mr. "CISO".