Incorporating Security from the Start for a More Secure Future: Exploring the 'Secure by Design' ...

Channel:
Subscribers:
4,700
Published on ● Video Link: https://www.youtube.com/watch?v=N-J24hSjA9I



Duration: 37:09
22 views
1


Guest: Jack Cable, Senior Technical Advisor at CISA [@CISAgov (https://twitter.com/CISAgov) ]


On LinkedIn | https://linkedin.com/in/jackcable


On Twitter | https://twitter.com/jackhcable


CISA on LinkedIn | https://www.linkedin.com/company/cisagov/


____________________________


Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine (https://twitter.com/ITSPmagazine) ] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber (https://twitter.com/RedefiningCyber) ]


On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin


____________________________


This Episode’s Sponsors


Imperva | https://itspm.ag/imperva277117988


Devo | https://itspm.ag/itspdvweb


___________________________


Episode Notes


In this episode of the Redefining CyberSecurity Podcast, host Sean Martin invites Jack Cable, Senior Technical Advisor at CISA (U.S. Cybersecurity and Infrastructure Security Agency), to discuss the concept of 'Secure by Design' and the importance of incorporating security into the development process of technology products. The episode explores the motivations behind CISA's 'Secure by Design' initiative, which aims to shift the responsibility for cybersecurity from end users to technology manufacturers.


During the conversation, Jack highlights the need for long-term investments in cybersecurity and emphasizes the role of business leaders in driving necessary security improvements. The conversation explores the core principles of 'Secure by Design', including technology manufacturers taking ownership of security outcomes for their customers, promoting radical transparency and accountability, and ensuring top business leadership drives security improvements. The episode also touches on the collaboration between CISA and the open-source community to foster greater security improvements in the open-source space.


Jack also shares success stories of companies effectively implementing 'Secure by Design' principles and highlights the economic and business factors that will drive a more secure future. The episode concludes with a call-to-action for organizations to adopt the 'Secure by Design' approach and engage with CISA to support the shift towards more secure software.


Top Key Insights:

• The 'Secure by Design' initiative is aiming to shift the burden of cybersecurity from end users to the technology manufacturers, essentially pushing for a more proactive approach to security.
• Successful adoption of 'Secure by Design' requires buy-in from business leaders who possess the power to allocate budgets and direct the shift towards a secure future, demonstrating that cybersecurity is as much a business issue as a technical one.
• Collaboration with the open-source community is crucial for improving security in the technology ecosystem. This includes expectaing companies who use open-source software to be responsible consumers and sustainable contributors to the open-source software ecosystem.

___________________________


Watch this and other videos on ITSPmagazine's YouTube Channel


Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:


📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

ITSPmagazine YouTube Channel:


📺 https://www.youtube.com/@itspmagazine


Be sure to share and subscribe!


___________________________


Resources


Inspiring LinkedIn Post: https://www.linkedin.com/posts/jackcable_when-a-new-vulnerability-comes-out-its-activity-7135658158726791168-nz9h


Secure by Design Overview: https://www.cisa.gov/securebydesign


Alert Series Announcement: https://www.cisa.gov/news-events/news/cisa-announces-secure-design-alert-series-how-vendor-decisions-can-reduce-harm-global-scale


Principles for Package Repository Security: https://repos.openssf.org/principles-for-package-repository-security


Request for Information: https://www.federalregister.gov/documents/2023/12/20/2023-27948/request-for-information-on-shifting-the-balance-of-cybersecurity-risk-principles-and-approaches-for


___________________________


To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:


https://www.itspmagazine.com/redefining-cybersecurity-podcast


Are you interested in sponsoring an ITSPmagazine Channel?


👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network




Other Videos By ITSPmagazine


2024-02-19How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats by Buil...
2024-02-19How the Newly-Formed AI-ISAC is Protecting Businesses from Emerging Cybersecurity Threats
2024-02-17The Cosmic Philosopher: Konstantin Tsiokolvsky | Stories From Space Podcast With Matthew S Williams
2024-02-16A Conversation with Carter Groome | The Leadership Student Podcast with MK Palmore
2024-02-16A Conversation with Carter Groome | The Leadership Student Podcast with MK Palmore
2024-02-16A Conversation with Carter Groome | The Leadership Student Podcast with MK Palmore
2024-02-16Illuminating Cybersecurity: A Wave Of Revelations From The Blue LED Revolution | A Musing On the ...
2024-02-16Illuminating Cybersecurity: A Wave Of Revelations From The Blue LED Revolution | A Musing On the ...
2024-02-15Flow, Challenge, and the Zone of Proximal Development: Optimizing the Learning Process | A Conver...
2024-02-15Flow, Challenge, and the Zone of Proximal Development: Optimizing the Learning Process | A Conver...
2024-02-14Incorporating Security from the Start for a More Secure Future: Exploring the 'Secure by Design' ...
2024-02-14Incorporating Security from the Start for a More Secure Future: Exploring the 'Secure by Design' ...
2024-02-14Exploring the 'Secure by Design' Initiative and the Ongoing Secure by Design Alert Series
2024-02-13How to Secure Tomorrow: A Cybersecurity Leader's Guide to Navigating 2024 with Etay Maor
2024-02-12The Great AI Debate: Does It Belong in SIEM? | Dissecting the Impact of AI on Modern SIEM Solutio...
2024-02-12The Great AI Debate: Does It Belong in SIEM? | Dissecting the Impact of AI on Modern SIEM Solutio...
2024-02-12The Great AI Debate: Does It Belong in SIEM? | Dissecting the Impact of AI on Modern SIEM Solutions
2024-02-12Swipe, Tap, Voice: Embracing the Digital without Losing Touch, Taste, the Earth Beneath Our Feet,...
2024-02-11Swipe, Tap, Voice: Embracing the Digital without Losing Touch, Taste, the Earth Beneath Our Feet,...
2024-02-11Redefining Existence: Will We Be Carbon, Silicon, Digital Entities, Or A Little Bit Everything? |...
2024-02-11Redefining Existence: Will We Be Carbon, Silicon, Digital Entities, Or A Little Bit Everything? |...