Make Others Great | A Conversation With Chief Information Security Office (CISO) David Cross

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=DFy8OvYA9uE



Category:
Guide
Duration: 30:02
318 views
3


David Cross has to balance both engineering and business priorities. He teaches us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.

As CISO for Oracle SaaS, David Cross has to balance both engineering and business priorities. He joins Tech Done Different to teach us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence.

You'll learn:

-why the core values that many veterans have are a great fit for security roles
-how to think about transition careers, roles, and companies
-how to build an ecosystem of mentors
-why to partner with someone whose strengths complement your weaknesses
-why to seek feedback that stings

________________________________

Guest
David Cross
Senior VP & CISO at Oracle [@Oracle]
On LinkedIn | https://linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657
On Twitter | https://twitter.com/MrDBCross

________________________________

Host
Ted Harrington
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

________________________________

This Episode’s Sponsors

CrowdSec 👉 https://itspm.ag/crowdsec-b1vp

________________________________

Resources

________________________________

For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcast

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships




Other Videos By ITSPmagazine


2022-06-09Live During RSA Conference 2022 | A Conversation w/ Security Leaders, Rock Lambros & Russell Eubanks
2022-06-09Live During RSA Conference 2022 With Steve Luczynski At The Aerospace Village In The Sandbox
2022-06-09A Conversation w/ Jen Easterly | Securing Bridges With Alyssa Miller Live @RSAConference 2022 | Ep13
2022-06-09Live During RSA Conference 2022 | A Conversation With Rick McElroy
2022-06-09Live During RSA Conference 2022 | A Conversation With Chloé Messdaghi
2022-06-09Live During RSA Conference 2022 | A Conversation With BlackCloak’s Chris Pierson
2022-06-09Live During RSA Conference 2022 | A Conversation With AppViewX’s Selena Proctor And Alon Nachmany
2022-06-07Live During RSA Conference 2022 | A Conversation With HITRUST’s Michael Parisi
2022-06-07Information Security Programs: Defining And Managing To Operational Success
2022-06-03Skills Vs Personality | A Conversation With Sameer Ranjan
2022-06-02Make Others Great | A Conversation With Chief Information Security Office (CISO) David Cross
2022-06-02Lessons From Secret Service | A Conversation With Former Special Agent, John Toney
2022-06-02Building An Iconic Business | A Conversation With Entrepreneur And Author, Richard Thalheimer
2022-06-02Starting With Security | A Conversation With Author Of Designing Secure Software, Loren Kohnfelder
2022-06-02Researchers Are Your Friends | A Conversation With Jay Balan
2022-06-02Building Better Workplaces | A Conversation With Chloé Messdaghi
2022-06-02The Machines Won't Kill Us | A Conversation With Ria Cheruvu
2022-06-02Lead With Positive Effects | A Conversation With April Sabral
2022-06-02Build Allies | A Conversation With Shamane Tan
2022-06-02What Is A Hacker | A Conversation With John Hammond
2022-06-02Mentor At Scale | A Conversation With Helen Patton