Ga offline met de app Player FM !
Yes, the Military Really Uses "Top Secret" Folders: Cultivating Cybersecurity Awareness | Anschuetz on Leadership
Manage episode 356095602 series 2536260
The Big Themes:
- Fixing human error: The biggest cybersecurity vulnerability companies have is their people, and there's no software tool or system that is more powerful than cultivating an awareness of secure practices among employees.
- Setting the right example: Business leaders must practice what they preach. No more leaving laptops open to email inboxes on our desks. Demonstrate the company's mindset by taking data security seriously and preach it to the whole team.
- How to lead externally: Christian talks about the dangers of "convergence for the sake of convergence," where manufacturers are creating digital products without being thoughtful about the cybersecurity implications of, for example, a poorly designed app for an oven.
The Big Quote: "Unless you start building a culture around the proper treatment of information—who can access it under what circumstances, etc.—and then put real consequences associated with violating the proper handling and use of it, you're never going to really address the weakest link in security."
Want more leadership inspiration from Christian? Connect with him on LinkedIn.
456 afleveringen
Manage episode 356095602 series 2536260
The Big Themes:
- Fixing human error: The biggest cybersecurity vulnerability companies have is their people, and there's no software tool or system that is more powerful than cultivating an awareness of secure practices among employees.
- Setting the right example: Business leaders must practice what they preach. No more leaving laptops open to email inboxes on our desks. Demonstrate the company's mindset by taking data security seriously and preach it to the whole team.
- How to lead externally: Christian talks about the dangers of "convergence for the sake of convergence," where manufacturers are creating digital products without being thoughtful about the cybersecurity implications of, for example, a poorly designed app for an oven.
The Big Quote: "Unless you start building a culture around the proper treatment of information—who can access it under what circumstances, etc.—and then put real consequences associated with violating the proper handling and use of it, you're never going to really address the weakest link in security."
Want more leadership inspiration from Christian? Connect with him on LinkedIn.
456 afleveringen
Alle afleveringen
×Welkom op Player FM!
Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.