A CEOs Guide To Ignoring Your Security Program (LIVE in Santa Monica)

Published: Oct. 24, 2023, 10 a.m.

b'

All links and images for this episode can be found on CISO Series.

Usually the buck stops with the CEO. But for a CISO, what do you do when a CEO wants to exempt themselves from your security program? Whether it\'s granting privileged network access or just ignoring protocols, it can put a CISO in a tough spot. So how do you deal with a leader that thinks they\'re above the controls you have in place? Is it enough to document your disagreement or is there anything else you can do in that position?\\xa0

This week\\u2019s episode is hosted by me, David Spark (@dspark), producer of CISO Series and John C. Underwood, VP, information security, Big 5 Sporting Goods. Joining me is our guest, Joshua Scott, Head of Security and IT, Postman.

Thanks to our podcast sponsor, Veza

Veza

75% of breaches happen because of bad permissions. The problem is that you don\\u2019t know exactly WHO has access to WHAT data in your environment. For example, roles labeled as \\u201cread-only\\u201d can often edit and delete sensitive data. Veza automatically finds and fixes every bad permission\\u2014in every app\\u2014across your environment.

In this episode:

  • For a CISO, what do you do when a CEO wants to exempt themselves from your security program?
  • How do you deal with a leader that thinks they\'re above the controls you have in place?
  • Is it enough to document your disagreement or is there anything else you can do in that position?
'