December 21

Security Catalyst #9 (Security Spending, MS Patches SONY, Email weakness)

Here is a list of things to do:
* subscribe with the RSS 2.0 feed(s) to your right
* check out the message board @ Security Synergy (registration required)
* add yourself to the security catalyst map
* Call the listener feedback line: 206-339-9361
* If you liked the show, tell a friend; if you didn’t, tell me!

Subscribe in iTunes using this link (Click Here Now)

Subscribe or RATE THE SHOW in Yahoo Here. Please take the time to rate the show for the series as well as the specific episode.

Take the 2006 Security Spending Survey RIGHT NOW. DO IT.

==>Download or listen to Security Catalyst #9 here (34 minutes long) < ==

On This Episode
SPENDING SURVEY PRELIM RESULTS
* 8 people have responded so far
* NO ONE has a budget that is shrinking, and the bulk are expanding by some level
* Compliance continues to be a driver, which really isn’t a big shock
* Trend is suggesting an increase in firewalls/ips, messaging security, organizational development.
* The biggest decrease is also in FW/IPS – i’m initially thinking this is due to lumping the two together. If you are in this situation, I would enjoy an email or phone call with some insights and experiences

Story #1 — Security Still Tops IT Spending
The big take-away from this is the spending for security continues to be the same (while others shrink) or increases. We’ll discuss how you can use this information to bolster or improve your own efforts.

Story #2 — MS Patch Cleans Up After Sony Rootkit
It may seem like the story that doesn’t end – and for good reason. After the recall is over and people think they are secure again because no-one is talking about it, we will still be faced with this issue. It is a big deal that MS has offered a patch for this, and you seriously need to consider installing it. Consider it preventative.

We’ll discuss why this is important and how to explain that importance to others.

Story #3 — Email Spills Corporate Secrets
Email has become a tool that we cannot live without; at the same time, we explore how our greatest strength is sometimes our greatest weakness. We have suspected for a while that users have been using email for more than business purposes and maybe leaking our private, confidential information. One study reveals the shocking proof.

We take a look at why, and talk about what steps you should be taking now – or planning for next year – as well as key ways to explain this concept to others. Understanding on this issue is important – after listening, you will be better prepared for these conversations.

The following track from the podsafe music collection of podshow was used during episode 9.
BAJA TAXI


Tags


You may also like

Are you using frameworks properly?

Leadership and communication are actually layers, not levels

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Subscribe to our newsletter now!