
Startups, Cybersecurity and Minority Representation — Security Awareness (CyberSpeak Podcast)
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | Spotify | RSS
On this episode of the CyberSpeak with InfoSec Institute podcast, Ron Gula, president of Gula Tech Adventures and co-founder of Tenable Network Security, talks about the evolution of cybersecurity and security awareness, his career shift from the NSA to growing Tenable to funding other cybersecurity startups, and a variety of other topics.
In the podcast, Gula and host Chris Sienko discuss:
- How has the cybersecurity landscape changed since you first got involved in the business? (1:45)
- Did your NSA experience lead you to go into business for yourself? (4:05)
- What do you think about the current state of information security? (5:25)
- What are some recommendations for tightening up existing companies’ security? (8:15)
- What led to your shift from Tenable to the focus on funding cyber startups? (12:15)
- What is the process at Gula Tech Adventures for improving clients’ businesses? (17:15)
- What do you see as the role between security education vs. technical solutions, and how do you create a good balance? (22:40)
- What are some security awareness tips for small business? (23:55)
- What are the barriers to women and minority hires in cybersecurity? (25:05)
- What can companies do to create a more diverse workplace? (27:10)
- What security challenges need to be addressed in the decade to come? (29:40)
Learn more about security awareness: https://www2.infosecinstitute.com/security-awareness
You can watch a video version of the discussion below:
About CyberSpeak with InfoSec Institute
Get security awareness and IT training insight direct from the trenches in this weekly podcast hosted by InfoSec Institute’s Chris Sienko. Each week on CyberSpeak with InfoSec Institute, IT and security practitioners share their insights into a new topic, including security awareness, IT and security careers and keeping organizations safe from cybercrime.
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Jeff Peters. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/0VyRuN4AiKA/