10 Questions to Cyber Resilience

Assurance IT

Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together! read less
TechnologyTechnology
Unlocking the Secrets of Manufacturing Cybersecurity, with Tanium's Ashley McGlone
Today
Unlocking the Secrets of Manufacturing Cybersecurity, with Tanium's Ashley McGlone
Dive into the world of manufacturing cybersecurity with an insightful podcast episode featuring Ashley McGlone, a seasoned technology strategist from Tanium. Join your host, Luigi Tiano, as he engages in a riveting conversation with Ashley, unraveling the complexities of Industry 4.0, IoT, and the critical role of cybersecurity in the manufacturing landscape.In this episode, Ashley shares his wealth of expertise, drawing on decades of experience in the tech industry, including roles at Microsoft, Toyota, and his current tenure at Tanium. The duo delves into the challenges posed by the convergence of IT and OT, exploring the unique cybersecurity concerns faced by manufacturing companies in an era of increased connectivity and automation.Discover the significance of standards like ISA 62443 and the Purdue model in structuring cybersecurity practices for manufacturing environments. Luigi and Ashley explore the pressing need for visibility and control in OT environments, shedding light on the evolving trends and the potential risks associated with cloud integration.As the conversation unfolds, Ashley provides valuable insights into the diverse mix of devices in manufacturing and how strategic platform partnerships can be the key to effective cybersecurity. The duo navigates the landscape of resources available for companies venturing into cybersecurity enhancements, with a special spotlight on the SANS Institute's industrial controls training. Resources: Watch the episode: https://youtu.be/1u6Ot5s-sXIAshley's LinkedIn: https://www.linkedin.com/in/ashleymcglone/Tanium's website: https://www.tanium.com/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Ashley McGlone: Ashley McGlone has spent his life in IT. Between recordings of Tanium Tech Talks he enjoys advocating for customers, getting in the weeds of tech, and savoring a particular retro variety of red licorice. In his role as Technology Strategist he researches and creates vertical-specific guidance for customers to maximize their Tanium experience. He also is a megaphone for customer feedback to the Tanium product teams. As a frequent conference speaker he's always looking for opportunities to share the "Wow Tanium" experience with new audiences. Message him just to say hi or to talk Tanium and tech.About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
An honest chat about Zero Trust Security, with Paul Baker
Nov 17 2023
An honest chat about Zero Trust Security, with Paul Baker
Zero trust is a hot topic, so we invited the Director of Cybersecurity from Plurilock, Paul Baker, to discuss the subject in detail.  In this episode, Paul Baker from Plurilock and co-founder of Assurance IT, Luigi Tiano, discuss: What is zero trust? How do you never assume someone is a good actor?How do you get an enterprise to prioritize zero trust?Is it easy to calculate the cost to protect a network?How do you get people to buy into cybersecurity?What role does zero-trust play in identity access management?What is continuous authentication? Compared to MFA?Is continuous authentication safe?How does a team measure the effectiveness of implementing zero-trust initiatives?Has zero trust helped you get cyber insurance?What are the long-term benefits of zero-trust? Resources: Watch the episode: https://youtu.be/D5oL9B1-0qwPaul Baker’s LinkedIn: https://www.linkedin.com/in/paul-baker-uk/Plurilock website: https://plurilock.com/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/ About Paul Baker: A customer-facing manager who collaborates with all levels of stakeholders, from developers and technical staff through to C-Suite executives. Builds solid relationships and quickly becomes the reliable "go-to" person internally and externally. Analytical thinker with a creative edge who deftly identifies client needs and assesses financial and technical viability. Passionate about helping clients discover new possibilities, maximizing investment in technology, and driving revenue for their company. Translates customer requests into detailed requirements, then follows through to delivery and beyond. About 10 Questions to Cyber Resilience: Learn about how IT leaders are strengthening their cyber security practices twice a month. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
Breaking down the infamous Uber, Cisco and LastPass breaches, with David Lindstrom
Oct 25 2023
Breaking down the infamous Uber, Cisco and LastPass breaches, with David Lindstrom
Assurance IT invited Identify and Deception Specialist, David Lindstrom, from SentinelOne, to chat about how unsophisticated attacks breached high-profile companies like Uber, Cisco, and LastPass.  In this episode, David Lindstrom and co-founder of Assurance IT, Luigi Tiano, answer the following questions: Do you need someone with high credentials to hack a system?Is Active Directory good at protecting the enterprise?Is it possible to understand the full scope of a data breach?What is a honey pot?Can you buy credentials on the dark web?How do you prevent an employee from being a target of social phishing?Is there a golden rule for creating a safe password?How do you avoid being the softest target for dark web credentials?What does it mean to secure your identity in an enterprise? Resources: Watch the episode: https://youtu.be/9zs2MzInI50David Lindstrom's LinkedIn: https://www.linkedin.com/in/davidlindstrom/SentinelOne's website: https://www.sentinelone.com/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About David Lindstrom: Passionate cybersecurity sales professional focused on successful security and business outcomes. I’ve had the pleasure of working on behalf of enterprise and educational organizations across industries and have excelled in the role of start-up evangelist, team leader, and practice expert for established companies.About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
How to Succeed in Ethical Hacking, with Laurent Deslauriers
Sep 15 2023
How to Succeed in Ethical Hacking, with Laurent Deslauriers
Assurance IT invited our favorite ethical hacker, Laurent Desaulniers. In this episode, Laurent Desaulniers, Security Cloud Manager, and co-founder of Assurance IT, Luigi Tiano, discuss: 1. What does ethical hacking really mean?2. Should pentests be done multiple times per year?3. Who was Mafia Boy? 4. How did he give ethical hacking a bad name?5. What will the lack of IT talent result in?6. The truth behind the ethical hacking community7. What are some ways to get started in ethical hacking?8. How do you identify great hacking talent?9. The #1 question to ask ethical hackers in interviews.10. How much money you can make as an ethical hacker.BONUS TOPICSWhat schools should really be teaching about tech?Resources for learning cyber security.Resources: Laurent Desaulniers’s LinkedIn: https://www.linkedin.com/in/laurentdesaulniers/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/ About Laurent Desaulniers: Laurent Desaulniers combines a strong technical experience with creative thinking to achieve elegant solutions with a passion for security, especially forensic, web and penetration testing.Laurent Desaulniers is knowledgeable in the following technologies : - Operating systems: Linux (Ubuntu/Debian) , Windows (2008, 2003 Server, Windows 2000 Server), Cisco IOS- Programming languages: PHP, Javascript, Python, Java (J2EE, EJB3, Servlet, Swing), JSP, Struts- Framework: PCI-DSS, ISO-27001, ISO27034, ISO17799, ISO13335, ITIL, COBIT.- Methodology: OSSTM, OWASP, OCTAVE- Security: IDS systems, Honeypots, Penetration TestingSpecialties: Forensic, Web application intrusion, Vulnerability AnalysisAbout 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. About Assurance IT: Assurance IT (www.assuranceit.ca) specializing in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
Is the cloud secure? with CISO from Insurity, Jay Wilson
Dec 16 2022
Is the cloud secure? with CISO from Insurity, Jay Wilson
Assurance IT invited Insurity's CISO, Jay Wilson to discuss SaaS platform, cloud security and data privacy. In this episode, Jay Wilson from Insurity and co-founder of Assurance IT, Luigi Tiano, discuss: Pros and cons of SaaS platformsShould hardware be back on-prem?Cloud security: Is it where it needs to be?Are security risks between cloud and on-prem similar?How to backup SaaS applicationsDifficulty of complying with data privacy regulations from around the worldAre the Data privacy regulations make us better? Resources: Watch the episode: https://youtu.be/a8YWmt-QcVU Jay Wilson’s LinkedIn: https://www.linkedin.com/in/jaywwilson/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Jay Wilson: As an experienced technology executive across multiple disciplines and sectors, Jay leads operations, delivery and strategy across global cross-discipline teams to produce and protect innovative products, growth strategies and measurable results.In his role of Chief Information Security Officer at Mercury Healthcare, he is responsible for advancing the information security and compliance program, ensuring our business operations and client-facing product technologies are safe from attack, exceed regulatory standards and protect the critically important protected health data assets that Mercury Healthcare manages for over 1000 hospitals. Additionally he lead our efforts to align to industry leading compliance and security frameworks, including HITRUST certification of the Mercury Patient Engagement Solution / CRM. Further, he also leads and directs the IT function at Mercury Healthcare to improve the efficacy, efficiency and effectiveness of IT/Helpdesk functions within the organization.He is CISM, CHP and CSCS certified and has over 20 years of experience in various technology development and leadership roles. Also a graduate of SapientNitro's CMTO University program, with a background as a professional marketing technologist and a consummate student of innovation and psychology, he focuses additional effort on the potential of people in the world of business+technology convergence. He has previously led (at Healthgrades) the Learning Academy program, part of HG's previous leadership development program, to help grow our people in communication, leadership and creating impact.His experiences in technologies are broad and diverse, but he has had the privilege of working in: Security Infrastructure, Network Engineering, Automation Engineering, Advertising Technologies, Data Engineering, Distributed Computing, Professional Video, Cloud Computing, DevOps, Containers, Front End Web Technologies, Server-side Technologies, Microservices & API Development.About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data...
How small companies should get started in cyber security, with Franco Perrotta
Nov 11 2022
How small companies should get started in cyber security, with Franco Perrotta
Franco Perrotta is a cyber security consultant at Bell. Over his decade of experience helping businesses with cyber security, he noticed trends he shares in this episode - specifically for small businesses. In this episode, Franco Perrotta and co-founder of Assurance IT, Luigi Tiano, discuss: How much budget should you have for cyber security?How small companies should get started in cyber securityBenefits of being small when attracting IT talentFirst step to identifying weal spots in a small businessCan you grow a business and do it prudently?Cyber insurance for small companiesUse case: helping small business with low budget and one IT person with cyber security Resources: Watch the episode: https://youtu.be/mPUy-RoUkrwFranco Perrotta’s LinkedIn: https://www.linkedin.com/in/francoperrotta/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Franco Perrotta: "10+ years experience in IT; this includes hardware, software and client relations. Through my attention to detail and always providing over the top service, I present an excellent addition to any team looking to strengthen their IT security posture."About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
The Future of Data Privacy in Canada, with Vanessa Henri
Oct 22 2022
The Future of Data Privacy in Canada, with Vanessa Henri
Vanessa Henri has been working in data privacy for 10 years. As a lawyer, she approaches data differently than most of us. So on today's episode of 10 Questions to Cyber Resilience, we wanted to pick her brain about her perspective of data privacy as a lawyer and where Canada is headed in terms of laws and compliance. In this episode, Vanessa Henri from Henri and Wolf, and co-founder of Assurance IT, Luigi Tiano, discuss: Using due diligence to grow an organizationThe relationship between legal and ITOne strategy to get more cyber security budgetIs Canada behind on data privacy laws?Defining C27 and what it could mean for CanadaWill C26 and C27 be passed as laws?How AI fits into new legislationWhy consumers are scared of AIHow to start implementing AI in your business Resources: Watch the episode: https://youtu.be/ng2SQk2OBi8Vanessa Henri’s LinkedIn: https://www.linkedin.com/in/vanessahenri/Henri & Wolf website: https://henriwolf.law/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/   About Vanessa Henri: "I work with emerging growth organizations to help them articulate a data governance strategy taking into consideration data privacy, information security, intellectual property, and ethics. I bring value and a competitive edge to data-driven organizations by helping them to manage their legal risks, enhance consumers trust and fast-forward the adoption of disruptive technologies through trust-by-design. I have an extensive experience negotiating and drafting tech agreements with data governance implications (including data acquisition, derivative data management and contracts involving data analytics and anonymization requirements), and enjoy working with entrepreneurs to build contractual structures that reflect their business strategies. I am fascinated by ethical innovation, the economic value of trust, and nurturing purpose-driven organizations.Organizations reach out to me to understand the legal impacts of their strategy for managing and securing their information assets, which may include trade secrets, intellectual property and personal information, and for advices on how to improve governance, risk management and decision making regarding such informational assets. I also work with organizations on issues of economic cyber-espionage and national security impacts. The organizations I work with are principally in the field of emerging technologies, cybersecurity and data-driven industries, including IIoT.I am a member of the Quebec Bar Association, a Certified Data Protection Officer ("CDPO") and a Senior Lead Implementor for ISO 27701 (Privacy Information Management System), with a proven track record of helping organizations of all sizes and industries implementing compliance measures for their informational assets, including through privacy-by-design in emerging technologies. I have experience deploying information management systems for organizations of all sizes by drafting policies, procedures and establishing risk management methodologies. I perform risk assessments and audits to prepare organizations for certification or for new compliance obligations, or for pre-market validation...
The Evolution of Cyber Security, with Mark Salinas
Oct 7 2022
The Evolution of Cyber Security, with Mark Salinas
Assurance IT invited Security Engineer Manager, Mark Salinas, to chat about the evolution of cyber security. In this episode, Mark Salinas and co-founder of Assurance IT, Luigi Tiano, discuss: Evolution of networkingCyber security in 2000 vs 2022End-users in 2000 vs 2022The reality of buying cyber security toolsCyber security vs cyber resilienceCyber attacks on critical infrastructureGetting hacked through a clockWhat the Googles of the world are doing to mitigate the skillset shortage in IT Resources: Watch the episode: https://youtu.be/TUA01zTVbw0Mark Salinas' LinkedIn: https://www.linkedin.com/in/mark-salinas-75b9363/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Mark Salinas: Over 20 years industry experience as a security & network architect and engineer, including: design & installation of: networking, Cloud, Network Security, Firewalls, IDS/IPS, Application Security /Firewall, Application Acceleration, WAN Optimization. WAF and DAM. Cloud Services. PCI & NERC Compliance and GRC. CISSP. Pre-Sales as well as Post Sales Support. Network & Security Architecture designs. Security Audits & reviews. US citizen. Mentor.About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev
Sep 23 2022
Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev
Jahn Karsybaev is the CIO at myBasePay - a small startup that raised $60 million in funding and are on their way to closing the year at $50 million in revenue. In today's episode, Assurance IT's co-founder Luigi Tiano asks Jahn about the following topics:The difficulty attracting IT talent as a startup & how Jahn works around thatDefining cyber resilienceTips on implementing digital transformation & debunking myths around itJahn's best tip to staying up-to-date with the tech industry (we're stealing this one)What keep's Jahn up at nightWhat Jahn looks for in a company that potentially acquires myBasePay Resources: Watch the episode: https://youtu.be/2wlSQeXbPHQJahn Karsybaev’s LinkedIn: https://www.linkedin.com/in/jahnibek/myBasePay: https://www.mybasepay.com/The book about Business experiments Jahn referred to: https://amzn.to/3dyyHN4Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Jahn Karsybaev: Jahn Karsybaev is a Technology Executive who has led IT teams for Fortune 500 companies. He is currently a Co-Founder and CIO at myBasePay. Jahn has co-founded, launched, successfully sold as well as successfully failed several start-ups. He is an Angel Investor and sits on Boards of several tech startups. He loves teaching angel investing, growth hacking & fundraising for startups. Fund-raising is one of Jahn's strengths and passions. Cumulatively, he has successfully raised close to $70MM for the startups he has launched or advised on.About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
How to apply the 80/20 rule to your cyber security strategy
Sep 9 2022
How to apply the 80/20 rule to your cyber security strategy
Cyber criminals are getting smarter. Protecting your enterprise is getting expense. Where do you start in your cyber security journey? The co-founders of Assurance IT discuss the top 5 cyber security tools every enterprise should start with. In this episode, Luigi Tiano, and Ernesto Pellegrino also discuss: 13 Cyber Secure MeasuresIncident Response PlansReason to increase cyber security awareness among executivesHow the workspace changed over the last two years and how it's affecting IT#1 cause of cyber attacksFeedback from cyber security insurance companiesTop 5 things you need to protect against ransomware Resources: Watch the episode: https://youtu.be/FejMyQmT9hABlog: www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware CyberSecure Canada: https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizationsErnesto Pellegrino’s LinkedIn: https://www.linkedin.com/in/ernestopellegrino/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
10 Burning Questions about the Cyber Security Industry, with Jonathan Victor, from Insurity
Aug 19 2022
10 Burning Questions about the Cyber Security Industry, with Jonathan Victor, from Insurity
There's a lot going on in the tech world. A huge skill gap, Log4j vulnerabilities, how your cloud strategy is making your security strategy more difficult. It's a lot. In this episode, we invited Chief Information Officer of Insurity, Jonathan Victor, to discuss the most pressing questions in the field. Co-founder of Assurance IT, Luigi Tiano, and Jonathan Victor discuss: How Jonathan became CIOWhat happened when John needed surgery during an important project How a cloud strategy makes a security strategy more difficultWhat is cyber resilience mean?How Log4j affected InsurityWhy companies are still being affected by Log4jWhy enterprises should try security by designhow to improve your cyber resilience with this one thingHow to overcome the skillset gapDiscussion about how we are becoming desensitized to online security Resources:  Watch the episode: https://youtu.be/5XIN-VttSdkJonathan Victor's LinkedIn: https://www.linkedin.com/in/jonathan-victor-65b2b5a/Insurity website: https://insurity.com/ Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/ Assurance IT Website: http://www.assuranceit.ca/  About Jonathan Victor: Jonathan Victor is the Chief Information Officer of Insurity. He oversees all of Insurity’s SaaS implementations and manages the build, run, and evolution of the company’s cloud platforms. He came to Insurity as part of the company’s acquisition of Oceanwide, where he began in 2005, and assumed the role of Chief Operating Officer in 2014. Before Oceanwide, Jonathan worked as a consultant at Accenture. Jonathan is a graduate of McGill Desautels Faculty of Management with a major in Management Information Systems and Finance.About 10 Questions to Cyber Resilience: Twice per month, learn about how Tech leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.
10 Questions to Better Understanding Data Privacy Roles, with Heather Federman from BigID
Jul 29 2022
10 Questions to Better Understanding Data Privacy Roles, with Heather Federman from BigID
On the first episode of 10 Questions to Cyber Resilience, Assurance IT invited Chief Privacy Officer, Heather Federman, from BigID, to chat about the responsibilities and scope of a data privacy role. In this episode, Heather Federman from BigID and co-founder of Assurance IT, Luigi Tiano, discuss: The evolution of Heather’s data privacy career How Heather’s passion for data privacy started in law school How the CPO fits in with the rest of the IT team How a CPO interacts with other departments  How not to get overwhelmed with the different data privacy laws The possibility of a GDPR for the US Examples of employee protection under different state laws How BigID plays a part in data privacy The current demand for experts in data privacy Privacy laws in Canada  Resources: Heather Federman’s LinkedIn: https://www.linkedin.com/in/heatherfederman/ BigID website: https://bigid.com/Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/Assurance IT Website: http://www.assuranceit.ca/  About Heather Federman: Heather leads the privacy strategy and program at BigID - focused on internal compliance and data risk, product development, go to market strategy, business development and privacy evangelism.  About 10 Questions to Cyber Resilience: Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.  About Assurance IT: Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.