The Cyber Executive

The Cyber Executive
Podcast Description
The Cyber Executive host is Marc Ashworth and has over 30 years of technology, security and business experience and leads the discussions with top executives and industry leaders on the topics of cyber security, technology, risk and business.
Podcast Insights
Content Themes
The podcast focuses on cyber security, technology risks, and business strategies, featuring episodes like the deep dive into incident response with Che Bhatia and the exploration of cybersecurity leadership techniques with Gary Chan. Key themes include incident response, leadership in cybersecurity, and the complexities of securing healthcare organizations.

The Cyber Executive host is Marc Ashworth and has over 30 years of technology, security and business experience and leads the discussions with top executives and industry leaders on the topics of cyber security, technology, risk and business.
In this episode of the Cyber Executive Podcast, host Marc Ashworth speaks with Mark Clancy, CISO of T-Mobile, about the evolving landscape of cybersecurity, focusing on talent planning, threat intelligence, and the importance of collaboration. Clancy emphasizes the need for organizations to proactively forecast their talent needs and adapt to the rapidly changing cyber threat landscape. The conversation also highlights the challenges of information sharing within the industry and the role of AI in enhancing security operations. Clancy advocates for moving towards passwordless authentication and improving access review processes to better manage security risks.
Key Takeaways:
- Talent planning should focus on skills forecasting and development.
- Organizations need to anticipate future talent needs proactively.
- Cybersecurity roles often require a mix of skills that are hard to find in one person.
- Effective talent management involves leveraging existing workforce capabilities.
- Threat intelligence must adapt to the rapidly changing cyber threat landscape.
- Collaboration between organizations is essential for effective threat sharing.
- Automated tools can help manage the noise in cybersecurity data.
- Access reviews need to be more context-driven and efficient.
- AI can enhance security operations but requires careful implementation.
- The industry must move towards passwordless authentication methods.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.