Cyber Security Documentary
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize in firewall management, but also web and email access. Eh, and work mainly in the network side to support security of various institutions.
People always get it wrong when they think about security. And they talk about hacking and they use the word cyber, almost, but without fail, in the wrong context. Cyber security is in fact a very broad sweet of controls institutions put in place to make sure that they are not threatened, hacked or attacked, both from outside and inside the organization. In the 21st century, the main problem that most institutions have are not from outside their business, but from inside. The evidence is shown that the majority of data leakage, the majority of fraud and the majority of financial and reputational loss is, has occurred, not because some third party from outside the business has managed to get through the firewall, or manage to attack a pc, or managed to get into a server. More often it is because somebody from inside the business has made a mistake, allowing somebody else to gain access, or has deliberately gained access for their own nefarious purposes.
My job is to do three things, one is to design the network to make sure that it is its least vulnerable, to any form of attack. Two is to identify when an object, or network has been attacked or hacked, or compromised in any way. And the third aspect is to prove what is commonly called the threat surface, em, for a vulnerability has been exposed. That is, yes we’ve been attacked. Yes, we’ve been exposed. What is the exposure. How much data are we due to lose? How much compromise has actually been reached, within our organization? These are the three main planks of any network security, within an organization.
Interview 2 – Hello my names is eh, Jim. I am a security architect for a large financial organization. Em, my job involves looking not at where we are with our feet right now, in terms of the vulnerabilities and flaws that we have, in the cyber warfare that we have with people inside and outside the organization. I look at the threats that are coming in the next eighteen to twenty-four months. So my role is to understand the current position of the organization, the current threats that face us, the position the business is in, and the position the business wishes to be in, in up to 24 months away from us just now. And to make sure that technology and processes is in place to manage the threats that the business will face in that timeframe. And we do this across the globe. So we manage firewalls, we manage anti-virus, we manage, em, remote access into the organization. We manage, em, data leakage, so, data leaving the organization, wither it be accidentally or purposefully. But ultimately my role is to facilitate access into the organization, to allow it to conduct its business. And to do that in a way that is as responsible as possible, in terms of business activity and in terms of cost to the organization. So, items that we have been focusing on recently, relate to, the ability to have data leaving the organization, as I mentioned previously, that is a big topic. There is a, a program coming in from the European union, called GDPR, which relates to how we manage our customer information. soundcloud.com

🎧 Podcast episodes
Listen to 1 episodes
Similar podcasts
Get Hired In Cyber Security
Get guidance, tips, and insights on how to get hired in cyber security from experts in the field. New guests every week. Hosted by Ayo Adeojo, a cyber security professional with a passion for helping aspiring cyber security professionals get hired.
Be sure to subscribe to get th...
Task Force 7 Cyber Security Radio
Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today.
Although the world of cyber security can be complex,...
Cyber Security, Digital Marketing, Programming, Software Development
I'm here to share my experience of the tech, cyber security and digital marketing
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Daily update on current cyber security threats
CS2AI Control System Cyber Security Association International: (CS)²AI
(CS)²AI is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 25,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer excha...
Cyber Democracy
The second season of Cyber Democracy podcast focuses on understanding how technology is a site for gendered politics in India. Through conversations with female and trans-queer grassroots practitioners, the podcast will discuss how our gender and intersectional identities shape o...
Cyber Work
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Off the Record
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligenc...