Recently, Brian, Dan and Erik had the great fortune to do a live version of the podcast at the monthly meeting of the SIM Detroit Chapter (https://chapter.simnet.org/detroit/home). At the close of that discussion, the comment was raised as to whether or not security should be used as a competitive advantage by businesses. The topic seemed perfect for The Great Security Debate, so here we are. In this episode, we cover:
- Can security be used as a business differentiator?
- SHOULD security be used as a business differentiator?
- If security is added too deeply into the sales cycle does it incentivise the wrong behaviours just to make a sale?
- How can we quantify the value of security in the purchasing process when it is not easily attributable to direct cost saving or value?
- How do closed systems compare to open systems with regard to security?
- How does the rise of customer trust as a key organisational focus indicate the use of security as a business differentiator?
- Do the fears that using security as a differentiator means that the collaborative nature and history of security will disappear?
We also have a video channel on YouTube that airs the "with pictures" edition of the podcast. Please head over to https://bit.ly/gsdyoutube and watch, subscribe and "like" the episodes.
Some of the links in the show notes contain affiliate links that may earn a commission should you chose to make a purchase using these links. Using these links supports The Great Security Debate, so we appreciate it when you do use them. We do not make our recommendations based on the availabliity or benefits from these affiliate links.
Thanks for listening!
- SEC Proposes Cybersecurity Rules for Public Companies
- TISAX: Information security for the automotive industry | TÜV SÜD
- Failure mode and effects analysis - Wikipedia
- Bridgestone Americas confirms ransomware attack, LockBit leaks data
- Quantitative Information Risk Management | The FAIR Institute
- Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat: Carlin, John P.: 9781541773837: Amazon.com: Books
- Saudi Aramco facing $50 million cyber extortion over leaked data
- Leaked Conti files reveal life inside ransomware gang • The Register
- KOJIMA INDUSTRIES CORPORATION Company Profile | TOYOTA, AICHI, Japan | Competitors, Financials & Contacts - Dun & Bradstreet
- Higher Education Community Vendor Assessment Toolkit | EDUCAUSE
- Home Page – CORL Technologies
- Home – Cyturus
- Financial Services Information Sharing and Analysis Center
- Auto-ISAC Summit 2021 – Auto-ISAC
- The SSO Wall of Shame | A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
- The Great Security Debate