Security Breach

Shiny Objects and the Power of Preparation

Eric Sorensen

Send us a text

"You don't have to get hacked to understand how you can get hacked."

While I utilize that editorial director title to introduce myself before every episode of Security Breach, it’s not the title that I’ve used the longest, think about the most, or with which I would hope to obtain the most acclaim. Rather, the job descriptor that meets all those requirements is the title of ... Dad. 

And perhaps the phrase most commonly utilized during my ongoing tenure in this position is some form of "are you ready?" 

Whether it was preparing to push a swing, toss a pitch or start a car, inquiring as to the state of my daughter’s readiness was always the first, most important, and yet most basic action I took. 

I was reminded of this when speaking with our guest for this episode, Itzik Kotler, the co-founder and CTO of SafeBreach. While our conversation took us down a number of paths in discussing “shiny objects”, the problems with silos, and the evolution of hackers, he kept coming back to the basics, or what I like to constantly describe as the blocking and tackling of cybersecurity.

At the heart of the focus on the basics is taking steps to be prepared for when, not if, you’re targeted by hackers. 

So, if you're ready, listen as we discuss:

  • Why every manufacturer is either a target or connected to a bigger target via their supply chain connections.
  • The lure of "shiny objects", and how they can distract from the best approaches to cybersecurity upgrades.
  • How hackers are exploiting the complexities of your environment.
  • Why security strategies need to start with understanding what is truly at risk, and what level of risk is acceptable.
  • The growing need for detection engineering.
  • Evolving your enterprise in realizing that "hackers don't work in silos."
  • The role AI can play in addressing alert fatigue.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.