Africa-focused technology, digital and innovation ecosystem insight and commentary.
…
continue reading
Вміст надано Illumio. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Illumio або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !
Переходьте в офлайн за допомогою програми Player FM !
Beyond the Breach
Відзначити всі (не)відтворені ...
Головна серій•Feed
Manage series 1165223
Вміст надано Illumio. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Illumio або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episode we explore lessons from public service and the past to inform the leadership and management challenges of our digital present. We also talk about life in the outdoors -- the trips we and our guests have made into the wilderness, the places we've walked and seen, and the trips we will take in the future. Our goal: help humanity to adapt and flourish in the digital age. * In each episode we interview leaders to learn about their journeys and how they’ve helped society manage cybersecurity risk. We draw on our experience helping to run large bureaucracies and forming policy, leading men and women on the battlefield, and on the leadership lessons we’ve learned in the public and private sector. Stories are important to us. What are the stories you've learned about managing security, for yourself and your organizations? We want to hear them. * Substantively, our first season looks at change management through a series of nine analytic frames. In our first episode, “cognition” we explore the psychological reasons for why humanity responds to short-term threats like terrorism but struggles to respond to longer-term threats like climate change and cybersecurity. Jonathan interviews Jason Healey at Columbia’s School of Public and International Affairs about steps we all can take in the future. In “transition” DJ and Jonathan talk about the role of the outdoors in helping leaders manage change and reset their thinking, and the importance of building a “strategic habit” for managing risk and building teams. * In “projection” we interview Jesse Goldhammer about the role of scenario planning and long-term strategic thinking in operational planning. In “narration” Jen Easterly speaks with us about the power of storytelling in helping society adapt to cybersecurity risks. For “proliferation” we speak with Richard Danzig and Kara Frederick about the growth of emerging technologies and weapons proliferation on the world stage and the risks cyberspace technologies post to liberal democracies and what to do about it. Future episodes this season will focus on regulation and risk, the foundation of America’s emergency services for cybersecurity crisis response, the precondition of trust in complex cybersecurity operations, and the necessity of execution skills for leadership. * Addressing major technological change is not easy – we need to build institutions, laws, and safety measures to prevent risk. But that’s what we’re about. * Our encounter with technology is a story of creativity, optimism, and resilience. Give us a listen. Let us know what you think. You can find us on twitter @jonathanreiber @dj_skelton, LinkedIn, and Instagram. The show is brought to you by Illumio, which delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. For more information, visit www.illumio.com
…
continue reading
5 епізоди
Відзначити всі (не)відтворені ...
Головна серій•Feed
Manage series 1165223
Вміст надано Illumio. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Illumio або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episode we explore lessons from public service and the past to inform the leadership and management challenges of our digital present. We also talk about life in the outdoors -- the trips we and our guests have made into the wilderness, the places we've walked and seen, and the trips we will take in the future. Our goal: help humanity to adapt and flourish in the digital age. * In each episode we interview leaders to learn about their journeys and how they’ve helped society manage cybersecurity risk. We draw on our experience helping to run large bureaucracies and forming policy, leading men and women on the battlefield, and on the leadership lessons we’ve learned in the public and private sector. Stories are important to us. What are the stories you've learned about managing security, for yourself and your organizations? We want to hear them. * Substantively, our first season looks at change management through a series of nine analytic frames. In our first episode, “cognition” we explore the psychological reasons for why humanity responds to short-term threats like terrorism but struggles to respond to longer-term threats like climate change and cybersecurity. Jonathan interviews Jason Healey at Columbia’s School of Public and International Affairs about steps we all can take in the future. In “transition” DJ and Jonathan talk about the role of the outdoors in helping leaders manage change and reset their thinking, and the importance of building a “strategic habit” for managing risk and building teams. * In “projection” we interview Jesse Goldhammer about the role of scenario planning and long-term strategic thinking in operational planning. In “narration” Jen Easterly speaks with us about the power of storytelling in helping society adapt to cybersecurity risks. For “proliferation” we speak with Richard Danzig and Kara Frederick about the growth of emerging technologies and weapons proliferation on the world stage and the risks cyberspace technologies post to liberal democracies and what to do about it. Future episodes this season will focus on regulation and risk, the foundation of America’s emergency services for cybersecurity crisis response, the precondition of trust in complex cybersecurity operations, and the necessity of execution skills for leadership. * Addressing major technological change is not easy – we need to build institutions, laws, and safety measures to prevent risk. But that’s what we’re about. * Our encounter with technology is a story of creativity, optimism, and resilience. Give us a listen. Let us know what you think. You can find us on twitter @jonathanreiber @dj_skelton, LinkedIn, and Instagram. The show is brought to you by Illumio, which delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. For more information, visit www.illumio.com
…
continue reading
5 епізоди
همه قسمت ها
×Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.