{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2F7a8ba6ef-59e5-40d4-ab8e-2f9c1a17d8e0","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"Program Your Program\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/7a8ba6ef-59e5-40d4-ab8e-2f9c1a17d8e0\"></iframe>","title":"Program Your Program","description":"This week on The Great Security Debate we have arrived at one of our favourite episodes of the year (and what is and will be an annual thing!) when Forrester Senior Analyst, Jess Burn, returns to the show to share this years recommendations for security programs. \r\n\n\nAn overarching theme of the report is to use the captital that the CISO has acquired over the past few years and build out your program to where it needs to be. AKA, \u201cstrike while the iron is hot\u201d\r\n\n\nMore detailed topics including:\r\n\n\n\nCareer paths and changes in comp methodology for security teams need to change\r\n\nSecurity Awareness needs adjustment for work for anywhere\r\n\nMinimum viable security - it\u2019s definitely not just \u201cbarely secure\u201d\r\n\n\n\nAnd a reminder that Dan, Brian and Erik will be doing a live episode of the podcast at the upcoming Michigan Women in Technology ExecutiveManagement Conference on May 5 in Novi, Michigan. Tickets for the whole conference are now available (https://MCWT.org (https://MCWT.org)) and the agenda for the day is great. See you there\r\n\n\nIf you want to listen to Jess\u2019s previous episode, check out Episode 20, \u201cIt All Comes Down To Relaltionships.\u201d https://www.greatsecuritydebate.net/20 (https://www.greatsecuritydebate.net/20)\r\n\n\nYou can find Jess on LinkedIn (https://www.linkedin.com/in/jessburn (https://www.linkedin.com/in/jessburn)), Twitter (https://twitter.com/jess_burn_ (https://twitter.com/jess_burn_)) and at the Forrester blog (https://go.forrester.com/blogs/author/jess_burn/ (https://go.forrester.com/blogs/author/jess_burn/)). \r\n\n\nThanks for joining us, Jess!  And thanks to you for listening and watching.\r\nSpecial Guest: Jessica Burn.\r\nhttps://www.patreon.com/securitydebate (Support The Great Security Debate)\r\nLinks:\r\nhttps://www.forrester.com/blogs/our-2022-top-recommendations-for-your-security-program-cisos-get-an-offer-they-cant-refuse/ (Forrester's 2022 Top Recommendations For Your Security Program)\r\nhttps://www.forrester.com/blogs/the-return-of-the-cybersecurity-incident-response-services-wave/ (The Return Of The Forrester Wave\u2122: Cybersecurity Incident Response Services)\r\nhttps://www.inputmag.com/tech/starlink-russian-jamming-attack-us-military-elon-musk-vladimir-putin (Starlink fought off Russian jamming attack faster than the military could)","thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/153c25aa-69f3-4325-9ea1-b7956fca63aa/cover.jpg"}