Podcast Preview: GRC Uncensored and the commoditization of compliance

Podcast Preview: GRC Uncensored and the commoditization of compliance

We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored.

This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners in the GRC space. We'll be back to our regular AZT episodes in a couple of weeks.

-----

In the first episode of 'GRC Uncensored,' hosts Troy Fine, dubbed the 'GRC Meme King,' and Elliot Volkman, alongside guest Kendra Cooley dive into the complexities of Governance, Risk, and Compliance (GRC) in cybersecurity. The discussion unravels the 'love-hate' relationship many security professionals have with compliance frameworks like SOC 2, exploring how they have become commoditized and possibly devalued over time.

The conversation touches upon the challenges security practitioners face in conveying the true value of GRC to businesses, the potential pitfalls of 'SOC in a box' offerings, and the broader implications of compliance becoming a 'check the box' exercise. Moreover, the episode delves into the broader regulatory landscape and the ongoing debates about the role of government regulations in cybersecurity compliance. This candid dialogue sets the stage for future episodes that promise further to dissect the nuances of cybersecurity audits and standards.

00:00 Welcome to GRC Uncensored

01:34 Introducing Kendra Cooley

02:05 Love-Hate Relationship with GRC

03:16 The SOC 2 Debate

04:33 Challenges with SOC 2 Audits

09:10 The Value of SOC 2 in the Industry

12:04 The Evolution of Compliance Frameworks

20:39 False Sense of Security in Compliance

24:46 The Buzz Around AI and Quantum

25:10 Staying Updated as a Security Professional

26:45 Challenges in Penetration Testing and Vendor Assessments

27:37 Compliance and Its Impact on Security

30:10 Government Regulations and Their Effectiveness

32:23 The Complexity of Privacy Laws

38:29 The Role of GRC Teams in Risk Management

42:30 Concluding Thoughts and Future Episodes

Hosted on Acast. See acast.com/privacy for more information.

Jaksot(58)

Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins

Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins

Season two, episode 13: Cybersecurity prevention on a global scale with Janey Heins, Global CISO for iHeartMedia. At the heart of Zero Trust is the idea of prevention. If you don’t trust anything or a...

27 Heinä 202344min

Adopting Zero Trust: Continuous Trust

Adopting Zero Trust: Continuous Trust

Over the past two years, we’ve explored the ins and outs of Zero Trust, ranging from the concept as a strategy down to the more technical components, such as how it impacts the physical world as found...

13 Heinä 202329min

Adopting Zero Trust: Nonfederated Apps

Adopting Zero Trust: Nonfederated Apps

Last episode, we brought to you a wild story of a victim who was SIM-swapped four times, and this week we’re back to basics with some fresh research and a closer look at a critical piece of Zero Trust...

29 Kesä 202354min

Adopting Zero Trust: SIM Swapped

Adopting Zero Trust: SIM Swapped

Taking a break from our usual format, this week we chat with a victim-turned-CEO who was hit by SIM-swapping attacks. However, not all harsh starts have to end that way, and Haseeb Awan made the best ...

15 Kesä 202359min

Adopting Zero Trust with Bloomberg: Implemented

Adopting Zero Trust with Bloomberg: Implemented

Season two, episode nine: Featuring Bloomberg’s Head of Information Security Architecture and the Information Security Program, Phil Vachon. Catch this episode on YouTube, Apple, Spotify, Amazon, or G...

25 Touko 202351min

Adopting Zero Trust with Bitwarden: The Mighty Password

Adopting Zero Trust with Bitwarden: The Mighty Password

There’s no avoiding it, the headlines have not been kind to the ways we access systems today. Users are still using 1234, password, and even their dog's name. Not just using these weak passwords but a...

11 Touko 202354min

Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy

Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy

For many, cybersecurity is seen as a cost center that reduces risk to the business. This can be oversimplified to something akin to how HR reduces people-related risks but comes with layer on top of l...

27 Huhti 202357min

Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto

Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto

For more than a decade, Zero Trust as a concept has moved from a philosophy and now into a practical architecture and strategy that organizations can adopt. While Zero Trust encapsulates much of what ...

13 Huhti 202339min