エピソード

  • CMM 11 - Rationalize & Consolidate Security Tools - Recommendation #2 from the 2025 CISO MindMap
    2025/04/20

    Send us fan mail via text by clicking here!

    In this episode of the CISO Mind Map Podcast, hosts Scott Hawk and Rafeeq Rehman dive into Recommendation #2 from the 2025 CISO Mind Map: Consolidate and Rationalize Security Tools.The discussion centers around the challenges organizations face with tool overload, the diminishing returns of excessive tools, and strategies to optimize cybersecurity operations.

    Key Takeaways:

    1. The Problem of Tool Overload:
      • Many organizations use dozens of security tools, often leading to inefficiencies, alert fatigue, and fragmented risk views.
      • Excessive tools can consume valuable time for maintenance and configuration instead of focusing on actual security work.
    2. Human Nature and the "Shiny New Thing":
      • The allure of new tools often leads to unnecessary purchases, adding complexity without proportional benefits.
    3. Impact on SOC Operations:
      • Research shows that 73% of SOCs use over 10 tools, while 45% use more than 20. This can result in alert overload and missed threats due to fragmented systems.
    4. Strategies for Managing Security Tools:
      • Ecosystem Approach:
        • Use a single vendor to provide an integrated suite of tools with centralized management and reporting.
        • Benefits: Single pane of glass visibility, streamlined operations.
        • Drawbacks: Vendor lock-in and risks if the vendor faces issues like financial instability or security breaches.
      • Best-of-Breed Approach:
        • Select the best tool for each specific use case from different vendors.
        • Benefits: Access to cutting-edge technology for specific needs.
        • Drawbacks: Siloed data, multiple vendor relationships, and lack of centralized risk visibility. Organizations should prioritize integration and automation to address these challenges.
    5. Recommendations for Tool Optimization:
      • Conduct a basic analysis to identify overlapping functionalities and redundant tools using a use-case matrix.
      • Explore open-source technologies as cost-effective alternatives where appropriate.
      • Ensure tools are properly configured to avoid vulnerabilities that could turn them into liabilities.
    6. Guiding Principle:
      • "No tool should be worth more than the value it brings or the risk it reduces."

    Thank you for listening! Don’t forget to subscribe, rate, and review the podcast wherever you listen!



    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    29 分
  • CMM 10 - Securing GenAI, Recommendation #1 from the 2025 CISO MindMap
    2025/04/13

    Send us fan mail via text by clicking here!

    Is it too soon for another podcast on AI? The gents think not. The first recommendation of the 2025 CISO MindMap is about securing AI and this week’s podcast attempts to go fairly deep into real-world experiences and recommendations. Your hosts try not to assume everyone is tuned in to all the different types, modes and capabilities of AI, so hopefully you’ll find this episode to be basic enough for newcomers and detailed enough to take action.

    In Rafeeq’s blog, he makes several recommendations which are discussed in this episode.

    • Setup standards and governance for GenAI.
    • Research, validate, and approve LLMs (and other AI models) for use within organizations.
    • Define what it means to have a responsible use of AI within an organization.
    • Create a process to review use cases to ensure standards are adhered to.
    • Update vulnerability management and AI application penetration testing processes to cater new needs for GenAI.
    • Train security professionals on how GenAI, LLMs, RAG and Agents actually work.
    • Establish a training and awareness program for IT staff.
    • Explore open source options for GenAI (which are already providing viable solutions).

    References mentioned in this episode.

    https://rafeeqrehman.com/2025/01/11/how-to-use-genai-in-cybersecurity-operations/

    https://rafeeqrehman.com/2024/06/30/run-llm-models-on-a-macbook/



    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    34 分
  • CMM 9 - The 2025 Edition of the CISO MindMap
    2025/04/06

    Send us fan mail via text by clicking here!

    The lads are excited to be back with a new CISO MindMap Podcast and this episode is extra special. They’re introducing the 2025 Edition of the CISO MindMap, available immediately at Rafeeq’s website. The latest edition makes six recommendations that will be introduced in this episode. Expect to go deeper into each recommendation in the coming weeks.

    This year's recommendations are:

    #1 - it is time for securing genai

    #2 - consolidate and rationalize security tools

    #3 - identify and manage security debt

    #4 - ransomware and cyber resilience

    #5 - create meaningful metrics

    #6 - improve cyber hygiene

    Be sure to subscribe to catch the ongoing discussion and visit Rafeeq’s website for the full CISO MindMap blog and download.

    From Rafeeq’s website:

    The job of a Chief Information Security Officer (CISO) is complex. Many individuals outside the realm of cybersecurity often underestimate the intricacies involved in a security professional’s role. Since its inception in 2012, the CISO MindMap has served as a valuable educational resource, offering insights into CISO responsibilities and aiding security professionals in crafting and enhancing their security programs. Continuously adapting to reflect the evolving landscape of cybersecurity, the CISO MindMap has been updated to accommodate the latest developments in the field. Here is the most recent iteration of the CISO MindMap for 2025, featuring numerous enhancements and fresh recommendations for the next 12-18 months covering the year 2025-26.



    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    22 分
  • CMM 8 - Building or Outsourcing Your SOC
    2025/03/02

    Send us fan mail via text by clicking here!

    In this episode, Rafeeq and Scott discuss the many considerations involved with building your own Security Operations Center SOC. While in no way a comprehensive analysis, the discussion attempts to make the concepts manageable. If you're a small company growing past a few IT headcount, the topic should help you create a vision for your situation. If you’re a larger company and looking to expand, these pointers may be of help

    This conversation focused on budgeting, structure, and decision-making processes, including the choice between building in-house or outsourcing. The discussion covered various aspects of SOC operations, such as staffing requirements, skill development, and the importance of continuous learning in the face of evolving threats. Also emphasized is the need for proper shift management, stress tolerance, and the value of tabletop exercises and purple teaming in assessing SOC effectiveness.

    Rafeeq wrote a great book on this topic. Have a look on Amazon here.

    Check out the calculator Rafeeq mentions in the podcast here.

    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    37 分
  • CMM 7 - Business Lingo For CISOs
    2025/02/23

    Send us fan mail via text by clicking here!

    Welcome to Episode 7 of the CISO MindMap Podcast. This week, Rafeeq and Scott discuss a range of topics related to business acumen. Tucked away in this topic are references to some common themes of this podcast. Themes such as brand-building, business performance, and business alignment are spread throughout the conversation.

    This episode breaks down the business acumen topic into five areas:

    1. Business Management
    2. Accounting & Finance
    3. Sales & Marketing
    4. Industry Specific Knowledge
    5. Legal Terminology and Concepts

    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    35 分
  • CMM 6 - Six Essential Ingredients of a Successful SOC
    2025/02/16

    Send us fan mail via text by clicking here!

    This week, Scott and Rafeeq go wide across the CISO MindMap discussing six key concepts for every Security Operations Center. As the conversation kicks off, Rafreeq takes a few minutes to discuss a recent FBI warning related to texting.

    The six elements discussed are People/Staffing, Processes, Technology Stack, Governance, Data Sources, and Threat Intelligence. Check out Rafeeq’s blog for written commentary on these topics.

    During the conversation, Scott mentions a security incident from Christmas Eve 2024. He laments not recalling the specifics but as predicted, it is well documented. That incident was a hack of a Chrome extension.

    Breach Stats: Scott mentioned that certain statistics are widely available to search engines. Here are the results from a ChatGPT request from February 2025.

    1. Time to Detect and Contain a Breach:

    • Average Detection Time: In 2024, the global average time to identify and contain a data breach was 258 days, marking a seven-year low.
      fieldeffect.com
    • Industry Variations: Detection and containment times can vary by industry. For instance, the energy sector is among the fastest, yet still takes over 30 days on average to identify a breach.
      varonis.com

    2. Attacker Dwell Time:

    • Definition: Dwell time refers to the duration an attacker remains undetected within a system.
    • Current Trends: In 2023, the global median dwell time was reported as 10 days, a decrease from 16 days in 2022.
      reddit.com

    3. Average Cost of a Data Breach:

    • Global Average: The average cost of a data breach globally reached an all-time high of $4.88 million in 2024, a 10% increase from the previous year.
      ibm.com
    • Cost by Company Size:
      • Small Businesses (fewer than 500 employees): Average cost of $2.98 million.
      • Medium Businesses (500-1,000 employees): Slightly lower at $2.63 million.
      • Larger Businesses (1,001-5,000 employees): Higher average cost of $4.09 million.
        prowritersins.com
    • Cost by Industry: Breaches involving customer personal data are particularly expensive, costing $173 per record on average in 2024, up from $156 in 2023.
      bakerdonelson.com

    4. Impact of Detection Time on Breach Cost:

    • Correlation: The longer a breach remains undetected, the higher the financial impact. Companies that contained a breach in less than 30 days saved more than $1 million compared to those that took longer.

    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    40 分
  • CMM 5 - GenAI Risks & Use Cases
    2025/01/12

    Send us fan mail via text by clicking here!

    It’s January 2025 and this podcast is the first of the year. Our first topic is Artificial Intelligence (AI). Or said more specifically, Generative AI. GenAI represents a potential for massive change in modern society. Although various forms of AI have been working their way into security tools and workflows for years, Generative AI has burst on the scene and leveraging it should be a top priority of security professionals.

    In this episode, your hosts are covering content from both Rafeeq’s CISO MindMap and Cybersecurity Learning Saturday. The first topic is GenAI risk, assigned to 3 buckets.

    1. Traditional Tech Risks
    2. GenAI Amplified Risks
    3. Newly Introduced Risks

    The second topic is a review of emerging GenAI use cases in security. Rafeeq documents at least 6 but there will be many more.

    Resources mentioned in this episode:

    • See the slides and learn more about Cybersecurity Learning Saturday.
    • Rafeeq’s blog on LLMs on the Mac is here.
    • Rafeeq mentions Codeshare (not a sponsor), visit them here:
    • Primer on AI coding tools at github
    • Github Copilot

    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    41 分
  • CMM 4 - Tribulations of the CISO
    2025/01/05

    Send us fan mail via text by clicking here!

    Numerous factors determine how long a CISO remains in their position and some can be controlled by the individual. In this episode of the CISO MindMap Podcast, Rafeeq and Scott discuss both the pitfalls and success criteria pertinent to the CISO role. From budgets to culture, they tackle some of the key elements driving the success or failure of the cybersecurity organization.

    https://rafeeqrehman.com/
    https://www.linkedin.com/in/scott-a-hawk/
    https://www.linkedin.com/in/rafeeq/

    続きを読む 一部表示
    27 分