HS010 Budgeting for Cybersecurity

Greg
Ferro

Johna Till
Johnson

Listen, Subscribe & Follow:
Apple Podcasts Spotify Overcast Pocket Casts RSS

When it comes to allocating budget for cybersecurity there are many approaches to breaking it down into line items. We discuss various ideas and possibilities that might offer some insight for your own situation.

Share this episode

Join the conversation

Find professional peers and chat all things networking in the Packet Pushers Slack community.

JOIN 💬

Have feedback for the hosts?

We want your follow-up.

SEND AN FU 😎

Leave a Comment

Comments: 4

  1. VENKAT KANDHARI on

    Hi Team:
    Very good insights. I have two questions.

    1. In the podcast you mentioned both Cisco Webex and Microsoft Teams are bad at security. Why do you say that ? Do you have fact check ? Atleast I didn’t see any security attack reported. Please provide the data

    2. Why do you say to buy Cyber Insurance but not expect anything from it ?

    Regards,
    Venkat

    Reply
    • Greg Ferro on

      2. All insurance is based on contract terms. For technology, the contract terms stipulate a number of requirements which the contractee often fails to meet. Regular audits, use of certain tools, or restrictions on configuration. If the insurer decide to challenge a claim, the client is in weak position.

      Reply
  2. Dan on

    Hi Greg and Johna, I recently stumbled across your Heavy Strategy podcast when it was cross-posted on Packet Pushers and I just wanted to say thanks! I’ve listened to a bunch of episodes already, the content is good and I like the way you play off each other’s opinions. I have met and seen Greg speak at Interop and have been a very long time listener of Packet Pushers and I’ve seen Johna speak at the IT Roadmap series when it was in Chicago, I’m glad you’ve found a fresh way to collaborate and I look forward to more.

    Reply
window.addEventListener("DOMContentLoaded", function() { var preElements = document.getElementsByTagName("pre"); if (preElements && preElements.length > 0) { for (var i = 0; i < preElements.length; i++) { var preElement = preElements[i]; var spanElement = document.createElement("span"); spanElement.classList.add("copy-container"); var buttonElement = document.createElement("button"); buttonElement.textContent = "Copy Snippet"; buttonElement.classList.add("copy-button"); buttonElement.addEventListener("click", createCopyTextHandler(preElement)); spanElement.appendChild(preElement.cloneNode(true)); spanElement.appendChild(buttonElement); preElement.parentNode.replaceChild(spanElement, preElement); } } }); function createCopyTextHandler(element) { return function() { var text = element.textContent; var tempInput = document.createElement("textarea"); tempInput.style = "position: absolute; left: -1000px; top: -1000px"; tempInput.value = text; document.body.appendChild(tempInput); tempInput.select(); document.execCommand("copy"); document.body.removeChild(tempInput); }; } */ ?>