

CISO Tradecraft®
G Mark Hardy & Ross Young
You are not years away from accomplishing your career goals, you are skills away. Learn the Tradecraft to Take Your Cybersecurity Skills to the Executive Level. © Copyright 2025, National Security Corporation. All Rights Reserved
Episodes
Mentioned books

Nov 18, 2024 • 46min
#207 - CISO Burnout (with Raghav Singh)
Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Raghav shares valuable insights from his extensive research on the unique stresses faced by CISOs, the organizational factors contributing to burnout, and practical coping mechanisms. We also explore the evolutionary phases of CISOs, from technical experts to strategic business enablers. Whether you're dealing with resource limitations, seeking executive support, or managing ever-evolving cybersecurity threats, this episode offers actionable advice to navigate the demanding role of a CISO successfully. Don't forget to like, comment, and share to help other CISOs and cybersecurity leaders!
Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/
CruiseCon Discount Code: CISOTRADECRAFT10
Transcripts: https://docs.google.com/document/d/1fhLkaj_JetlYFQ50Q69uMGmsw3fS3Wqa
CISO Burnout - https://aisel.aisnet.org/amcis2023/sig_lead/sig_lead/4/
CISO-CIO Power Dynamics https://aisel.aisnet.org/amcis2024/is_leader/is_leader/6/
Cybersec professionals and AI integration https://aisel.aisnet.org/amcis2024/security/security/29/
Raghav can be reached on rsingh45@buffalo.edu
Chapters
00:00 Introduction and Guest Welcome
02:34 Understanding CISO Burnout
03:24 PhD Journey and Challenges
10:12 Key Findings on CISO Burnout
18:39 Six Sources of CISO Burnout
32:47 CISO Maturity Levels
42:57 Conclusion and Call to Action

Nov 11, 2024 • 46min
#206 - Ira Winkler CruiseCon Founder
Setting Sail with Cybersecurity: Exclusive Insights from Ira Winkler on CruiseCon 2025 🛳️ Join us for an exciting episode of CISO Tradecraft as G Mark Hardy sits down with renowned cybersecurity expert Ira Winkler! Discover the groundbreaking CruiseCon 2025, the first at-sea cybersecurity conference, featuring top-tier speakers and unrivaled networking opportunities. Learn about Ira's illustrious career, the significance of certifications, and the current state of the cybersecurity job market. Don't miss out on this chance to enhance your career and connect with industry luminaries.
Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/
CruiseCon Discount Code: CISOTRADECRAFT10
Transcripts: https://docs.google.com/document/d/1CGyFBxOrxvJitKsH9BRKwf2_g8rRPZ6K
Chapters
00:00 Introduction and Special Announcement
00:42 Reconnecting with Ira Winkler
04:07 Early Cybersecurity Days and Certifications
14:35 Innovative Ideas and CruiseCon
21:32 Meet the Top Cybersecurity Experts
22:13 Exciting Events and Networking Opportunities
24:10 Special Deals and Sponsorships
34:47 Addressing the Cybersecurity Job Market

Nov 4, 2024 • 46min
#205 - Wisdom from the 1st Cyber Colonel (JC Vega)
Join G. Mark Hardy on this exciting episode of CISO Tradecraft as he interviews J.C. Vega, the first cyber colonel in the United States Army. Vega shares his invaluable insights on leadership, team building, and success strategies that can transform your cybersecurity career. Plus, learn about CruiseCon 2025, Wee Dram, and how you can take your leadership skills to the next level. Don't miss out on this episode packed with wisdom, actionable advice, and some fun anecdotes. Subscribe, comment, and share with your peers!
Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/
CruiseCon Discount Code: CISOTRADECRAFT10
JC Vega - https://www.linkedin.com/in/jcvega-cyber-colonel/
Transcripts: https://docs.google.com/document/d/1ExuX-WVO4_qqLoIZDuT0QS2VAvN2resW
Chapters
00:00 Introduction and Special Guest Announcement
01:15 Meet J.C. Vega: The First Cyber Colonel
01:55 The Wee Dram Community
03:39 Building a Trusted Cybersecurity Community
09:12 Leadership Principles from Military to Civilian Life
12:31 Building and Leading Effective Teams
24:17 The Peter Principle and Career Progression
24:49 Creating a Shared Understanding in Cybersecurity
26:43 Commander's Intent: Defining Success
29:29 Empowering Teams and Accepting Prudent Risk
36:19 Rules to Live By: The Vega's Top Three
44:58 Final Thoughts and Farewell

Oct 28, 2024 • 24min
#204 - Shadows and Zombies in the Data Center
In this special Halloween episode of CISO Tradecraft, host G Mark Hardy delves into the lurking dangers of Shadow IT and Zombie IT within organizations. Learn about the origins, risks, and impacts of these hidden threats, and discover proactive measures that CISOs can implement to safeguard their IT ecosystems. Strategies discussed include rigorous asset management, automation, and comprehensive compliance reviews. Tune in for insights to foster a secure, compliant, and efficient IT environment, and don't miss out on an exclusive opportunity to join a cybersecurity conference aboard a luxury cruise.
Big Thanks to our Sponsor
CruiseCon - https://cruisecon.com/
CruiseCon Discount Code: CISOTRADECRAFT10
Transcripts: https://docs.google.com/document/d/1lh-TQhaSOIA2rITaXgTaqugl7FRGevnn
Chapters
00:00 Introduction to Shadow IT and Zombie IT
02:14 Defining Shadow IT
04:58 Risks of Shadow IT
07:29 Introduction to Zombie IT
09:35 Risks of Zombie IT
11:25 Shadows vs Zombies
11:25 Comparing Shadow IT and Zombie IT
19:11 Lifecycle Management Strategies
19:56 Summarizing the Threats and Solutions
22:32 Final Thoughts and Call to Action

Oct 21, 2024 • 17min
#203 - Be SOCcessful with the SOC-CMM
Unlocking SOC Excellence: Master the SOC Capability Maturity Model Join host G Mark Hardy in this compelling episode of CISO Tradecraft as he explores the revolutionary SOC Capability Maturity Model (SOC CMM) authored by Rob van Os. This episode is a must-watch for CISOs, aspiring CISOs, and cybersecurity professionals aiming to optimize their Security Operations Center (SOC). Learn how to measure, evaluate, and enhance your SOC's maturity across key domains including Business, People, Process, Technology, and Services. Gain insights into leveraging radar charts for visualizing SOC capabilities and hear case studies such as a mid-sized financial company’s remarkable improvements. Discover why understanding your SOC's strengths and weaknesses and conducting risk-based improvement planning are crucial. Don't miss out—elevate your cyber resilience today, subscribe, and share with your network to set your SOC on the path to excellence!
References:
SOC-CMM - https://www.soc-cmm.com/products/soc-cmm/
Robert van Os - https://www.linkedin.com/in/socadvisor/
Transcripts: https://docs.google.com/document/d/1Fk6_t9FMyYXDF-7EfgpX_ZjLc0iPAgfN
Chapters
00:12 Introduction to CISO Tradecraft and SOCs
01:20 Understanding SOC CMM: A Game-Changing Tool
02:29 Evaluating SOC Maturity and Capability
06:04 Benefits and Implementation of SOC CMM
07:56 Understanding SOC Assessments
08:55 Deep Dive into SOC CMM Domains
12:42 Benefits and Flexibility of SOC CMM
14:40 Real-World Application and Conclusion

Oct 14, 2024 • 45min
#202 - Cybersecurity Crisis: Are We Failing the Next Generation?
In this episode of CISO Tradecraft, host G Mark Hardy explores the challenges and misconceptions facing the next generation of cybersecurity professionals. The discussion covers the myth of a talent shortage, the shortcomings of current educational and certification programs, and the significance of aligning curricula with real-world needs. Hardy emphasizes the importance of hands-on experience, developing soft skills, and fostering continuous learning. The episode also highlights strategies for retaining talent, promoting internal training, and creating leadership opportunities to cultivate a skilled and satisfied cybersecurity workforce.
Transcripts: https://docs.google.com/document/d/12fI2efHXuHR4dS3cu7P0UIBCtjBdgREI
Chapters
00:00 Introduction to the Cybersecurity Talent Crisis
00:40 Debunking the Talent Shortage Myth
02:23 The Real Talent Gap: Mid-Career Professionals
03:04 Outsourcing and Its Impact on Entry-Level Jobs
08:29 Challenges in Cybersecurity Education
16:13 The Importance of Practical Skills Over Theory
23:52 The Importance of Writing Skills
25:10 Continuous Learning and Self-Investment
26:07 Performance and Career Progression
28:40 Mentorship and Onboarding
29:51 Training and Development Challenges
32:32 Retention Strategies
33:44 Engaging Junior Employees
39:07 Technology and Innovation
40:54 Conclusion and Final Thoughts

Oct 7, 2024 • 18min
#201 - Avoiding Hurricanes in the Cloud
In this episode of CISO Tradecraft, hosted by G Mark Hardy, you'll learn about four crucial tools in cloud security: CNAPP, CASB, CSPM, and CWPP. These tools serve various functions like protecting cloud-native applications, managing access security, maintaining cloud posture, and securing cloud workloads. The discussion covers their roles, benefits, key success metrics, and best practices for CISOs. As the cloud security landscape evolves, understanding and integrating these tools is vital for keeping your organization safe against cyber threats.
Transcripts: https://docs.google.com/document/d/1Mx9qr30RuWrDUw1TLNkUDQ8xo4xvQdP_
Chapters
00:00 Introduction to Cloud Security Tools
02:24 Understanding CNAPP: The Comprehensive Cyber Defense
08:13 Exploring CASB: The Cloud Access Gatekeeper
11:12 Diving into CSPM: Ensuring Cloud Compliance
13:40 CWPP: Protecting Cloud Workloads
15:08 Best Practices for Cloud Security
15:54 Conclusion and Final Thoughts

Sep 30, 2024 • 45min
#200 - Copywriting AI (with Mark Rasch)
In this episode of CISO Tradecraft, hosts G Mark Hardy and Mark Rasch discuss the intersection of artificial intelligence and the law. Recorded at the COSAC computer conference in Dublin, this episode covers the legal implications of AI, copyright issues, AI-generated content, privacy concerns, and ethical considerations. They explore the nuances between directed and undirected AI, the importance of training data, and the potential risks and liabilities associated with AI-driven systems. Tune in for a deep dive into how AI is reshaping cybersecurity and legal landscapes.
Transcripts: https://docs.google.com/document/d/1s_eDwz-FPuyxYZRJaOknWi2Ozjqmodrl
Chapters
00:00 Introductions
01:13 Diving into Artificial Intelligence
04:04 Directed vs. Undirected AI
11:02 Legal and Ethical Issues of AI
23:47 AI and Copyright: Who Owns the Creation?
26:59 The Role of AI in Information Security
32:51 Ethical Dilemmas in AI Decision-Making
39:18 Future Challenges and Recommendations for AI

Sep 23, 2024 • 28min
#199 - How to Secure Generative AI
Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landscape.
References
OWASP Top 10 LLM Risks https://genai.owasp.org/
Gartner CARE Standard - https://www.gartner.com/en/documents/3980890
Make sure your controls work consistently over time (Consistency)
Make sure your controls meet the business needs (Adequacy)
Make sure your controls are appropriate and fair (Reasonableness)
Make sure your controls produce the desire outcome (Effectiveness)
Transcripts: https://docs.google.com/document/d/1V2ar7JBO503MN0RZcH7Q7VBkQUW9MYk6
Chapters
00:00 Introduction from Spain
00:42 Understanding Generative AI
03:25 Major Players in Generative AI
05:02 Risks of Generative AI
15:14 Mitigating Generative AI Risks
18:23 Implementing Solutions
24:09 Conclusion and Call to Action

Sep 16, 2024 • 22min
#198 - Securing the Business Processes
G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like the CIA triad (Confidentiality, Integrity, Availability) to bolster your organization's cybersecurity posture. Tune in as G Mark, broadcasting from Glasgow, Scotland, shares valuable lessons on proactive security measures, risk-based decision-making, and crisis recovery strategies.
7 critical business processes common to most organizations.
Book
Order
Bill
Pay
Ship
Close
Communicate
Transcripts
https://docs.google.com/document/d/1Ra3c0J5Wo6s2BSqhNoNyqm9D65ogT07h
Chapters
00:00 Introduction to Securing the Business
00:12 Begin Podcast
01:08 Understanding Critical Business Processes
02:23 Identifying and Prioritizing Business Functions
03:00 Real-World Example: Restaurant Booking System
04:57 Decision Making in Crisis Situations
10:38 Mapping Confidentiality, Integrity, and Availability
19:42 Conclusion and Final Thoughts


