In media and entertainment we are entrusted with the creative products that constitute invaluable intellectual property. Consequently, security is everyone’s job. Unfortunately, security is filled with complex topics and jargon. DEG seeks to demystify security to give everyone a working knowledge of key concepts.
In this series, hosted by cybersecurity expert Matthew Rosenquist, CISO at Eclipz.io, and Craig Seidel, CTO at Pixelogic and Co-Chair of DEG’s Supply Chain Efficiency & Security committee, we focus on topics specific to media and entertainment. We also provide reference to resources that address more general topics.
We know people’s time is limited so we’ve created short executive-level short videos that introduce concepts. To fill in the gaps, we’ve created longer videos that dive more deeply into the same topics. We target a broad audience ranging from CEOs to individual practitioners.
We plan to release videos and other resources over time.
You might not be an expert in cybersecurity, but you’re responsible for the bottom line, and you need to know if your security program is solid. How can you tell?
Questions are an effective tool to drive important conversations, but you need the right questions to ask.
Here are the three questions Rosenquist suggests CEOs discuss with the CISO.
Cybersecurity risks fall into the categories of Confidentiality, Availability, and Integrity. All risk aspects are relevant to business success goals and must be driving considerations for the cybersecurity teams.
Security can be a significant investment for an organization. How do you know if you’re getting your money’s worth? When deciding where to expend resources on security, it is essential to understand the value proposition of that investment. How do you know if it’s enough?
Not only is security never perfect, with changing landscapes security degrades over time. Effective security requires a recognition of this true.
Cloud-Specific Security Resources
Generic Cybersecurity Resources
DEG thanks Matthew Rosenquist for his contributions. For more, see his Cybersecurity Insights Channel. You may also enjoy his LinkedIn Learning course: 5 Biggest Mistakes of Cybersecurity Programs.
This work was performed for the Security Literacy Project, a subcommittee within ACDA’s Supply Chain Efficiency and Security Committee.
DEG Regular and Associate level members are invited to participate on the Subcommittees and are encouraged to submit ideas for issues to be addressed.
For more information, please email Bekah Sturm (Bekah@degonline.org).