37:54

Episode 13: How to Collect Data That Meets Your Business’s Security Needs With Gary Hayslip

April 20, 2022


Listen on SpotifyListen on Apple Podcasts

For companies operating in the digital space, the subject of security has become critical.  But not many organizations know how to deal with it, what tools to use, and what departments to involve.

Therefore, it’s critical for businesses to understand the importance of intel teams, how they collect and analyze data to mitigate risks, and when outsourcing is inevitable. 

In this episode of Dr. Dark Web, our host Chris Roberts welcomes Gary Hayslip, the Global CISO at SoftBank Investment Advisers & SoftBank Group International. 

The two discuss the importance of reviewing the technology purchased and determining the additional risk they are exposed to as a result. They also talk about the importance of data and putting it into the proper context to be used adequately. Finally, they touch upon the relationships companies must develop with solutions providers — not looking at them as vendors but as partners. 

Podcast Expert

  • Name: Gary Hayslip
  • What he does: Gary is the Global CISO at SoftBank Investment Advisers & SoftBank Group International.
  • Company: SoftBank Investment Advisers & SoftBank Group International
  • Noteworthy: Gary is a mentor and author. So far, he has co-authored five books:
    • CISO Desk Reference Guide Executive Primer: The Executive’s Guide to Security Programs
    • CISO Desk Reference Guide: A Practical Guide for CISOs 
    • CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
    • The Essential Guide to Cybersecurity for SMBs
    • Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level

Podcast Insights

🎙️ It is critical to review the vendor’s offer from a security standpoint before making a choice. Today’s businesses rely on their tech stack. New tools that enable companies to improve their operations are released regularly. But with digital tools come risks, primarily related to security. That’s why it is critical for anyone using those technologies (basically every department) to know what risk they are exposed to when they choose a particular solution. ”As a consumer of services — because I run my security program — […] I try to get as much data as I can to understand if I’m looking at this technology, and if I were to use it, how much more risk exposure am I bringing into my program?”

🎙️ It’s not about the quantity of data; it’s about its quality and context. Information is the most valuable asset today. Especially in the digital space, you must acquire as much data as possible to make your business grow while mitigating security risks. However, no information is valuable if you don’t know its context and how to use it. ”You have the management for the security stack. You have the strategic piece where you’re looking long term at the changes that you need to make and ways that you’re going to support the business as it grows. Then you also have this whole tactical side. You’re taking these various data points, which help you mature your stack and your team. They help you mature what you’re looking at, so you don’t look at false positives.”

🎙️ Look at solution providers as partners rather than vendors. When cybersecurity comes into play, companies that don’t have specialized internal departments must consider outsourcing. Luckily, many third-party vendors offer various solutions to different businesses. However, with its complexity, cybersecurity requires you to perceive these vendors as partners you can trust and build long-term relationships with. Finally, you want to be involved in making security-related decisions. For instance, the conversation may look like this: “Look, we’re just not going to give you access, and then you’re going to take off and do everything. No. You’re going to go ahead and be right there, and we make decisions together. You’re going to review things, and my staff and I will be looking at what you have. And we will make decisions about what we’re looking for because we’re going to integrate you into almost everything within our SIEM, almost everything within our stack. We’re going to go ahead and tie into it.”