Listen "Enterprise encryption around the Hash Table."
Episode Synopsis
Enterprise encryption is a cybersecurity first principle strategy.
Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion.
With Rick Howard, the Cyberwire’s CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy.
Cybersecurity professional development and continued education.
You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion.
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more encryption and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Encryption is like mortar to our first principle wall. It holds together resilience and zero trust for material data. Rick explains the history of famous cryptographic techniques, dives into SolarWinds as an example of zero trust and encryption failure, and identifies some strategies to help implement encryption for data at rest and data in motion. The Hash Table reveals a risk-based approach to deploying encryption and makes a solid case for extensive enterprise encryption to defend against ransomware extortion.
With Rick Howard, the Cyberwire’s CSO and Chief Analyst, joined by Don Welch, the Penn State University Interim VP for IT and CIO, and Wayne Moore, the Simply Business CISO discuss Enterprise encryption as a first principle strategy.
Cybersecurity professional development and continued education.
You will learn about: cryptographic techniques, data at rest and in motion, encryption for data islands, open source and commercial encryption tools, protection against ransomware and extortion.
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more encryption and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
More episodes of the podcast CISO Perspectives (public)
The existing state of regulation.
23/09/2025
The return of CISO Perspectives.
16/09/2025
Bringing it all together.
08/07/2025
Mid season reflection with Kim Jones.
10/06/2025
Are we a trade or a profession?
22/04/2025
Is the cyber talent ecosystem broken?
15/04/2025
CISO Perspectives is back!
08/04/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.