{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/66fc33b12838c1aca56c4378/66fc33b42838c1aca56c4491?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Cybersecurity 101: What Are the Three Pillars of a Robust Strategy","description":"<p>Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to <a href=\"https://www.linkedin.com/in/nashid-shaker-mba-38711258/\">Nashid Shaker</a>, AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and <a href=\"https://www.linkedin.com/in/antonio-maio-b082191/\">Antonio Maio</a>, Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth—leveraging a multidisciplinary background in strategic planning and cybersecurity. </p><p> </p><p><strong>In This Episode You Will Learn</strong>:      </p><ul>\n<li>When it’s time to re-evaluate your cybersecurity strategy. </li>\n<li>What cybersecurity leaders should think about today to prepare for a future that will use AI. </li>\n<li>Predictions for cybersecurity in the next 2-4 years. </li>\n</ul><p><br></p><p><strong>Some Questions We Ask:</strong>     </p><ul>\n<li>What is the top risk that organizations tend to overlook? </li>\n<li>What are some tips for how cybersecurity leaders should engage with the c-suite?  </li>\n<li>Can cybersecurity contribute to an organization's bottom line or mission? </li>\n</ul><p> </p><p><strong>Resources:</strong>    </p><p><a href=\"https://www.linkedin.com/in/nashid-shaker-mba-38711258/\">View Nash Shaker on LinkedIn</a> </p><p><a href=\"https://www.linkedin.com/in/antonio-maio-b082191/\">View Antonio Maio on LinkedIn</a> </p><p><a href=\"https://www.linkedin.com/in/ericatoelle/\">View Erica Toelle on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:          </strong> <strong>    </strong>    </p><p>Listen to: <a href=\"https://thecyberwire.com/podcasts/afternoon-cyber-tea\">Afternoon Cyber Tea with Ann Johnson </a>  </p><p>Listen to: <a href=\"https://thecyberwire.com/podcasts/security-unlocked\">Security Unlocked</a>      </p><p>Listen to: <a href=\"https://thecyberwire.com/podcasts/security-unlocked-ciso-series\">Security Unlocked: CISO Series with Bret Arsenault</a>       </p><p><br></p><p>Discover and follow other Microsoft podcasts at<a href=\"https://news.microsoft.com/podcasts/\"> microsoft.com/podcasts</a>  </p><p> </p><p><em>Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. </em> </p>","author_name":"Microsoft"}