Episode 13

Cybersecurity is Patient Safety

"Cybersecurity is patient safety and patient safety is cybersecurity," is how Stoddard Manikin, Chief Information Security Officer, Children's Healthcare of Atlanta, described the significance of cybersecurity readiness in the healthcare sector. Speaking with exceptional clarity and eloquence, Stoddard traced the evolution of the cybersecurity threat landscape and governance approaches, before discussing in detail what it takes to succeed as a modern CISO.

Time Stamps

01:35

How would you describe the evolution of the cybersecurity phenomenon and what has stayed with you by way of lessons learned?

05:17

Talking about specialization, getting the right people for the right kinds of roles in cybersecurity is very critical. And there are challenges there. But at the same time, you also need the non-cyber security professionals, the members of the organization to do their part. Don't you agree?

06:55

What are your recommendations when it comes to cybersecurity awareness and training?

10:41

What are some metrics or KPIs that are being tracked or should be tracked?

13:37

What does it take to make a CISO, and when I say CISO, I mean the CISO function as a whole, effective?

17:35

From a practical standpoint, how feasible is it to involve legal or to work with legal closely?

19:59

How and to what extent does your function partner with Legal when formulating and reviewing cybersecurity strategies?

22:25

How do you stay on top of industry regulations and compliance requirements?

24:18

What is the state of cybersecurity readiness in the US healthcare industry?

28:40

Is it common practice to regularly test the disaster recovery capabilities of an organization?

30:46

What are your thoughts on the practicality of conducting real-time security audits?

33:19

According to media reports, many of the breaches that have happened, large breaches, major breaches, the story goes that the organization was made aware, or a particular individual was made aware, who did nothing about it. Based on your experience in the field, how or why does that happen?

36:03

How feasible is it to have structures and mechanisms to ensure joint ownership and accountability both within the organization, as well as when you're partnering up with vendors?

40:23

Any final thoughts for the audience?


Memorable Stoddard Manikin Quotes

"Cybersecurity is everyone's responsibility within an organization. We're past the days where you have a few people in a room providing all the security to the organization, and it's just up to them to take care of it. It's now a central team coordinating cybersecurity for an organization but directing a lot of different players."

"And when it comes down to it, people are the easiest way to breach an organization's security defenses. So it's incumbent on every organization to train all of their users that have access to IT resources, and equip them with the knowledge and awareness they need, so that they can be prepared, should someone target them with some kind of attack or attempted attack."

"I find that providing them specialized training, giving them a forum to ask questions, testing them on it, perhaps even monthly with a simulation exercise is how you get the best behavioral response. The other part of that training is it can't just be one way where you're giving them the info; the next step is to test them on it. And then the step after that is to measure them on it."

"First and foremost, the most fundamental thing you've got to know as the CISO is the business of the organization that you're in. Because if you don't understand how the business operates, what it does, how it earns money, how it spends money, where it really makes its profit that funds other areas that have losses, then it's very hard for you to understand how to prioritize what security controls need to be put in place, and also how restrictive you can be without cutting off the lifeblood of the organization."

"So a patient can recover from a data breach, but they might not be able to fully recover from lack of care. So that's where I really want to emphasize that cybersecurity is patient safety. And we all have to take it seriously, regardless of where we are in that healthcare ecosystem."


Connect with Host Dr. Dave Chatterjee and Subscribe to the Podcast

Please subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes release every two weeks.

Connect with Dr. Chatterjee on these platforms:

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338

Transcript
Introducer:

Welcome to the Cybersecurity Readiness Podcast

Introducer:

Series with Dr. Dave Chatterjee. Dr. Chatterjee is the author of

Cybersecurity Readiness:

A Holistic and High-Performance

Cybersecurity Readiness:

Approach by SAGE publishing. He has been studying cybersecurity

Cybersecurity Readiness:

for over a decade, authored and edited scholarly papers,

Cybersecurity Readiness:

delivered talks, conducted webinars, consulted with

Cybersecurity Readiness:

companies, and served on a cybersecurity SWAT team with

Cybersecurity Readiness:

Chief Information Security officers. Dr. Chatterjee is an

Cybersecurity Readiness:

Associate Professor of Management Information Systems

Cybersecurity Readiness:

at the Terry College of Business, the University of

Cybersecurity Readiness:

Georgia, and Visiting Professor at Duke University's Pratt

Cybersecurity Readiness:

School of Engineering.

Dr. Dave Chatterjee:

Hello, everyone, I'm delighted to

Dr. Dave Chatterjee:

welcome you to another episode of the Cybersecurity Readiness

Dr. Dave Chatterjee:

Podcast Series. Today, our guest is Mr. Stoddard Manikin, Chief

Dr. Dave Chatterjee:

Information Security Officer, Children's Healthcare of

Dr. Dave Chatterjee:

Atlanta, with over 18 years of progressive experience in

Dr. Dave Chatterjee:

information technology, security, and privacy. Stoddard

Dr. Dave Chatterjee:

specializes in advising complex organizations on security

Dr. Dave Chatterjee:

topics, including regulatory compliance, integrating

Dr. Dave Chatterjee:

information security with enterprise risk management, and

Dr. Dave Chatterjee:

identity and access management. So we are truly privileged to

Dr. Dave Chatterjee:

have a subject matter expert with us. Stoddard, welcome!

Dr. Dave Chatterjee:

Thanks for making time for this podcast.

Stoddard Manikin:

Thank you, Dave. It's great to be here.

Dr. Dave Chatterjee:

So given the amount of time you've spent

Dr. Dave Chatterjee:

as a cybersecurity professional, I'm sure you've seen a lot over

Dr. Dave Chatterjee:

the last 25 years in the cybersecurity space. How would

Dr. Dave Chatterjee:

you capture the evolution of this phenomenon and what has

Dr. Dave Chatterjee:

stayed with you by way of lessons learned?

Stoddard Manikin:

I think that cybersecurity has evolved

Stoddard Manikin:

dramatically, since I've been involved in the 1990s. And and

Stoddard Manikin:

that's true of so many aspects of, you know, modern life. But

Stoddard Manikin:

in particular, we didn't used to call it cybersecurity, either.

Stoddard Manikin:

We used to call it you know, information security or even

Stoddard Manikin:

data security. So, the name itself has changed over time to

Stoddard Manikin:

reflect what, what the world thinks of it. But I think that,

Stoddard Manikin:

most importantly, it's, it's captured the imagination, much

Stoddard Manikin:

more. So it's kind of follow that hype train, if you will,

Stoddard Manikin:

that popular culture typically does where something is

Stoddard Manikin:

marginally understood by the masses. And then some tiny

Stoddard Manikin:

aspect of it is used to appeal to the masses. Like if you look

Stoddard Manikin:

back many years ago, when they were hacker movies coming out of

Stoddard Manikin:

Hollywood, and everything was just super oversimplified and

Stoddard Manikin:

glorified. And it made everybody fear that these hackers were

Stoddard Manikin:

everywhere. And they could get in and steal all your

Stoddard Manikin:

information by guessing a couple of passwords, right. So now I

Stoddard Manikin:

think we've gotten to a point where most people realize

Stoddard Manikin:

there's not just somebody hiding in a basement somewhere with a

Stoddard Manikin:

dial up modem cracking into all these different organizations. I

Stoddard Manikin:

mean, now we're talking about organized crime, state sponsored

Stoddard Manikin:

actors, you know, script kiddies, renting ransomware as a

Stoddard Manikin:

service and using it to make money. And it is truly a college

Stoddard Manikin:

cottage industry, where at this point, a lot of these

Stoddard Manikin:

ransomware-as-a-service will not only provide the software, but

Stoddard Manikin:

also they include English speaking help desks to help

Stoddard Manikin:

their payers figure out how to buy bitcoin and pay the ransom.

Stoddard Manikin:

So it's a tremendous evolution in terms of the threat

Stoddard Manikin:

landscape. And it's also remarkable evolution from the

Stoddard Manikin:

perspective of practitioners like ourselves. So the

Stoddard Manikin:

specialization is significant. Whereas 20 years ago, you might

Stoddard Manikin:

have one security person or maybe just a network person who

Stoddard Manikin:

dabbled in security, and they had to learn how to do it all.

Stoddard Manikin:

And the expectation for management was that one person

Stoddard Manikin:

could do it all. And and now you have specialization of positions

Stoddard Manikin:

in cybersecurity much like you do in the medical field, where

Stoddard Manikin:

you wouldn't want to hire, say, a surgeon to look at common

Stoddard Manikin:

colds. Right? What is the point of that? Nor would you want a

Stoddard Manikin:

general practitioner doing surgery? Well, it's a lot like

Stoddard Manikin:

that in cybersecurity, there are certain positions where you are

Stoddard Manikin:

trained to do certain things, and you are not necessarily an

Stoddard Manikin:

expert to do others. And so that specialization has become very

Stoddard Manikin:

traumatic in the industry. And unfortunately, we still have a

Stoddard Manikin:

ways to go in convincing non-practitioners of this

Stoddard Manikin:

specialization importance because we still see job

Stoddard Manikin:

postings out there looking for a security professional and

Stoddard Manikin:

they're expected to do the work of eight different people. So I

Stoddard Manikin:

think that's that's kind of the next step of the evolution. It's

Stoddard Manikin:

that recognition of the variety of specializations in

Stoddard Manikin:

cybersecurity, and that no one person can do them all.

Dr. Dave Chatterjee:

You captured the the landscape very,

Dr. Dave Chatterjee:

very well. I couldn't agree with you more. Talking about

Dr. Dave Chatterjee:

specialization, getting the right people for the right kinds

Dr. Dave Chatterjee:

of roles in cybersecurity is very critical. And there are

Dr. Dave Chatterjee:

challenges there. But, at the same time, you also need the

Dr. Dave Chatterjee:

non-cybersecurity professionals, the members of the organization

Dr. Dave Chatterjee:

to also do their part. Don't you agree?

Stoddard Manikin:

Absolutely. Cybersecurity is everyone's

Stoddard Manikin:

responsibility within an organization. It's to the point

Stoddard Manikin:

where in my opinion, certainly every IT job description, should

Stoddard Manikin:

have some type of security requirements written into it.

Stoddard Manikin:

Because I think we're past the days where you have a few people

Stoddard Manikin:

in a room providing all the security to the organization,

Stoddard Manikin:

and it's just up to them to take care of it. It's now a central

Stoddard Manikin:

team coordinating cybersecurity for an organization, but

Stoddard Manikin:

directing a lot of different players. And when it comes down

Stoddard Manikin:

to it, people are the easiest way to breach an organization's

Stoddard Manikin:

security defenses. So it's incumbent on every organization

Stoddard Manikin:

to train all of their users that have access to IT resources, and

Stoddard Manikin:

equip them with the knowledge and awareness they need, so that

Stoddard Manikin:

they can be prepared, should someone target them with some

Stoddard Manikin:

kind of attack or attempted attack.

Dr. Dave Chatterjee:

Yeah, the human element in cybersecurity

Dr. Dave Chatterjee:

is so significant, I like the way you framed it. I couldn't

Dr. Dave Chatterjee:

emphasize more what you just said, everyone has a role to

Dr. Dave Chatterjee:

play, and they must be trained accordingly. You know, I've been

Dr. Dave Chatterjee:

doing research in this area, I've authored a book I consult

Dr. Dave Chatterjee:

as well. One of the things that I see across the spectrum, is a

Dr. Dave Chatterjee:

varied approach to cybersecurity awareness and training. In some

Dr. Dave Chatterjee:

organizations, it's about checking the box and doing the

Dr. Dave Chatterjee:

required training once or twice in the year. It's kind of broad

Dr. Dave Chatterjee:

based, a hit or miss approach. And then there are other

Dr. Dave Chatterjee:

organizations where they have a more role focused training. In

Dr. Dave Chatterjee:

your experience, what have you seen? Or what are you seeing?

Dr. Dave Chatterjee:

And what are your recommendations when it comes to

Dr. Dave Chatterjee:

cybersecurity awareness and training?

Stoddard Manikin:

It's a great question, because it's so

Stoddard Manikin:

relevant. And I think that what you were describing where an

Stoddard Manikin:

organization might provide, perhaps an onboarding training,

Stoddard Manikin:

when they first start to say, Hey, don't give your password

Stoddard Manikin:

anyone and here's how you enroll and password reset and, and

Stoddard Manikin:

watch out for phishing attempts. That's, like maturity level 1.0

Stoddard Manikin:

And table stakes. Right? You have to do that on their first

Stoddard Manikin:

day, of course. But from there, it requires consistent

Stoddard Manikin:

reinforcement of the topic, and reminders for people because

Stoddard Manikin:

human beings typically can't retain information forever after

Stoddard Manikin:

hearing it once. And so what I find to be most effective is to

Stoddard Manikin:

start off with that kind of onboarding training, that

Stoddard Manikin:

background stuff, the context. And then what that does is it

Stoddard Manikin:

plants triggers, so that when the users hear future trainings,

Stoddard Manikin:

it reminds them Oh, yeah, that is important. And I remember why

Stoddard Manikin:

and I heard this before somewhere, but I can't quite

Stoddard Manikin:

make it out. And so over time, you build up that retention and

Stoddard Manikin:

awareness. And I think that minimum once a year type of

Stoddard Manikin:

training is what a lot of organizations do. And frankly,

Stoddard Manikin:

it's it's not enough depending on someone's job function and

Stoddard Manikin:

responsibility. So may be you do that for the majority of your

Stoddard Manikin:

workforce that rarely has to worry about security issues. But

Stoddard Manikin:

if you've got people processing an invoice and payroll, then

Stoddard Manikin:

they are specifically going to be targeted with business email

Stoddard Manikin:

compromise attempts constantly. And if you only train them once

Stoddard Manikin:

a year, you can't expect them to successfully repelled those

Stoddard Manikin:

tacks that have been honed and improved upon through 1000s of

Stoddard Manikin:

attempts around the world on a daily basis. So I find that

Stoddard Manikin:

providing them specialized training, giving them a forum to

Stoddard Manikin:

ask questions, testing them on it, perhaps even monthly with a

Stoddard Manikin:

simulation exercise is how you get the best behavioral

Stoddard Manikin:

response. The other part of that training is it can't just be one

Stoddard Manikin:

way when you're giving them the info, the next step is to test

Stoddard Manikin:

them on it. And then the step after that is to measure them on

Stoddard Manikin:

it. So for example, if you do a quarterly or a monthly phishing

Stoddard Manikin:

test, capture the results of that test, did people click on

Stoddard Manikin:

the link or enter their credentials? Did they open the

Stoddard Manikin:

attachment? Did they do nothing? Did they report the message

Stoddard Manikin:

proactively, which is the best behavior, and then report on

Stoddard Manikin:

those percentages by department by division by type of user to

Stoddard Manikin:

the leadership chain, and the data will help you figure out

Stoddard Manikin:

where your education is working, and where it needs to be

Stoddard Manikin:

improved.

Dr. Dave Chatterjee:

Fantastic means being able to measure the

Dr. Dave Chatterjee:

effectiveness of training is so critical. And I don't hear folks

Dr. Dave Chatterjee:

in your position emphasize this enough. In fact, the first time

Dr. Dave Chatterjee:

I'm hearing a CISO so emphatically, specifying the

Dr. Dave Chatterjee:

importance of measurement. Because, there's no point giving

Dr. Dave Chatterjee:

people training, if you're not being able to see the progress,

Dr. Dave Chatterjee:

or if you don't see the progress, what else can be done.

Dr. Dave Chatterjee:

In other words, you know, taking a very substantive approach, as

Dr. Dave Chatterjee:

opposed to check-the-box approach where you really want

Dr. Dave Chatterjee:

to see this, whatever training is being is being given is

Dr. Dave Chatterjee:

having an impact. Talking about measurement Stoddard, if we can

Dr. Dave Chatterjee:

go a little broader, as the CISO of your organization, and you

Dr. Dave Chatterjee:

don't have to be specific to your organization, you can be

Dr. Dave Chatterjee:

very generic. What are some metrics or KPIs that are being

Dr. Dave Chatterjee:

tracked or should be tracked?

Stoddard Manikin:

This is a very challenging one to answer.

Stoddard Manikin:

Because the, the audience that you're preparing the metrics

Stoddard Manikin:

for, has very different levels of understanding of them. So you

Stoddard Manikin:

know, if you think back to the old days, when you had a, a

Stoddard Manikin:

CISO, who was more of like a network security person or an IT

Stoddard Manikin:

security person, they would try out the metrics of, you know,

Stoddard Manikin:

the number of intrusion attempts and the number of things that

Stoddard Manikin:

got blocked at the firewall, and all very kind of technical,

Stoddard Manikin:

objective data that wasn't necessarily meaningful to the

Stoddard Manikin:

audience. I think there's a place for some of that data, to

Stoddard Manikin:

remain in your kind of dashboard reporting type of things,

Stoddard Manikin:

particularly for your executive team and your board. But I think

Stoddard Manikin:

you've also got to have some other really common sense

Stoddard Manikin:

measures in there. Things that are more related to the

Stoddard Manikin:

organization itself. Like, for example, if you have a strategic

Stoddard Manikin:

goal, to reach a certain level of maturity on a given maturity

Stoddard Manikin:

framework, then you might want to report on what your most

Stoddard Manikin:

recent third party assessment gave you as the maturity

Stoddard Manikin:

ranking. And whether that's up or down, and the areas where you

Stoddard Manikin:

improve the areas where you're still lagging, and so forth. You

Stoddard Manikin:

might also want include something along the lines of the

Stoddard Manikin:

number of IT audit findings that happened from an external audit,

Stoddard Manikin:

because I think that's important to to watch for trends. And then

Stoddard Manikin:

you can dive into the details either in the comment section or

Stoddard Manikin:

in follow up q&a, where you say, here's where the audit findings

Stoddard Manikin:

are, is it a same place as the last three years? And we're not

Stoddard Manikin:

fixing it? Or is a brand new place? Or is it a brand new

Stoddard Manikin:

field, like related to cloud security that's just so new that

Stoddard Manikin:

you don't have a handle on it yet. And I think that that way,

Stoddard Manikin:

your metrics can drive the conversation of where you need

Stoddard Manikin:

to focus and prioritize investment.

Dr. Dave Chatterjee:

Absolutely. In fact, you touched upon three

Dr. Dave Chatterjee:

things about performance measures. First is taking a

Dr. Dave Chatterjee:

holistic approach. In fact, when I look at my research, my book,

Dr. Dave Chatterjee:

I come at it from the standpoint of business value impact

Dr. Dave Chatterjee:

measures, productivity measures, extent of preparedness measures,

Dr. Dave Chatterjee:

audit and compliance measures. And there can be more. The

Dr. Dave Chatterjee:

second, the second thing that you talked about is equally

Dr. Dave Chatterjee:

important, what's the point of measuring, if we are not gonna

Dr. Dave Chatterjee:

review the results and act on them? So what mechanisms are in

Dr. Dave Chatterjee:

place to effectively and promptly review the findings and

Dr. Dave Chatterjee:

take action? And the third is, who is interested in these

Dr. Dave Chatterjee:

measures? And how important are these measures to them, as you

Dr. Dave Chatterjee:

know, in organizations, there can be a multitude of metrics,

Dr. Dave Chatterjee:

and often what gets measured is what is convenient to measure,

Dr. Dave Chatterjee:

not what needs to be measured. And I'm sure cybersecurity is

Dr. Dave Chatterjee:

not an exception to that situation. But, but yeah, the

Dr. Dave Chatterjee:

points are very, very well made. Moving along from the standpoint

Dr. Dave Chatterjee:

of CISO empowerment, essentially, the question is,

Dr. Dave Chatterjee:

what does it take to make a CISO, and when I say CISO, I

Dr. Dave Chatterjee:

mean the CISO function as a whole, effective?

Stoddard Manikin:

Well, that's an interesting one, too, because

Stoddard Manikin:

the role has changed over time, including its position in the

Stoddard Manikin:

organization and the reporting structure. And there is no one

Stoddard Manikin:

answer to this either. A lot of it depends on the organization

Stoddard Manikin:

and who's in the roles at that organization. I think that

Stoddard Manikin:

historically, a lot of CISOs came from, you know, one of two

Stoddard Manikin:

places, they came either from military and law enforcement, or

Stoddard Manikin:

they came from a network security type of background. And

Stoddard Manikin:

both of those types of backgrounds prepare you well.

Stoddard Manikin:

But unless you're able to expand your your perspective, and

Stoddard Manikin:

embrace a lot of other areas of the organization, you can't

Stoddard Manikin:

succeed as a modern CISO. I certainly need the fundamental

Stoddard Manikin:

technical background, to understand what people are

Stoddard Manikin:

telling me and what the implications are, I need to

Stoddard Manikin:

understand how law enforcement works, and when do I engage with

Stoddard Manikin:

them and how to do so effectively. But I also have to

Stoddard Manikin:

understand regulatory compliance, I have to understand

Stoddard Manikin:

audit, I have to understand finance, because when I'm trying

Stoddard Manikin:

to get a security product in house and implement it, I have

Stoddard Manikin:

to know how to budget for it, whether it makes more sense for

Stoddard Manikin:

us to capitalize it or subscribe to it and pay it out of opex, I

Stoddard Manikin:

have to know whether the training should be included or

Stoddard Manikin:

not depending on how we want to pay for things, and what the

Stoddard Manikin:

useful lifespan is going to be. So I've got to understand those

Stoddard Manikin:

financial implications. I also need to understand insurance,

Stoddard Manikin:

because cybersecurity insurance is a critical aspect of this.

Stoddard Manikin:

And then there's other areas as well, that you've got to have a

Stoddard Manikin:

broad understanding of. But first and foremost, the most

Stoddard Manikin:

fundamental thing you've got to know as the CISO is the business

Stoddard Manikin:

of the organization that you're in. Because if you don't

Stoddard Manikin:

understand how the business operates, what it does, how it

Stoddard Manikin:

earns money, how it spends money, where it really makes its

Stoddard Manikin:

profit, that funds other areas that have losses, then it's very

Stoddard Manikin:

hard for you to understand how to prioritize what security

Stoddard Manikin:

controls need to be put in place, and and also how

Stoddard Manikin:

restrictive you can be without cutting off the lifeblood of the

Stoddard Manikin:

organization.

Dr. Dave Chatterjee:

Security versus convenience, security

Dr. Dave Chatterjee:

versus mission of the organization, you have to find

Dr. Dave Chatterjee:

that balance. Very well said, Very well said. So I'd like to

Dr. Dave Chatterjee:

follow up on a couple of things you mentioned. You talked about

Dr. Dave Chatterjee:

law enforcement and regulatory compliance. And that brings to

Dr. Dave Chatterjee:

mind the role that the legal function plays. And if you think

Dr. Dave Chatterjee:

about it, when organizations are in trouble, many a times that

Dr. Dave Chatterjee:

leads to a lawsuit, they have to defend, you know, all that they

Dr. Dave Chatterjee:

have done to protect the organization, and so on and so

Dr. Dave Chatterjee:

forth. So doesn't it make sense to involve legal every step of

Dr. Dave Chatterjee:

the way? And is that too much to expect? Because when I pose this

Dr. Dave Chatterjee:

question to people in other organizations in your role, I

Dr. Dave Chatterjee:

get very different responses. And sometimes the responses are

Dr. Dave Chatterjee:

not very clear. So I want to know, from a practical

Dr. Dave Chatterjee:

standpoint, how feasible is is it to involve legal or to work

Dr. Dave Chatterjee:

with legal closely.

Stoddard Manikin:

I think it's not only feasible, but it's a

Stoddard Manikin:

requirement for survival of a sea. So I've always had

Stoddard Manikin:

excellent relationships with the legal officers of different

Stoddard Manikin:

organizations that I've worked with. And I think that it all

Stoddard Manikin:

comes down to the relationship that cybersecurity has with

Stoddard Manikin:

legal as far as how straightforward it is to engage.

Stoddard Manikin:

Now, I would not propose bringing everything to legal

Stoddard Manikin:

that happens, because so many things that that start out as an

Stoddard Manikin:

investigation turned into nothing, it turns into sure this

Stoddard Manikin:

looks really bad. It looks like someone just hacked us from

Stoddard Manikin:

Puerto Rico. And we don't have any operations there. But then

Stoddard Manikin:

you dig into the the details and the logs and you find okay, we

Stoddard Manikin:

actually had someone on vacation and they got a call and they

Stoddard Manikin:

were asked to login and do this. So you know, why would I alarm

Stoddard Manikin:

legal about that until I've done some due diligence around it?

Stoddard Manikin:

bring things to them that are real, or if they're significant

Stoddard Manikin:

enough that you don't know yet, but they need to be aware and

Stoddard Manikin:

involved early, then be clear with them that you don't know

Stoddard Manikin:

yet if this is real or not, but you're engaging them early so

Stoddard Manikin:

that if it becomes real, they'll have background and context and

Stoddard Manikin:

they are ramped up already.

Dr. Dave Chatterjee:

Very fair, very reasonable. But but it's

Dr. Dave Chatterjee:

also true that when you're formulating your cybersecurity

Dr. Dave Chatterjee:

strategy or let's say you're doing an annual review, that you

Dr. Dave Chatterjee:

get legal involved to provide y'all with a checklist or a

Dr. Dave Chatterjee:

guideline or the do's and don'ts just to make sure that you're

Dr. Dave Chatterjee:

always staying on the right side of the law. Is that is that a

Dr. Dave Chatterjee:

common practice common procedure? Or do you accomplish

Dr. Dave Chatterjee:

it in some other way?

Stoddard Manikin:

You know, I think it depends. Because

Stoddard Manikin:

really, what I'm interpreting, as you say, legal in that

Stoddard Manikin:

context is it's really about regulatory compliance, or even

Stoddard Manikin:

contractual obligations, right, because those are two different

Stoddard Manikin:

things that you have to think about as a CISO. And from a

Stoddard Manikin:

regulatory compliance perspective, you've got to think

Stoddard Manikin:

about the international implications, the national here

Stoddard Manikin:

in the US, we think about state and local, and then beyond the

Stoddard Manikin:

governmental regulations, if you do business in other countries,

Stoddard Manikin:

you might have GDPR if you're in Europe, and there's just it

Stoddard Manikin:

really gets complex quickly. States have individual privacy

Stoddard Manikin:

laws that you need to be aware of. And that's getting more and

Stoddard Manikin:

more complex. And then on top of that, you've got commitments to

Stoddard Manikin:

other partners that you have contracts with in terms of how

Stoddard Manikin:

quickly you need to notify them if you have some type of breach.

Stoddard Manikin:

And you even have industry regulations. So for example, in

Stoddard Manikin:

the credit card industry, there's PCI DSS, the Payment

Stoddard Manikin:

Card Industry Data Security Standard, that is not a

Stoddard Manikin:

government regulation, that is essentially a voluntary industry

Stoddard Manikin:

requirement, that if you want to accept and process credit cards,

Stoddard Manikin:

you must follow. But it's created by a consortium of

Stoddard Manikin:

credit card companies. And so that's just kind of another

Stoddard Manikin:

dimension there. And that's why I say when you say legal, it

Stoddard Manikin:

sounds to me like it's compliance. And in reality,

Stoddard Manikin:

that's not all coming from just one department, be it legal or

Stoddard Manikin:

compliance that's coming from four different departments, it's

Stoddard Manikin:

going to come from legal and the contracts aspect, and they'll

Stoddard Manikin:

have to handle typically the the government regulation. In terms

Stoddard Manikin:

of the industry regulation for PCI, that's going to be the

Stoddard Manikin:

finance division, it gets very complicated. And that's where I

Stoddard Manikin:

was saying earlier, it's really important for the CISO to have

Stoddard Manikin:

broad relationships everywhere. And and even if they come from a

Stoddard Manikin:

narrow background, to have very broad horizons in their

Stoddard Manikin:

thinking.

Dr. Dave Chatterjee:

Yep, that is that is very necessery for

Dr. Dave Chatterjee:

the kind of role of a CISO plays, which is highly

Dr. Dave Chatterjee:

interdisciplinary. And you and you talked about different types

Dr. Dave Chatterjee:

of regulatory requirements. Some are requirements. Some are

Dr. Dave Chatterjee:

industry regulations, industry expectations. So how do you stay

Dr. Dave Chatterjee:

on top of all this? Do you have a team that provides that

Dr. Dave Chatterjee:

guidance? Or is one particular person assigned to make sure

Dr. Dave Chatterjee:

that you're on top of all the different expectations from a

Dr. Dave Chatterjee:

compliance and other legal standpoint?

Stoddard Manikin:

Well, certainly, we're going to focus

Stoddard Manikin:

on the ones that are most relevant to us, above others.

Stoddard Manikin:

And for example, that would include the HIPAA security rule

Stoddard Manikin:

and the HIPAA Privacy Rule, the High Tech Act for health care,

Stoddard Manikin:

things like that. But But ultimately, what I have found to

Stoddard Manikin:

be effective is to find a framework, a security framework

Stoddard Manikin:

that incorporates multiple regulations and requirements, so

Stoddard Manikin:

that you can focus on meeting the framework design and measure

Stoddard Manikin:

yourself against that. And by doing so, you're going to cover

Stoddard Manikin:

the majority of your bases related to regulatory

Stoddard Manikin:

requirements. So for example, in healthcare, there's the high

Stoddard Manikin:

trust framework that you could adopt. And and I think a lot of

Stoddard Manikin:

organizations in the US in particular are using the NIST

Stoddard Manikin:

CSF the Cybersecurity Framework, these frameworks incorporate

Stoddard Manikin:

multiple regulatory requirements, some of them go

Stoddard Manikin:

above and beyond it. So you actually have to kind of be

Stoddard Manikin:

careful that you don't turn the wrench too tight on your

Stoddard Manikin:

organization. But it's a matter of picking that framework,

Stoddard Manikin:

laying it out, mapping what you do to the framework, figure out

Stoddard Manikin:

where you're doing well, where you need to improve and then

Stoddard Manikin:

measuring yourself on that.

Dr. Dave Chatterjee:

Okay, okay. Good to know, talking about the

Dr. Dave Chatterjee:

US healthcare industry, or you can, you know, go even further

Dr. Dave Chatterjee:

and talk about the global healthcare industry. There are a

Dr. Dave Chatterjee:

lot of reports out there that talk about how the landscape or

Dr. Dave Chatterjee:

the the areas of vulnerability are expanding because of the use

Dr. Dave Chatterjee:

of IoT devices, because of the complexity of these

Dr. Dave Chatterjee:

organizations. It's very hard to keep track of where the weak

Dr. Dave Chatterjee:

points are. In one particular report, they say there is enough

Dr. Dave Chatterjee:

evidence to suggest that US healthcare organizations lack a

Dr. Dave Chatterjee:

deliberate, organized, and comprehensive cyber resilience

Dr. Dave Chatterjee:

strategy. So with this kind of statements being made, I just

Dr. Dave Chatterjee:

wanted to get your sense of what is the state of cybersecurity

Dr. Dave Chatterjee:

readiness in the US in the US healthcare industry.

Stoddard Manikin:

So I believe that it's far better than it was

Stoddard Manikin:

in the past. But there's, of course still room for

Stoddard Manikin:

improvement. When you talk about healthcare as an industry, it is

Stoddard Manikin:

a massive ecosystem. There are providers, including large

Stoddard Manikin:

healthcare systems with multi hospitals and clinics that are

Stoddard Manikin:

standalone independent hospitals, there are physician

Stoddard Manikin:

practices, there are medical device manufacturers, there's

Stoddard Manikin:

even the insurance industry around healthcare. It is

Stoddard Manikin:

enormous, and it makes up a significant part of the United

Stoddard Manikin:

States GDP every year. So what we're talking about is just

Stoddard Manikin:

massive, and such different levels of sophistication. But

Stoddard Manikin:

when it comes down to it, Dave, cybersecurity is patient safety.

Stoddard Manikin:

Patient safety is cybersecurity. Now, historically, cybersecurity

Stoddard Manikin:

in healthcare was all about confidentiality, because you

Stoddard Manikin:

were concerned about having a breach of patient data,

Stoddard Manikin:

electronic protected health information, or ePHI, would be a

Stoddard Manikin:

HIPAA breach. And then, if affected more than 500 records,

Stoddard Manikin:

then you got on the HHS Wall of Shame website, where it was

Stoddard Manikin:

publicly known. You know what, it's not only about

Stoddard Manikin:

confidentiality, and I'm glad that it's not, it's much more

Stoddard Manikin:

about integrity, and most importantly, availability now,

Stoddard Manikin:

because now we recognize that, especially with ransomware,

Stoddard Manikin:

attacks, and similar types of things, systems become

Stoddard Manikin:

unavailable. And healthcare delivery, meaning providers,

Stoddard Manikin:

people touching patients, and taking care of them rely on

Stoddard Manikin:

electronic computer aided workflows. And if the systems

Stoddard Manikin:

are down, because some patch broke something or there's a

Stoddard Manikin:

ransomware attack, then you can't easily know a patient's

Stoddard Manikin:

blood type. You can't look at their medical records to know

Stoddard Manikin:

what history they have, what allergies they have, you can't

Stoddard Manikin:

get lab results back to know how to treat a patient. And

Stoddard Manikin:

sometimes that could result in a life threatening or life

Stoddard Manikin:

altering delay. So a patient can recover from a data breach, but

Stoddard Manikin:

they might not be able to fully recover from lack of care. So

Stoddard Manikin:

that's where I really want to emphasize that cybersecurity is

Stoddard Manikin:

patient safety. And we all have to take it seriously, regardless

Stoddard Manikin:

of where we are in that healthcare ecosystem. Now, to be

Stoddard Manikin:

fair, there is a significant disparity in healthcare systems

Stoddard Manikin:

based on size and resources and how prepared people are for

Stoddard Manikin:

cybersecurity impact, right. So those large multi hospital

Stoddard Manikin:

systems typically have more resources, and ability to deal

Stoddard Manikin:

with those kinds of things. Smaller community hospitals or

Stoddard Manikin:

systems might have less resources. Physician practices,

Stoddard Manikin:

if it's an independent practice, we've seen them close after one

Stoddard Manikin:

ransomware attack, because the physicians that work there said

Stoddard Manikin:

it's just not worth trying to recover. Because all our patient

Stoddard Manikin:

records are in that system, I'm going to retire. So there's

Stoddard Manikin:

really a significant impact if you're not ready to handle these

Stoddard Manikin:

kinds of things. And everybody's a little bit different. So I

Stoddard Manikin:

think one of the things we've got to move towards, and we've

Stoddard Manikin:

started to do so is to level the playing field in terms of

Stoddard Manikin:

ability to protect yourself against cybersecurity attacks.

Stoddard Manikin:

And that's where things like industry consortiums and

Stoddard Manikin:

government resources, help you do what you need to do, even if

Stoddard Manikin:

you don't have the same resources as someone who's

Stoddard Manikin:

bigger.

Dr. Dave Chatterjee:

Okay, that's good to know. And in

Dr. Dave Chatterjee:

terms of, you know, threat analysis, where you're kind of

Dr. Dave Chatterjee:

testing the recovery capability of your organization, how, how

Dr. Dave Chatterjee:

committed is the organization in doing these kinds of disaster

Dr. Dave Chatterjee:

recovery, business continuity planning. If you could, if you

Dr. Dave Chatterjee:

could expand on these approaches, strategies, let's

Stoddard Manikin:

Yeah, I think that testing your strategies and

Stoddard Manikin:

say?

Stoddard Manikin:

procedures is absolutely crucial so that you're ready to execute

Stoddard Manikin:

on them during an emergency. It's very similar to sports

Stoddard Manikin:

where if you have a team that just shows up once a week to

Stoddard Manikin:

play games, they are probably going to really struggle to do

Stoddard Manikin:

anything intricate on the field. You've got to practice all week

Stoddard Manikin:

long to get ready for that game. So when it comes to business

Stoddard Manikin:

continuity, disaster recovery, responding to a phishing attempt

Stoddard Manikin:

responding to a ransomware attack, any any of those major

Stoddard Manikin:

types of incidents that you are writing an incident response

Stoddard Manikin:

plan for, you should be testing that at some frequency. You

Stoddard Manikin:

could do a tabletop exercise twice a year and bring all the

Stoddard Manikin:

different people together that would be involved in a

Stoddard Manikin:

ransomware attack. You can you can do red teaming where you

Stoddard Manikin:

have offensively minded people on your team, try to break

Stoddard Manikin:

something or hack into a system, and then tell you what's wrong

Stoddard Manikin:

and what needs to be fixed. That's actually evolving from

Stoddard Manikin:

the old Red Team Blue Team, mild Blue team, or the defenders into

Stoddard Manikin:

a purple teaming approach, where the red team and blue team are

Stoddard Manikin:

in the same room working together. And the red team will

Stoddard Manikin:

say, here's how I would attack it, the blue team says here's

Stoddard Manikin:

how I would defend against it. And then they both go at it

Stoddard Manikin:

together as a kind of a blended purple team. And that actually

Stoddard Manikin:

has even better results than the older model. So there's so many

Stoddard Manikin:

different ways that you should be testing these things. But I

Stoddard Manikin:

agree with you, it's absolutely essential to do frequent tests

Stoddard Manikin:

of the most likely and largest impacting types of incidents,

Dr. Dave Chatterjee:

You know, you mentioned about audits. And

Dr. Dave Chatterjee:

that brought back memories; I used to be an auditor in my

Dr. Dave Chatterjee:

first career. We always do audit, it's like after the fact,

Dr. Dave Chatterjee:

and I have been a huge proponent of real-time audit, whether it's

Dr. Dave Chatterjee:

financial, whether it's security, because you want to

Dr. Dave Chatterjee:

know what the vulnerabilities are, what the weaknesses are, so

Dr. Dave Chatterjee:

you get an opportunity to fix it before it's too late. And

Dr. Dave Chatterjee:

there's no point reviewing historical facts, because you

Dr. Dave Chatterjee:

didn't get a chance to fix it. It's past now. What are your

Dr. Dave Chatterjee:

thoughts from the practicality of conducting real-time security

Dr. Dave Chatterjee:

audits?

Stoddard Manikin:

I think that it's becoming more and more

Stoddard Manikin:

commonplace. And like you said, it's better to be proactive.

Stoddard Manikin:

Now, I do think if you've had an incident, you should do a very

Stoddard Manikin:

thorough review root cause analysis and understand what

Stoddard Manikin:

happens so that you can make changes and it can't happen

Stoddard Manikin:

again. And at the same time, I think that there is a concept

Stoddard Manikin:

that's been around for decades in audit, called continuous

Stoddard Manikin:

controls monitoring, right? And so when we, as security

Stoddard Manikin:

professionals put a control in place, you think it's there, you

Stoddard Manikin:

think it's configured correctly, it's still operating

Stoddard Manikin:

effectively. But how often are you testing it to make sure and

Stoddard Manikin:

and so often, you put it in place, and you move on to the

Stoddard Manikin:

next thing without necessarily having a good operational plan

Stoddard Manikin:

to monitor it. So what I see becoming much more relevant

Stoddard Manikin:

lately, is this concept of CCM, the continuous controls

Stoddard Manikin:

monitoring, where you identify some key controls where if they

Stoddard Manikin:

were to fail, the impact could be significant, right? So high

Stoddard Manikin:

risk. And then from there, you figure out how are we going to

Stoddard Manikin:

monitor this are we going to set up some kind of alert to tell us

Stoddard Manikin:

if it fails, and it sends us an email? Are we going to

Stoddard Manikin:

physically test it ourselves every once a week, every day,

Stoddard Manikin:

every hour, we got to automate that and then only email us if

Stoddard Manikin:

it fails. That type of approach helps you identify weaknesses

Stoddard Manikin:

and vulnerabilities before someone else finds them and

Stoddard Manikin:

exploits them. And that's certainly one of my focus areas,

Stoddard Manikin:

is to identify what those key controls are, come up with the

Stoddard Manikin:

monitoring plan based on potential risk. And then make

Stoddard Manikin:

sure that we're proactively looking at them ourselves,

Stoddard Manikin:

before someone else finds them.

Dr. Dave Chatterjee:

Couldn't agree with you more, you got to

Dr. Dave Chatterjee:

be proactive. You've got to continuously monitor. You know

Dr. Dave Chatterjee:

Stoddard, as you are aware, based on the media reports, many

Dr. Dave Chatterjee:

of the breaches that have happened, large breaches, major

Dr. Dave Chatterjee:

breaches, the story goes that the organization was made aware,

Dr. Dave Chatterjee:

or a particular individual was made aware, who did nothing

Dr. Dave Chatterjee:

about it. Based on your experience in the field, how or

Dr. Dave Chatterjee:

why does that happen? It's almost borderline negligence.

Dr. Dave Chatterjee:

And that's what the courts have found time and again, in several

Dr. Dave Chatterjee:

cases, they have found organizations to be guilty of

Dr. Dave Chatterjee:

negligence. Can you speak to that?

Stoddard Manikin:

I sure can. And I also want to be very

Stoddard Manikin:

cautious because you can't always put yourself in someone

Stoddard Manikin:

else's shoes, especially after something has happened. Right?

Stoddard Manikin:

It's very easy to look back and say how did you not see this

Stoddard Manikin:

going on guys. But I also know that historically, there has

Stoddard Manikin:

been a certain amount of scapegoating that has occurred

Stoddard Manikin:

with CISOs, where they were not necessarily given the authority

Stoddard Manikin:

or the resources to fix problems. They've made

Stoddard Manikin:

management aware of them and management accepted the risk.

Stoddard Manikin:

And only when it became a public relations issue that the

Stoddard Manikin:

organization decide that oh, yeah, what we should have done

Stoddard Manikin:

something. Right. It's the traffic light mentality. You see

Stoddard Manikin:

car accidents happening at a corner, but until there's a

Stoddard Manikin:

really bad one that gets a lot of visibility, they don't pay

Stoddard Manikin:

the money for a new traffic light because it's incredibly

Stoddard Manikin:

expensive to put that in there and then maintain it. So you

Stoddard Manikin:

know, again, I I want to be cautious about that concept of

Stoddard Manikin:

negligence because it's really easy to throw that word around.

Stoddard Manikin:

And that's primarily a legal term that results in higher

Stoddard Manikin:

damages, particularly for publicly traded companies with

Stoddard Manikin:

shareholder lawsuits. What I can tell you from my experience, is

Stoddard Manikin:

that the amount and volume of alerts that come from a good

Stoddard Manikin:

mature security system of anywhere from 25 or more

Stoddard Manikin:

security tools, is enormous. And no matter how big your team is,

Stoddard Manikin:

it is a physical impossibility, to look at every one of those

Stoddard Manikin:

alerts and determine if it's real or not. So yeah, we need

Stoddard Manikin:

more automation, we need to use more machine learning and AI to

Stoddard Manikin:

handle that avalanche of data. But the reality is, is you get

Stoddard Manikin:

so many of these types of warnings, that you've got to use

Stoddard Manikin:

your judgment, and your artistic skills and your logic to figure

Stoddard Manikin:

out which ones are the most likely to be going on, and which

Stoddard Manikin:

ones need to track down in the limited amount of time and

Stoddard Manikin:

resources you have to deal with it.

Dr. Dave Chatterjee:

You know, that is, you know, very

Dr. Dave Chatterjee:

enlightening to know, it's a hard, hard job, no doubt. You

Dr. Dave Chatterjee:

you touched upon something that brings to mind another topic

Dr. Dave Chatterjee:

that is very close to my heart. And that's the possibility of

Dr. Dave Chatterjee:

joint ownership and accountability. And you just

Dr. Dave Chatterjee:

said that the CISOs, or the security professionals, are made

Dr. Dave Chatterjee:

scapegoats of incidents, they often lose their jobs. But yet

Dr. Dave Chatterjee:

we say cybersecurity is everyone's business, everyone

Dr. Dave Chatterjee:

has a role to play. How feasible is it to have structures and

Dr. Dave Chatterjee:

mechanisms where there is some level of joint ownership and

Dr. Dave Chatterjee:

accountability both within the organization, as well as when

Dr. Dave Chatterjee:

you're partnering up with vendors, where the vendor

Dr. Dave Chatterjee:

organization also has a stake in ensuring your data is secure on

Dr. Dave Chatterjee:

their servers. Your thoughts?

Stoddard Manikin:

I think that I have been much more successful

Stoddard Manikin:

at doing that within the organization than I have with

Stoddard Manikin:

vendor partners. So you know, talk about them distinctly.

Stoddard Manikin:

Internally, there is some responsibility with the security

Stoddard Manikin:

executive via the CISO, or anyone else to build that kind

Stoddard Manikin:

of framework. And by that I mean, if a CISO operates

Stoddard Manikin:

independently and in the dark, and throws around a lot of

Stoddard Manikin:

technical terms and doesn't do a good job of explaining why then

Stoddard Manikin:

they're not going to kind of build that shared accountability

Stoddard Manikin:

concept with the other key leaders of the organization.

Stoddard Manikin:

Right? What's very important from my experience is to explain

Stoddard Manikin:

the why behind things, to do shared decision making about

Stoddard Manikin:

which areas need prioritization based on risk, which ones you're

Stoddard Manikin:

going to jointly agree to not do anything about, or maybe do a

Stoddard Manikin:

slower rollout, for different reasons, be it financial,

Stoddard Manikin:

operational, and so forth. And even get some guidance from key

Stoddard Manikin:

board members so that they understand the risks that you're

Stoddard Manikin:

accepting the risks that you're not willing to accept, and, and

Stoddard Manikin:

how much to invest. Because there is eventually a declining

Stoddard Manikin:

ROI on those things, right? You can never eliminate risk unless

Stoddard Manikin:

you just stopped doing business and turn off all your computers,

Stoddard Manikin:

that's probably not going to happen for most industries. So

Stoddard Manikin:

that's where I think that shared accountability it comes from it

Stoddard Manikin:

comes from shared decision making, shared prioritization,

Stoddard Manikin:

shared understanding of what we're willing to accept or not,

Stoddard Manikin:

what threshold of risk can we live with? And what do we want

Stoddard Manikin:

to remediate otherwise, that's internal. When it comes to your

Stoddard Manikin:

vendor partner, network, that is way more complicated. Same thing

Stoddard Manikin:

we talked about earlier, where healthcare has this disparity of

Stoddard Manikin:

capability and resources. vendor partners have the same thing,

Stoddard Manikin:

right, you've got the really large ones that are well

Stoddard Manikin:

resourced, and they'll, they'll hand you their procedure sheet

Stoddard Manikin:

and their third party audit reports of what they do for

Stoddard Manikin:

security. Then all the way at the other end of the spectrum,

Stoddard Manikin:

you've got what I consider to be small business websites that

Stoddard Manikin:

might run a specialized program for real estate or some other

Stoddard Manikin:

niche purpose. Where, you know, they say we were in a pen test

Stoddard Manikin:

once last year. But that's it. And meanwhile, you've got an

Stoddard Manikin:

area of your organization that's screaming, saying we have to use

Stoddard Manikin:

this as the only one that'll meet our requirements. And

Stoddard Manikin:

you're trying to tell them, Okay, but they're going to have

Stoddard Manikin:

the ability to log into our network. And third party

Stoddard Manikin:

breaches is one of the most common tactics to break into an

Stoddard Manikin:

organizatio now. If you look at some high profile breaches,

Stoddard Manikin:

you'll find that they came in through for example, an air

Stoddard Manikin:

conditioning contractor who responded to a phishing attempt,

Stoddard Manikin:

use their credentials to login and then they escalated from

Stoddard Manikin:

there. Well, I don't really want to bet my organization's

Stoddard Manikin:

security posture on the security capabilities of a 1000 or more

Stoddard Manikin:

independent, contracted vendor partners who may or may not have

Stoddard Manikin:

reasonable security practices. So it's up to me to make sure

Stoddard Manikin:

I'm working with everybody to get the right controls in place

Stoddard Manikin:

and give the minimum necessary access to these organizations,

Stoddard Manikin:

and make sure that people are aware of the risk before they

Stoddard Manikin:

engage in business with these types of companies.

Dr. Dave Chatterjee:

Fabulous, very, very insightful. Started.

Dr. Dave Chatterjee:

Thank you so much for your time today. Before we conclude any

Dr. Dave Chatterjee:

final thoughts for the audience?

Stoddard Manikin:

I would say that my journey has been very,

Stoddard Manikin:

very interesting in the cybersecurity industry, in

Stoddard Manikin:

particular for healthcare, it is a complex one, but also

Stoddard Manikin:

rewarding. It's one of those few industries in my opinion, where

Stoddard Manikin:

you can truly find purpose and meaning in the long hours and

Stoddard Manikin:

the resistance that you have to push through. And I am very

Stoddard Manikin:

grateful to be in the position I'm in where I can help protect

Stoddard Manikin:

patients and enable our caregivers to take care of kids.

Dr. Dave Chatterjee:

Well, thank you again, Stoller, for all that

Dr. Dave Chatterjee:

you do, appreciate your time on the podcast, and hopefully,

Dr. Dave Chatterjee:

we'll talk to you again in the future.

Stoddard Manikin:

My pleasure, thank you.

Dr. Dave Chatterjee:

A special thanks to Stoddard Manikin for

Dr. Dave Chatterjee:

his time and insights. If you like what you heard, please

Dr. Dave Chatterjee:

leave the podcast a rating and share it with your network. Also

Dr. Dave Chatterjee:

subscribe to the show, so you don't miss any new episodes.

Dr. Dave Chatterjee:

Thank you for listening, and I'll see you in the next

Dr. Dave Chatterjee:

episode.

Introducer:

The information contained in this podcast is for

Introducer:

general guidance only. The discussions assume no

Introducer:

responsibility or liability for any errors or omissions in the

Introducer:

content of this podcast. The information contained in this

Introducer:

podcast is provided on an as is basis with no guarantee of

Introducer:

completeness, accuracy, usefulness, or timeliness. The

Introducer:

opinions and recommendations expressed in this podcast are

Introducer:

those of the discussants and not of any organization.

About the Podcast

Show artwork for The Cybersecurity Readiness Podcast Series
The Cybersecurity Readiness Podcast Series
with Dr. Dave Chatterjee

About your host

Profile picture for Dave Chatterjee

Dave Chatterjee

Dr. Debabroto 'Dave' Chatterjee is tenured professor in the Management Information Systems (MIS) department, at the Terry College of Business, The University of Georgia (UGA). He is also a Visiting Scholar at Duke University, affiliated with the Master of Engineering in Cybersecurity program in the Pratt School of Engineering. An accomplished scholar and technology thought leader, Dr. Chatterjee’s interest and expertise lie in the various facets of information technology management – from technology sense-making to implementation and change management, data governance, internal controls, information security, and performance measurement. His work has been accepted and published in prestigious outlets such as The Wall Street Journal, MIT Sloan Management Review, California Management Review, Business Horizons, MIS Quarterly, and Journal of Management Information Systems. Dr. Chatterjee’s research has been sponsored by industry and cited over two thousand times. His book Cybersecurity Readiness: A Holistic and High-Performance Approach was published by SAGE Publishing in March 2021.