logo
episode-header-image
Oct 11
51m 54s

The Role and Evolution of Virtual CISOs ...

Jim Love
About this episode

In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience.

They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. Taylor shares insights into why companies, especially SMBs, opt for vCISO services due to budget constraints and the scarcity of cybersecurity professionals. He also talks about the common challenges faced by vCISOs, such as managing burnout and ensuring client adherence to security recommendations.

The conversation delves into the importance of cybersecurity culture, the need for effective education, and the integration of cybersecurity in business practices. Taylor offers practical advice on hiring the right vCISO and highlights the benefits his company provides. The episode concludes with a discussion on the psychology behind successful cybersecurity practices and Taylor's thoughts on the future of the industry.

00:00 Introduction to Cybersecurity Today
00:04 Meet Craig Taylor: The Virtual CISO
00:47 The Early Days of Virtual CISOs
02:15 Building a Cybersecurity Company
03:40 The Rise of Virtual CISO Services
05:01 Challenges and Realities of Cybersecurity
06:42 The Importance of Cyber Literacy
20:38 Managing Cybersecurity Risks
28:05 Understanding Administrative Risks in Onboarding and Offboarding
28:39 Challenges with MSPs and Cybersecurity
29:27 The Importance of Basic Security Measures
31:52 Dealing with Technology Debt
32:52 Balancing Budget and Security Needs
35:13 Real-Life Cybersecurity Incidents
40:17 The Role of Education in Cybersecurity
46:12 Hiring the Right VCISO
51:33 Conclusion and Final Thoughts

Up next
Nov 24
Checkout.com Takes a Bold Stance, SolarWinds Case Dismissed, and FCC Reverses Mandate
<p>In this episode, host David Shipley discusses some of the most pressing issues in cybersecurity today. Checkout.com refuses to pay a ransom to cyber extortion group Shiny Hunters and instead donates to cybersecurity research. The U.S. SEC ends its long-standing case against So ... Show More
15m 53s
Nov 22
Understanding Cybersecurity Threats: Insights from Intelligence Experts
<p>In this episode of Cybersecurity Today, host Jim Love welcomes retired intelligence officer Neil Bisson and regular guest David Shipley for an in-depth discussion on current cybersecurity threats facing both Canada and the US. They explore the roles of major state actors like ... Show More
47m 7s
Nov 21
Major CloudFlare Outages, Black Friday Phishing Surge, AI Privacy Breach at Ontario Hospital, and Salesforce Data Theft Investigation
<p>In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. CloudFlare faced significant outages affecting major platforms like Amazon and YouTube, along with continued issues for Microsoft 365 users. NordVPN warned of a surge in fake sh ... Show More
12m 28s
Recommended Episodes
Jul 2024
2975: AI in Cybersecurity: Balancing Innovation and Risk
Are you prepared for the ever-evolving cybersecurity threats that challenge today's businesses? In this episode of Tech Talks Daily, we sit down with Dave Merkel, CEO of Expel, to delve into the dynamic world of cybersecurity. With threats becoming more sophisticated and frequent ... Show More
24m 29s
Nov 2024
3092: Infosec - The Future of Cybersecurity Training and Upskilling
<p>How can the cybersecurity industry bridge the gap in its staggering 4 million open roles? This episode dives into the critical need for workforce development and how unconventional paths into cybersecurity are reshaping the field.</p> <p>Joining us is Keatron Evans, VP of Port ... Show More
20m 9s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Oct 24
Justin Williams | Mount Aloysius College
Justin Williams, is an instructor and chairperson of the Information Technology Department at Mount Aloysius College.Williams shares his personal journey into cybersecurity, starting as a student passionate about understanding cyber threats and now guiding the next generation of ... Show More
38m 34s
Oct 8
LIVE from RareEvo: TradFi vs DeFi Stablecoins (Lessons from Hacks, Policy, and Global Adoption)
Gerrit, developer relations at Curve Finance, discusses the unique risks and rewards associated with DeFi stablecoins, and how increased regulatory clarity has fueled the rise of TradFi stablecoins. He also spotlights the crucial role of platforms like Curve in providing essentia ... Show More
19m 14s
Dec 2024
Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration ... Show More
39m 17s
Nov 2019
Cyber Security monitoring with Robert Pritchard
In episode 4 Terry Pattar, head of the Jane’s Intelligence Unit, is joined by “The Cyber Security Expert”, Robert Pritchard, to discuss methods for OSINT analysts to mitigate online security risks and better understand the threat environment in which they operate. Rob is highly e ... Show More
36m 44s
Oct 2022
An IT security professional walks into an OT bar.
An assessment of port and terminal cybersecurity in the US. Tata Power discloses a cyberattack. The White House issues statements on cybersecurity. India’s power company collaborates on energy sector cybersecurity. Guests Special Agent in Charge, Tom Sobocinski, and Supervisory S ... Show More
37m 7s
Jun 2025
Vibe Coding vs Low-Code/No-Code: Security Risks and CI/CD Pipeline Impacts for Citizen Developers
Explore the evolution from traditional coding to vibe coding and its relationship with low-code/no-code (LCNC) platforms. This comprehensive analysis examines how AI-assisted development and visual programming tools are creating a new generation of citizen developers, transformin ... Show More
9m 42s
Apr 2025
Turing Award Special: A Conversation with Martin Hellman
<p>Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation fo ... Show More
41m 3s