Wargaming, Cyber Attacks and Astronaut thinking

CEO Digital Show

This week Lisa was on the CEO Digital show discussing Wargaming, Cyberattacks, Protecting Against Romance Fraud, & ‘Astronaut Thinking’ in Leadership.

Key points (according to the podcast)

  • We heard about Lisa’s experience coming into a male-dominated industry, and what it took to excel within that environment
  • Why there’s no sacred line that cybercriminals won’t cross, and how the healthcare sector has been targeted in the past year,
  • Lisa discussed the dangers of social engineering, including a worrying case of romance fraud
  • The value space exploration and adventurous activities like mountaineering can bring to businesses and leadership approaches
  • How Lisa co-founded Cyber Volunteers 19, a 3,000-strong force of volunteers dedicated to helping enhance the cybersecurity of hospitals around Europe during the pandemic.

More information on the episode here: https://ceo.digital/podcasts/the-ceo-digital-show/lisa-forte-wargaming-cyberattacks-podcast?

Listen on Spotify

Listen on Apple

Related Posts

3 easy traps your CMT could fall into and how to prevent them

3 easy traps your CMT could fall into and how to prevent them

Your Crisis Management Team, CMT, helps prepare your organisation for an incident and manages the strategic response to any incidents or crisis that occurs. In my experience of running cyber crisis simulations with these teams I see the same issues present themselves...

Your New Ransomware Business Partner   

Your New Ransomware Business Partner  

2020 and 2021 have seen some pretty epic ransoms being paid by companies that at one point in time you would have assumed would never pay. Ransomware groups have undertaken a rebranding of sorts. They have their business model pretty well tuned and their...

Rebuilding after a cyber attack

Rebuilding after a cyber attack

We talk a lot about handling the initial car crash of a breach. What to do first, the comms that need to go out and the reporting to regulators. This all happens within the first few hours or days of a breach being discovered. What about after that? Last week I ran...