{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2F3da5e209-3da5e209","width":444,"version":"1.0","type":"rich","title":"Dr. Wolter Pieters on Information Ethics, Part Two","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/5128d4/5128d4b9-97a3-46af-af2a-d5ffe821f6e2/6df0400b-caf8-424a-8c6f-9d26a8f14ab3/1523476520artwork.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/6df0400b-caf8-424a-8c6f-9d26a8f14ab3\" height=\"200\" width=\"100%\" title=\"Dr. Wolter Pieters on Information Ethics, Part Two\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"In part two of my interview with Delft University of Technology’s assistant professor of cyber risk, Dr. Wolter Pieters, we continue our discussion on transparency versus secrecy in security.\r\n\r\nWe also cover ways organizations can present themselves as trustworthy. How? Be very clear about managing expectations. Declare your principles so that end users can trust that you’ll be executing by the principles you advocate. Lastly, have a plan for know what to do when something goes wrong.\r\n\r\nAnd of course there’s a caveat, Wolter reminds us that there’s also a very important place in this world for ethical hackers. Why? Not all security issues can be solved during the design stage."}