All links and images for this episode can be found on CISO Series. Check out this post Monte Pedersen of The CDA Group for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our guest, Jerry Davis, division director for cyber defense at Truist Bank. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, OFFSEC img http://offsec.com/trial
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our sponsored guest, Spencer Thompson, CEO, Prelude. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, PRELUDE img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Ron Gula, president and co-founder, Gula Tech Adventures https://www.gula.tech/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Ben Sapiro, head of global cyber security services, Manulife. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Matt Eberhart, CEO, Query https://query.ai. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is my guest, Mario Trujillo, staff attorney, Electronic Frontier Foundation. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, MATERIAL SECURITY img Material Security is purpose-built to stop attacks and reduce risk across Microsoft 365 and Google Workspace with unified cloud email security, data loss prevention, and posture management. Learn more at material.security.
All links and images for this episode can be found on CISO Series. The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security http://reveal.security/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, REVEAL SECURITY img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Mike Levin, deputy CISO, 3M. IN THIS EPISODE: __ __ Thanks to our podcast sponsor, RevealSecurity! img https://hubs.li/Q02hJcXj0
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Derek Fisher, Executive director of product security, JPMorgan. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, REVEALSECURITY! img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Alexandra Landegger, Executive Director and CISO, Collins Aerospace. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, APHINIA! img https://aphinia.com/#signup_form
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Richard Ford, CTO, Praetorian https://www.praetorian.com/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Adam Glick, CISO, PSG https://www.psgequity.com/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Erik Decker, CISO, Intermountain Health https://intermountainhealthcare.org/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our sponsored guest, Trevor Hilligoss, senior director of security research, SpyCloud. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img https://spycloud.com/ciso/
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, David Christensen https://www.linkedin.com/in/jdchrist/, VP, CISO, PlanSource. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our guest, Jerich Beason, CISO, WM. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our sponsored guest, Himaja Motheram, Censys https://censys.com/contact/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, CENSYS img
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Russell Spitler, CEO and co-founder, Nudge Security https://www.nudgesecurity.com/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img
All links and images for this episode can be found on CISO Series. In increasingly complex technical defenses, threat actors frequently target the human element. This makes them a top attack vectors, but are they actually the weak leak in your defenses? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our guest, Christina Shannon, CIO, KIK Consumer Products https://www.kikcorp.com/. THANKS TO OUR PODCAST SPONSOR, SPHERE img In this episode: __ __
All links and images for this episode can be found on CISO Series. We often talk about the contradiction of seemingly entry-level security jobs requiring years of experience. But maybe that's because entry-level jobs don't actually exist. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us this week is our guest Jay Wilson, CISO, Insurity https://insurity.com/. THANKS TO OUR PODCAST SPONSOR, SLASHNEXT img https://slashnext.com/request-a-demo/ In this episode: __ __
All links and images for this episode can be found on CISO Series. The Securities and Exchange Commission issued new cyber rules. What do these new rules mean for CISOs and will they ultimately improve our cybersecurity posture? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Jamil Farshchi, CISO, Equifax https://www.equifax.com/. THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img In this episode: __ __
All links and images for this episode can be found on CISO Series. Are trade shows like RSA getting so big that there's not enough economic value for a CISO to attend? Or do these events have enough industry gravity to justify the spend? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest Lee Parrish, CISO, Newell Brands https://www.newellbrands.com/. THANKS TO OUR PODCAST SPONSOR, CENSYS img In this episode: __ __
All links and images for this episode can be found on CISO Series. Work from home flourished during the pandemic. Many workers love it and don't want to go back. Some organizations are pushing for a return to the office. Is in-office work necessary to improve productivity and cybersecurity posture? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us for the episode is our guest, Shawn Bowen, CISO, World Kinect Corporation https://www.wfscorp.com/. THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img In this episode: __ __
All links and images for this episode can be found on CISO Series. Large language models and generative AI are today's disruptive technology. This is not the first time companies just want to ban a new technology that everyone loves. Yet, we're doing it all over again. Whether its ChatGPT or BYOD, people are going to use desirable new tech. So if our job isn't to stop it, how do we secure it? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Carla Sweeney, SVP, InfoSec, Red Ventures. https://www.redventures.com/careers THANKS TO OUR PODCAST SPONSOR, CENSYS img In this episode: __ __
All links and images for this episode can be found on CISO Series. What do the people least in the know about cyber, want to know? What are they asking? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Caitlin Sarian, AKA cybersecuritygirl on TikTok. THANKS TO OUR PODCAST SPONSOR, DATABEE FROM COMCAST TECHNOLOGY SOLUTIONS img In this episode: __ __
All links and images for this episode can be found on CISO Series. A security data lake, a data repository of everything you need to analyze and get analyzed sounds wonderful. But priming that lake, and stocking it with the data you want to get the insights you need is a more difficult task than it seems. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our sponsored guest, Matt Tharp, Head of Field Engineering, Comcast DataBee. THANKS TO OUR PODCAST SPONSOR, COMCAST TECHNOLOGY SOLUTIONS img In this episode: __ __
All links and images for this episode can be found on CISO Series. A threat intelligence program sounds like a sound effort in any security program. But, can you pull it off? There are so many phases to execute properly. Blow it with any one of them and your threat intelligence effort is moot. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us today is our special guest Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group. THANKS TO OUR PODCAST SPONSOR, COMCAST img In this episode: __ __
All links and images for this episode can be found on CISO Series. When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Tim Brown, CISO, Solarwinds https://www.solarwinds.com/. THANKS TO OUR PODCAST SPONSOR, PUSH SECURITY img . In this episode: __ __
All links and images for this episode can be found on CISO Series. We all know that our employees need to be more security aware, but what are the methods to get them there? How can we make our employees more security conscious? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Jack Chapman, vp, threat intelligence, Egress. THANKS TO OUR PODCAST SPONSOR, EGRESS img In this episode: __ __
All links and images for this episode can be found on CISO Series. Users have tried to upload sensitive company information and PII, personally identifiable information, into ChatGPT. Those who are successful getting the data in, have now made that data free to all. Will people's misuse of these generative AI programs be our greatest downfall to security and privacy? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest Suha Can, CISO, Grammarly. THANKS TO OUR PODCAST SPONSOR, OPAL img In this episode: __ __