Tag: CISO Series

Risk Management in Real Time with Safe Security

Join us for a groundbreaking announcement in cyber risk quantification and management. Today, Safe Security unveils SafeX, its new AI-powered mobile application designed to simplify and automate cyber risk assessment. […] The post Risk Management in Real Time with Safe…

Celebrating 6 Years with CISO Series

We got the best present for the CISO Series 6th anniversary: testimonials from our listeners! David Spark hit the show floor at Black Hat 2024 to ask attendees why they […] The post Celebrating 6 Years with CISO Series appeared…

Is It Possible to Inject Integrity Into AI?

When it comes to generative AI systems, often we’re concerned about the quality and reliability of the output. But do we risk losing sight of the integrity of these systems […] The post Is It Possible to Inject Integrity Into…

CISO Series Podcast LIVE in La Jolla (10-30-24)

The CISO Series Podcast is celebrating spooky season the only way we know how, with another live podcast recording! We’re recording a podcast episode at the Planet Cyber Sec CISO-CIO […] The post CISO Series Podcast LIVE in La Jolla…

When Can AI Take Over Decision Making in the SOC?

There are varied decisions SOC analysts have to make multiple times every day. It’s hard to describe each one, and so much of the decision making is happening in the […] The post When Can AI Take Over Decision Making…

CISO Series Podcast LIVE in Los Angeles (10-09-24)

CISO Series Podcast will be returning to Los Angeles to do another live audience recording of our show with ISSA LA. Joining me on stage will be two CISO Series […] The post CISO Series Podcast LIVE in Los Angeles…

Building Cybersecurity Leadership Skills

Last week on Super Cyber Friday, we talked about building leadership skills. David Spark hosted the discussion, joined by Alexandra Landegger, executive director and CISO at Collins Aerospace, and Jodie […] The post Building Cybersecurity Leadership Skills appeared first on…

CISO Series Podcast LIVE at Stanford University (10-17-24)

CISO Series Podcast will be going back to school for another live show. We’re recording a show at Stanford University’s Cybersecurity and Privacy Festival 2024, AKA “Cyberfest.” Joining me on […] The post CISO Series Podcast LIVE at Stanford University…

PREVIEW: CISO Series Podcast LIVE in Houston, TX 9-24-24

CISO Series Podcast will be heading to HOU.SEC.CON to do a live audience recording of our show. Joining me on stage will be the incomparable Jerich Beason, CISO, WM, and […] The post PREVIEW: CISO Series Podcast LIVE in Houston,…

Who Is Responsible for Securing SaaS Tools?

Haven’t we already discussed at great length the cloud shared security model? We’ve had the cloud for a few decades. Why can’t we just extend that shared responsibility model for […] The post Who Is Responsible for Securing SaaS Tools?…

Join us at FAIRCON24 – 10-02-24 for CISO Series Game Show

Live in Washington DC or planning to attend FAIRCON24? Love cybersecurity and playing cybersecurity games? Then join us for a CISO Series Game Show, happening as part of FAIRCON24. Here’s […] The post Join us at FAIRCON24 – 10-02-24 for…

Join CISO Series for a Game Show at FAIRCON24 – 10-02-24

Live in Washington DC or planning to attend FAIRCON24? Love cybersecurity and playing cybersecurity games? Then join us for a CISO Series Game Show, happening as part of FAIRCON24. Here’s […] The post Join CISO Series for a Game Show…

CISO Series Podcast LIVE in Houston (09-24-24)

CISO Series Podcast will be heading to HOU.SEC.CON to do a live audience recording of our show. Joining me on stage will be the incomparable Jerich Beason, CISO, WM, and […] The post CISO Series Podcast LIVE in Houston (09-24-24)…

Join Us 9-23-24 For a CISO Series Meetup in Houston

On the Monday just before HOU.SEC.CON. launches in Houston, CISO Series will be hosting a meetup for both the listeners of the CISO Series AND those who have never heard […] The post Join Us 9-23-24 For a CISO Series…

Hiring Cyber Teenagers with Criminal Records

Threat actors don’t need certifications or a degree to be good at their job. So why do we keep trying to demand those from new cyber hires? And could a […] The post Hiring Cyber Teenagers with Criminal Records appeared…

Cybersecurity News: Spyware research, Cicada rebrand, MacroPack malware

In today’s cybersecurity news… Spyware research report A new study from the Atlantic Council’s Cyber Statecraft Initiative tracked the evolution of the spyware market, looking at larger players like NSO […] The post Cybersecurity News: Spyware research, Cicada rebrand, MacroPack…

CISO Series Podcast LIVE in Boca Raton, FL (09-21-24)

CISO Series Podcast will be at the 2024 SFISSA Hack the Flag Conference to do a live audience recording of our show. Joining me on stage will be Adam Fletcher, […] The post CISO Series Podcast LIVE in Boca Raton,…

Automating Network Alert Investigations with Dropzone AI

What good are network security alerts if they never get addressed? Frustration around this issue led Edward Wu to create Dropzone AI. I spoke with Edward about how he pivoted […] The post Automating Network Alert Investigations with Dropzone AI…

Red Flag? My Vendor Just Asked for My Mother’s Maiden Name

Just because a vendor is selling a security solution doesn’t mean they should expect your trust right away. Too many vendors initiate relationships with requests that stink of phishing emails. […] The post Red Flag? My Vendor Just Asked for…

What’s Working With Third-Party Risk Management?

We know third-party risk management is a pain. If nobody likes the universally agreed upon solutions like questionnaires, what are we doing that’s improving the situation? Check out this post […] The post What’s Working With Third-Party Risk Management? appeared…

Beating MFA Fatigue and AI-Driven Attacks with DirectDefense

One of the big trends with threat actors over the past year is a rise in multi-factor authentication (MFA) attacks. Attackers have turned to increased sophistication using a variety of […] The post Beating MFA Fatigue and AI-Driven Attacks with…

What Triggers a CISO?

CISOs are familiar with dealing with stress, making high-stakes decisions, and operating in an industry of unknown unknowns. But there are some things that still get under their skin and […] The post What Triggers a CISO? appeared first on…

Mastering Data Visibility for Secure AI Adoption with Cyera

Does data security need to be complex? Perhaps in the past, but modern AI and cloud solutions simplify data security at scale, argues Yotam Segev, Co-Founder and CEO, Cyera. The […] The post Mastering Data Visibility for Secure AI Adoption…

I Said I Was Technically a CISO, Not a Technical CISO

The road to becoming a CISO is highly individual. Often a CISO will not come from a technical background, or their technical background is long in their career rearview mirror. […] The post I Said I Was Technically a CISO,…

Combining Continuous Pentesting with Attack Surface Management

A point-in-time pentest is insufficient in today’s cybersecurity landscape. Casey Cammilleri, CEO & Founder, Sprocket Security, explained to me that constantly changing targets, such as new application deployments and infrastructure […] The post Combining Continuous Pentesting with Attack Surface Management…

Information Security vs. Cybersecurity

CISO stands for Chief Information Security Officer. So why do we sometimes pigeonhole their duties under “just” cybersecurity? Check out this post for the discussion that is the basis of […] The post Information Security vs. Cybersecurity appeared first on…

Understanding AI Bias and Security with NetSPI

For all the intricacies and hype around AI and large language models, Nabil Hannan, Field CISO, NetSPI, reminds us that they lack any kind of true intelligence, it’s all just […] The post Understanding AI Bias and Security with NetSPI…

Should Deny By Default Be the Cornerstone of Zero Trust?

How far can we extend a deny-by-default approach as we build out our zero-trust architecture? Can that aggressive security tactic work for the business without disrupting productivity? Conventional wisdom says […] The post Should Deny By Default Be the Cornerstone…

How NetSPI Built a Proactive Security Platform

Jumping from penetration testing to a full proactive security platform isn’t an easy move. But as organizations need to address the critical needs of IT organizations, InfoSec teams, and CISOs, […] The post How NetSPI Built a Proactive Security Platform…

What Is a Field CISO?

We’re increasingly seeing the industry fill up with Field CISOs. Why is the CISO out in the field? What does that role entail? Check out this post for the discussion […] The post What Is a Field CISO? appeared first…

The Challenges and Responsibilities of CISOs with Halcyon

We’re seeing increasing pressure and anxiety put on the CISO role, as legal and regulatory pressure seems to single out people in these positions. This leaves CISOs with a lot […] The post The Challenges and Responsibilities of CISOs with…