• Summary

  • Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
    2018-2022 CISO Series
    Show More Show Less
Episodes
  • Jun 28 2022

    All links and images for this episode can be found on CISO Series

    Next time you're annoyed by a security vendor's pitch, instead of firing back at them at what an idiot they are, or complaining about it on social media, why not see if you can find a friendly manager at the vendor company and explain what happened so they can actually address the problem appropriately?

    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Rob Suarez, CISO, BD.

    Thanks to our podcast sponsor, Trend Micro

    Trend Micro Cloud One, a security services platform for cloud builders, delivers the broadest and deepest cloud security offering in one solution, enabling you to secure your cloud infrastructure with clarity and simplicity. Discover your dynamic attack surface, assess your risk, and respond with the right security at the right time. Discover more!

    In this episode:

    • Where could we possibly draw the line of what can be known to the public, but at the same time not offering insight to the attackers?
    • We examine what makes medical establishments an attractive target. Why are medical records valuable and outside of havoc is there any other purpose of tampering with medical devices?
    • How do you use industry-specific threat information to make better security decisions?
    • Why do some cybersecurity companies succeed and others fail?
    Show More Show Less
    35 mins
  • Jun 21 2022

    All links and images for this episode can be found on CISO Series

    I have no idea what I need to spend to demonstrate our security program is working. What's it going to take? Or maybe I need just others on my team to just validate that they truly do care about security.

    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is John McClure (@johnmcclure00), CISO, Sinclair Broadcast Group.

    Thanks to our podcast sponsor, Keyavi

    Data that protects itself?  Now it does! We made data so smart it can think for itself. Secure itself. Stay continually aware of its surroundings. Control where, when and who is allowed access. And automatically report back to its owner. This changes the entire cybersecurity paradigm. Learn how.

    In this episode:

    • What’s your best indicator that your security program is actually improving?
    • We examine certifications and separate myth from reality for those trying to get into cybersecurity and also for more seasoned professionals?
    • What security flaw often gets overlooked?
    • How does one go about asking for a team building budget for a remote team?
    Show More Show Less
    37 mins
  • Jun 14 2022

    All links and images for this episode can be found on CISO Series

    How dangerous is it for a cybersecurity professional to pull a G-d complex with the email server just because they didn't like the way one salesperson behaved?

    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Jadee Hanson (@jadeehanson), CIO/CISO, Code42.

    Thanks to our podcast sponsor, Code42.

    As the Insider Risk Management leader, Code42 helps security professionals protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. For security practitioners, it means speed to detection and response. For companies, it means a collaborative workforce that is productive and a business that is secure. Visit http://Code42.com/showme to learn more.

    In this episode:

    • Is it alright to block a vendor because one salesperson is persistent and annoying?
    • How can one go about creating a cybersecurity report card?
    • Is it just inevitable that your staff is going to eventually violate policies?
    • How to determine a delicate balance between a complete non-tolerance policy versus complete tolerance?
    Show More Show Less
    40 mins

What listeners say about CISO Series Podcast

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.