HomePodcastCISO Series Podcast

CISO Series Podcast

CISO SERIES PODCAST

How to Be a Security Vendor CISOs Can’t Ignore

There are vendors that CISOs can't look away from. Who are they and what did they do to get so much attention from CISOs? This...

I Pity the Fool Who Builds a Homogeneous Cyber A-Team

If you want to build a successful cybersecurity team, you need to be diverse, mostly in thought. But that diversity in thought usually is...

The Cybersecurity Hamster Wheel of Getting Nothing Done

What are signs your team is getting burnt out? It's not an imbalance of work and family, it's feeling you're having no impact. That...

09-22-22: Join Our Live Audience Recording of CISO Series Podcast in Santa Monica, CA

ISSA-LA will be hosting me at their annual ISSA-LA Information Security Summit XII. Come to this fun event where Spark will be joined by...

09-20-22: Join Our Live Audience Recording of CISO Series Podcast in Mountain View, CA

We did it before the pandemic and it's now time to do it again. ISSA Silicon Valley and San Francisco will be hosting David...

Who Do You Need to Trust When You Build a Zero Trust Architecture?

Uggh, just saying "zero trust" sends shivers down security professionals' spines. The term is fraught with so many misnomers. The most important is who...

The Best Interview Questions and the Answers You Want to Run From

You want an awesome job in cybersecurity, and you want to ask the right questions. What are the right answers, and which ones are...

But I Spent All This Money. Why Are You Still Ignoring Me?

Are RSA and other big conferences worth it? It seems that fewer CISOs are actually walk the floor at these big trade shows. The...

It’s OK to Look Like a Cyber Hero. Just Don’t Act Like One.

Security professionals should turn in the cyber hero mentality for the "sidekick" role. Many cybersecurity leaders believe they need to save the company from...

How to Market “Zero Trust” Without Making CISOs Cringe

Just the words "zero trust" often causes security professionals to shiver. In general, CISOs are on board with the concepts of "zero trust," we...

When Good Decisions Go Bad

You can make the right decision given the information you have, but everything is a risk, so there are times those good decisions are...

When Does an Exaggeration Become a Lie?

We explore the world of dishonesty in cybersecurity. Practitioners know that marketers will stretch the truth, but how far are we willing to let...

Yuck! Now Everyone Has Touched My Data.

What can you do when your data keeps passing through different third party applications? Your data is being accessed and manipulated by more people,...

“Bad” Security Practices That Really Aren’t All that Bad

If they can find flaws, security professionals are quick to label it as bad security behavior. But often, what is marked as "bad" may...

How Many Forms of ID Do I Need to Buy This Gift Card?

Getting someone to purchase gift cards is a popular vector for theft. Given that the gift card theft technique is so well known, many...