All Posts

Defense in Depth: Building a Fully Remote Security Team

Could you be successful with a fully virtual InfoSec team? Many say it can’t be done, while some have actually done it and been successful.…

Highlights from “Hacking the Greatest Risks” Video Chat

Here are the best moments from last year’s CISO Series Video Chat, “Hacking the Greatest Risks: An hour of critical thinking about protecting where we’re…

We Lower the Security and Pass the Savings on to You

We’re racing to the bottom on price and security on the latest episode of CISO/Security Vendor Relationship Podcast. This episode was recorded in person in…

January 2020! CISO-Vendor Podcast Live Recordings in Silicon Valley and Tel Aviv!

Last year we produced TEN live audience recordings of the CISO/Security Vendor Relationship Podcast in San Francisco, New York, Philadelphia, Grand Rapids, Los Angeles, and…

Defense in Depth: Account Takeover

An account takeover traditionally follows a methodical path that takes considerable time before anything bad happens. Is it worth a company’s time and effort to…

Ah, Here’s The Problem. You’ve Got a Leaky CEO.

We’re waking up the C-suite to the realization that they’re the prime target for cyberattacks. This episode was recorded in front of a live audience…

Defense in Depth: UX in Cybersecurity

Security products and programs may be functional and work correctly, but are they usable in the sense that it fits into the work patterns of…

Highlights from “Hacking the Security Basics” Video Chat

Here are six minutes of the best moments of “Hacking Security Basics: An hour of critical thinking about identifying and managing what every cybersecurity team…

Trust Me, We’re Using “Advanced” AI

We’re looking for a good reason to trust your AI on the latest CISO/Security Vendor Relationship Podcast. This episode was recorded in front of a…

[12-13-19] CISO Series Video Chat: Hacking the Greatest Risks

Please join us on December 13th, 2019 at 10 AM Pacific for the next installment of the CISO Series Video Chats, “Hacking the Greatest Risks:…

Defense in Depth: InfoSec Trends for 2020

We’re coming to the end of the year and that means it’s time to make our predictions for 2020. Mark this episode and check back…

Highlights from “Hacking the Email Pitch” Video Chat

Here are seven minutes of the best moments of â€œHacking the Email Pitch: An hour of critical thinking about security vendor’s very first outreach to a…

Isn’t That Adorable? Our Little CISO Has An Opinion.

We’re spoon-feeding “respect” to the CISO on this week’s CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and…

[12-06-19] CISO Series Video Chat: Hacking Security Basics

Please join us on December 6th, 2019 at 10 AM Pacific for the next installment of the CISO Series Video Chats, “Hacking Security Basics: An…

Rest Assured, We’re Confident Our Security Sucks

We may not have the protection you want, but what we lack in adequate security we make up in confidence. Sleep better at night after…

Hacking Humans: Security Has to Be Friendly

If you want security to work at your organization, it needs to be accessible or friendly to your users. If they have to side step…

Looking for Cybersecurity Solutions at Dreamforce 2019

Here’s my short report about the little cybersecurity presence I discovered at Dreamforce 2019. While you’ll see plenty of talk about Salesforce security at RSA,…

Defense in Depth: Cybersecurity Readiness as Hiring Criteria

What if every candidate interviewed was tested on their cybersecurity competency? How would that affect hiring and how would that affect your company’s security? Check…

Highlights from “Hacking the Hiring Process” Video Chat

Here are six 1/2 minutes of the best moments of “Hacking the Hiring Process: An hour of critical thinking on what we can actively improve…

What Security Advice Will Your Family Ignore?

This Thanksgiving we wish you lots of luck convincing your family members to use a password manager. Would getting them to switch political allegiances be…

[11-22-19] CISO Series Video Chat: Hacking the Email Pitch

Please join us on November 22nd, 2019 at 10 AM Pacific for the next installment of the CISO Series Video Chats, “Hacking the Email Pitch:…

Defense in Depth: Cybersecurity and the Media

Cybersecurity and the media. It rides the line between providing valuable information and feeding the FUD cycle. What’s the media’s role? Check out this post for…

Highlights from “Hacking the CIS Top 20” Video Chat

Here are six minutes of the best moments from the 11/8/19 recording of our weekly CISO Series Video Chat. We talked at great length about…

Hacking the Hiring Process – CISO Series Video Chat

Watch the replay of our CISO Series Video Chat: “Hacking the hiring process: An hour of critical thinking on what we can actively improve about the…