All Posts

Do’s And Don’ts of Trashing Your Competition

We want to malign our competitors, but just don’t know how mean we should be. Miss Manners steps in on the latest episode of CISO/Security…

Defense in Depth: The Cloud and Shared Security

When your business enters the cloud, you are transferring risk, but also adding new risk. How do you deal with sharing your security obligations with…

Highlights from CISO Series Video Chat: “Hacking the Boardroom Meeting”

Here are six minutes of the best moments of “Hacking the Boardroom Meeting: An hour of critical thinking about communicating with the C-suite”. This video…

Get Out! The FUD Is Coming from the Inside

On this week’s CISO/Security Vendor Relationship Podcast, we’re pointing fingers at practitioners, not vendors, for promoting the FUD (fear, uncertainty, and doubt) scare-a-thon. This episode…

CISO Series Video Chat: Hacking the CIS Top 20

Please join on Friday, November 8th, 2019 at 10 AM Pacific for the next installment of the CISO Series Video Chats, “Hacking the CIS Top…

Do You Want to Be a CISO?

Is CISO the cybersecurity job you’ve always wanted? Second time CISOs Mike Johnson, co-host of CISO/Security Vendor Relationship Podcast and Eddie Contreras, CISO, Frost Bank…

Defense in Depth: Is Product Security Improving?

We’ve been at this cybersecurity thing for a long time. Are products improving their security? A recent study says they aren’t. Check out this tweet…

Highlights from “How to Create the Most Attractive Entry Level Cybersecurity Jobs”

Here are 6 1/2 minutes of the best moments from our one hour video chat on the topic of attracting new cybersecurity professionals to the…

Say It Loud! I Didn’t Read the Privacy Policy and I’m Proud!

If we don’t understand the purpose of a privacy policy, why should we bother reading it? We’re claiming the cyber ignorance defense on the latest…

CISO Series Video Chat: Hacking the Boardroom Meeting

Please join on Friday, November 1st, 2019 at 10 AM Pacific for “Hacking the Boardroom Meeting: An hour of critical thinking about communicating with the…

Why Startups Desperately Need CISO Guidance

As a preview for the 10-29-19 episode of CISO/Security Vendor Relationship Podcast, Mike Johnson interviews Roger Hale, CISO in residence for YL Ventures, about his…

Defense in Depth: Best Starting Security Framework

If you were building a security program from scratch, which many of our listeners have done, which framework would be your starting point? Check out…

I’ll See Your Gated Whitepaper and Raise You One Fake Email Address

We’re all in with not wanting “follow up email marketing” on the latest episode of CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David…

Highlights from “Are Cybersecurity Sales Incentives Helping or Hurting the Industry?”

Here are 4 1/2 minutes of the best moments from the one hour video-chat webinar “Are Cybersecurity Sales Incentives Helping or Hurting the Industry?” Featured…

Defense in Depth: Cyber Defense Matrix

A simple way to visualize your entire security program and all the tools that support it. Check out this post for the discussion that is the…

WEBINAR: How to Create the Most Attractive Entry Level Cybersecurity Jobs

There is an eagerness to draw in more cybersecurity talent, but heck, to do what? What are those jobs that vendors and CISOs should be…

Rated #1 in Irresponsible Security Journalism

No security alert is too small for us to completely misrepresent its severity. The sky is falling on the latest episode of CISO/Security Vendor Relationship Podcast.…

Defense in Depth: User-Centric Security

How can software and our security programs better be architected to get users involved? Check out this post for the discussion that is the basis…

Webinar Preview: Digital Forensics that Overpromise and Underdeliver

Join me on Tuesday, October 22nd, at 11 AM Eastern for a webinar entitled “How to Avoid Digital Forensics that Overpromise and Underdeliver.” I’ll be…

Cybercrimes Solved in an Hour or Your Next One’s Free

In the real world, cybercrimes just don’t get solved as fast as they do on CSI. So we’re offering a guarantee. If we don’t catch…

Defense in Depth: Securing the New Internet

If you could re-invent the entire Internet, starting all over again with security in mind, what would you do? Check out this post for the…

End of Year Recap of the CISO Series

What were the most popular podcast episodes, videos, and articles on CISO Series over the past year? Today is the first year anniversary (hopefully there…

Mapping Unsolvable Problems to Unattainable Solutions

We’re busting out the Cyber Defense Matrix to see what we’ll never be able to achieve with our security program. This episode is hosted by…

Simple Tool to Visualize the Security-Vendor Ecosystem

The Cyber Defense Matrix is an easy-to-use chart for making sense of the unbelievably crowded field of cybersecurity solutions. It’s also a good chart to…