Here’s a post-show interview Mike Johnson conducted with Fredrick Lee (AKA “Flee”) (@fredrickl), CSO, Gusto for our June 4th, 2019 episode of the CISO/Security Vendor…
I’m heading to Dallas in two weeks to host a salon-style discussion with a group of enthusiastic cybersecurity professionals of how we’re improving some of…
For most organizations, their ERP solution holds its crown jewels. Should custom and complex applications that trade such vital customer and corporate data be secured…
We’re playing hard to get on the latest episode of CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series…
Obsolete systems that are critical to your business. They’re abandoned, unpatchable and unmanaged. We’ve all got them, and often upgrading is not an option. What…
Everyone needs more security talent, but what kind of talent, how specialized, and what kind of pressure is hiring requirements putting on security professionals? Check…
One program we initiated in 2019 is something called “Topic Takeover” where we delve into one topic, by creating a deluge of articles, videos, podcasts…
Right after we recorded an episode of CISO/Security Vendor Relationship Podcast with Sean Catlett, CISO of Reddit, we turned on the camera for a little…
Are security professionals so burned out by aggressive cybersecurity marketing that they’re giving up on discovering new and innovative solutions? What are the best ways…
Today, Wednesday, May 8th, Verizon releases its highly anticipated Data Breach Investigation Report (DBIR). The CISO Series conducted a webinar with all the hosts for…
Is the cybersecurity industry solving our problems? We’ve got lots of new entrants. Are they doing anything new, or just doing the same thing slightly…
The CISO/Security Vendor Relationship Podcast will be heading to Grand Rapids, Michigan to be the closing keynote at the 2019 West Michigan IT Summit. The…
So many breaches happen through ports of known vulnerabilities. What is the organizational vulnerability in vulnerability management? Check out this post and discussion and this…
We’ve been concerning ourselves with vulnerability management lately. And so after publishing “25 Tips to Reduce the Frustration of Vulnerability Management” and a post by…
I’m not exactly sure what “humbling” means, but I’m going to use it to hopefully soften my braggadocio announcement. We discuss semantics and when it’s…
In the CISO Series’ ongoing effort to reduce frustration between buyers and sellers of security products, I’ll be moderating a round table discussion where we…
At the RSA 2019 Conference I spoke with Davi Ottenheimer (@daviottenheimer), product security at MongoDB, about where and why machine learning falls short. One might…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.