All Posts

Best moments from “America’s Next Top Data Privacy Violator”

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, “America’s Next Top Data Privacy Violator.” Highlighted…

America’s Next Top Data Privacy Violator

A newly proposed provision in the Consumer Data Protection Act (CDPA) could result in jail time for intentional data privacy violations. We’re not scared. We’re…

Best Moments from “A ‘Single Pane of Glass’ for Ignoring Vendor Pitches”

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, “A ‘Single Pane of Glass’ for Ignoring…

A ‘Single Pane of Glass’ for Ignoring Vendor Pitches

Tired of deleting pages of vendor pitches? Wouldn’t it be more efficient if you could see them altogether on one screen so you could simply…

Best moments from “Latest Unnecessary Stats from Marginal Security Threats”

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, “Latest Unnecessary Stats from Marginal Security Threats.”…

The Latest Unnecessary Stats on Marginal Security Threats

If we let you know that 90 percent of break-ins happen because of a little known threat we happen to mitigate, you’d purchase our product,…

Best Responses to “12 Specific Techniques to Build Relationships with CISOs”

This is my feedback to your feedback to my article “12 Specific Techniques to Build Relationships with CISOs.” Each time I write an article readers…

Best moments from “We Turn Our Backs on Cybersecurity Rock Stars”

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, “We Turn Our Backs on Cybersecurity Rock Stars.”…

We Turn Our Backs on Cybersecurity Rock Stars

We’re no longer buying their albums because we’ve had enough of the “can do no wrong” toxic culture of cybersecurity rock stars. On this episode…

Chenxi Wang on Diversity

Best Moments from “We’d Feel Safer if This Legitimate Email Was a Phishing Attack”

Here are three of the best moments from the most recent episode of the CISO/Security Vendor Relationship Podcast, “We’d Feel Safer if This Legitimate Email Was…

12 Specific Techniques to Build Relationships with CISOs

CISOs (chief information security officers) are a prime target for security sales and marketing because they are usually the point person who controls a company’s…

We’d Feel Safer if This Legitimate Email Was a Phishing Attack

Why is our financial institution sending us an email suggesting we click on a link to log into our account? On this episode of the…

Three Best Moments from “Is This a Vendor Dinner or an Escape Room?”

Not counting on employees to follow security policies, building security program around zero trust, and the worst situation is when more people ignore you. It’s…

Best Responses to “How to Make a Huge Impact in the Security Community with Zero Marketing”

This is my feedback, to your feedback, to my article, “How to Make a Huge Impact in the Security Community with Zero Marketing.” This is…

Is This a Vendor Dinner or an Escape Room?

Why were we brought to this event? Why can’t we leave? I don’t think we have enough clues to get out of this vendor meeting.…

Three Best Moments from “STAND BACK! We’re Plugging in USB Drives We Found on the Ground”

Here are three highlights from the October 30, 2018 episode of the CISO/Security Vendor Relationship Podcast, Three Best Moments from “STAND BACK! We’re Plugging in…

How to Make a Huge Impact in the Security Community with Zero Marketing

One of the greatest struggles a security vendor has is how to effectively spend its marketing dollars. CISOs are becoming jaded and tuning out at…

STAND BACK! We’re Plugging In USB Drives We Found on the Ground

We gear up in HAZMAT suits and get ready for some dangerous USB drive analysis. We’re taking all precautions on the latest episode of the…

Best Moments from “We Get to Know Our Bodies and Our Security Program”

Here are three highlights from the October 22nd, 2018 episode of the CISO/Security Vendor Relationship Podcast, “We Get to Know Our Bodies and Our Security…

We Get to Know Our Bodies and Our Security Program

We’re just a bunch of immature teenagers who can’t seem to control ourselves or our security program. We’re definitely exploring new solutions in the latest…

Behind the Scenes: “CHEAT! Best Practices to Win at Monopoly and Security”

Right after we finished recording this episode of the CISO/Security Vendor Relationship Podcast at Silicon Valley Code Camp at Pay Pal in San Jose, I…

Best Moments from “Why it’s Critical for CISOs to Proactively Engage with Vendors”

Here are a few highlights from the bonus episode of the CISO/Security Vendor Relationship Podcast with former guest, Allan Alford, CISO of Mitel. We talked about his…

Why it’s Critical for CISOs to Proactively Engage with Vendors

This is a bonus episode of the CISO/Security Vendor Relationship Podcast with former guest, Allan Alford, CISO of Mitel, who was also the subject of…