All Posts

Best Moments from “CHEAT! Best Practices to Win at Monopoly and Security”

Three of the best moments from the 10-16-18 episode of CISO/Security Vendor Relationship Podcast with me, David Spark (@dspark), founder of Spark Media Solutions and Mike Johnson, CISO of Lyft. Our…

CHEAT! Best Practices to Win at Monopoly and Security

We don’t play fair and we’re not ashamed to admit it. This week’s episode of the podcast is super-sized because it was recorded in front…

Welcome to CISOseries.com, the New Home for CISO/Security Vendor Relationship Series and Podcast

When marketers and salespeople from security firms are questioned as to who they want to reach, CISOs are unquestionably the desired target. “We want to…

We Acknowledge We’ve Received and Are Ignoring Your Support Ticket

Our CISOs don’t have much confidence they’ll receive any support when they hit the ‘Send’ button on your web form. Got feedback? Join the conversation…

How to Help Your Best Employees Leave

In such a hyper-competitive market for security talent, the natural inclination would be to try everything you can to keep your best employees. Unfortunately, even…

I Wish I Didn’t Post That … But I’m Glad I Did

We admit we’ve posted some rather embarrassing posts on social media. In particular, my co-host, Mike Johnson, talks about a post he initially regretted, but…

Best Responses to “One CISO’s Grand Experiment to Engage with Security Vendors”

This is the story of Allan Alford, CISO of Mitel, who publicly announced on LinkedIn that he was going to reserve two hours each week…

Our All White Male Panel Discusses Diversity in Cybersecurity

With absolutely no irony three white men discuss the value of diversity in cybersecurity in the latest episode of CISO/Security Vendor Relationship Podcast. So before…

Best Responses to “How and When Do You Trust a Security Vendor?”

Again and again I hear from CISOs and security buyers that they want to trust security vendors first. But at the same time they say…

Our Latest Product Release Includes Shiny New Security Vulnerabilities

We have an exciting announcement: Our latest version of the podcast is packed with new features and they’re riddled with security holes. We know you…

One CISO’s Grand Experiment to Engage with Security Vendors

Last week, Allan Alford, CISO of Mitel, announced on LinkedIn that he was going to set aside two hours each week to have meetings with…

Best Responses to “4 Stories of Security Vendors Overcoming Roadblocks”

A roadblock in security sales is assumed, but it doesn’t have to be a negative. Rather, it can be an educational experience on how to…

How and When Do You Trust a Security Vendor?

In my reporting for the CISO/Security Vendor Relationship Series and the companion podcast, the one theme I hear over and over is that buyers of…

Best Responses to “4 Effective Targeted Techniques to Market GDPR”

Now that the deadline for GDPR compliance has passed, it doesn’t mean the regulation isn’t top of mind on a daily basis. Companies need help…

Security Made the Mess. They Should Clean It Up

Security is suffering from a serious Rodney Dangerfield “I get no respect” problem. What has often been seen as the department of “no” is struggling…

4 Stories of Security Vendors Overcoming Roadblocks

I think it might be safe to say that the majority of a security vendor’s time is trying to avoid being a roadblock or running…

BONUS: What’s So Awesome About Being a CISO?

This is an extra segment we recorded with Dan Glass, former CISO, American Airlines for our last episode. It didn’t make it into the last episode, but I…

Job Opportunity: Unqualified AND Underpaid

We spend a good portion of this episode of the CISO/Security Vendor Relationship Podcast mocking unrealistic job listings that ask for too many unnecessary credentials…

4 Effective Targeted Techniques to Market GDPR

As has been reported many times previously (here and here), selling fear to CISOs is far from welcome. Prior to May’s looming EU deadline of GDPR, or General…

How CISOs Stay Current When They’re Ignoring Vendor Pitches

We promise to keep your identity private while we discuss the troubles of two-factor authentication. Share your feedback by joining the conversation on LinkedIn. On this…

Use Your CRM. CISOs Are Tired of Repeating Themselves.

Just because you have a new salesperson, doesn’t mean you have to restart the sales process. If you’ve been properly entering information into your CRM,…

Ultra Enhanced Deluxe AI with a Drop of Retsyn

Just like so many security products are infused with artificial intelligence, we’ve also got plenty of meaningless modifiers to describe this podcast. Share your feedback…

How to Choose a Bad Security Product

If I knew more about your current security needs, I’d probably be able to tell you what security product to buy. But that would require…

We Have the Silver Bullet for BS Detection

We’re fed up with vendors that think they can detect any breach, but we’re not fed up with breach detection. Share your feedback by joining the…