Category: CISO Series

Risk Management in Real Time with Safe Security

Join us for a groundbreaking announcement in cyber risk quantification and management. Today, Safe Security unveils SafeX, its new AI-powered mobile application designed to simplify and automate cyber risk assessment. […] The post Risk Management in Real Time with Safe…

Celebrating 6 Years with CISO Series

We got the best present for the CISO Series 6th anniversary: testimonials from our listeners! David Spark hit the show floor at Black Hat 2024 to ask attendees why they […] The post Celebrating 6 Years with CISO Series appeared…

Is It Possible to Inject Integrity Into AI?

When it comes to generative AI systems, often we’re concerned about the quality and reliability of the output. But do we risk losing sight of the integrity of these systems […] The post Is It Possible to Inject Integrity Into…

CISO Series Podcast LIVE in La Jolla (10-30-24)

The CISO Series Podcast is celebrating spooky season the only way we know how, with another live podcast recording! We’re recording a podcast episode at the Planet Cyber Sec CISO-CIO […] The post CISO Series Podcast LIVE in La Jolla…

Building Cybersecurity Leadership Skills

Last week on Super Cyber Friday, we talked about building leadership skills. David Spark hosted the discussion, joined by Alexandra Landegger, executive director and CISO at Collins Aerospace, and Jodie […] The post Building Cybersecurity Leadership Skills appeared first on…

CISO Series Podcast LIVE at Stanford University (10-17-24)

CISO Series Podcast will be going back to school for another live show. We’re recording a show at Stanford University’s Cybersecurity and Privacy Festival 2024, AKA “Cyberfest.” Joining me on […] The post CISO Series Podcast LIVE at Stanford University…

Who Is Responsible for Securing SaaS Tools?

Haven’t we already discussed at great length the cloud shared security model? We’ve had the cloud for a few decades. Why can’t we just extend that shared responsibility model for […] The post Who Is Responsible for Securing SaaS Tools?…

CISO Series Podcast LIVE in Houston (09-24-24)

CISO Series Podcast will be heading to HOU.SEC.CON to do a live audience recording of our show. Joining me on stage will be the incomparable Jerich Beason, CISO, WM, and […] The post CISO Series Podcast LIVE in Houston (09-24-24)…

Hiring Cyber Teenagers with Criminal Records

Threat actors don’t need certifications or a degree to be good at their job. So why do we keep trying to demand those from new cyber hires? And could a […] The post Hiring Cyber Teenagers with Criminal Records appeared…

What’s Working With Third-Party Risk Management?

We know third-party risk management is a pain. If nobody likes the universally agreed upon solutions like questionnaires, what are we doing that’s improving the situation? Check out this post […] The post What’s Working With Third-Party Risk Management? appeared…

What Triggers a CISO?

CISOs are familiar with dealing with stress, making high-stakes decisions, and operating in an industry of unknown unknowns. But there are some things that still get under their skin and […] The post What Triggers a CISO? appeared first on…

Combining Continuous Pentesting with Attack Surface Management

A point-in-time pentest is insufficient in today’s cybersecurity landscape. Casey Cammilleri, CEO & Founder, Sprocket Security, explained to me that constantly changing targets, such as new application deployments and infrastructure […] The post Combining Continuous Pentesting with Attack Surface Management…

Information Security vs. Cybersecurity

CISO stands for Chief Information Security Officer. So why do we sometimes pigeonhole their duties under “just” cybersecurity? Check out this post for the discussion that is the basis of […] The post Information Security vs. Cybersecurity appeared first on…

Understanding AI Bias and Security with NetSPI

For all the intricacies and hype around AI and large language models, Nabil Hannan, Field CISO, NetSPI, reminds us that they lack any kind of true intelligence, it’s all just […] The post Understanding AI Bias and Security with NetSPI…

Should Deny By Default Be the Cornerstone of Zero Trust?

How far can we extend a deny-by-default approach as we build out our zero-trust architecture? Can that aggressive security tactic work for the business without disrupting productivity? Conventional wisdom says […] The post Should Deny By Default Be the Cornerstone…

How NetSPI Built a Proactive Security Platform

Jumping from penetration testing to a full proactive security platform isn’t an easy move. But as organizations need to address the critical needs of IT organizations, InfoSec teams, and CISOs, […] The post How NetSPI Built a Proactive Security Platform…

What Is a Field CISO?

We’re increasingly seeing the industry fill up with Field CISOs. Why is the CISO out in the field? What does that role entail? Check out this post for the discussion […] The post What Is a Field CISO? appeared first…