エピソード

  • Do You Have a Functional Policy or Did You Just Write One?
    2025/08/21

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Justin Berman, formerly vp of platform engineering and CISO at Thirty Madison Health.

    In this episode:

    • Maps without transportation
    • The untouchable employee problem
    • Attestation theater
    • The lightbulb moment

    Huge thanks to our sponsor, SecurityPal

    SecurityPal is the leader in Customer Assurance, helping companies accelerate security assurance without compromising accuracy. Their AI + human expertise approach, dynamic Trust Center, and modern TPRM solution eliminate manual work and streamline vendor security at scale. To learn more, visit securitypal.ai.

    続きを読む 一部表示
    32 分
  • Where are We Struggling with Zero Trust
    2025/08/14

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker.

    In this episode:

    • Legacy infrastructure creates the biggest hurdles
    • More marketing than methodology
    • Implementation complexity makes zero trust a Sisyphean task
    • Don't ignore human factors

    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit Threatlocker.com/CISO

    続きを読む 一部表示
    34 分
  • Cybersecurity Has a Prioritization Problem
    2025/08/07

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Terry O'Daniel, former CISO at Amplitude.

    In this episode:

    • Beyond prioritization: aligning risk with reality
    • From signals to strategy
    • The Case for Maturity Models
    • Security Starts With Culture

    Huge thanks to our sponsor, SecurityPal

    SecurityPal is the leader in Customer Assurance, helping companies accelerate security assurance without compromising accuracy. Their AI + human expertise approach, dynamic Trust Center, and modern TPRM solution eliminate manual work and streamline vendor security at scale. To learn more, visit securitypal.ai.

    続きを読む 一部表示
    31 分
  • How Can AI Provide Useful Guidance from Fragmented Security Data?
    2025/07/31

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is their sponsored guest, Matt Eberhart, CEO, Query.

    In this episode:

    • Quality over quantity in AI decision-making
    • Process before technology
    • The connectivity challenge
    • The context complexity paradox

    Huge thanks to our sponsor, Query

    Query is a Federated Search and Analytics platform that builds a security data mesh, giving
    security teams real-time context from all connected sources. Analysts move faster and make
    better decisions with AI agents and copilots that handle the grunt work and guide each step.
    Learn more at query.ai

    続きを読む 一部表示
    30 分
  • Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
    2025/07/24

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jason Thomas, senior director, technology security, governance, and risk, Cystic Fibrosis Foundation.

    In this episode:

    • The trust deficit
    • Defending the non-technical roles
    • The business accountability gap
    • The communication imperative

    Huge thanks to our sponsor, Query.ai

    Query is a Federated Search and Analytics platform that builds a security data mesh, giving security teams real-time context from all connected sources. Analysts move faster and make better decisions with AI agents and copilots that handle the grunt work and guide each step. Learn more at query.ai

    続きを読む 一部表示
    29 分
  • What Are the Cybersecurity Trends We Need To Follow?
    2025/07/17

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital.

    In this episode:

    • Shifting left, broadening out
    • The insurance wake-up call
    • Building trust into the system
    • Security’s identity crisis

    A huge thanks to our sponsor, Doppel

    Doppel is the first social engineering defense platform built to dismantle deception at the source. It uses AI and infrastructure correlation to detect, link, and disrupt impersonation campaigns before they spread - protecting brands, executives, and employees while turning every threat into action that strengthens defenses across a shared intelligence network. Learn more at https://www.doppel.com/platform

    続きを読む 一部表示
    24 分
  • Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
    2025/07/10

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian.

    In this episode:

    • The experience prerequisite
    • The bootcamp reality check
    • The compensation conundrum
    • The domain expertise imperative

    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
    続きを読む 一部表示
    27 分
  • What's the Most Efficient Way to Rate Third Party Vendors?
    2025/07/03

    All posts and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Steve Knight, former CISO, Hyundai Capital America.

    In this episode:

    • Streamlining vendor evaluations
    • Moving beyond compliance theater
    • The scorecard skeptics
    • Finding the right balance

    Thanks to our sponsor, Formal

    Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.

    続きを読む 一部表示
    28 分