『Security You Should Know』のカバーアート

Security You Should Know

Security You Should Know

著者: CISO Series
無料で聴く

今ならプレミアムプランが3カ月 月額99円

2026年5月12日まで。4か月目以降は月額1,500円で自動更新します。

概要

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.2018-2025 CISO Series 政治・政府
エピソード
  • Verifying Identities with Trusona
    2026/05/04

    In this episode, Ori Eisen, founder and CEO at Trusona, makes a case for getting out of the AI detection arms race entirely. He argues that trying to catch AI-generated fakes with AI detection is the antivirus playbook, and we know how that ends. Trusona instead anchors verification to authoritative sources, DMV records and physical-world signals, things AI can mimic on screen but can't actually own. No pre-registered devices required. And it works in both directions: attackers calling your help desk, and attackers calling your employees while pretending to be IT. Joining him are Eduardo Ortiz, VP and Global Head of Cybersecurity at Techtronic Industries, and Mandy Huth, SVP and CISO at Ultra Clean Technology.

    Want to know:

    • Why do MFA and SSO still leave gaps attackers walk right through?
    • How Trusona verifies identity with no pre-registered devices or tokens?
    • Why building AI detection on top of AI fakes is a losing strategy?
    • How is a false rejection rate of zero achievable without locking out real employees?
    • What deployment actually looks like, and how fast you can be live?
    • Which departments beyond IT need identity verification, and where do you start?
    • How to measure the business value of this beyond just counting blocked account takeovers?
    • Why is a solid help desk protocol still not enough on its own?

    Huge thanks to our sponsor, Trusona

    GenAI supercharges identity impersonation and social engineering attacks – rendering legacy identity verification methods obsolete, especially in high-risk workflows like IT Help Desk password/MFA resets, vendor payment changes, remote employee hiring, or customer account access. Trusona ATO Protect empowers your team to thwart these attacks across business units and channels.

    GenAI supercharges identity impersonation and social engineering. It's rapidly eroding traditional authentication, especially in high-risk workflows like help desk password or MFA resets, vendor payment changes, remote employee hiring, and customer account access.

    Trusona's ATO Protect addresses deepfakes and social engineering directly—without adding friction or relying on legacy MFA.

    続きを読む 一部表示
    20 分
  • Transitioning to Quantum-Safe Encryption with enQase
    2026/03/16

    All links and images can be found on CISO Series.

    In this episode, Raj Patil, CTO at enQase, explains how enQase's full-stack platform helps enterprises implement quantum-safe security through a structured, integrated approach. This covers everything from cryptographic asset discovery and governance to out-of-band key generation for network appliances, without requiring organizations to rip and replace existing infrastructure. Joining him are Ross Young, co-host at CISO Tradecraft, and Adam Palmer, CISO at First Hawaiian Bank.

    Want to know:

    • Why is the post-quantum cryptography transition harder than simply implementing new standards?
    • What three factors should frame every CEO conversation about quantum risk?
    • Where should a highly regulated enterprise start, and what can reasonably wait three to five years?
    • Why should we be planning for "harvest now, decrypt later" attacks right now?
    • How do you build and track a cryptographic bill of materials across hundreds of applications and devices?
    • Why is crypto agility more important than picking the perfect algorithm?

    Huge thanks to our sponsor, enQase

    The enQase Platform empowers enterprises, defense organizations, cloud providers, and critical infrastructure operators to seamlessly adopt quantum-safe technologies while achieving crypto agility across their ecosystems. By combining quantum-grade hardware with software-defined control and interoperability, enQase ensures alignment with NIST standards, delivers unmatched flexibility and compliance readiness, and reduces risk across data, network, and compute layers, all while maintaining business continuity and operational resilience in an evolving cryptographic landscape. Learn more at enqase.com.

    続きを読む 一部表示
    18 分
  • Solving GRC Complexity with Anecdotes
    19 分
まだレビューはありません