『Security You Should Know』のカバーアート

Security You Should Know

Security You Should Know

著者: CISO Series
無料で聴く

このコンテンツについて

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.2018-2025 CISO Series 政治・政府
エピソード
  • Verifying Identity with Incode Technologies
    2025/12/01

    All links and images can be found on CISO Series.

    Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and existing IAM platforms still trust the human layer far too easily.

    In this episode, Fernanda Sottil, Senior Director of Strategy at Incode Technologies, explains how their solution adds a real-world identity layer that integrates seamlessly with existing IAM systems. Joining her are Nick Espinosa, host of the Deep Dive radio show and Bozidar Spirovski, CISO at Blue Dot.

    Questions answered on the show:

      • How does Incode comply with GDPR when training AI models on employee facial data?
      • What happens when legitimate users get blocked, especially job candidates?
      • How does Incode maintain accuracy across 4,600 document types in 200 countries?
      • Can organizations see error rates and override the system when needed?
      • How quickly can Incode patch new attack vectors as adversarial threats evolve?

      Huge thanks to our sponsor, Incode Technologies

      Incode Workforce helps enterprises stop deepfakes, prevent fraud, and secure every identity moment. By matching an ID to a selfie with AI-powered biometrics, Incode confirms the real person behind each IAM interaction, safeguarding onboarding, access, and recovery with frictionless verification that ensures workforce security and trust at scale.

      続きを読む 一部表示
      20 分
    • Securing Application Delivery with Island
      2025/11/17

      All links and images can be found on CISO Series.

      Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermines both protection and performance.

      In this episode, Braden Rogers, chief customer officer at Island, explains how their enterprise browser platform rethinks application delivery by building security services natively into the browsing experience. Joining him are Nick Ryan, former CISO, and Janet Heins, CISO at ChenMed.

      Want to know:

      • How do you explain this approach to your CEO in plain English?
      • What's the real architecture difference between enterprise browsers and traditional VDI?
      • How do you deploy a new browser to 20,000 users without change management chaos?
      • What happens to your existing security stack when you add an enterprise browser?
      • Can users access personal apps while keeping corporate data protected?
      • What's the offline experience when cloud services fail?
      • How does this handle the surge of AI tools in your organization?
      • What's the difference between browser enforcement and a full enterprise browser?
      • How do you apply different security controls without overwhelming users?
      • What does vendor support actually look like from pilot to production?
      Huge thanks to our episode sponsor, Island What if you no longer had to bolt agents, proxies, and gateways onto browsers? Island, the Enterprise Browser, embeds core security, IT, and productivity into the workspace. Intelligent boundaries keep data where it belongs. Orgs have full visibility into all work. And users enjoy a fast, smooth, and productive experience. Learn more at Island.io
      続きを読む 一部表示
      16 分
    • Optimizing Access Management with Imprivata
      2025/11/03

      Watch our demo with Imprivata on our site.

      In this episode, Chip Hughes, chief product officer at Imprivata, explains how the company addresses shared access management challenges with specialized solutions that prioritize both security and user experience. Joining him are Kathleen Mullin, former CISO at MyCareGorithm, and Howard Holton, CEO at GigaOm.

      Want to know:

      • Why does shared access management remain such a persistent challenge across industries?
      • What does Imprivata's solution actually do versus traditional IAM tools?
      • How does passwordless authentication work in high-security, high-speed environments?
      • What authentication modalities beyond badges are organizations adopting?
      • How can organizations integrate access management across devices, operating systems, and applications?
      • What are the unique access challenges in healthcare, law enforcement, and manufacturing?
      • Can shared mobile devices provide enterprise-grade security while reducing hardware costs?

      Huge thanks to our sponsor, Imprivata

      Imprivata delivers solutions that provide simple and secure access management for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata solves complex security, workflow, and compliance challenges with solutions that facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership. Learn more at https://www.imprivata.com/

      続きを読む 一部表示
      18 分
    まだレビューはありません