loader from loading.io

Aside From Text, Images, and Videos, GenAI Can’t Fool Me (Live in Boston)

CISO Series Podcast

Release Date: 06/10/2025

Are You Implying This Line Graph Isn’t a Compelling Cybersecurity Narrative? show art Are You Implying This Line Graph Isn’t a Compelling Cybersecurity Narrative?

CISO Series Podcast

All links and images can be found on This week’s episode is hosted by , producer of CISO Series and (), principal of Duha. Joining them is our sponsored guest, , director, security, . In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Huge thanks to our sponsor, Vanta Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. Get back time to focus on strengthening...

info_outline
Our CISO Certainly Puts the Tool in Multi-Tool (LIVE in LA) show art Our CISO Certainly Puts the Tool in Multi-Tool (LIVE in LA)

CISO Series Podcast

All links and images can be found on CISO Series. This week’s episode is hosted by , producer of CISO Series and , deputy CISO, . Joining them is , CSO, . This episode was recorded live at the ISSA LA Summit in Santa Monica, California. In this episode:  The foundational debate Strength over breadth Beyond traditional backgrounds Keeping perspective on risk Huge thanks to our sponsors, Adaptive Security and Dropzone AI AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast.  helps security leaders get ahead with an...

info_outline
I Don’t Just Guess About Effectiveness, I Make Educated Guesses! show art I Don’t Just Guess About Effectiveness, I Make Educated Guesses!

CISO Series Podcast

All links and images can be found on This week’s episode is hosted by me, , producer of CISO Series and (), principal of Duha. Joining us is , CISO, . In this episode:  Optimizing for reality, not idealism Engineering governance instead of monitoring compliance When AI finds what humans miss The measurement problem Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware or data loss. With ThreatLocker, unauthorized apps, scripts, and devices are blocked before they can ever run. See how...

info_outline
It’s a Little Hard to Evaluate New Solutions When You’re Screaming “AI” at Me All the Time (Live in Houston) show art It’s a Little Hard to Evaluate New Solutions When You’re Screaming “AI” at Me All the Time (Live in Houston)

CISO Series Podcast

All links and images can be found on  This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them on stage is , CISO, . This episode was recorded live at . In this episode: The open source sustainability problem AI levels the geopolitical playing field Cutting through AI vendor hype Why the fundamentals still hurt Thanks to Erik Bloch from Illumio for providing our "What's Worse" scenario. Huge thanks to our sponsor, Vorlon Security SaaS data moves fast—Vorlon gives security teams the context to move faster. Vorlon combines posture and secrets...

info_outline
Dear Abby: Why Should I Trust a Vendor Selling Me Zero Trust? show art Dear Abby: Why Should I Trust a Vendor Selling Me Zero Trust?

CISO Series Podcast

All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is our sponsored guest, , chief product officer, . In this episode: When EDR gets knocked out Red flags in vendor theater Configuration chaos The sticker problem Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines...

info_outline
The Difference with AI Red Teaming is We Added the Word AI show art The Difference with AI Red Teaming is We Added the Word AI

CISO Series Podcast

All links and images can be found on  This week’s episode is hosted by , producer of CISO Series and , principal of . Joining us is our sponsored guest, , senior director, GRC, . In this episode: Skip the Sermon When to coach versus command Making risk quantification useful Recognizing a distinct discipline   Huge thanks to our sponsor, Vanta Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. A recent IDC analysis found that compliance teams using Vanta are 129% more...

info_outline
Don’t Worry, We’ll Get to Solving Your Problem on Slide 87 show art Don’t Worry, We’ll Get to Solving Your Problem on Slide 87

CISO Series Podcast

All links and images can be found on  This week’s episode is hosted by , producer of CISO Series and (), principal of Duha. Joining them is , CISO, . In this episode: AI security's blind spot problem Vendors don't understand the assignment Marketing budgets overshadow actual innovation Accuracy versus effectiveness Huge thanks to our sponsor, Material Security Built specifically for Google Workspace, Material is a detection and response platform that protects Gmail, Google Drive, and accounts by proactively eliminating security gaps, stopping misconfigurations, and preventing...

info_outline
Time to Choose a Security Vendor: Dart Board or Spin the Wheel? show art Time to Choose a Security Vendor: Dart Board or Spin the Wheel?

CISO Series Podcast

All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is , global CISO and CIO, . In this episode: We can't promise safe, but we can promise ready Are we accidentally building security nightmares? Being held accountable for things you had no say in The safe space problem in vendor evaluation Huge thanks to our sponsor, Adaptive Security Sponsored by Adaptive Security — the first cybersecurity company backed by OpenAI. Adaptive helps security leaders defend against AI-powered social engineering threats like...

info_outline
Now That You Mention It I HAVE Heard Some Hype Around These AI Tools show art Now That You Mention It I HAVE Heard Some Hype Around These AI Tools

CISO Series Podcast

All links and images can be found on CISO Series. This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is , CISO, . In this episode: The AI experimentation phase isn't optional When selling security becomes the hardest part of the job Threat actors aren't hacking in anymore We build, we bond, and we can't bear to let go Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware or data loss. With ThreatLocker, unauthorized apps, scripts, and devices are...

info_outline
Wait, SMS Doesn’t Stand for “Super Mega Secure?” show art Wait, SMS Doesn’t Stand for “Super Mega Secure?”

CISO Series Podcast

All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , principal of Duha. Joining us is our sponsored guest, , CEO, Adaptive Security. In this episode: Hiring North Korean operatives on a Tuesday AI coding and the death of specifications Deepfake personas beyond video calls The middleman problem with SMS Huge thanks to our sponsor, Adaptive Security AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. Adaptive helps security leaders get ahead with an AI-native platform that...

info_outline
 
More Episodes

All links and images can be found on CISO Series.

This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest, Sam Curry, global vp, CISO at Zscaler. This episode was recorded at a Zscaler event in Boston, MA.

In this episode:

  • Guardrails for decision making under fatigue
  • Preparing for quantum threats
  • Strategic use of generative AI
  • Reassessing outdated knowledge

Huge thanks to our sponsor, Zscaler

Zscaler is a cloud-based cybersecurity company that provides secure internet access and private application access. Its platform replaces traditional network security by delivering Zero Trust architecture, protecting users, data, and applications regardless of location. Zscaler’s scalable services help organizations modernize IT and reduce risk with seamless, cloud-native security solutions.