Our CISO Certainly Puts the Tool in Multi-Tool (LIVE in LA)
Release Date: 11/11/2025
CISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and (), principal of Duha. Joining them is our sponsored guest, , director, security, . In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Huge thanks to our sponsor, Vanta Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. A recent IDC analysis found that compliance teams using Vanta are 129% more productive. Get back time to focus on strengthening...
info_outlineCISO Series Podcast
All links and images can be found on CISO Series. This week’s episode is hosted by , producer of CISO Series and , deputy CISO, . Joining them is , CSO, . This episode was recorded live at the ISSA LA Summit in Santa Monica, California. In this episode: The foundational debate Strength over breadth Beyond traditional backgrounds Keeping perspective on risk Huge thanks to our sponsors, Adaptive Security and Dropzone AI AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. helps security leaders get ahead with an...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by me, , producer of CISO Series and (), principal of Duha. Joining us is , CISO, . In this episode: Optimizing for reality, not idealism Engineering governance instead of monitoring compliance When AI finds what humans miss The measurement problem Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware or data loss. With ThreatLocker, unauthorized apps, scripts, and devices are blocked before they can ever run. See how...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them on stage is , CISO, . This episode was recorded live at . In this episode: The open source sustainability problem AI levels the geopolitical playing field Cutting through AI vendor hype Why the fundamentals still hurt Thanks to Erik Bloch from Illumio for providing our "What's Worse" scenario. Huge thanks to our sponsor, Vorlon Security SaaS data moves fast—Vorlon gives security teams the context to move faster. Vorlon combines posture and secrets...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is our sponsored guest, , chief product officer, . In this episode: When EDR gets knocked out Red flags in vendor theater Configuration chaos The sticker problem Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , principal of . Joining us is our sponsored guest, , senior director, GRC, . In this episode: Skip the Sermon When to coach versus command Making risk quantification useful Recognizing a distinct discipline Huge thanks to our sponsor, Vanta Vanta automates key areas of your GRC program—including compliance, risk, and customer trust—and streamlines the way you manage information. A recent IDC analysis found that compliance teams using Vanta are 129% more...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and (), principal of Duha. Joining them is , CISO, . In this episode: AI security's blind spot problem Vendors don't understand the assignment Marketing budgets overshadow actual innovation Accuracy versus effectiveness Huge thanks to our sponsor, Material Security Built specifically for Google Workspace, Material is a detection and response platform that protects Gmail, Google Drive, and accounts by proactively eliminating security gaps, stopping misconfigurations, and preventing...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is , global CISO and CIO, . In this episode: We can't promise safe, but we can promise ready Are we accidentally building security nightmares? Being held accountable for things you had no say in The safe space problem in vendor evaluation Huge thanks to our sponsor, Adaptive Security Sponsored by Adaptive Security — the first cybersecurity company backed by OpenAI. Adaptive helps security leaders defend against AI-powered social engineering threats like...
info_outlineCISO Series Podcast
All links and images can be found on CISO Series. This week’s episode is hosted by , producer of CISO Series and , CISO, . Joining them is , CISO, . In this episode: The AI experimentation phase isn't optional When selling security becomes the hardest part of the job Threat actors aren't hacking in anymore We build, we bond, and we can't bear to let go Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware or data loss. With ThreatLocker, unauthorized apps, scripts, and devices are...
info_outlineCISO Series Podcast
All links and images can be found on This week’s episode is hosted by , producer of CISO Series and , principal of Duha. Joining us is our sponsored guest, , CEO, Adaptive Security. In this episode: Hiring North Korean operatives on a Tuesday AI coding and the death of specifications Deepfake personas beyond video calls The middleman problem with SMS Huge thanks to our sponsor, Adaptive Security AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. Adaptive helps security leaders get ahead with an AI-native platform that...
info_outlineAll links and images can be found on CISO Series.
This week’s episode is hosted by David Spark, producer of CISO Series and Jeff Steadman, deputy CISO, Corning Incorporated. Joining them is Quincey Collins, CSO, Sheppard Mullin. This episode was recorded live at the ISSA LA Summit in Santa Monica, California.
In this episode:
- The foundational debate
- Strength over breadth
- Beyond traditional backgrounds
- Keeping perspective on risk
Huge thanks to our sponsors, Adaptive Security and Dropzone AI

AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. Adaptive helps security leaders get ahead with an AI-native platform that simulates realistic genAI attacks, and delivers expert-vetted security awareness training — all in one unified solution. Learn more at adaptivesecurity.com.

Dropzone AI autonomously investigates every security alert—no playbooks needed. This AI SOC analyst queries your CrowdStrike, Splunk, threat intel feeds, and 60+ other tools to build complete investigations in 5 minutes. Unlike black-box automation, it shows every query, finding, and decision. See it work yourself—explore the self-guided demo at dropzone.ai.