loader from loading.io

CISOs DO Own the Risk

Defense in Depth

Release Date: 01/02/2025

Is AI Benefiting Attackers or Defenders? show art Is AI Benefiting Attackers or Defenders?

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and (). Joining us is our sponsored guest, , chief product officer, . In this episode: The promise and perils of LLMs A boon for defenders Raising the bar Muddying the waters Thanks to our podcast sponsor, ThreatLocker ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny...

info_outline
CISOs DO Own the Risk show art CISOs DO Own the Risk

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and , CISO-in-residence, , and , CISO, . In this episode: Creating authority Don’t reinvent the wheel Accountable for quality Make the distinction clear Thanks to our podcast sponsor, Fenix24 You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the combines resistance, managed protection, and rapid recovery to minimize downtime and restore...

info_outline
How Can We Fix Alert Fatigue? show art How Can We Fix Alert Fatigue?

Defense in Depth

All links and images for this episode can be found on CISO Series. Check out for the discussion that is the basis of our conversation on this week’s episode  co-hosted by me, (), the producer of , and . Joining us is our sponsored guest, , CEO, . In this episode: Build for what you can handle Rethinking alerts Building trust into your system Seeing the bigger picture Thanks to our podcast sponsor, Intezer AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it escalates only...

info_outline
Vulnerability Management ≠ Vulnerability Discovery show art Vulnerability Management ≠ Vulnerability Discovery

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and , CISO, . Joining us is , CISO, . In this episode: You can’t manage what you don’t know you have Vulnerability management doesn’t have an endpoint This is about tradeoffs A unique approach Thanks to our podcast sponsor, Intezer AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it...

info_outline
Are Security Awareness Training Platforms Effective? show art Are Security Awareness Training Platforms Effective?

Defense in Depth

All links and images for this episode can be found on . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and , CISO, . Joining us is , CISO, . In this episode: A vicious cycle Not all training is created equal Don’t forget the human factor We can still define success Thanks to our podcast sponsor, Intezer Intezer’s AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it escalates only 4% of...

info_outline
The Argument For More Cybersecurity Startups show art The Argument For More Cybersecurity Startups

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and , author, . Be sure to check out Ross's podcast, , and his book . In this episode: A market response to industry failure Is this a business or a feature? The economics of startups Practicality over novelty Thanks to our podcast sponsor, Nudge Security Manage SaaS security and governance at scale with . Discover all SaaS accounts ever created by anyone in your org on Day One, including genAI tools....

info_outline
How Are New SEC Rules Impacting CISOs? show art How Are New SEC Rules Impacting CISOs?

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and . Joining us is , group CISO, . In this episode: Striking a balance  Will we see a talent exodus? Playing by the same rules This is an organizational responsibility Thanks to our podcast sponsor, SpyCloud Cybercrime doesn’t take breaks. Protect your organization from ransomware, account takeover, and online fraud with SpyCloud. SpyCloud recaptures stolen identity data from breaches,...

info_outline
Managing the Risk of GenAI Tools show art Managing the Risk of GenAI Tools

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and . Joining us is our sponsored guest , founder and CEO, . In this episode: Meet the new risk, same as the old risk Understanding where your risks are coming from Identifying best practices Know what you’re getting into Thanks to our podcast sponsor, Concentric AI DSPM solution automates data security, protecting sensitive data in real-time. Our AI-driven solution identifies, classifies, and secures...

info_outline
Defending Against What Criminals Know About You show art Defending Against What Criminals Know About You

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and . Joining us is our sponsored guest, , chief product officer, . In this episode: A holistic view Adding sophistication to identity Your employees can help Cracking the code Thanks to our podcast sponsor, SpyCloud Cybercrime doesn’t take breaks. Protect your organization from ransomware, account takeover, and online fraud with . SpyCloud recaptures stolen identity data from breaches, infostealer...

info_outline
Will We Ever Go Back From Work From Home? show art Will We Ever Go Back From Work From Home?

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and (). Joining us is , CISO, . In this episode: Don’t underestimate the quality of life benefits We’re still learning What is the case for return-to-office? Moving past gimmicks Thanks to our podcast sponsor, SpyCloud Cybercrime doesn’t take breaks. Protect your organization from ransomware, account takeover, and online fraud with . SpyCloud recaptures stolen identity data from breaches,...

info_outline
 
More Episodes

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Ross Young, CISO-in-residence, Team8, and Jeroen Schipper, CISO, Gemeente Den Haag.

In this episode:

  • Creating authority
  • Don’t reinvent the wheel
  • Accountable for quality
  • Make the distinction clear

Thanks to our podcast sponsor, Fenix24

Fenix24

You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works.