loader from loading.io

Are CISOs Struggling to Get Respect?

Defense in Depth

Release Date: 02/27/2025

Don't Try to Win with Technical Expertise. Win by Partnering. show art Don't Try to Win with Technical Expertise. Win by Partnering.

Defense in Depth

All links and images can be found on CISO Series. Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, , the producer of , and , CISO, . Their guest is , CSO and vp of strategy, In this episode: From loudest to most trusted Letting go of the win Listening over proving Beyond right and wrong Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of...

info_outline
What Makes a Successful CISO? show art What Makes a Successful CISO?

Defense in Depth

All links and images can be found on CISO Series. Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode:  Consequence, not controls The credibility gap Defining the undefined Expanding the mandate A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that’s easy to manage and built to scale. Stop threats...

info_outline
How Should CISOs Talk to the Business show art How Should CISOs Talk to the Business

Defense in Depth

All links and images can be found on Check out by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is best-selling cybersecurity author His upcoming study guide on AI governance can be pre-ordered . In this episode: Speaking the language of leadership Beyond translation: the trust factor Making risk tangible When translation isn't enough Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing,...

info_outline
How Much Cyber Risk Should a CISO Own? show art How Much Cyber Risk Should a CISO Own?

Defense in Depth

All links and images can be found on Check out by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is , former CSO, Robinhood. In this episode: Delegation requires accountability The reality of daily decision-making The gap between theory and practice Beyond the advisory role Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that’s easy to manage and built to...

info_outline
How To Tell When a Vendor is Selling AI Snake Oil show art How To Tell When a Vendor is Selling AI Snake Oil

Defense in Depth

All links and images can be found on Check out by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , builder, . Joining them is , vp of cybersecurity, . In this episode: Understanding the fundamentals The grift of superficial expertise Hands-on experience matters  A vulnerability at the leadership level Huge thanks to our sponsor, Stellar Cyber By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to...

info_outline
In the Age of Identity, is Network Security Dead? show art In the Age of Identity, is Network Security Dead?

Defense in Depth

All links and images can be found on Check out by Ross Haleliuk of Venture in Security for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is Davi Ottenheimer, vp, trust and digital ethics, . In this episode: Network security isn't dying—it's evolving The observability layer that can't be replaced What's old is new again The innovation gap Huge thanks to our sponsor, HackerOne Discover how AI innovators like Adobe, Anthropic, and Snap are using AI to find and fix vulnerabilities...

info_outline
How to Manage Configuration Drift show art How to Manage Configuration Drift

Defense in Depth

All links and images can be found on  Check out  by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining us is our sponsored guest, , chief product officer, . In this episode: When configuration drift becomes operational reality The garden that never stops growing From detection to cultural shift The maturity gap Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations,...

info_outline
Is Least Privilege Dead? show art Is Least Privilege Dead?

Defense in Depth

All links and images can be found on Check out by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is , CISO-in-Residence, . In this episode: Is least privilege dead? Modern tactics, timeless principle Implementation over ideology Pragmatism over purity Huge thanks to our sponsor, Cyera AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov...

info_outline
How Do We Measure Our Defenses Against Social Engineering Attacks? show art How Do We Measure Our Defenses Against Social Engineering Attacks?

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , CISO, . Joining them is their sponsored guest , chief strategy and experience officer, . In this episode: Beyond the click High-risk users demand different metrics Building engagement over punishment Creating a security culture through community Huge thanks to our sponsor, Doppel Doppel is protecting the world’s digital integrity. Impersonators adapt fast — but so does Doppel. By pairing AI with expert analysis, we...

info_outline
Sales Follow Up Sequences: What Works Best in Cyber? show art Sales Follow Up Sequences: What Works Best in Cyber?

Defense in Depth

All links and images can be found on Check out by Mike Gallardo for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining them is , BISO, . In this episode: Timing the approach When persistence becomes harassment Playing the long game The necessity argument Huge thanks to our sponsor, Cyera AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov 12–13 in Dallas. Register now at . 

info_outline
 
More Episodes

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Lee Parrish, CISO, Newell Brands. Joining us is David Tyburski, vp of information security and CISO, Wynn Resorts.

In this episode:

  • CISOs need to stick around

  • Culture forward

  • CISOs need support

  • This isn’t always about budget 

Thanks to our podcast sponsor, Palo Alto Networks!

Cortex Cloud, the next generation of Prisma Cloud, merges best-in-class CDR with industry-leading CNAPP for real-time cloud security. Harness the power of AI and automation to prioritize risks with runtime context, enable remediation at scale, and stop attacks as they occur. Bring together your cloud and SOC on the unified Cortex platform to transform end-to-end operations. Experience the future of real-time cloud security at https://www.paloaltonetworks.com/cortex/cloud.