Defense in Depth
All links and images can be found on Check out by Ross Haleliuk of Venture in Security for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is Davi Ottenheimer, vp, trust and digital ethics, . In this episode: Network security isn't dying—it's evolving The observability layer that can't be replaced What's old is new again The innovation gap Huge thanks to our sponsor, HackerOne Discover how AI innovators like Adobe, Anthropic, and Snap are using AI to find and fix vulnerabilities...
info_outlineDefense in Depth
All links and images can be found on Check out by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining us is our sponsored guest, , chief product officer, . In this episode: When configuration drift becomes operational reality The garden that never stops growing From detection to cultural shift The maturity gap Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations,...
info_outlineDefense in Depth
All links and images can be found on Check out by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is , CISO-in-Residence, . In this episode: Is least privilege dead? Modern tactics, timeless principle Implementation over ideology Pragmatism over purity Huge thanks to our sponsor, Cyera AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov...
info_outlineDefense in Depth
All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , CISO, . Joining them is their sponsored guest , chief strategy and experience officer, . In this episode: Beyond the click High-risk users demand different metrics Building engagement over punishment Creating a security culture through community Huge thanks to our sponsor, Doppel Doppel is protecting the world’s digital integrity. Impersonators adapt fast — but so does Doppel. By pairing AI with expert analysis, we...
info_outlineDefense in Depth
All links and images can be found on Check out by Mike Gallardo for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining them is , BISO, . In this episode: Timing the approach When persistence becomes harassment Playing the long game The necessity argument Huge thanks to our sponsor, Cyera AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov 12–13 in Dallas. Register now at .
info_outlineDefense in Depth
All links and images can be found on . Check out by Evgeniy Kharam for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is , Leader of Product and Supply Chain Technology, . And check out "Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More" by we referenced in this episode. In this episode: Beyond the technical playbook Influencing without authority Partnering, not just selling The deliberate work of connection Thanks to our...
info_outlineDefense in Depth
All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , security advisor, . Joining them is , business security services director, . In this episode: Turning visibility into actionable intelligence Pure visibility still provides an essential security foundation Finding strategic value The risk of gaps in identity management Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware...
info_outlineDefense in Depth
All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , CISO, . Joining them is their sponsored guest, , vp, strategy, EMEA, . In this episode: The access creep challenge Bridging intent and execution Looking for integrity Racing against exponential complexity Huge thanks to our sponsor, Cyera AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov...
info_outlineDefense in Depth
All links and images can be found on CISO Series. Check out by of for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is , CISO, . In this episode: ROI challenges Venture capital saturation Risk aversion and organizational politics A GTM transformation Huge thanks to our sponsor, Doppel Doppel is the first social engineering defense platform built to dismantle deception at the source. It uses AI and infrastructure correlation to detect, link, and disrupt impersonation campaigns...
info_outlineDefense in Depth
All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , CEO, . In this episode: Shadow AI as a control problem Rethinking identity for autonomous agents When process meets momentum Beyond blocking: channeling AI usage Huge thanks to our sponsor, HackerOne Built on 580,000+ validated vulnerabilities, $81M in payouts this year, and insights from 1,950 enterprise programs, the 2025 Hacker-Powered Security Report shows how leading...
info_outlineAll links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet.
In this episode:
- Aligning incentives
- The realities of the job
- Delivering ROI
- Holistic cybersecurity
Thanks to our sponsor, Backslash Security
Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business process, filters “triggerable” vulnerabilities, and simulates the security impact of updates. Backslash dramatically improves AppSec efficiency, eliminating legacy SAST and SCA frustration. Learn more at www.backslash.security.
