loader from loading.io

How Should CISOs Talk to the Business

Defense in Depth

Release Date: 12/18/2025

How Much Autonomy Should You Give AI Agents in Your SOC? show art How Much Autonomy Should You Give AI Agents in Your SOC?

Defense in Depth

All links and images can be found on . This week's episode is co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , co-founder and CEO, . In this episode: Earning autonomy gradually The blast radius question The reality check Today's value, tomorrow's evolution Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by...

info_outline
Cybersecurity's Broken Hiring Process show art Cybersecurity's Broken Hiring Process

Defense in Depth

All links and images can be found on CISO Series. Check out by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is Brett Conlon, CISO, . In this episode: The experience paradox Who benefits from the narrative Kitchen sink job postings The aggregation problem Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no...

info_outline
Simple Security Solutions That Deliver a Big Impact show art Simple Security Solutions That Deliver a Big Impact

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by , the producer of , and , senior evp and CISO, . Joining them is their sponsored guest, , chief product officer, . In this episode: Getting permissions right The fundamentals that still fail Know what you have Simple controls, outsized impact Huge thanks to our sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real...

info_outline
When Cybersecurity Marketing Fails to Reach the Buyer show art When Cybersecurity Marketing Fails to Reach the Buyer

Defense in Depth

All links and images can be found on Check out  by Patrick Garrity of VulnCheck for the discussion that is the basis of our conversation on this week’s episode, co-hosted by , the producer of , and . Joining them is , CISO, . In this episode:  The 3Ms of product clarity Buzzwords work because buyers aren't experts Investor pressures distort messaging Threading the needle Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk,...

info_outline
How Best to Prepare Your Data for Your Tools show art How Best to Prepare Your Data for Your Tools

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by , the producer of , and . Joining them is sponsored guest , director of information security, . In this episode: The integrity challenge Zero trust for AI outputs Guardrails over garbage It looks good... Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of...

info_outline
Don't Try to Win with Technical Expertise. Win by Partnering. show art Don't Try to Win with Technical Expertise. Win by Partnering.

Defense in Depth

All links and images can be found on CISO Series. Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, , the producer of , and , CISO, . Their guest is , CSO and vp of strategy, In this episode: From loudest to most trusted Letting go of the win Listening over proving Beyond right and wrong Huge thanks to our sponsor, Alteryx Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of...

info_outline
What Makes a Successful CISO? show art What Makes a Successful CISO?

Defense in Depth

All links and images can be found on CISO Series. Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is Ejona Preci, group CISO, LINDAL Group. In this episode:  Consequence, not controls The credibility gap Defining the undefined Expanding the mandate A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that’s easy to manage and built to scale. Stop threats...

info_outline
How Should CISOs Talk to the Business show art How Should CISOs Talk to the Business

Defense in Depth

All links and images can be found on Check out by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , senior evp and CISO, . Joining them is best-selling cybersecurity author His upcoming study guide on AI governance can be pre-ordered . In this episode: Speaking the language of leadership Beyond translation: the trust factor Making risk tangible When translation isn't enough Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing,...

info_outline
How Much Cyber Risk Should a CISO Own? show art How Much Cyber Risk Should a CISO Own?

Defense in Depth

All links and images can be found on Check out by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is , former CSO, Robinhood. In this episode: Delegation requires accountability The reality of daily decision-making The gap between theory and practice Beyond the advisory role Huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that’s easy to manage and built to...

info_outline
How To Tell When a Vendor is Selling AI Snake Oil show art How To Tell When a Vendor is Selling AI Snake Oil

Defense in Depth

All links and images can be found on Check out by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and , builder, . Joining them is , vp of cybersecurity, . In this episode: Understanding the fundamentals The grift of superficial expertise Hands-on experience matters  A vulnerability at the leadership level Huge thanks to our sponsor, Stellar Cyber By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to...

info_outline
 
More Episodes

All links and images can be found on CISO Series.

Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter Gregory. His upcoming study guide on AI governance can be pre-ordered here.

In this episode:

  • Speaking the language of leadership
  • Beyond translation: the trust factor
  • Making risk tangible
  • When translation isn't enough

Huge thanks to our sponsor, ThreatLocker

ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that’s easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.