Podcast Episodes
Back to Search
Should You Phish Your Employees or Not?
All links and images can be found on CISO Series.
This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Edward Cont…
12 hours ago
How Much Autonomy Should You Give AI Agents in Your SOC?
All links and images can be found on CISO Series.
This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Steve Zale…
1 week ago
Cybersecurity's Broken Hiring Process
All links and images can be found on CISO Series.
Check out this post by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basi…
2 weeks ago
Simple Security Solutions That Deliver a Big Impact
All links and images can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episod…
3 weeks ago
When Cybersecurity Marketing Fails to Reach the Buyer
All links and images can be found on CISO Series.
Check out this post by Patrick Garrity of VulnCheck for the discussion that is the basis of our co…
4 weeks ago
How Best to Prepare Your Data for Your Tools
All links and images can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episod…
1 month ago
Don't Try to Win with Technical Expertise. Win by Partnering.
All links and images can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episode…
1 month, 1 week ago
What Makes a Successful CISO?
All links and images can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episode…
1 month, 2 weeks ago
How Should CISOs Talk to the Business
All links and images can be found on CISO Series.
Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our co…
2 months, 1 week ago
How Much Cyber Risk Should a CISO Own?
All links and images can be found on CISO Series.
Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our con…
2 months, 2 weeks ago