Podcast Episodes

Back to Search
How Do We Measure Our Defenses Against Social Engineering Attacks?

How Do We Measure Our Defenses Against Social Engineering Attacks?



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO S…


Published on 10 hours ago

Sales Follow Up Sequences: What Works Best in Cyber?

Sales Follow Up Sequences: What Works Best in Cyber?



All links and images can be found on CISO Series.

Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the p…


Published on 1 week ago

What Soft Skills Do You Need in Cyber?

What Soft Skills Do You Need in Cyber?



All links and images can be found on CISO Series.

Check out this post by Evgeniy Kharam for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the p…


Published on 2 weeks ago

What is the Visibility That Security Teams Need?

What is the Visibility That Security Teams Need?



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Se…


Published on 3 weeks ago

Data Governance in the Age of AI

Data Governance in the Age of AI



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Se…


Published on 4 weeks ago

How Can Security Vendors Better Stand Out?

How Can Security Vendors Better Stand Out?



All links and images can be found on CISO Series.

Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spar…


Published on 1 month ago

What New Risks Does AI Introduce?

What New Risks Does AI Introduce?



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CIS…


Published on 1 month, 1 week ago

The Pattern of Early Adoption of Security Tools

The Pattern of Early Adoption of Security Tools



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of C…


Published on 1 month, 2 weeks ago

How Are You Managing the Flow of AI Data

How Are You Managing the Flow of AI Data



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Se…


Published on 1 month, 3 weeks ago

How to Deal with Last Minute Compliance Requirements

How to Deal with Last Minute Compliance Requirements



All links and images can be found on CISO Series.

Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week's episode c…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate