Podcast Episodes

Back to Search
No image available

Don't Ask "Can" We Secure It, But "How" Can We Secure It



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Se…


Published on 2 months, 1 week ago

Has the Shared Security Model for SaaS Shifted?

Has the Shared Security Model for SaaS Shifted?



All links and images can be found on CISO Series.

Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, Dav…


Published on 2 months, 3 weeks ago

Improving the Efficiency of Your Threat Intelligence

Improving the Efficiency of Your Threat Intelligence



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the prod…


Published on 3 months ago

Why Cybersecurity Professionals Lie on Their Resumes

Why Cybersecurity Professionals Lie on Their Resumes



All images and links can be found on CISO Series.

Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hos…


Published on 3 months, 1 week ago

What Should Be in a CISO Job Description?

What Should Be in a CISO Job Description?



All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the produ…


Published on 3 months, 2 weeks ago

The CISO's Job Is Impossible

The CISO's Job Is Impossible



All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…


Published on 3 months, 3 weeks ago

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?



All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…


Published on 3 months, 4 weeks ago

How Much Should Salespeople Know About Their Product?

How Much Should Salespeople Know About Their Product?



All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the pr…


Published on 4 months ago

No image available

Why Are We Still Struggling to Fix Application Security?



All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, th…


Published on 4 months, 2 weeks ago

What Can Someone with No Experience Do in Cybersecurity?

What Can Someone with No Experience Do in Cybersecurity?



All links and images for this episode can be found on CISO Series.

Check out this post from Jerich Beason, CISO at WM, for the discussion that is the basis of our conversation on this week’s episode …


Published on 4 months, 3 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate