Podcast Episodes
Back to SearchWhy Is Security Recruiting So Broken?
All links and images for this episode can be found on CISO Series
Check out this post for the basis for our conversation on this week's episode whic…
4 years, 4 months ago
How to Be a Vendor that CISOs Love
All links and images for this episode can be found on CISO Series
Check out this post for the basis for our conversation on this week's episode which…
4 years, 4 months ago
The "Are We Secure?" Question
All links and images for this episode can be found on CISO Series
When a senior person at your company asks you, "Are we secure?" how should you resp…
4 years, 4 months ago
Ransomware Kill Chain
What are the tell tale signs you've got ransomware before you receive the actual ransomware threat?
Check out this post and this post for the basis …
4 years, 4 months ago
Can Technology Solve Phishing?
All links and images for this episode can be found on CISO Series
Check out this post for the basis for our conversation on this week's episode whic…
4 years, 5 months ago
Convergence of SIEM and SOAR
All links and images for this episode can be found on CISO Series
SIEM tools that ingest and analyze data are ubiquitous in security operations cent…
4 years, 5 months ago
Cybersecurity Is Not Easy to Get Into
All links and images for this episode can be found on CISO Series
Check out this post for the basis for our conversation on this week's episode whic…
4 years, 5 months ago
Preventing Ransomware
All links and images for this episode can be found on CISO Series
What is the most critical step to preventing ransomware? Security professionals may…
4 years, 5 months ago
Managing Lateral Movement
All links and images for this episode can be found on CISO Series
For four years in a row, Verizon's DBIR, has touted compromised credentials as the…
4 years, 6 months ago
First Steps as a CISO
All links and images for this episode can be found on CISO Series
You've just joined a company as CISO, what's the very first step you would take to …
4 years, 6 months ago