CISO Series Podcast
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.

No, please not another acronym. I can't take another education cycle on another product segment. Oh, I'm sure Gartner is launching it. And I'm sure they'll make yet another Magic Quadrant to tell us which companies are in this new market segment. And we're going to have to buy this report so we understand this new category so we can create yet another line item on our budget sheet.

This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our sponsored guest is Ed Bellis (@ebellis), co-founder and CTO, Kenna Security (now a part of Cisco).

Thanks to our podcast sponsor, Kenna Security

Thanks to our podcast sponsor, Kenna Security

In this episode:

  • How do you develop unbiased knowledge about a new technology?
  • Do you have advice on how to prepare for a SOC interview?
  • Vulnerability management: what have we heard enough of?
  • Do your parents know what you do for a living?

 

Direct download: CISO_Vendor_9-28-21_Final.mp3
Category:podcast -- posted at: 3:00am PDT

You don’t want anything to happen, but you also want security to somehow to calculate ROI. Maybe the ROI could be calculated from actual sales that security allowed to actually happen.

This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our sponsored guest is Ryan Gurney, CISO-in-residence, YL Ventures.

Thanks to our sponsor, YL Ventures

YL Ventures

YL Ventures, a global VC firm, manages over $300 million and exclusively invests in early-stage Israeli cybersecurity startups. YL Ventures accelerates the evolution of its portfolio companies via strategic advice and operational execution, leveraging a network of CISOs and industry veterans from Fortune 100 and high-growth companies.

In this episode:

  • What happens when Application Surface Management (ASM) vendors are purchased as Security assets?
  • What do you do when your company wants to use a really insecure SaaS product?
  • Does a startup need a CISO, or just a CISO-in-residence?
  • Is there a better sign other than "nothing happened" that indicates you did a good job in cybersecurity today?"

 

Direct download: CISO_Vendor_9-21-21_Final.mp3
Category:podcast -- posted at: 3:00am PDT

All links and images for this episode can be found on CISO Series

It’s imperative we speak to him. We want to make sure they landed safely. And if he has some available time, maybe we can show him our slide deck.

This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Branden Newman, svp, CISO, MGM Resorts.

Thanks to our podcast sponsor, Grip Security

Thanks to our sponsor, Grip Security

Ask yourself – do I know what SaaS my company is using? How do users access them? What data is uploaded and downloaded? Enterprises today are using hundreds and thousands of different SaaS, and have lost control over it.

Grip Security sees and secures every SaaS application. With simple deployment, you can have immediate visibility to the entire SaaS portfolio, and automated access and data governance at scale. This is the only way you could fight the SaaS Sprawl.

In this episode:

  • How do security vendors communicate their uniqueness and product quality?
  • If you were to start a data security company - what gap would you fill?
  • What's the pushiest sales tactic you've seen in InfoSec?
  • Assessing vendor pitches on email security or human layer security

 

Direct download: CISO_Vendor_9-14-21_Final.mp3
Category:podcast -- posted at: 3:00am PDT

All links and images for this episode can be found on CISO Series

I know your friends say they use excellent passwords, but they don't take the time and care we put into choosing the right combination of letters, numbers, and special characters that's unique to your personality. Once your friends and the dark web have a chance to see them, they'll want to emulate you by using your password over and over again.

This week's CISO/Security Vendor Relationship Podcast was actually recorded in front of a small live audience at The Passwordless Summit in Newport, Rhode Island. The event was sponsored by HYPR, our sponsor for this episode as well. Joining me and my co-host, Andy Ellis (@csoandy), operating partner, YL Ventures, was our sponsored guest, Brian Heemsoth (@bheemsoth), head of cyber defense and monitoring, Wells Fargo.

Thanks to our podcast sponsor, HYPR

HUGE thanks to our sponsor HYPR

HYPR is the leader in Passwordless Multi-factor Authentication.
We protect workforce and customer identities with the highest level of assurance while enhancing the end user’s experience. HYPR shifts the economics of attack to the enterprise’s favor by replacing password-based MFA with Passwordless MFA. 
Welcome to The Passwordless Company®. It’s time to reimagine Identity Access Assurance. 
Learn More »

In this episode:

  • Ways to make a good impression about the quality of your security
  • How’s passwordless access working for you?
  • When an EULA says no to reviewing the product
  • What does a good SOC look like to you?
Direct download: CISO_Vendor_09-07-21_Final.mp3
Category:podcast -- posted at: 3:00am PDT