All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest Richard Stiennon, chief research analyst, IT-Harvest.
In this episode:
In this episode:
Why do so many vendors claim to offer zero-trust solutions?
Is that framework even applicable to some product categories?
Do your eyes roll when you hear "zero trust solution"?
What do most people think it is, and what’s the reality?
Thanks to our podcast sponsor, SquareX
SquareX helps organizations detect, mitigate and threat-hunt web attacks happening against their users in real-time, including but not limited to malicious sites, files, scripts, and networks.
Find out more at sqrx.com.
We Want a Solution to Remediate, Not Just Detect Problems
Recruiting from the Help Desk
How Do We Build a Security Program to Thwart Deepfakes?
Where Are Secure Web Gateways Falling Short?
Scaling Least Privilege for the Cloud
Should CISOs Be More Empathetic Towards Salespeople?
Managing Data Leaks Outside Your Perimeter
What Are the Risks of Being a CISO?
Onboarding Security Professionals
How to Improve Your Relationship With Your Boss
Improving the Responsiveness of Your SOC
The Demand for Affordable Blue Team Training
Why are CISOs Excluded from Executive Leadership?
What Is Your SOC's Single Search of Truth?
When Is Data an Asset and When Is It a Liability?
Tracking Anomalous Behaviors of Legitimate Identities
Why Do Cybersecurity Startups Fail?
Is "Compliance Doesn't Equal Security" a Pointless Argument?
CISOs Responsibilities Before and After an M&A
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast