All Episodes
CISO Stories Podcast (Video) — 82 episodes
From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222
Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
Keys Without People — John Heasman on Cleaning Up Non-Human Access - John Heasman - CSP #220
Agents at the Door: Vetting Non-Human Identities in External IAM - Rakesh Soni - CSP #219
ATT&CK → ATLAS: A CISO's Blueprint for AI Governance - Sandy Dunn - CSP #218
Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
OT on the Frontlines: Threat Intelligence You Can't Ignore - Dawn Cappelli - CSP #216
Reimagining Security Operations: SOC as a Service and the Role of AI - Kevin Nikkhoo - CSP #215
From Diagram to Cloud: Rethinking Cloud Security in an Age of Uncertainty - Yogita Parulekar - CSP #214
Empowering Developers: Fostering a Culture of Security in AppSec - Danielle Ruderman - CSP #213
Mapping the Modern Attack Surface: Fintech's Evolving Risk Frontier - Erika Dean - CSP #212
Maximizing Cyber Liability Insurance: Risk, Relationships & Renewal Strategies - Mandy Andress - CSP #211
Breach by the Dozen: Incident Response Lessons from the Field - Mike Miller - CSP #210
AI Governance: Navigating Risks, Frameworks, and the Future - Rock Lambros - CSP #209
Privacy Under Siege: Navigating Data Theft and the BadBox Threat - Gavin Reid - CSP #208
Cloud Security in Higher Education: Balancing Trust and Risk - Sheena Thomas - CSP #207
Cybersecurity in the Cloud: Lessons for Businesses and Beyond - Melina Scotto - CSP #206
Cloud Security for SMBs: Strategies, Risks, and Resources - Adam John - CSP #205
Cloud Security at Risk: Tackling Misconfigurations Head-On - Nadia Mazzarolo - CSP #204
Cloud Security: Lessons Learned and Applied to Emerging Tech - Bertrum Carroll - CSP #203
Identity Challenges in Manufacturing - Tammy Klotz - CSP #202
Identity Security: Navigating the New Normal with Dr. Sean Murphy - Sean Murphy - CSP #201
Identity Security Training: How important is it? - Eric Belardo - CSP #200
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
Have you consider your team's cognitive biases when selecting tools? - Dustin Sachs - CSP #196
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
The vCISO's role in Incident Response Accountability - William Klusovsky - CSP #192
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
Todd's Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
CISO and the Board: Demonstrating value and relevant metrics - Max Shier - CSP #178
Point Vs. Platform: Improving TCO Cost/Benefit - Patrick Benoit - CSP #177
Data Governance is Critical to Info Security and Privacy - Michael Redmond - CSP #176
The Riddle of Data Governance - Steven Fox - CSP #175
That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174
Why CISO's Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173
Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170
Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169
Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168
Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167
52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
The Business Side of AI - Edward Contreras - CSP #161
Generative AI and Corporate Security – Getting it Right - Bill Franks - CSP #160
Better CISO Health in the New Year: From Burnout to Balance - Steve Shelton - CSP #159
Cloud Security Staffing in a Hybrid World – It Can Be Done! - Larry Lidz - CSP #158
You want the CISO Title & Pay? Responsibility Comes Also! - Malcolm Harkins - CSP #157
Reimagining Risk in the Emerging Cloud: A GRC Perspective - Solomon Ugah - CSP #156
Why Don't We Care About Identity Security? - Don Baham - CSP #155
High Consequences Cyber: Make or Break the CISO's Reputation - Andy Jaquith - CSP #154
Four Pieces of Transitional Advice: Incoming CISOs - Sean Zadig - CSP #153
Is there really an Information Security Jobs Crisis? - Ben Rothke - CSP #152
Prioritizing Identity and Getting the Fundamentals Right - Bezawit Sumner - CSP #151
Do You Really Want to Be a CISO? - Spencer Mott - CSP #150
All in One CISO: There Is Nothing We Can't Do - Jessica Hoffman - CSP #149
Building a People-Centric Security Program - Cathy Olsen - CSP #148
Veterans Impacting Cybersecurity - David Cross - CSP #147
Should We Be Relying on Our Cybersecurity Risk Matrices? - Doug Hubbard - CSP #146
OT is Not IT but Security Can Handle Both - Mea Clift - CSP #145
Effective Communication is Critical for CISO Success - Wes Knight - CSP #144
Terminology Matters: Changing 'Cybersecurity' to Data Care - Ron Gula, Cyndi Gula - CSP #143
NextGen Security Tooling: Investments in Intelligence - Mike Coogan - CSP #142
Uber CISO Trial Learnings for CISOs: In the CISO's Own Words - Joe Sullivan - CSP #141