171 episodes

Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.

CISO-Security Vendor Relationship Podcast Mike Johnson and David Spark

    • Technology
    • 4.3 • 7 Ratings

Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.

    Could We Speak To Your CISO To Confirm He Received the Cupcakes?

    Could We Speak To Your CISO To Confirm He Received the Cupcakes?

    All links and images for this episode can be found on CISO Series
    It’s imperative we speak to him. We want to make sure they landed safely. And if he has some available time, maybe we can show him our slide deck.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Branden Newman, svp, CISO, MGM Resorts.
    Thanks to our podcast sponsor, Grip Security

    Ask yourself – do I know what SaaS my company is using? How do users access them? What data is uploaded and downloaded? Enterprises today are using hundreds and thousands of different SaaS, and have lost control over it.

    Grip Security sees and secures every SaaS application. With simple deployment, you can have immediate visibility to the entire SaaS portfolio, and automated access and data governance at scale. This is the only way you could fight the SaaS Sprawl.
    In this episode:
    How do security vendors communicate their uniqueness and product quality? If you were to start a data security company - what gap would you fill? What's the pushiest sales tactic you've seen in InfoSec? Assessing vendor pitches on email security or human layer security  

    • 40 min
    Make Your Friends Jealous with Our Hand-Crafted Passwords

    Make Your Friends Jealous with Our Hand-Crafted Passwords

    All links and images for this episode can be found on CISO Series
    I know your friends say they use excellent passwords, but they don't take the time and care we put into choosing the right combination of letters, numbers, and special characters that's unique to your personality. Once your friends and the dark web have a chance to see them, they'll want to emulate you by using your password over and over again.
    This week's CISO/Security Vendor Relationship Podcast was actually recorded in front of a small live audience at The Passwordless Summit in Newport, Rhode Island. The event was sponsored by HYPR, our sponsor for this episode as well. Joining me and my co-host, Andy Ellis (@csoandy), operating partner, YL Ventures, was our sponsored guest, Brian Heemsoth (@bheemsoth), head of cyber defense and monitoring, Wells Fargo.
    Thanks to our podcast sponsor, HYPR

    HYPR is the leader in Passwordless Multi-factor Authentication.
    We protect workforce and customer identities with the highest level of assurance while enhancing the end user’s experience. HYPR shifts the economics of attack to the enterprise’s favor by replacing password-based MFA with Passwordless MFA. 
    Welcome to The Passwordless Company®. It’s time to reimagine Identity Access Assurance. 
    Learn More »
    In this episode:
    Ways to make a good impression about the quality of your security How’s passwordless access working for you? When an EULA says no to reviewing the product What does a good SOC look like to you?

    • 42 min
    Are You Asking "How Secure Are We?" or "How Insecure Am I?"

    Are You Asking "How Secure Are We?" or "How Insecure Am I?"

    All links and images for this episode can be found on CISO Series
    We've heard the question "How secure are we?" many times, and we know what it really means.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Kevin Morrison, CISO, Alaska Air.
    Thanks to our podcast sponsor, Enso

    Enso, an Application Security Posture Management platform, helps security teams scale and gain control over their AppSec programs. Enso discovers application inventory, ownership and risk to easily build and enforce security policies and transform AppSec into an automated, systematic discipline.
    In this episode:
    Red flag-level bad security: run away or offer to help? How necessary is it to know patterns of where and how criminals are going to attack? How to manage the risk of onboarding entry level cybersecurity personnel who lack prior job experience? How do you answer the question, "Are we secure?"  
     

    • 33 min
    Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

    Tips to Finding an Incompetent Overpriced Cybersecurity Consultant

    All links and images for this episode can be found on CISO Series
    What questions should we be asking of a consultant's referrals to see if they're really worth the money they're trying to overcharge us?
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Ira Winkler (@irawinkler), CISO, Skyline Technology Solutions.
    Thanks to our podcast sponsor, Varonis

    Varonis will help you get meaningful data security results faster than you thought possible. Protect sensitive data, detect sophisticated threats and streamline privacy and compliance. Visit varonis.com/risk for a demo of Varonis’ leading data security platform.
    In this episode:
    Fujifilm refused to pay ransomware demand, restored from backup. Be like Fujifilm. What to do with people who ask for your password and sign-on – and those who comply Best techniques for interviewing cybersecurity consultant candidates The importance of securing inter-organization Slack and Teams channels

    • 33 min
    We Shame Others Because We're So Right About Everything

    We Shame Others Because We're So Right About Everything

    All links and images for this episode can be found on CISO Series
    You think it's easy carrying around the burden of being so perfect all the time? It's tough to carry that responsibility to tell others what they need to do.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Ed Contreras (@cisoedwardc), CISO, Frost Bank.
    Thanks to our podcast sponsor, Varonis

    Varonis will help you get meaningful data security results faster than you thought possible. Protect sensitive data, detect sophisticated threats and streamline privacy and compliance. Visit varonis.com/risk for a demo of Varonis’ leading data security platform.
    Does a quality tech stack help with recruitment and retention of talent? Should security features be free? And should those who charge be shamed? Failing phishing tests - is there a limit to how many?

    • 35 min
    Will You Accept "My Bad" As Our Breach Response?

    Will You Accept "My Bad" As Our Breach Response?

    All links and images for this episode can be found on CISO Series
    We know we've got to say something about this breach, but geez, the details are really sordid and it would just be easier if we could just wrap it up with one giant "oops." You cool with that?
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our sponsored guest is Matt Radolec, senior director, incident response and cloud operations, Varonis.
    Thanks to our podcast sponsor, Varonis

    Varonis will help you get meaningful data security results faster than you thought possible. Protect sensitive data, detect sophisticated threats and streamline privacy and compliance. Visit varonis.com/risk for a demo of Varonis’ leading data security platform.
    In this episode:
    How have insider threats morphed since the onset of Covid? Should paying ransomware be illegal? What goes into a good post-breach public incident response? Should ransomware focus more on backups?

    • 32 min

Customer Reviews

4.3 out of 5
7 Ratings

7 Ratings

Paul_G_Aus ,

Great resource

Coming into a security leadership role I've found this a great help in dealing with/prioritizing the flood of incoming, really appreciate the effort put in to make it happen!

sputnick45 ,

Keep it constructive?

Would certainly be a lot more useful to better discuss the successes vendors have had in engaging with CISOs and what’s made them successful. In recent months were listening to the standard put-downs of vendors we see across industry.

uukfrbkokbg ,

An entrepreneurs oxygen

If you are an entrepreneur and want to hear about top Silicon Valley companies achieved greatness (and what not to do too), listen to this.

Great insights and I look forward to every episode!

Top Podcasts In Technology

Listeners Also Subscribed To