314 episodes

Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.

CISO Series Podcast David Spark, Mike Johnson, and Andy Ellis

    • Technology
    • 4.8 • 179 Ratings

Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.

    I Don’t Want Insider Risk, You Take It

    I Don’t Want Insider Risk, You Take It

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our sponsored guest, Abhishek Agrawal, CEO and co-founder, Material Security.
    In this episode:
    What does defense in depth look like in the cloud? Collaborating on insider risk Email is a vector and a target Understand risk during an IPO Thanks to our podcast sponsor, Material Security!

    Material Security is a multi-layered email threat detection & response toolkit designed to stop attacks and reduce the threat surface across all of Microsoft 365 and Google Workspace. Learn more at material.security.

    • 34 min
    How to Get the Most for Yourself Through Altruism

    How to Get the Most for Yourself Through Altruism

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is Jana Moore, CISO, Belron.
    In this episode:
    SEC disclosure rules require cyber readiness Breaking up the “boys club” Building a threat intelligence ecosystem Blending InfoSec communities and careers Thanks to our podcast sponsor, Vanta!

    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across SOC 2, ISO 27001, and more. Streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies use Vanta to manage risk and prove security.

    • 38 min
    Who Owns AI Risk? NOT IT!

    Who Owns AI Risk? NOT IT!

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Jason Clark, chief strategy officer, Cyera.
    In this episode:
    Does AI require new security measures?  Meeting the new SEC requirements Empowerment through data security Upskilling with Gen AI? Thanks to our podcast sponsor, Cyera!

    Cyera’s AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance.
 As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.

    • 38 min
    How About This? Only Attack the Endpoints We Configured

    How About This? Only Attack the Endpoints We Configured

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest and winner of Season 2 of Capture the CISO, Russell Spitler, CEO and co-founder, Nudge Security.
    In this episode:
    The Gordian knot of EDR Can we keep up with patching? Making AI practical Standardization or granularity? Thanks to our podcast sponsor, ThreatLocker!

    ThreatLocker® is a global leader in Zero Trust endpoint security offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

    • 40 min
    The Post-it Note Clearly Says “Don’t Share” Right Under My Password

    The Post-it Note Clearly Says “Don’t Share” Right Under My Password

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Allan Alford, CISO, Eclypsium.
    In this episode:
    Evolving public-private partnerships New technology, but not a new challenge Securing the hidden layers of the supply chain Balancing usability and control Thanks to our podcast sponsor, Eclypsium

    Eclypsium is helping enterprises and government agencies mitigate risks to their infrastructure from complex technology supply chains. Our cloud-based and on-premises platform provides digital supply chain security for software, firmware and hardware in enterprise infrastructure. Get started today at eclypsium.com/spark.

    • 37 min
    Who You Gonna Call? LEGAL COUNSEL!

    Who You Gonna Call? LEGAL COUNSEL!

    All links and images for this episode can be found on CISO Series.
    This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Ryan Bachman, evp and global CISO, GM Financial.
    In this episode:
    A changing of the executive guard?
    Playing nice with cyber insurance
    What does leadership want out of a CISO?
    Who does a CISO call first? Thanks to our podcast sponsor, Vanta

    Whether you’re starting or scaling your security program, Vanta helps you automate compliance across SOC 2, ISO 27001, and more. Streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center. Over 7,000 global companies use Vanta to manage risk and prove security.

    • 37 min

Customer Reviews

4.8 out of 5
179 Ratings

179 Ratings

ArlieLP ,

Top notch!

I can't recommend this podcast enough! The discussions, tips, and debates are incredibly insightful. It's an invaluable resource for learning how to enhance security collaboratively, benefiting not only our organizations but the entire community. Thanks for putting out such a superb show, David, Mike, and Andy - keep up the great work!

yopoctopus ,

This would be a 5 star show if the sound effects weren’t so loud

Great content. The game show sounds are very loud.

MikeVotaw ,

Thanks for fantastic content

This is the meatiest podcast I’ve ever listened to. Learning so much! I’m on the sales side but looking to take on a CISO role soon. What an amazing tool to be successful!!

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
Lex Fridman Podcast
Lex Fridman
Search Engine
PJ Vogt, Audacy, Jigsaw
TED Radio Hour
NPR

You Might Also Like

Defense in Depth
David Spark
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
CyberWire Daily
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Hacking Humans
N2K Networks