38 min

Wrong Answers to Revealing Interview Questions CISO Series Podcast

    • Technology

All links and images for this episode can be found on CISO Series
Security leaders will often ask challenging or potentially gotcha questions as barometers to see if you can handle a specific job. They're looking not necessarily for a specific answer, but rather a kind of answer and they're also looking to make sure you don't answer the question a specific way. Don't get caught in the trap.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Quincy Castro, CISO, Redis.
Thanks to our podcast sponsor, Okta

Auth0 is the leading provider of customer identity solutions. Watch Jameeka Aaaron, CISO for Auth0, explain how to balance security with friction to create a safe authentication experience without compromising on privacy.
In this episode:
What parts of cybersecurity can you comfortably outsource? What parts of cybersecurity do you want to outsource, but can't?
One of the major arguments for outsourcing is "Finding cyber talent is really tough." Do you agree with that rationale to outsource?
When building a security program for a startup, how do you establish scope and requirements?

All links and images for this episode can be found on CISO Series
Security leaders will often ask challenging or potentially gotcha questions as barometers to see if you can handle a specific job. They're looking not necessarily for a specific answer, but rather a kind of answer and they're also looking to make sure you don't answer the question a specific way. Don't get caught in the trap.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Quincy Castro, CISO, Redis.
Thanks to our podcast sponsor, Okta

Auth0 is the leading provider of customer identity solutions. Watch Jameeka Aaaron, CISO for Auth0, explain how to balance security with friction to create a safe authentication experience without compromising on privacy.
In this episode:
What parts of cybersecurity can you comfortably outsource? What parts of cybersecurity do you want to outsource, but can't?
One of the major arguments for outsourcing is "Finding cyber talent is really tough." Do you agree with that rationale to outsource?
When building a security program for a startup, how do you establish scope and requirements?

38 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Hard Fork
The New York Times