エピソード

  • Why Cyber Startups Need CISO Advisors
    2026/05/14

    All links and images can be found on CISO Series

    All security startups will tell you they talk to potential customers. The problem is that you limit your development when you only talk to CISOs who might buy. It's not the same guidance you'll get from a CISO who advises.

    Check out this post by Val Tsanev of the Cyber Risk Alliance for the discussion that is the basis of our conversation.

    This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Steve Jensen, CISO, University of Maine System.

    In this episode:

    • Building for whom?
    • The only feedback loop that matters
    • Valid, but for whom?
    • Rethink the advisor roster

    A huge thanks to our sponsor, Material Security

    Legacy email security only watches the door. Material protects your entire cloud workspace—email, files, and accounts—as one ecosystem. It's more coverage for less than the cost of a legacy SEG. One price, no surprises: just security that covers the whole surface area. Learn more at material.security.

    続きを読む 一部表示
    27 分
  • Breaking the Reactive Cycle of Cybersecurity
    2026/05/07

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Rob Allen.

    In this episode:

    • The vulnerable stack
    • Changing the structural economics
    • Change the terrain
    • The cost-benefit equation

    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.

    続きを読む 一部表示
    32 分
  • How Do You Know If Your Backups Will Survive a Ransomware Attack?
    2026/04/30

    All links and images can be found on CISO Series

    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Heath Renfrow, co-founder, Fenix24.

    In this episode:

    • Knowing which systems to save first
    • Recovery is a business conversation, not an IT ticket
    • Not all systems are created equal
    • Recovery knowledge as a governed asset

    A huge thanks to our sponsor, Fenix24

    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.

    続きを読む 一部表示
    38 分
  • What Makes a Successful Security Vendor Demo?
    2026/04/23

    What Makes a Successful Security Vendor Demo?

    All links and images can be found on CISO Series.

    Check out this post from Adam Palmer for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining is Ken Beasley, BISO, Kaiser Permanente.

    In this episode:

    • Show me the problem, not the product
    • Walking in blind
    • Discovery is the demo
    • Define the use case, set the clock

    A huge thanks to our sponsor, Fenix24

    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.

    続きを読む 一部表示
    27 分
  • Should You Use Native or 3rd Party Cloud Management Tools?
    2026/04/16

    Should You Use Native or 3rd Party Cloud Management Tools?

    All links and images can be found on CISO Series.

    Check out this post from Steve Zalewski for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is their sponsored guest, Gal Ordo, co-founder and CPO, Native.

    In this episode:

    • More tools, more problems
    • A gap in design
    • Catching what slips through
    • Competence over complexity

    A huge thanks to our sponsor, Native Security

    Native makes secure-by-design inherent to how the cloud operates. It's the control plane for built-in cloud security, unifying and governing native controls, so security intent is defined once and applied consistently across providers. Learn more at native.security.

    続きを読む 一部表示
    28 分
  • How Should We Measure the Performance of a CISO?
    2026/04/09

    How Should We Measure the Performance of a CISO?

    All links and images can be found on CISO Series.

    Check out this post from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Richards, vp, information security, CHG Healthcare.

    In this episode:

    • Likability as a career strategy
    • The storytelling gap
    • How the math actually gets done
    • The unofficial scorecard

    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.

    続きを読む 一部表示
    29 分
  • How to Be Less Busy and More Effective in Cyber
    2026/04/02

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Ross Young, co-host, CISO Tradecraft. Joining them is Dan Walsh, CISO, Datavant. Be sure to check out Ross's book Cybersecurity's Dirty Secret: Why Most Budgets Go to Waste.

    In this episode:

    • Patterns hiding in plain sight
    • Activity vs. advancement
    • The human cost
    • Frameworks about frameworks

    A huge thanks to our sponsor, Fenix24

    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.

    続きを読む 一部表示
    26 分
  • How to Engage With a CISO When They Express Interest
    2026/03/26

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week's episode, co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Adam Palmer, CISO, First Hawaiian Bank. Be sure to check out David's book, Three Feet from Seven Figures: One-on-One Engagement Techniques to Qualify More Leads at Trade Shows.

    In this episode:

    • Lead with insight, not persuasion
    • Recognize the opportunity when it arrives
    • Strategy over features
    • Keep it efficient

    A huge thanks to our sponsor, Endor Labs

    Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces. Learn more at endorlabs.com.

    続きを読む 一部表示
    32 分