script for todays security link

Cyber Security Headlines Week in Review: Amazon Ring privacy violations, Gigabyte firmware problems, AI extinction threat

This week’s Cyber Security Headlines - Week in Review, May 29-June 2, is hosted by Sean Kelly with our guest, Howard Holton, CTO, GigaOm Cyber...

Data Classification Is the Key to Your Data Security Efforts

Why is data classification such a critical keystone? "It helps you quantify where your risk is", said Matt Radolec, sr. director incident response and...

“Hacking Data Loss” – Super Cyber Friday

Please join us on Friday June 9th, 2023 for Super Cyber Friday. Our topic of discussion will be “Hacking Data Loss: An hour of critical...
CISO Series Podcast Live in Tel Aviv 06-2023

[06-19-23] CISO Series Podcast Live in Tel Aviv

We'll be kicking off the CISO Summit TLV 2023, a six day event, with a live audience recording of CISO Series Podcast. This is...
Failure Is The Likely Option

Failure Is The Likely Option

When cybersecurity needs to cut budget, first move is to look where you have redundancy. That way you're not actually reducing the security effort....
PREVIEW: CISO Series Podcast LIVE in Denver 6-7-23

PREVIEW: CISO Series Podcast LIVE in Denver 6-7-23

Here's a preview video of the live audience recording of the CISO Series Podcast at the Rocky Mountain Information Security Conference (RMISC) in Denver....
How Must Processes Change to Reduce Risk?

How Must Processes Change to Reduce Risk?

What do we need to do to fix our processes to truly reduce risk and vulnerabilities? Check out this post for the discussion that is...
Reputational Damage from Breaches

Reputational Damage from Breaches

Security professionals talk a lot about the reputational damage from breaches. And it seems logical, but major companies still do get breached and their...
Do RFPs Work?

Do RFPs Work?

Do RFPs or request for proposals work as intended? It seems they're loaded with flaws. Yet for some organizations who must follow processes, they...
20 ways to ensure security remains/becomes everyone’s responsibility

20 Ways to Ensure Security Remains/Becomes Everyone’s Responsibility

Every security department has a limitation: it can’t be on the front lines of every business activity all the time. The charge to make...
23 Beliefs About Cloud Security That Are Just Not True (Anymore)

23 Beliefs About Cloud Security That Are Just Not True (Anymore)

The cloud has become a ubiquitous and essential part of our world, but just like every relationship in our lives, things change and inevitably...
Improve third party risk by driving directives down the supply chain

Improve Third Party Risk by Driving Directives Down the Supply Chain

One of the ways to deal with the third party risk issue is to drive down your security knowledge and directives to those operating...
Capture the CISO Finals Season 1

Capture the CISO Finals – Season 1

A fantastic first season of Capture the CISO finishes with a fantastic finale. The show went live last Friday, June 17th, 2022, and you...

CISOs Don’t Want to Click on Your “Request a Demo” Button

The "Request a Demo" button. They're proliferating on security vendor sites like weeds. If the vendor knows how to conduct a demo, one would...

Capture the CISO: Open Conversations Between CISOs and Vendors

What's so awesome about CISO Series' newest show Capture the CISO? Here's a conversation between Capture the CISO host, Johna Till Johnson (@JohnaTillJohnso), and Dan...