script for todays security link

Cyber Security Headlines Week in Review: NortonLifeLock password breach, Ransomware revenue falls, ChatGPT goes phishing 

This week’s Cyber Security Headlines - Week in Review, January 16-20, is hosted by Rich Stroffolino  with our guest, George Finney, CISO, Southern Methodist...

“Hacking Your Security Program” – Super Cyber Friday

Please join us on Friday, February 10, 2023 for Super Cyber Friday. REGISTER HERE. Our topic of discussion will be “Hacking Your Security Program: An...

Trying to Investigate When the Data No Longer Exists

If you're spinning up ephemeral instances and containers that live and die in just minutes, your ability to investigate a possible intrusion lives and...
Today’s Agenda: When Will This Meeting End? - CISO Series Podcast

Today’s Agenda: When Will This Meeting End?

Everyone's favorite meeting is a short meeting. But does anyone want a fun or entertaining meeting? Or is that a bad idea? This week’s episode...
Your Password Is Too Long. Please Shorten It. - CISO Series Podcast

Your Password Is Too Long. Please Shorten It.

What happens when you want to adhere to more secure behavior, but the tool you're using forces you to be less secure, solely because...
Stir in a Little Merger and Acquisition, and Voilà, You’re a Target

Stir in a Little Merger and Acquisition, and Voilà, You’re a Target

There is a lot unknown before, during, and after a merger and that can make employees very susceptible to phishing attacks. But, at the...
What Can the Cyber Haves Do for the Cyber Have Nots?

What Can the Cyber Haves Do for the Cyber Have Nots?

Given that your company's security is dependent on the security of your partners and others, what can we do to get more organizations above...
Securing Unmanaged Assets

Securing Unmanaged Assets

"When the asset discovery market launched, every single company that offered a solution used the line, “You can’t protect what you don’t know.” Everyone...
Ambulance Chasing Security Vendors - Defense in Depth

Ambulance Chasing Security Vendors

A good high profile security threat seems like a good time to alert potential customers about how your product could help or even prevent...
Improve third party risk by driving directives down the supply chain

Improve Third Party Risk by Driving Directives Down the Supply Chain

One of the ways to deal with the third party risk issue is to drive down your security knowledge and directives to those operating...
Inventory Is the First Step to Building Cyber Resilience

Inventory Is the First Step to Building Cyber Resilience

So much of the conversation of cybersecurity has evolved into a discussion of cyber resilience. You can't be secure, but you can withstand an...
If the Board Knows Risk, Why Is It Such a Struggle to Explain Cyber Risk?

If the Board Knows Risk, Why Is It Such a Struggle to Explain Cyber...

It's not so easy to explain information security risk through the business lens, as Evelin Biro, CISO, Alliant Credit Union pointed out in our...
Capture the CISO Finals Season 1

Capture the CISO Finals – Season 1

A fantastic first season of Capture the CISO finishes with a fantastic finale. The show went live last Friday, June 17th, 2022, and you...

CISOs Don’t Want to Click on Your “Request a Demo” Button

The "Request a Demo" button. They're proliferating on security vendor sites like weeds. If the vendor knows how to conduct a demo, one would...

Capture the CISO: Open Conversations Between CISOs and Vendors

What's so awesome about CISO Series' newest show Capture the CISO? Here's a conversation between Capture the CISO host, Johna Till Johnson (@JohnaTillJohnso), and Dan...