We eschew those cybersecurity firms touting claims of artificial intelligence for our organic conversation-based approach to podcasting.



This show, like all the previous ones is hosted by me, David Spark (@dspark), founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is Mike Wiacek (@Mikewiacek), co-founder and CSO for Chronicle.

Got feedback? Join the conversation on LinkedIn

Thanks to this week’s sponsor, Chronicle

Chronicle’s Backstory is a global security telemetry platform for investigation and threat hunting within your enterprise network. Backstory makes security analytics instant, easy, and cost-effective. Backstory is a specialized, cloud-native security analytics system, built on the core infrastructure that powers Google itself.

On this episode

What’s a CISO to do?

As we brace for RSA this week, we expect most companies on the floor will be touting some form of artificial intelligence or machine learning. CISOs are no longer even slightly moved by those terms. What should vendors be saying? And what should a savvy security shopper demand to know about a company’s AI or ML?

Why is everybody talking about this now?

Allan Alford, CISO of Mitel, and my co-host on the other CISO Series podcast, Defense in Depth, created a very funny “Cybersecurity Startup Name & Mission Generator!” chart that got a lot of response. We’ve seen a lot of these name generators, but this one seemed creepily too real. We discuss InfoSec company names and how not to let your eyes glaze over as you walk the trade show floor.

What’s Worse?!

How do you feel when big security companies acquire smaller security companies?

Please, enough. No, more.

This week’s topic is “threat hunting.” We talk about what we’ve heard enough of on “threat hunting,” and what we’d like to hear a lot more.

What’s a CISO to do?

A great challenge question from an anonymous source: “My users learned security from the evening news. Now I can’t see their traffic due to their VPN tunnel and they are using programs that delete evidence to be more secure.” What’s a CISO to do?

Got feedback? Join the conversation on LinkedIn