Be afraid. Be very afraid of the latest episode of the CISO/Security Vendor Relationship Podcast where it’s possible that 90 percent of your security breaches are coming from within your own company.

This show, like all the previous ones is hosted by me, David Spark (@dspark), founder of Spark Media Solutions and Mike Johnson, CISO of Lyft. Our guest this week is Leon Ravenna, CISO, KAR Auction Services.

Synack provides crowdsourced security testing that provides more than older style penetration testing. Instead of using a few researchers who output a final report, Synack uses a globally-sourced crowd of researchers backed by a purpose-built hacking platform. This gives organizations access to security talent that is not available from any one company, and data and insights into the testing process. All Synack security testing is recorded, measured, and analyzed to not only output results like new vulnerabilities and compliance checks, but displays attack patterns and quantities in real-time. By using bug bounties as incentives, researchers are rewarded for the great finds that Synack verifies and shares with its customers. To find out more about the Hacker-Powered Security used by the Internal Revenue Service and many other organizations, go to

Got feedback? Join the conversation on LinkedIn.

On this episode

How CISOs are digesting the latest security news

According to a new report from Kroll, “Human Error, Not Hackers, to Blame for Vast Majority of Data Breaches.” They report that 2,124 incidents could be attributed to human error, compared to just 292 that were deliberate cyber incidents, They say that’s a 75% increase over the past two years but that could be because reporting breaches wasn’t mandatory before GDPR. One user commented, these numbers seem to conflict with what the Verizon Breach report says. According to this data it appears a security leader should be spending close to 90 percent of their budget and effort trying to prevent inside data leakage. How would your security plan change if that was your charge?

Hey, you’re a CISO, what’s your take on this?’

An article and video published last week on this site written and featuring Elliot Lewis, CEO of Keyavi Data (formerly Encryptics), talks about the need to get cozy with your legal team because when a breach occurs, you’re going to need to have possession, custody, and control of your data. If you can’t answer those questions you’re putting your legal team in a bind. Mike and our guest talk about being able to answer these questions and building relations with the legal team.

It’s time to play, “Um… What Do They Do?”

It’s a brand new game where I read copy from a vendor’s website, and Mike and our guest try to guess, “What do they do?”

What’s a CISO to do?

Kip Boyle, past guest, friend of the show, and author of a new book, “Fire Doesn’t Innovate,” which comes out today asks this question, “Could good cyber risk management be the basis for a competitive differentiator for your business? How?”

Kip’s book is available at and for the first week it’s out it’s only $.99 via Kindle.

Ask a CISO

Thomas Torgerson of Blue Cross/Blue Shield of Alabama asks, “How do CISO’s feel about presenting webinars or speaking at other events regarding products that they use in their environment?” Are there incentives promoting a vendor solution? Or is it too risky to let threat actors know your security toolsets?

Got feedback? Join the conversation on LinkedIn.

Creative Commons photo credit to Flickr user bradleypjohnson.