We’re looking for the one company brave/truthful enough to say they don’t care about privacy on the latest episode of CISO/Security Vendor Relationship Podcast. This episode was recorded live on June 6th at The B.O.B. in Grand Rapids, Michigan at…
"Defense in Depth"
Live Event in Dallas 6/14/19: From Hiring to Buying: What Do CISOs Want?
Live Event in Dallas 6/14/19: From Hiring to Buying: What Do CISOs Want?
I’m heading to Dallas in two weeks to host a salon-style discussion with a group of enthusiastic cybersecurity professionals of how we’re improving some of the most troublesome areas of InfoSec – hiring and selling/buying. This event will be hosted…
Great Demo! Let’s Schedule a Time to Ignore Your Follow Up
Great Demo! Let’s Schedule a Time to Ignore Your Follow Up
We’re playing hard to get on the latest episode of CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our guest this week is Al Ghous, head of…
Topic Takeover: Vulnerability Management
Topic Takeover: Vulnerability Management
One program we initiated in 2019 is something called “Topic Takeover” where we delve into one topic, by creating a deluge of articles, videos, podcasts and memes on just that one subject. The editorial is fully controlled by CISO Series,…
Our “What Not to Do” Security Selling Secret
Our “What Not to Do” Security Selling Secret
We’re not always clear on what vendors should do when selling security products, but when we get a really bad email pitch, we’re very clear on what they should not do. We’re bedazzled with bad pitch disbelief on this episode…
CISO Series Deconstructs the Verizon Data Breach Investigation Report (DBIR)
CISO Series Deconstructs the Verizon Data Breach Investigation Report (DBIR)
Today, Wednesday, May 8th, Verizon releases its highly anticipated Data Breach Investigation Report (DBIR). The CISO Series conducted a webinar with all the hosts for the CISO Series podcasts along with the head of Verizon Security Research to discuss latest…
Garbage In, Garbage Out is NOT Why Machine Learning Fails
Garbage In, Garbage Out is NOT Why Machine Learning Fails
At the RSA 2019 Conference I spoke with Davi Ottenheimer (@daviottenheimer), product security at MongoDB, about where and why machine learning falls short. One might assume garbage in, garbage out, but who determines what’s garbage and what’s not can greatly…
25 Tips to Reduce the Frustration of Vulnerability Management
25 Tips to Reduce the Frustration of Vulnerability Management
Vulnerability management (VM) has become synonymous with frustration. Breaches often result from exploited vulnerabilities that are known, yet not patched. The compromise was avoidable. Why couldn’t we stop it? The problem stems from security “trying to manage a mountain of…
A Pesticide-Free Podcast Made with ‘All Natural’ Intelligence
A Pesticide-Free Podcast Made with ‘All Natural’ Intelligence
We eschew those cybersecurity firms touting claims of artificial intelligence for our organic conversation-based approach to podcasting. This show, like all the previous ones is hosted by me, David Spark (@dspark), founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week is…
Prepping for RSA 2019
Prepping for RSA 2019
David Spark (@dspark) and Allan Alford (@allanalfordintx), co-hosts of the Defense in Depth podcast with their advice for both vendors and practitioners on how to prepare for the RSA Conference. Got feedback? Join the conversation on LinkedIn.