207 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية
![You Can’t Make This Up podcast artwork](https://cdn.player.fm/images/21055062/series/xUxSMTjIutrzxfGp/32.jpg 32w, https://cdn.player.fm/images/21055062/series/xUxSMTjIutrzxfGp/64.jpg 64w, https://cdn.player.fm/images/21055062/series/xUxSMTjIutrzxfGp/128.jpg 128w, https://cdn.player.fm/images/21055062/series/xUxSMTjIutrzxfGp/256.jpg 256w, https://cdn.player.fm/images/21055062/series/xUxSMTjIutrzxfGp/512.jpg 512w)
![You Can’t Make This Up podcast artwork](/static/images/64pixel.png)
If and When Should a CISO Have a Long Term Security Plan?
Manage episode 462694215 series 2478315
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Gaurav Kapil, CISO, Bread Financial.
In this episode:
- It helps to have a vision
- The benefit of planning
- It’s never too early to start
- Don’t make rash decisions
Thanks to our podcast sponsor, ThreatLocker
ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
297 حلقات
Manage episode 462694215 series 2478315
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Gaurav Kapil, CISO, Bread Financial.
In this episode:
- It helps to have a vision
- The benefit of planning
- It’s never too early to start
- Don’t make rash decisions
Thanks to our podcast sponsor, ThreatLocker
ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
297 حلقات
كل الحلقات
×![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Protecting Your Backups from Ransomware 29:43
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Can a Security Program Ever Reach Maintenance Mode? 25:12
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 The Hardest Problems in Security Aren't "Security Problems" 25:52
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 If and When Should a CISO Have a Long Term Security Plan? 29:20
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Do We Want CISOs Dictating How Salespeople Should Engage? 33:45
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Is AI Benefiting Attackers or Defenders? 29:51
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Vulnerability Management ≠ Vulnerability Discovery 28:39
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Are Security Awareness Training Platforms Effective? 26:50
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 The Argument For More Cybersecurity Startups 32:07
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 How Are New SEC Rules Impacting CISOs? 34:32
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Defending Against What Criminals Know About You 31:35
![Defense in Depth podcast artwork](https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/32.png 32w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/64.png 64w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/128.png 128w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/256.png 256w, https://cdn.player.fm/images/23142364/series/ARwpMyo9V1Zb0F4F/512.png 512w)
![Defense in Depth podcast artwork](/static/images/64pixel.png)
1 Will We Ever Go Back From Work From Home? 32:59
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.