David Spark, Mike Johnson, and Andy EllisNews, Technology
David Spark, Mike Johnson, and Andy EllisNews, Technology
David Spark, Mike Johnson, and Andy EllisNews, Technology
David Spark, Mike Johnson, and Andy EllisNews, Technology

About

Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.

  • Failure Is The Likely Option
    All links and images for this episode can be found on . When cybersecurity needs to cut budget, first move is to look where you have redundancy. That way you're not actually reducing the security effort. But after that, the CFO needs to know what are...
  • A Fireman? A Princess? How About a CISO?
    All links and images for this episode can be found on . As children, we don't dream of becoming a CISO, but yet we still have them. What is it a security professional can learn or even show, to demonstrate that they're getting ready for the position...
  • I’ve Got Plenty of Risk If You Want More
    All links and images for this episode can be found on . It seems anything that's added to a business, like a new app or a third party vendor, just adds more risk. Risk definitely piles up faster than CISOs can reduce it. This week’s episode is...
  • What Kind of Challenges Do You Foresee In Firing Me?
    All links and images for this episode can be found on . This show was recorded in front of a live audience in New York City! This week’s episode is hosted by me, (), producer of CISO Series, and a special guest host, , CISO & vp,...
  • I Wouldn’t Trust Everything You Read… On My Resume
    All links and images for this episode can be found on . Turns out cybersecurity professionals . They add degrees and certifications they don't have. They omit degrees for fear of looking overqualified. And sometimes, they flat out invent jobs. But...
  • Can’t You Just Pop Out of Zeus’ Head a Fully Formed Security Professional?
    All links and images for this episode can be found on . Companies want to hire security professionals who know everything. Eager professionals who want all those skills are screaming please hire me and train me. But unlike the military which can turn...
  • We’d Secure Our Data If We Knew Where It Was
    All links and images for this episode can be found on . Given the ease of sharing data, our sensitive information is going more places that we want it. We have means to secure data, but you really can't do that if you don't know where your data...
  • Our Security Tool Can Do Everything But Mitigate Risk
    All links and images for this episode can be found on . No department is immune to budget cuts. When the budget cuts come in, where can security look first to save money? Mike Johnson said, "An expensive tool that doesn't mitigate risk should be...
  • No Need for Chaos Engineering Since Our Architecture Is Always Failing
    All links and images for this episode can be found on . Is chaos engineering the secret sauce to creating a resilient organization? Purposefully disrupt your architecture to allow for early discovery of weak points. Can we take it even further to...
  • Why Aren’t You On Slack Where I Can Interrupt You?
    All links and images for this episode can be found on . In order to get any work done we try to shut out all possible distractions. That includes messaging apps. But those people who want to connect become annoyed that they can't reach you. This...
  • Fast Track Burnout for Your Cyber Team with Layoffs
    All links and images for this episode can be found on . What happens to your team after the layoffs? Your overextended team now realizes they're going to have to pick up the slack for those who left. How do you shift responsibilities in such a...
  • We Look for Candidates Who Already Know Everything
    All links and images for this episode can be found on . Future cybersecurity talent is frustrated. The industry demand for cybersecurity professionals is huge, but the openings for green cyber people eager to get into the field are few. They want...
  • We're Experts At Telling You To Fix Your Problems
    All links and images for this episode can be found on . I don't need another vendor to find my problems. Finding my problems has not been the issue. That's the easy part. Fixing them with the staff I have is definitely "the problem." Vulnerability...
  • _Saying_ “We’re 100% Secure” Is Not the Problem
    All links and images for this episode can be found on . It's pretty darn easy to just utter the words "we're 100% secure." Pulling that off seems universally impossible, but some organizations are adamant about certain types of safety so they aim for...
  • This Unwanted Cold Call Made Possible Thanks to This Month’s Sales Quota
    All links and images for this episode can be found on . A CISO calls on security vendors to stop the spamming and cold calling. Are these annoyances the direct result the way salespeople are measured? Is that what drives the desperation and bad...
  • Adversaries Beef Up Their Shiny Object Distraction Campaign
    All links and images for this episode can be found on . We are all very easily distracted, and adversaries know that. So they'll try any little trick to make us not pay attention, look away, or do what we're not supposed to do all in an effort to...
  • 21 “Dark Side”-Approved Ways to Threaten Your Prospects
    All links and images for this episode can be found on . For those security practitioners who leave a job to go work for a security vendor, please stop calling it "going to the dark side." This week’s episode is hosted by me, (), producer...
  • Let’s Pretend We’re Getting Hacked. Who Wants to Panic First?
    All links and images for this episode can be found on . Tabletop exercises are critical procedures to learn how everyone will react during an actual attack. Panic is usually the first response, so why don't we do that when we're playing our pretend...
  • Today’s Agenda: When Will This Meeting End?
    All links and images for this episode can be found on . Everyone's favorite meeting is a short meeting. But does anyone want a fun or entertaining meeting? Or is that a bad idea? This week’s episode is hosted by me, (), producer of CISO...
  • Your Password Is Too Long. Please Shorten It.
    All links and images for this episode can be found on . What happens when you want to adhere to more secure behavior, but the tool you're using forces you to be less secure, solely because they didn't architect in more stringent security when they...