Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
All links and images for this episode can be found on CISO Series
Should you monitor your staff? I mean reallymonitor them. Some bosses are installing screen grabbing and click tracking software to …
All links and images for this episode can be found on CISO Series
Next time you're annoyed by a security vendor's pitch, instead of firing back at them at what an idiot they are, or complaining abou…
All links and images for this episode can be found on CISO Series
I have no idea what I need to spend to demonstrate our security program is working. What's it going to take? Or maybe I need just ot…
All links and images for this episode can be found on CISO Series
How dangerous is it for a cybersecurity professional to pull a G-d complex with the email server just because they didn't like the w…
All links and images for this episode can be found on CISO Series
What if we could convince management that security is not a cost center, but a means to actually make and save money for the busines…
To see the blog post and read the transcript, head over to CISO Series.
We don't celebrate quitting. Maybe we should. When should you do it when you don't have another offer?
This week’s episode is …
I have talked to vendors who get all excited about Gartner opening up a new category for them. All I can think is uggh, something ne…
All links and images for this episode can be found on CISO Series
Are bad security policies of yesteryear just because we didn't know any better at the time, or were they some bozos idea of legitima…
All links and images for this episode can be found on CISO Series
Legacy tech can often be the anchor that prevents an organization from growing. Put the issue of dealing with legacy tech long enoug…
All links and images for this episode can be found on CISO Series
People violate cybersecurity policies at a rate of one out of every 20 job tasks. It's just a matter of time before all your employe…
All links and images for this episode can be found on CISO Series
A young woman is killing it in her first cybersecurity job out of college. Management is so thrilled with her that they want to give…
All links and images for this episode can be found on CISO Series
First job out of college and you get the cybersecurity job of your dreams... and nightmares. It's just too much, and you definitely …
"No business wants more security, they want less risk," said a redditor on the cybersecurity subreddit. Executives seem to not care …
All links and images for this episode can be found on CISO Series
A CISO hears about your company's product from some other CISOs. Eager to find more information like a video demo they could watch o…
All links and images for this episode can be found on CISO Series
The web is awash with sites claiming they know what the security trends will be for 2022. All of them were filled with quotes from s…
All links and images for this episode can be found on CISO Series
Are security conferences really helpful in advising you on making your business more secure, or are they just adding more worries to…
All links and images for this episode can be found on CISO Series
Our entire network launched because of the irritation CISOs had with vendors could have stopped some breach that happened to another…
All links and images for this episode can be found on CISO Series
The trick to getting the attention of CISOs is to create an awesome company. Focus on that and the attention will follow.
This week’…
All links and images for this episode can be found on CISO Series
If you're up against Google, Facebook, or Apple for hiring talent, chances are pretty good that your company is not going to match t…
All links and images for this episode can be found on CISO Series
Every organization has an Acceptable Use Policy (AUP) for their computers and network. Nobody reads it and everybody violates it. Ho…