1. EachPod
EachPod
CISO Stories Podcast (Audio) - Podcast

CISO Stories Podcast (Audio)

SC Media and NowSecure are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.

Leadership Technology Tech Business
Update frequency
every 7 days
Average duration
28 minutes
Episodes
217
Years Active
2021 - 2025
Share to:
Protecting Your Intellectual Property - Michael Boucher - CSP #77

Protecting Your Intellectual Property - Michael Boucher - CSP #77

As CISOs embark on implementing an Intellectual Property protection effort, they are often met with resistance, being challenged as to the necessity of the effort. Join Michael as he shares his exper…

00:23:16  |   Tue 05 Jul 2022
Achieving a Competitive Advantage Through Privacy By Design - Ann Cavoukian - CSP #76

Achieving a Competitive Advantage Through Privacy By Design - Ann Cavoukian - CSP #76

Join the former Privacy Commissioner of Ontario, Canada and creator of PrivacyByDesign (PbD), translated into 40 languages and incorporated into General Data Protection Regulation (GDPR) and used by …

00:22:10  |   Tue 28 Jun 2022
Attracting Talent Using The Nice Framework - Greg Witte - CSP #75

Attracting Talent Using The Nice Framework - Greg Witte - CSP #75

As your organization increases the cybersecurity talent to protect and defend the information assets, how do you know what skills are needed? What tasks are to be performed and what knowledge is nece…

00:24:29  |   Tue 21 Jun 2022
Where Should the CISO Report? Guess Again! - Stephen Fried - CSP #74

Where Should the CISO Report? Guess Again! - Stephen Fried - CSP #74

Where the CISO should report has been debated for many years, with the predominant view being “anywhere but the CIO”, while even in 2022, most CISOs are reporting to the CIO! Which reporting structur…

00:26:00  |   Tue 14 Jun 2022
Educating Senior Management in Cybersecurity - Edward Amoroso - CSP #73

Educating Senior Management in Cybersecurity - Edward Amoroso - CSP #73

Managing cybersecurity defense inside an organization is an enormously complex endeavor, considering the interconnections, vendor relationships, cloud, and mobile proliferation of the data. While man…

00:26:42  |   Tue 07 Jun 2022
Moving From a Techie to a CISO - Shaun Cavanaugh - CSP #72

Moving From a Techie to a CISO - Shaun Cavanaugh - CSP #72

Careers can just happen, or they can be planned. Join us as we discuss making the decision to become a CISO and then taking the steps necessary to develop the skills to attain the job and thrive in t…

00:28:33  |   Tue 31 May 2022
Women in Leadership - Stacy Mill - CSP #71

Women in Leadership - Stacy Mill - CSP #71

The cybersecurity field has traditionally been male dominated and there is clearly a desire to attract more women into the field. Join us as we discuss practical tips for women advancement to leaders…

00:27:14  |   Tue 24 May 2022
Establishing and Selling The Cost of Cybersecurity - Devon Bryan - CSP #70

Establishing and Selling The Cost of Cybersecurity - Devon Bryan - CSP #70

The security spend is increasing year over year as hackers become more sophisticated, organized, and opportunistic. Join us as we discuss ways to determine and evaluate the cost of cybersecurity to e…

00:27:43  |   Tue 17 May 2022
Deliver Your Board Message with Context and Confidence! - Jason Witty - CSP #69

Deliver Your Board Message with Context and Confidence! - Jason Witty - CSP #69

A key function of the CISO is to provide an accurate organizational picture of the risk the organization is currently accepting and communicate the strategy for enhancing the security maturity in sup…

00:22:28  |   Tue 10 May 2022
Using Security Metrics as a Shared Goal With Developers - Caroline Wong - CSP #68

Using Security Metrics as a Shared Goal With Developers - Caroline Wong - CSP #68

Security metrics are often a struggle to establish by security departments. These metrics may be taking too narrow of a view, whereby metrics visible and embraced by other areas can improve the secur…

00:25:11  |   Tue 03 May 2022
Keeping Up with the Jones when Your Neighbors Are Bad Actors - Jason Taule - CSP #67

Keeping Up with the Jones when Your Neighbors Are Bad Actors - Jason Taule - CSP #67

Organizations want to know, how are we doing with respect to security? Companies can accept risks they are aware of, and don’t want to outspend the competitors with the industry vertical. They also n…

00:25:58  |   Tue 26 Apr 2022
Get Ready: 4 Generations Are Returning to The Office! - Caitlin McGaw - CSP #66

Get Ready: 4 Generations Are Returning to The Office! - Caitlin McGaw - CSP #66

We have four generations predominantly in the workforce today, boomers, generation X, Millennials, and Generation Z. Each generation was influenced by different world events, shaping values towards w…

00:25:45  |   Tue 19 Apr 2022
Control Frameworks Are There For A Reason - Philip Agcaoili - CSP #65

Control Frameworks Are There For A Reason - Philip Agcaoili - CSP #65

In addition to serving as a CISO for several large companies, Phil was instrumental in co-founding the Cloud Security Alliance (CSA) and creating the Cloud Controls Matrix (CCM) to identify what stan…

00:32:56  |   Tue 12 Apr 2022
Change Controls Are More Necessary Than Ever - Rebecca Herold - CSP #64

Change Controls Are More Necessary Than Ever - Rebecca Herold - CSP #64

Organizations are developing technology at a rapid pace today to maintain business relevance and adapt to changing conditions. Rebecca talks about the importance of ensuring change control is impleme…

00:26:03  |   Tue 05 Apr 2022
Determining Cyber Risk Appetite With the Board - Adel Melek - CSP #63

Determining Cyber Risk Appetite With the Board - Adel Melek - CSP #63

One of the most important and impactful tasks of the CISO is presenting to the Board of Directors and Senior Management. The Board needs to have the confidence the CISO is able to determine risk and …

00:30:12  |   Tue 29 Mar 2022
CISO Priorities 2022 - CSP #62

CISO Priorities 2022 - CSP #62

For security leaders, it can be hard to catch a break when faced with the increasingly challenging task of defending their organizations from evolving threats while simultaneously fighting the battle…

01:02:07  |   Tue 22 Mar 2022
Why Are We Still Failing at Security? - Wayman Cummings - CSP #61

Why Are We Still Failing at Security? - Wayman Cummings - CSP #61

Why are we failing at security, and will we ever graduate from Cyber-Kindergarten? The industry has arguably made a lot of progress over the last three decades, yet the attackers still enjoy a distin…

00:13:23  |   Tue 15 Mar 2022
The CISO Six Minute Rule - Renee Stark - CSP #60

The CISO Six Minute Rule - Renee Stark - CSP #60

Sharing sensitive information on a website is likely to solicit a ‘No Way” response from the CISO. Renee was faced with these decisions early in her career and needed a way to determine and communica…

00:27:02  |   Tue 08 Mar 2022
Lessons Learned from Building an ISAC - Grant Sewell - CSP #59

Lessons Learned from Building an ISAC - Grant Sewell - CSP #59

Information Sharing and Analysis Centers (ISACs) were formed to promote the centralized sharing of threat intelligence within a particular sector. These have grown since the first ISAC in the late 19…

00:26:50  |   Tue 01 Mar 2022
Getting the Board on Board With Security - Richard Clarke - CSP #58

Getting the Board on Board With Security - Richard Clarke - CSP #58

Richard spent several decades serving Presidents of both parties and understands what is necessary to implement effective security programs. Join us as he provides pragmatic tips for working with the…

00:24:58  |   Tue 22 Feb 2022
Disclaimer: The podcast and artwork embedded on this page are the property of SC Media. This content is not affiliated with or endorsed by eachpod.com.