admin

About admin

This author has not yet filled in any details.
So far admin has created 54 blog entries.

#51 Yuriy Bulygin – CEO and co-founder, Eclypsium

Security in Hardware Yuriy talks security in firmware and hardware, building a product people need, and the secret to entrepreneurial success. 02:04 How disaster can shape a career, a person. 06:24 Some hardware and firmware manufacturers are starting to pay much more attention to vulnerabilities and securing their products, but too many just don’t care. [...]

By | September 4th, 2019|Podcasts, Tech|Comments Off on #51 Yuriy Bulygin – CEO and co-founder, Eclypsium

#50 Trish Dixon – VP Cyber Operations, IronNet

Crowdsource in Cybersecurity Rubric. 05:50 It is as important to learn from your failures as your successes. It shapes you as a leader. 08:23 A company must embody, as part of normal business practices, what it means to do the right thing, then it becomes company culture. 11:88 Quantum computing — the higher the bandwidth, [...]

By | September 2nd, 2019|Leader, Podcasts|Comments Off on #50 Trish Dixon – VP Cyber Operations, IronNet

#49 Brian NeSmith – CEO, Arctic Wolf

The Right to Know Brian talks about the need for constant monitoring in security and argues that we should be able to ask the data collectors, like Google and the government, what they know about us. 05:09 The permissive culture the internet was built with is the reason we have so many security issues today [...]

By | September 2nd, 2019|Podcasts, Tech|Comments Off on #49 Brian NeSmith – CEO, Arctic Wolf

#48 John Yeoh – VP of Research, Cloud Security Alliance

Cloud Security is a Shared Responsibility John talks about CSA’s main areas of focus, the challenge of staying up to date in an ever-evolving space, and the importance of participating in new learning. 01:50 CSA’s three areas of focus are helping people transition to cloud, enhance cloud security,and adopt new technologies delivered through cloud. 05:37 [...]

By | August 29th, 2019|Podcasts, Tech|Comments Off on #48 John Yeoh – VP of Research, Cloud Security Alliance

#47 Tammy Moskites – MD & Senior Security Executive, Accenture

How to Plug the Skills Gap Tammy talks about identity management, diversity, and the usefulness of mentoring and internships in helping to fill the skills gap. 04:19 Fill the skills gap by recruiting from universities. Encourage students into internships and then groom and mentor them. 08:03 Vendors — you need a relationship and a network [...]

By | August 24th, 2019|Leader, Podcasts|Comments Off on #47 Tammy Moskites – MD & Senior Security Executive, Accenture

#46 Sergio Caltigirone – VP Threat Intel., Dragos

A Digital Geneva Convention Sergio talks about the cyberspace power vacuum, the challenge of ICS cybersecurity, and mental health issues in an incredibly pressured industry. 02:42 ICS cybersecurity is one of the most important and preeminent challenges we face because of the direct relationship to lives. 07:10 There are significant mental health issues in the [...]

By | August 21st, 2019|Leader, Podcasts|Comments Off on #46 Sergio Caltigirone – VP Threat Intel., Dragos

#45 Helen Patton – CISO, Ohio State University

Helen discusses the importance of ethics in security teams, vendor relationship goals, and the inherent goodness of the cybersecurity community. 03:17 Part of the CISO role is to translate the business need to the vendor and the vendor product value to the business. 03:49 Higher education cybersecurity risk profiles have a timeline. 07:55 How can [...]

By | August 21st, 2019|Leader, Podcasts|Comments Off on #45 Helen Patton – CISO, Ohio State University

#44 Jake Olcott – VP, Communications and Govt. Affairs, BitSight

What Are the Questions We Should Be Asking? Jake discusses the cybersecurity questions we should be asking: what legislators should be asking citizens; what boards should be asking CISOs; what companies should be asking during M&A processes; and what citizens should be asking themselves. 03:22 While it’s true that legislators lack technical knowledge, the best [...]

By | August 15th, 2019|Podcasts, Tech|Comments Off on #44 Jake Olcott – VP, Communications and Govt. Affairs, BitSight

#43 Phil Dunkelberger – CEO and Founder, Nok Nok Labs

Trust is a Cultural Imperative Phil talks about the erosion of trust in society, the increasing role of encryption in security, and the need for some privacy standards. 01:19 Privacy and security are two different things and not interchangeable. 02:06 How much access should governments have to their citizens’ data? 04:22 The value of the [...]

By | August 13th, 2019|Podcasts, Tech|Comments Off on #43 Phil Dunkelberger – CEO and Founder, Nok Nok Labs

#42 Jon Callas – Sr Technology Fellow, ACLU

Encryption, Business’s Moral Dilemma, and Diversity Rubric: Jon Callas talks about his long and illustrious career, offers unusual advice on how to address the diversity and the skills gap, discusses the advantages of encryption, and is positive about the protection of privacy, believing the future lies in proper policy, regulation, legislation, and consumer activism. 01:09 [...]

By | August 9th, 2019|Podcasts, Tech|Comments Off on #42 Jon Callas – Sr Technology Fellow, ACLU

#41 Eric Olden — ex-SVP and GM of Cloud Security and Identity, Oracle

Trust as a Product Eric discusses his process of customer development, the concept of trust as a product, and the dollar cost of the loss of customer trust. 01:08 Customer development is about starting with the problem first. 03:26 Collect a Dirty Dozen. Gather 12 customers in the space that you care about and interview [...]

By | August 7th, 2019|Podcasts, Tech|Comments Off on #41 Eric Olden — ex-SVP and GM of Cloud Security and Identity, Oracle

#40 Emily Mossburg – Principal, Deloitte & Touche

The Future of Cyber Emily discusses Deloitte’s survey on The Future of Cyber and offers her opinion on the risk in IoT, consumer identity management, and the best way to increase diversity in cyber. 03:04 The discrepancy between digital spending and digital transformation. 05:32 Organizations are creating additional risk as they go through digital transformation. [...]

By | August 7th, 2019|Podcasts, Tech|Comments Off on #40 Emily Mossburg – Principal, Deloitte & Touche

#39 Andrea Bonime-Blanc – Founder & CEO, GEC Risk Advisory

Understanding Risk in Cybersecurity Andrea explains her role as a translator of digital topics into business language to help decision makers better understand strategic risk. She goes on to explore why leadership and culture are crucial in managing risk, the monetization of data and our tech addiction, and the need for the different stakeholders in [...]

By | July 30th, 2019|Leader, Podcasts|Comments Off on #39 Andrea Bonime-Blanc – Founder & CEO, GEC Risk Advisory

#38 Joseph Stuntz – Director of Federal, Virtru

Federal policy, data protection, and identity fraud Joseph talks about data protection and breaches, points out the opportunity regulation offers vendors, and welcomes the possibility of federal government sharing identity attributes to help fight synthetic identity fraud. 03:03 The different silos of data are meaningless to the end user. They just want their data to [...]

By | July 24th, 2019|Podcasts, Tech|Comments Off on #38 Joseph Stuntz – Director of Federal, Virtru

#37 Jackson Shaw – Senior Director of Product Identity, Diversity and Inclusion

Identity, Diversity and Inclusion Jackson talks about security in identity management, emphasizes the importance of user experience, and describes the IoT industry as the Wild West. 02:23 In the world of identity, foundational technology is still relevant. The dissonance comes with cloud. 04:49 IM should be a business enabler not just an IT efficiency thing. [...]

By | July 9th, 2019|Podcasts, Tech|Comments Off on #37 Jackson Shaw – Senior Director of Product Identity, Diversity and Inclusion

#36 Emrah Gultekin – CEO, Chooch AI

Working with Data While Respecting Privacy Emrah discusses the best way to store data, the privacy paradox, and cautions against overregulation. 00:55 Chooch AI’s mission is to emulate human intuition. 06:00 There is a privacy paradox and the best way to address it is to score the benefits and disadvantages of having your privacy revealed. [...]

By | June 27th, 2019|Podcasts, Tech|Comments Off on #36 Emrah Gultekin – CEO, Chooch AI

#35 Caroline Wong – Chief Security Strategist, Cobalt.io

The Human Element in Cybersecurity Caroline talks about how the skills shortage impacts the industry and the very real problem of burnout in skilled, experienced security professionals. She shares her thoughts on AI and automation and underlines that the human element is still necessary to effectively detect, defend against, and respond to cybersecurity attacks. 02:06 [...]

By | June 24th, 2019|Podcasts, Tech|Comments Off on #35 Caroline Wong – Chief Security Strategist, Cobalt.io

#34 Archis Gore – CTO, Polyverse

The CTO Determined to Solve Cybersecurity Archis shares the story of his experience of Spectre and Meltdown and the lessons vendors could learn from it. He discusses the importance of compliance but suggests organizations go further than the minimum bar. Finally, Archis reassures the cyber industry that it won’t become obsolete if it solves the [...]

By | June 19th, 2019|Podcasts, Tech|Comments Off on #34 Archis Gore – CTO, Polyverse

#33 Vincent Sritapan – Portfolio Manager, U.S. Department of Homeland Security Science and Technology Directorate

Security on Our Most-Used Device Vincent discusses the neglected world of mobile security. He shares insights on how to get a government contract and offers sound advice to both vendors and practitioners. 02:06 We need to be able to trust the result that comes out of a security vendor tool. 04:05 Vendors need to be [...]

By | June 13th, 2019|Podcasts, Tech|Comments Off on #33 Vincent Sritapan – Portfolio Manager, U.S. Department of Homeland Security Science and Technology Directorate

#32 Gary Hayslip – CISSP

The storytelling CISO who leads by example Gary points out that a CISO’s hardest job is to help executives understand the value of cybersecurity and shares that storytelling is invaluable in gaining trust and promoting understanding. 02:34 In a breach the CISO does not own 100 percent of the blame. 03:46 CISO’s help manage risk, [...]

By | June 4th, 2019|Leader, Podcasts|Comments Off on #32 Gary Hayslip – CISSP

#31 Scott Augenbaum – Consultant, Speaker, and Author

Back to Basics Scott shares his lessons from 30 years at the FBI. He states that 90 percent of cybercrime could be prevented with simple user education and cautions us all to know what our children are doing on the internet. 02:20 Nobody ever expects to be a victim of cybercrime. From large companies to [...]

By | May 31st, 2019|Leader, Podcasts|Comments Off on #31 Scott Augenbaum – Consultant, Speaker, and Author

#30 Jason Haward Grau – CISO, PAS

Operational Technology is Underrepresented in Cybersecurity Jason talks about cyber crime in OT and the huge impact it has on human life, infrastructure, and energy resources. He discusses the importance of frameworks in encouraging good, ethical behavior and shares his thoughts on digital consumer rights being determined by geography. 02:41 OT is underrepresented and little [...]

By | May 14th, 2019|Leader, Podcasts|Comments Off on #30 Jason Haward Grau – CISO, PAS

#29 Ben Johnson – CTO and Co-Founder, Obsidian Security

An Unusual Cybersecurity Creed In a crowded security marketplace, Ben believes that people are happy to have multiple security tools but want fewer interfaces. He highlights the value of conversations with customers, points to the value of feedback, and shares his unusual corporate creed. 02:22   An unusual cybersecurity creed: Passion, Capacity, Humility. 06:02   The technology [...]

By | May 6th, 2019|Podcasts, Tech|Comments Off on #29 Ben Johnson – CTO and Co-Founder, Obsidian Security

#28 Malcolm Harkins – Chief Security and Trust Officer, Blackberry Cylance

Vendors Know Where Their Products Fail In his second podcast with UberKnowledge Malcolm suggests the cyber skills shortage has been created by the industry’s own approaches. He believes security needs to be about protecting business outcomes and suggests the best way to do this is to factor security and privacy into the design of technology. [...]

By | May 6th, 2019|Leader, Podcasts|Comments Off on #28 Malcolm Harkins – Chief Security and Trust Officer, Blackberry Cylance

The Security Industry Profiting from Insecurity, Gender Diversity in Cybersecurity, and More – UberKnowledge Podcasts, March 2019

March saw UberKnowledge in conversations with Malcolm Harkins of Cylance, Kristina Podnar author of The Power of Digital Policy, Ajit Sancheti of Preempt, Dr. Andrea Little Limbago of Virtru, and Hema Lakkaraju of Ansa Solutions. We covered topics as diverse as social science and data protection, the rise of the cyber industrial complex, digital policies [...]

By | May 4th, 2019|Blogs|Comments Off on The Security Industry Profiting from Insecurity, Gender Diversity in Cybersecurity, and More – UberKnowledge Podcasts, March 2019

#27 Linda Moss – Vice President of Global Enablement, Palo Alto Networks

Diversity Generates Innovation As a lifelong technical trainer, Linda shares her insights into the different ways people learn and believes training should accommodate them. She highlights the dismal statistics of women in cyber and talks about Palo Alto’s efforts to redress the diversity imbalance. 02:04 The evolution of the training world. There are two fields: [...]

By | April 30th, 2019|Podcasts, Tech|Comments Off on #27 Linda Moss – Vice President of Global Enablement, Palo Alto Networks

#26 Rahul Kashyap – President and CEO, and Rudolph Araujo, VP of Marketing

Protecting the New Network Rahul and Rudolph describe Awake’s approach to network security and explain the only way to earn credibility in the market is to be honest with your customers. They admit CISOs would love to see one vendor provide that single pane of glass but the fragmented nature of the industry prevents it. [...]

By | April 19th, 2019|Podcasts, Tech|Comments Off on #26 Rahul Kashyap – President and CEO, and Rudolph Araujo, VP of Marketing

#25 Sanjay Beri – CEO and Founder of Netskope

What it Takes to be a Unicorn Sanjay talks company culture and the importance of being aligned with your board and your team. He advises budding entrepreneurs to measure their success by their own life metrics and believes mentoring and good role models are the best way to encourage diversity in cybersecurity. 02:09 Company culture [...]

By | April 18th, 2019|Podcasts, Tech|Comments Off on #25 Sanjay Beri – CEO and Founder of Netskope

#24 Mark Orlando – CTO at Raytheon Cyber Protection Solutions

How should vendors and CISOs communicate? Mark discusses the relationship between CISOs and vendors arguing for more transparency on both sides. He points out that the fundamentals are always overlooked and underhyped and considers the ethics of using security incidents to get more budget. 1:59 In the rush to market, startups are failing to speak [...]

By | April 3rd, 2019|Podcasts, Tech|Comments Off on #24 Mark Orlando – CTO at Raytheon Cyber Protection Solutions

#23 Brian Vecci – Field CTO at Varonis

It is time for a Consumer’s Technical Bill of Rights? Brian Vecci talks about how freely we give away our most precious assets - not our personal ID but the data on our habits and behavior. 2:07 We get trained to say yes to everything. 2:48 We will never get to the point where consumers [...]

By | April 3rd, 2019|Podcasts, Tech|Comments Off on #23 Brian Vecci – Field CTO at Varonis

#22 Ajit Sancheti – Co-founder and CEO, Preempt Security

Ajit Sancheti, Co-founder and CEO, Preempt Security The Challenge of Identity in Security Ajit asks where enterprise CISOs are finding their biggest challenges. He discusses the often-overlooked role of cybersecurity in the M&A process and suggests CISOs tell the board how they will manage risk post-transaction. He believes cooperation is the future of cybersecurity and [...]

By | March 25th, 2019|Podcasts, Tech|Comments Off on #22 Ajit Sancheti – Co-founder and CEO, Preempt Security

#21 Malcolm Harkins – CSO, Cylance

The Rise of the Cyber Industrial Complex Malcolm declares the security industry is not to be trusted because it profits from insecurity. 00:23 Non-traditional beginnings to a CSO career. 02:02 The unusual role of a CSO in a vendor. 02:24 Security needs to crawl out from under IT because it touches every aspect of the [...]

By | March 22nd, 2019|Leader, Podcasts|Comments Off on #21 Malcolm Harkins – CSO, Cylance

#20 Hema Lakkaraju – CEO, Ansa Solutions

Be as innovative in compliance as you are in your business Hema argues that compliance should be strategized and integrated to help it keep pace with fast-changing industry innovation. 02:09 What is a compliance strategy? 03:59 Understand the business, the market, and the product then create a compliance model. 06:03 The compliance mindset needs to [...]

By | March 18th, 2019|Podcasts, Tech|Comments Off on #20 Hema Lakkaraju – CEO, Ansa Solutions

#19 Diana Kelley – Cybersecurity SME

Cybersecurity Is Akin to Cancer Research Diana focuses on the importance of data-centric security in the cloud and reminds security practitioners that cybersecurity is a career-long fight. 00:27 Diana’s career trajectory and her trifold perspective as practitioner, vendor, and analyst 2:44 Data-centric security in the cloud 3:22 The triumvirate of security: confidentiality, integrity, availability 6:22 [...]

By | March 15th, 2019|Leader, Podcasts|Comments Off on #19 Diana Kelley – Cybersecurity SME

Podcasts: A Retrospective

November 2018 saw the very beginning of our knowledge shares in our podcast library. We are proud to have featured industry leaders, pioneers, and thinkers. Individuals with diverse backgrounds and experiences but one goal: the betterment of the cybersecurity industry. We opened with a conversation with Internet Hall of Famer, Paul Vixie. Here Paul shared [...]

By | March 2nd, 2019|Blogs|Comments Off on Podcasts: A Retrospective

#18 Kristina Podnar – Digital Governance Advisor

Cultivate Innovation within a Policy Safe Zone Kristina discusses the evolution of GDPR and is surprised by the readiness ratio of global multinationals to small and medium enterprises. She draws a clever analogy of digital policies as a backyard boundary: a safe space to be creative in not a restrictive yoke. For women in cyber, [...]

By | March 2nd, 2019|Leader, Podcasts|Comments Off on #18 Kristina Podnar – Digital Governance Advisor

#17 Dr. Andrea Little Limbago – Chief Social Scientist, Virtru

The Human Element at the Overlap of Privacy and Security Andrea stresses the importance of quality over quantity when collecting data and says companies need to be able to explain what data is going into their AI models and why. She says it’s time the security industry look at how humans interact with technology and [...]

By | March 2nd, 2019|Podcasts, Tech|Comments Off on #17 Dr. Andrea Little Limbago – Chief Social Scientist, Virtru

#16 Joe Slowik – Principal Adversary Hunter at Dragos

Think like a practitioner when trying to execute as a vendor Joe recommends being strategic in your partnerships and being authentic in your message by selling a solution instead of a product. 02:29 A unique vendor message is the way to connect with customers, not spam. 03:23 The problem with anomaly detection as threat detection. [...]

By | February 26th, 2019|Podcasts, Tech|Comments Off on #16 Joe Slowik – Principal Adversary Hunter at Dragos

The Case for Continuous Learning in a Time-crunched Universe

How UberKnowledge plans to educate and empower a distracted and time-starved audience We have all heard the phrase “continuous learning” but frankly even thinking about it can be intimidating. Why? Because it conjures images of “continuous time sink,” and who can afford that these days?"? But consider the alternative: the fast route to obsolescence. Gone [...]

By | February 16th, 2019|Blogs|Comments Off on The Case for Continuous Learning in a Time-crunched Universe

#15 Itay Kozuch – Director of Threat Research at IntSights Cyber Intelligence

A CISO’s Gamble Itay explains why phishing is still the most common attack vector and worries that privacy laws are good for privacy but very bad for security. 03:25 The number one buzz kill for CISOs. 11:14 GDPR benefits the bad guys. 12:09 Privacy laws are good for privacy but very bad for security. 14:07 [...]

By | January 30th, 2019|Podcasts, Tech|Comments Off on #15 Itay Kozuch – Director of Threat Research at IntSights Cyber Intelligence

#14 Kamakshi Narasimhan – Senior Director of Customer Success at Netskope

Customer Success in the Cloud Kamakshi discusses how the customer success team’s unique perspective can drive product development and shares her advice for the next generation of female cybersecurity professionals. 00:55 Customer success very different in a cloud world versus a traditional data center 02:59 be an advocate for your customer inside their own organization [...]

By | January 22nd, 2019|Podcasts, Tech|Comments Off on #14 Kamakshi Narasimhan – Senior Director of Customer Success at Netskope

#13 Eve Maler – VP of Innovation & Emerging Technologies, ForgeRock

Eve discusses the security implications of the social sign-in and considers if there is an opportunity for enterprises to provide IoT identity management. 00:57 The outsized role of privacy and consent 03:50 Does business’ love affair with the social sign-in ignore the security implications? 08:45 Seamless sign-on or Social sign-in: it’s the underlying business model [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #13 Eve Maler – VP of Innovation & Emerging Technologies, ForgeRock

#12 Krishna Narayanaswamy – Chief Scientist and Co-Founder of Netskope

Security in the Cloud Is a Shared Responsibility Krishna discusses the need for swim lanes in the cloud, asks who actually has control of access to services in the cloud and argues for a layered approach to security. 02:58 Security in the cloud is a shared responsibility 03:46 Where does the dividing line on responsibility [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #12 Krishna Narayanaswamy – Chief Scientist and Co-Founder of Netskope

#11 Jim Reavis – CEO and Co-Founder of Cloud Security Alliance

Jim advocates for greater transparency within the security community, points out that GDPR means privacy must be the differentiator, and addresses the challenges of security in IoT. 03:17 Vendors need to information share. 07:36 You don’t need to give away your secret sauce to be part of the community 12:47 The trend for communities within [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #11 Jim Reavis – CEO and Co-Founder of Cloud Security Alliance

#10 Giovanni Vigna – Co-founder and CTO of Lastline

Giovanni ponders whether we are outsourcing moral responsibility and describes the adversarial machine-learning setting. 1:22 Security and the adversarial machine-learning setting 4:25 Anomaly detection is not machine learning 7:09 Use anomaly detection as information, not detection 11:50 The ability to triage an incident is fundamental to save time. 13:07 The commoditization of the Cybercrime community [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #10 Giovanni Vigna – Co-founder and CTO of Lastline

#9 Magda Chelly – CISO on demand and CyberFeminist

Magda talks about the rise of the CyberFeminist and discusses the evolving definition of identity. 02:12 The rise of the CyberFeminist 04:24 A day in the life — how CISOs can learn to speak business 11:45 How can CISOs keep up with security in the cloud 14:32 Technami! 18:00 Address security at the beginning of [...]

By | January 18th, 2019|Leader, Podcasts|Comments Off on #9 Magda Chelly – CISO on demand and CyberFeminist

#8 Bryson Bort – CEO of SCYTHE and Founder of GRIMM

Breaking the Cybersecurity Status Quo Bryson shares his energetic and entertaining opinion of the CISO as merely a con-man and tackles the prickly question of whether AI can solve the talent problem. 00:53 The difference between a CIO and a CISO. Aka, the CISO is just a con man. 03:01 The real reason information security [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #8 Bryson Bort – CEO of SCYTHE and Founder of GRIMM

#7 Aaron Turner – CEO of Hotshot

GDPR: A New Ally for CISOs Aaron talks about how it feels to be a victim of GDPR and explains why we should trust no-one but ourselves. 02:55 How it feels to be a victim of GDPR 07:07 GDPR (when properly interpreted) - means fewest eyeballs 08:13 Zero-trust architecture 12:15 Cloud has seen speed to [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #7 Aaron Turner – CEO of Hotshot

#6 Laura Noren – Director of Research for Obsidian

Tech, Cybersecurity and Ethics Laura offers a refreshing perspective on how to start the ethics in cybersecurity conversation, touching upon Google’s (in)famous Project Maven, and highlights the importance of building ethics into products — before the problems happen. 02:11 How to start the ‘ethics in cybersecurity’ conversation 07:41 How can a community figure out what [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #6 Laura Noren – Director of Research for Obsidian

#5 Lester Godsey – CISO for the City of Mesa, Arizona

The Ever-Changing Role of a CISO 1:49 The conversation that CISOs and CIOs need to have 3:20 Should CISOs be influencing the vendor road map? 6:12 The critical skill set for the future CISO? Speak business and know data analytics. 10:26 The challenge of the duality of the CISO role, aka: the toggle switch 12:41 [...]

By | January 18th, 2019|Leader, Podcasts|Comments Off on #5 Lester Godsey – CISO for the City of Mesa, Arizona

#4 Tom McAndrew – CEO of Coalfire

Thought Leadership and Leading the Field by Sharing Tom underlines the importance of understanding your customer before selling anything and defines the three areas in which customers want continuous assurance. 01:29 Three areas customers want high levels of assurance in. 03:47 A proactive approach not only educates your customer, but differentiates you from your competitors [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #4 Tom McAndrew – CEO of Coalfire

#3 Tammy Moskites – Senior Security Executive at Accenture and career CISO

Your Network is the Key to Your Success Tammy offers vendors advice on deepening relationships and building networks and opines on the most critical, yet overlooked, security issue - the basic security foundations of asset inventory, security and protection. 01:56 Advice for vendors: it’s all about the relationship. 03:44 The importance of networking and branding [...]

By | January 18th, 2019|Leader, Podcasts|Comments Off on #3 Tammy Moskites – Senior Security Executive at Accenture and career CISO

#2 Paul Vixie – CEO of Farsight Security and Internet Hall of Famer

Six Questions, Vendor Honesty, and the Role of the CISO Paul poses the six questions you need to ask for success in any relationship — business or personal and stresses the importance of vendor agenda transparency. 02:16 The six questions you need to ask in any relationship 05:21 Client agenda versus Vendor agenda 07:51 The [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #2 Paul Vixie – CEO of Farsight Security and Internet Hall of Famer

#1 Chad Holmes – Chief Services and Operations Officer at Optiv

Supporting and Educating CISOs 02:30 Cyber industry has become less about solving problems and more about driving market price 05:01 The most under-hyped security issue – the pressure placed on the security industry by changing business models 07:12 The new vision of insider threat 08:29 Tech skills and business skills in the CISO role 14:05 [...]

By | January 18th, 2019|Podcasts, Tech|Comments Off on #1 Chad Holmes – Chief Services and Operations Officer at Optiv