Look for any podcast host, guest or anyone
Showing episodes and shows of

CIO & CISO

Shows

CIO Leadership Live: JapanCIO Leadership Live: JapanさくらインターネットのCIOが語る「CIOの役割や魅力」とは オンラインメディア「CIO」の由来であるCIOやCxOなどの経営層および、ビジネスとIT領域に関心の高いITリーダーズの読者層を対象にCIO.com Japanでは、動画インタビューシリーズの「Leadership Live Japan」を立ち上げました。 当サイトではCIOやCxO、ITリーダーとして活躍されている方々の「現在に至るまでのキャリア、仕事観、やりがい」などにクローズアップし、読者の皆様に「ITリーダーの役割」をお伝えたします。 今回、「Leadership Live Japan」に出演するゲスト、さくらインターネット株式会社 技術推進統括担当 執行役員 兼CISO 兼CIOの江草陽太氏をお迎えし、CIOやCISOのキャリアや仕事観、やりがい、魅力などについて語ってもらいました。江草氏のCIO・CISOとしての仕事観、やりがいとキャリアストーリーは以下の通りです。 CIO・CISOの仕事のやりがいと魅力:江草氏は、CIOおよびCISOとして「企業のデジタル戦略を主導し、成長に貢献できること」に大きなやりがいを感じていると語っています。特に、経営戦略とITの橋渡し役として、技術を活用して事業の競争力を強化する役割に誇りを持っています。 また、CISOとしては、セキュリティーの最前線で企業の信頼を守る使命感が大きなモチベーションになっているとのこと。サイバー攻撃の高度化が進む中で、インフラの安全性を確保し続けることはプレッシャーもあるが、その分、社会的な責任と達成感を強く感じると述べています。 CIOに至るまでのキャリアとエピソード:江草氏のキャリアは、エンジニアとしての現場経験からスタートしています。開発現場でのトラブル対応や運用改善の実務経験が、現在のCIO業務に活きていると振り返ります。 特に印象的なエピソードとして、「障害発生時に顧客と向き合いながら解決に奔走した経験」が語られています。この時に培った顧客志向と責任感は、現在のCIOとしての判断にも影響を与えているとのこと。 また、ITと経営の橋渡し役を担うに至った背景には、「技術だけでなくビジネス視点を持つ重要性」に気づいた転機があったと語っています。現場のエンジニアからプロジェクトマネージャーを経て、IT戦略に関わるようになり、徐々に経営と技術の両方を理解する立場へと成長していきました。 仕事への情熱と今後の展望:江草氏は、CIOとして「ITは単なるコストではなく、競争優位性を生み出す武器である」という信念を持っています。そのため、DX推進においては、技術だけでなくビジネス価値を最大化する視点を常に意識していると述べています。 また、CISOとしては、サイバー攻撃が巧妙化する中で、最新の脅威に対応しながら「守るべきものを守る」責任感が仕事のやりがいになっていると語っています。今後も「挑戦し続ける姿勢」を大切にしながら、同社のIT基盤とセキュリティーを強化し続ける決意を示しています。 2025-05-2917 minImpulsores Digitales: Liderazgo y tendencias en el ámbito ITImpulsores Digitales: Liderazgo y tendencias en el ámbito IT#16 - Pedro Galdón, CIO & CISO en EMASA - Tecnología y datos al servicio del ciclo integral del aguaEn este episodio de Impulsores Digitales exploramos la transformación tecnológica en la gestión del agua con Pedro Galdón, CIO & CISO en EMASA. Analizamos cómo la inteligencia artificial, la sensorización y los gemelos digitales están revolucionando la eficiencia y sostenibilidad del ciclo integral del agua. También abordamos la creciente importancia de la ciberseguridad en infraestructuras críticas y cómo la concienciación del personal es clave para proteger los sistemas. Finalmente, discutimos la evolución normativa y los desafíos futuros, como la optimización del agua regenerada y la adaptación a sequías pro2025-05-2051 minCyber Security HeadlinesCyber Security HeadlinesCisco IOS XE vulnerability, Pentagon CIO nomination, new SonicWall vulnerabilityCisco patches a level 10 vulnerability in IOS XE President nominates former Unilever CISO to be Pentagon CIO SonicWall patches a new zero-day vulnerability Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.c...2025-05-0908 minCode and CountryCode and CountryEp 11: Patrick Gorman, Former US Intelligence Community CIO, CISO Bank of AmericaNation-states don’t steal data, they wage war.In this episode of Code and Country, former US Intelligence Community CIO, CISO at Bank of America, and Chief Security Officer at Bridgewater Associates, Patrick Gorman exposes how cyber warfare threatens North America’s federal systems, higher education, BFSI, healthcare, and manufacturing sectors.Gorman reveals:How nation-state intent flips overnight, leaving CISOs and IT leaders scramblingWhy compliance frameworks fail to defend against ransomware, fraud, and insider threatsHow fragmented cyber defenses open the door to influence operations and disinformation campaignsIf you defend federal agencies, university netw...2025-05-0621 minCyber Security HeadlinesCyber Security HeadlinesWeek in Review: Google acquires Wiz, water utility improvements, more GitHub attacksLink to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, DeleteMe Data brokers bypass online safety measures to sell your name, address, and social security number to scammers. DeleteMe scours the web to find – and remove – your private information before it gets into the wrong hands by scanning for exposed information, and completing opt-outs and removals.   With over 100 Million personal listings removed, DeleteMe is your trusted privacy solution for onlin...2025-03-2124 minHeads TalkHeads Talk238 - Hanna Hennig & Natalia Oropeza, Group CIO & CISO: Cyber Protect Series, Siemens - Titans in DataLet us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedInEpisode Title: 🇩🇪Titans of Data, Management, Distribution and Security🇩🇪 Heads Talk kick off the year and concludes the Cyber Protection Series #HTCyberProtectSeries with two titans in data and information management, protection, distribution, and security. It was an absolute pleasure to host my esteemed guests for a truly insightful and thought-provoking conversation. This is a must-listen episode! Hear directly from the experts themselves as they discuss the dynamic rela...2025-01-201h 05Cybersecurity GrowthCybersecurity Growth#25 - Real CISO problems - Why it’s often a little c and not a big CWelcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. IntroAgendaWho are you wearing?Hot Topic - Real CISO problems - Why it’s often a little c and not a big C24% of CISOs actively looking to leave their jobs Is the CISO part of the executive team?CSO vs CISOCISO and CIOCISO paradox: With great responsibility comes little or no powerRACI Matrix Learn reality when interviewingWha...2024-12-0737 minCISO Tradecraft®CISO Tradecraft®#207 - CISO Burnout (with Raghav Singh)Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Raghav shares valuable insights from his extensive research on the unique stresses faced by CISOs, the organizational factors contributing to burnout, and practical coping mechanisms. We also explore the evolutionary phases of CISOs, from technical experts to strategic business enablers. Whether you're...2024-11-1846 minCIO Leadership LiveCIO Leadership LiveCIO Leadership Live with Sarah Betadam, CIO, CISO, NovantaJoin Sarah Betadam, CIO, CISO, Novanta as she discusses herleadership role, supporting women in technology, building tech strategy,working with the board and CEO to advance innovation and growth. 2024-11-0823 minVISION by ProtivitiVISION by ProtivitiFormer CISO on what Boards are getting wrong about data protection and privacyIn this VISION by Protiviti podcast, Jow Kornik, Editor-in-Chief, sits down with Sue Bergamo. Bergamo is an executive advisor, former CIO, CISO, and Global Technology Strategist for Microsoft. She sits on several boards, is host the Short Takes podcast and author of So you want to be a CISO: A practical guide to becoming a successful cybersecurity leader. Here, Bergamo discusses recent SEC rulings and their impacts on the current and future state of the CISO role, and how the C-suite and boards view data governance and privacy, and what steps they should be taking right now to build customer...2024-10-2812 minThe Tech Tea PodcastThe Tech Tea PodcastInsightful Discussion with Mr. Sujoy Brahmachari-CIO & CISO at Rosmarta Technologies Ltd.In this episode, we are honoured to have Sujoy Brahmachari, CIO and CISO of Rosmerta Technologies Limited, share his inspiring journey. Sujoy talks about his tech journey and provides detailed information about Generative AI and its comprehensive perks. Sujoy's experience and leadership style blend uniquely into the discussion of leaders' tech tea. 2024-07-2412 minSecurity VisionariesSecurity VisionariesThe Convergence of CIO & CISO RolesJoin host Max Havey on the latest episode of Security Visionaries as he sits down with guest Jadee Hanson, CISO at Vanta. Jadee offers an in-depth and insightful look at the intertwining roles of CIOs and CISOs in the high-stakes world of cybersecurity. Tune in to listen to Jadee's journey, learn about the strategies she’s used to build bridges between security and technology teams, gain insights into the future of CISO roles, and discover why integrated processes and equal accountability are changing the game.  2024-07-1218 minCISO TalksCISO TalksStrategies for CISOs and CIOs to Work Together EffectivelyIn this episode of CISO Talks, we talk with Michael Armer (CISO) and Ashu Varshney (CIO) of global software company, RingCentral. We discuss the role of the CISO and CIO within the business and how they have an effective working partnership with each other. We talk about why this relationship is so effective and how it greatly benefits the organization when it comes to securing sensitive data. Guests in this episode: Michael Armer | CISO - RingCentral https://www.linkedin.com/in/marmer/ Ashu Varshney | CIO - RingCentral ...2024-05-1540 minCapture the CISOCapture the CISOSeason 2: BugProve, Egress, Zenity Welcome to episode three of Capture the CISO Season 2! Our judges are Christina Shannon, CIO, KIK Consumer Products and  Dan Walsh, CISO, VillageMD. Our contestants: Attila Szász, CEO & Founder, BugProve Steve Malone, VP of Product Management, Egress Ben Kliger, CEO, Zenity Huge thanks to all our contestants who are also sponsors of Capture the CISO BugProve BugProve offers a vulnerability management platform for embedded devices.  Its unique feature of identifying zero-day vulnerabilities sets it apart f...2024-05-0137 minCyber Security HeadlinesCyber Security HeadlinesWeek in Review: GitHub comments abused, networkless” attack techniques, Police bodycam AI reportsLink to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Veracode Get ready to experience the future of application security at RSAC 2024 with Veracode. Join us as we unveil cutting-edge innovations and insights to tackle today’s most pressing security challenges. From live demos showcasing our newest products to engaging discussions with industry experts. See you at RSAC!  All links and the video of this episode can be found on CISO...2024-04-2723 minCISO Tradecraft®CISO Tradecraft®#162 - CISO Predictions for 2024Looking for accurate predictions on what 2024 holds for cybersecurity? Tune into our latest episode of CISO Tradecraft for intriguing insights and industry trends. Listen now and boost your cybersecurity knowledge! Earn CPEs: https://www.cisotradecraft.com/isaca Transcripts: https://docs.google.com/document/d/11YX2bjhIVThSNPF6yEKaNWECErxjWA-R Chapters 00:00 Introduction 02:11 1) CISOs flock to buy private liability and D&O insurance. It also becomes the norm for CISO hiring agreements. 05:25 2) CISO reporting structure changes. No more reporting to the CIO. 11:43 3) More CISOs get implicated in lawsuits, but the lawsuits rule in favor of the...2024-01-0142 minCISO Tradecraft®CISO Tradecraft®#159 - Refreshing Your Cybersecurity StrategyIn this episode of CISO Tradecraft, host G. Mark Hardy guides listeners on how to refresh their cybersecurity strategy. Starting with the essential assessments on the current state of your security, through to the creation of a comprehensive, one-page cyber plan. The discussion covers different approaches to upskilling the workforce, tools utilization, vulnerability management, relevant regulations, and selecting the best solution for your specific needs. The show also includes tips on building a roadmap, creating effective key performance indicators, and validation exercises or trap analysis to ensure the likelihood of success. At the end of the discussion, G. Mark...2023-12-1123 minCyber Security HeadlinesCyber Security HeadlinesWeek in Review: Okta breach expands, Former Uber CISO speaks, OpenAI’s chatbot leak secretsLink to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, SpyCloud SpyCloud disrupts cybercrime by telling you what criminals know about your business and your customers, so you can take action on exposed authentication data to prevent ransomware, session hijacking, account takeover, and online fraud. With knowledge of the specific data criminals have in hand – like credentials, cookies, and PII compromised by breaches and malware infections – security teams have better vi...2023-12-0129 minThe Cyber Ranch PodcastThe Cyber Ranch Podcast12 Questions for 12 Guests LIVE! at CISO XCAllan takes the show on the road again, this time at his all-time favorite conference: CISO XC! He asks a unique question of each guest, who represent a great deal of breadth in our industry: Dave Belanger, CISO at Bestow Insurance - What is the most effective way to demonstrate and communicate security program progress to the board? Tera Davis, CEO at CyberOne Security – How does a vendor forge relationships with a customer to be a strategic advisor and not just another vendor? Andrew Woolen – Account Executive at Semperis – What do you wish CISOs knew about the ve...2023-11-2935 minBitport CIO Klub PodcastBitport CIO Klub PodcastCIO Hungary 2023: Kényes egyensúly: biztonság és/vagy munka?A CIO Hungary 2023 IT-biztonsági panelbeszélgetésének résztvevői megbeszélték: hogyan alakítható olyan IT-biztonsági környezet, amely nem akadálya, hanem támogatója a core tevékenységnek? Ki lehet-e alakítani olyan IT-biztonsági kereteket a vállalatoknál, melyek egyfelől megadják a szükségesen magas szintű biztonságot a vállalati rendszereknek, de nem akadályozzák az üzleti folyamatokat? Mi a szerepe ebben a CIO-nak, a CISO-nak vagy épp az üzemeltetési vezetőnek? Hogyan lehet bevonni a felhasználókat? A beszélgetés részvevői: Györke Zso...2023-08-0241 minQPC Security - Breakfast BytesQPC Security - Breakfast BytesCISO, CTO, CIO, what’s the difference?Kyle Wentworth of Wentworth Consulting Group joined Felicia to compare/contrast three C-suite level IT/IS related roles. Kyle has 35 years of business experience and has been working on computers since 1976. He is a: Fractional CTO Business coach Business process modeler Kyle has a great resource on his website to help people understand the differences between these C-suite roles. https://wentworthconsultinggroup.com/cto-cio-ciso-consulting/ Listen to the podcast for some Kyle truth bombs such as: "Technology runs your business. You don't. We facilitate technology to run our business. IT is...2023-06-1629 minCISO TalkCISO TalkThe Changing Role of the CISO – CISO Talk EP 11Our hosts Alan Shimel and Mat Newfield are joined by Julie Cullivan, Board member at Heartflow and Prasad Ramakrishnan, CIO & CISO at Freshworks and Mitch Ashley, ASG/MediaOps to discuss the transformative roles that CISOs are increasly being propelled into, often taking on responsibilities well outside the traditional boundaries of cybersecurity. This panel of security leaders and experts are living the journey of cybersecurity in enterprise organizations and they discuss the evolution of the CISO and how the role will evolve in this period of disruption and rapid transformation. 2023-02-2341 mininfosecliveinfosecliveThe CISO Experience - Brian BoboWhat an awesome session in the studio with Brian Bobo for “The CISO Experience”!    Huge thank you for your time and the valuable insights gained  around the difficulties of outsourcing, being an effective leader, and the successes and challenges faced during your career!   With 35 of our industries biggest leaders lined up for future episodes so far, by sharing best ideas and practice, we hope to bring some extra clarity to the challenges being faced in our industry now and in the future.  As Chief Digital and Security Officer (CDO/CIO/CISO), Brian is responsible for Greenway’...2022-11-151h 07CISO Tradecraft®CISO Tradecraft®#96 - The 9 Cs of CyberAhoy! and welcome to another episode of CISO Tradecraft -- the podcast that provides you with the information, knowledge, and wisdom to be a more effective cyber security leader.  My name is G. Mark Hardy, and today we’re going to -- talk like a pirate.  ARRR As always, please follow us on LinkedIn, and make sure you subscribe so you can always get the latest updates. On today’s episode we are going to talk about the 9 Cs of Cyber Security.  Note these are not the 9 Seas that you might find today, the 19th of Sept...2022-09-1930 minCIO Talk NetworkCIO Talk NetworkWill Zero Trust adoption remain a pipe dream?While the zero-trust security model may offer excellent defense against emerging, unrecognized, and unpredictable threats, a piecemeal implementation approach, significant commitment for ongoing administration, and productivity concerns pose daunting challenges preventing organizations from adopting it fully. So how must an organization address these challenges and harness the significant benefits it offers? Guest 1: Gerald Caron, Chief Information Officer (CIO) / Assistant Inspector General for Information Technology (AIG/IT), U.S. Department of Health and Human Services (HHS), Office of the Inspector General (OIG) Guest Bio: Guest 2: Dan Wilkins, Chief Information Security Officer, State of Arizona Guest Bio: Guest 3: Bharat Soni, Chief Information...2022-08-3158 minCIO Talk Network PodcastCIO Talk Network PodcastWill Zero Trust adoption remain a pipe dream?While the zero-trust security model may offer excellent defense against emerging, unrecognized, and unpredictable threats, a piecemeal implementation approach, significant commitment for ongoing administration, and productivity concerns pose daunting challenges preventing organizations from adopting it fully. So how must an organization address these challenges and harness the significant benefits it offers? Guest 1: Gerald Caron, Chief Information Officer (CIO) / Assistant Inspector General for Information Technology (AIG/IT), U.S. Department of Health and Human Services (HHS), Office of the Inspector General (OIG) Guest Bio: https://www.ciotalknetwork.com/contributor/gerald-caron/ Guest 2: Dan Wilkins, Chief...2022-08-2658 minCISO Tradecraft®CISO Tradecraft®#92 - Updating the Executive Leadership Team on CyberShow Notes Hello, and welcome to another episode of CISO Tradecraft -- the podcast that provides you with the information, knowledge, and wisdom to be a more effective cyber security leader.  My name is G. Mark Hardy, and today we're going to offer tips and tools for briefing your executive leadership team, including the four major topics that you need to cover.  As always, please follow us on LinkedIn, and make sure you subscribe so you can always get the latest updates. Imagine you have been in your role as the Chief Information Security Officer fo...2022-08-2226 minCIO Talk NetworkCIO Talk NetworkThe People side of Cyber Security – Turning organizations’ weakest link into their greatest strengthThere’s no question that people are the weakest link in Cybersecurity. So we invest in educating people about security risks and how to handle them. We try building cybersecurity champions who can help spread the word about good security practices. We introduce incentive programs for “security-first” behaviors. However, the results are still disappointing and prove that computers are designed to be secure while people are not. Can we do better? How can we make security a foundation of our organizations and help ensure that we can continue to grow with confidence? Guest 1: James Johnson, Chief Information Security Officer, John Deere...2022-07-0353 minCIO Talk Network PodcastCIO Talk Network PodcastThe People side of Cyber Security – Turning organizations’ weakest link into their greatest strengthThere’s no question that people are the weakest link in Cybersecurity. So we invest in educating people about security risks and how to handle them. We try building cybersecurity champions who can help spread the word about good security practices. We introduce incentive programs for “security-first” behaviors. However, the results are still disappointing and prove that computers are designed to be secure while people are not. Can we do better? How can we make security a foundation of our organizations and help ensure that we can continue to grow with confidence? Guest 1: James Johnson, Chief Information Securi...2022-07-0353 minCIO Talk NetworkCIO Talk NetworkEmbedding Security in Technology CapabilitiesTo support digital, an organization needs to develop custom software applications or use third-party software packages and tools, migrate workloads and infrastructure to the cloud, and standardize management and governance of multi-cloud environments. First, however, security must be ingrained holistically to ensure that technology does not become the weakest link to managing digital risks effectively. How has this journey been so far? What challenges are the CISOs facing in embedding security in their technology capabilities, and what strategies are effective in addressing them? Guest 1: John McClure, CISO Sinclair Broadcast Group Guest Bio: Guest 2: Rob Hornbuckle, CISO Allegiant Airlines Guest Bio...2022-06-0253 minhealthsystemCIO.comhealthsystemCIO.comQ&A with North Country Hospital CIO/CISO Kate Pierce: “It Takes a Village to Make Us Secure.”In this podcast, Kate Pierce talks about the key criteria she looks for in a vendor partner, North Country’s three-pronged cybersecurity strategy, and the pros and cons of being both CIO and CISO. Source: Q&A with North Country Hospital CIO/CISO Kate Pierce: “It Takes a Village to Make Us Secure.” on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2022-06-0118 minhealthsystemCIO.comhealthsystemCIO.comQ&A with North Country Hospital CIO/CISO Kate Pierce: “It Takes a Village to Make Us Secure.”In this podcast, Kate Pierce talks about the key criteria she looks for in a vendor partner, North Country’s three-pronged cybersecurity strategy, and the pros and cons of being both CIO and CISO. Source: Q&A with North Country Hospital CIO/CISO Kate Pierce: “It Takes a Village to Make Us Secure.” on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2022-06-0118 minBitport CIO Klub PodcastBitport CIO Klub PodcastKiberháború: várni pofont jobbról, kapni balrólFebruár 24-én orosz csapatok rohanták le Ukrajnát. Érezteti-e hatását Magyarországon a háború nyomán felerősödött rosszindulatú kibertevékenység? Hogyan kell kezelni a problémát egy kritikusinfrastruktúra-szolgáltatónál, az állami szférában és egy olyan nagyvállalatnál, amely mindkét háborús fél országában intenzíven jelen van. Lehet-e háborús gyakorlatot szerezni békeidőben? Kockázatokról és jó gyakorlatokról beszélgetett a CIO Hungary 2022-n Agárdi Györgyi CIO (Allianz), Szoboszlai Beáta üzleti elemzési vezető(MVM) és Hári Krisztián...2022-06-0141 minCIO Talk Network PodcastCIO Talk Network PodcastEmbedding Security in Technology CapabilitiesTo support digital, an organization needs to develop custom software applications or use third-party software packages and tools, migrate workloads and infrastructure to the cloud, and standardize management and governance of multi-cloud environments. First, however, security must be ingrained holistically to ensure that technology does not become the weakest link to managing digital risks effectively. How has this journey been so far? What challenges are the CISOs facing in embedding security in their technology capabilities, and what strategies are effective in addressing them? Guest 1: John McClure, CISO Sinclair Broadcast Group Guest Bio: https://www.ciotalknetwork...2022-05-3153 minCDM Media PodcastCDM Media PodcastMax Garcia - Sneak Peak CIO/CISO Atlanta SummitThe CIO/CISO Atlanta Summit is coming up quickly. Our own J.D. Miller sits down with Max Garcia, CISO and Executive Director of Financial Services Division at NCR to preview his fireside discussion at the Atlanta event. The two dive into the changing role of the CISO among other topics. Our systems are smarter and the bad actors are trying other methods now to get into our organizations. The two discuss how to handle new threats and also talk about defense in depth, how a renewed focus on expanding tabletop exercises is imperative, ransomware and so much more.2022-04-0711 minThe Business SamuraiThe Business SamuraiHow to become a CIO (Chief Information Officer) w/ Dan PersicoDan Persico CIO for the Virginia Department of ElectionsDan Persico served 15 years in the United States Air Force working a variety of duties including tactical aircraft maintenance, Command and control actions supporting homeland security, military police, security forces, and advance program management that included protection of classified and unclassified systems, designing continuity plans, and oversight of information assurance officers.Dan was most recent CIO/CISO for the Virginia Department of Elections.  Responsible for overseeing business operations, technology support, software development, project management, cybersecurity, data privacy and governance within the unique realm of elections oversight, d...2022-04-041h 15CISO Tradecraft®CISO Tradecraft®#70 - Partnership is KeyOn this episode of CISO Tradecraft you can learn how to build relationships of trust with other executives by demonstrating executive skill & cyber security expertise.  You can learn what to say to each of the following executives to build common ground and meaningful work:  CFO Legal Marketing Business Units CEO CIO HR Note Robin Dreeke mentions 5 keys to building goals.:  Learn… about their priorities, goals, and objectives. Place… theirs ahead of yours Allow them to talk…. suspend your own need to talk. Seek their thoughts and opinions. Ego suspension!!! Validate them unconditionally and non-judgmentally for who they are...2022-03-2116 minCIO Talk Network PodcastCIO Talk Network PodcastSteps to Outcome-Driven SecurityOrganizations want their security investments to achieve intended results and drive significant positive ROI like any business function. For such clarity, how much security organizations need and how much they should pay must be calculated based on operations and technology costs, risks mitigated, and benefits realized. Also, explicit metrics must drive security effort evaluation, performance, and the required adjustments. So how can we move to such outcome-driven security? Guest: Bharat Soni, Chief Information Security Officer (CISO) and Group Head Information Security Group, Guaranty Trust Bank (GTBank) Guest Bio: https://www.ciotalknetwork.com/contributor/bharat-soni/ 2021-12-0846 minCISO TalksCISO TalksAn Insight into Starting Your Own Cybersecurity Business | CISO TalksIn this episode of CISO Talks, we talk about making the jump from a large cybersecurity organization to founding your own cybersecurity business. What are some of the key ideas and lessons to take into your own business? Even if you don't have experience working in a large cybersecurity organization, this is a really valuable chat! Guest in this episode: Jack Naglieri - Founder & CEO @ Panther Labs https://www.linkedin.com/in/jacknaglieri/ Also available on: IGTV: www.instagram.com/instalepide SoundCloud: bit.ly/2MYHwxR Spotify: spoti.fi/2N0XGXR iTunes: apple.co/2N0sO9P Follow us on Social...2021-12-0809 minColorado = Security PodcastColorado = Security Podcast230 - 11/22 - Diego Silva, CIO @ Gates CorpDiego Silva, CIO at Gates Corp, is our feature interview this week, recorded live at Evanta’s Denver CIO/CISO event this week. News from Casa Bonita, Banksy, Wedfuly, Wad-Free, Welltok, Stackhouse, Red Canary, RADICL, Ping Identity, Coalfire, CyberGRX and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or...2021-11-211h 03CIO Talk Network PodcastCIO Talk Network PodcastFrom Peanut Butter to Surgery for Better SecuritySpreading the same controls across all business areas hasn’t proven to be effective for security management. Neither has planting people, whether your own or a managed service provider, and passively waiting for the alarm to go off. How can you as a CISO be surgical in your approach to security operations to proactively safeguard the crown jewels? Guest 1: Jerich Beason, Chief Information Security Officer, Epiq Guest Bio: https://www.ciotalknetwork.com/contributor/jerich-beason/ Guest 2: Leon Ravenna, Chief Information Security Officer, KAR Global Guest Bio: https://www.ciotalknetwork.com/contributor/leon-ravenna/...2021-10-2650 minBusiness Security Weekly (Video)Business Security Weekly (Video)CISO vs. CIO, CISO & the C-Suite, & How the CISO Works With the CPO - BSW #233This week in the Leadership and Communications section, Who actually owns cyber security: CISO vs. CIO, How to Say “No” After Saying “Yes”, Decode different types of business interruption insurance, and more!   Visit https://www.securityweekly.com/bsw for all the latest episodes!   Show Notes: https://securityweekly.com/bsw2332021-09-2825 minCISO TalksCISO TalksLeast Privilege: Are Organizations Reducing their Risk Effectively? | CISO TalksIn this episode of CISO Talks we talk all about least privilege. A lot of organizations don't really adhere to fully to a least privilege model. We discuss how this reduces risk and we determine whether organizations are reducing their risk effectively. Guest in this episode: Reuven Aronashvili - Founder and CEO at CYE https://www.linkedin.com/in/reuven-aronashvili/ Also available on: IGTV: www.instagram.com/instalepide SoundCloud: bit.ly/2MYHwxR Spotify: spoti.fi/2N0XGXR iTunes: apple.co/2N0sO9P Follow us on Social Media: LinkedIn - bit.ly/2FWHKoM Twitter - bit.ly/2FWNO0C Instagram...2021-08-2507 minCISO TalksCISO TalksImplementing New Security Structures | Passwordless Future | CISO TalksIn this episode of CISO Talks, we talk about the difficulty that many organizations have on both a financial and practical level when implementing a new security structure. A lot of organizations still run a lot of legacy systems and software for these very reasons which is simply not secure enough in the world we live in today. We also discuss the very likely prospect of passwords becoming a thing of the past in the not so distant future! Guest in this episode: Or Finkelshtein - VP @ EitanMedical https://www.linkedin.com/in/orfinkel/ Also available on: IGTV: www.instagram...2021-07-2104 minCISO TalksCISO TalksSolving Authentication Problems in Large Enterprises | CISO TalksIn this episode of CISO Talks, we talk all about authentication. How can it evolve? How can we add security whilst making the process simple and effective. Tune in for the full debate. Guest in this episode: Or Finkelshtein - VP @ EitanMedical https://www.linkedin.com/in/orfinkel/ Also available on: IGTV: www.instagram.com/instalepide SoundCloud: bit.ly/2MYHwxR Spotify: spoti.fi/2N0XGXR iTunes: apple.co/2N0sO9P Follow us on Social Media: LinkedIn - bit.ly/2FWHKoM Twitter - bit.ly/2FWNO0C Instagram - bit.ly/2FWMxXj Facebook - bit.ly/2FXb2Ue #Lepide #data...2021-07-0710 minCISO TalksCISO TalksChecking The Integrity & Security of Your Suppliers Is Vital | CISO TalksIn this episode of CISO Talks we discuss the importance of knowing the security & integrity of your suppliers to minimise risk. Simply not enough organizations are proactive with their security. Guest in this episode: Tim Callahan - CISO @ Aflac https://www.linkedin.com/in/tim-callahan-4b39241/ Also available on: IGTV: www.instagram.com/instalepide SoundCloud: bit.ly/2MYHwxR Spotify: spoti.fi/2N0XGXR iTunes: apple.co/2N0sO9P Follow us on Social Media: LinkedIn - bit.ly/2FWHKoM Twitter - bit.ly/2FWNO0C Instagram - bit.ly/2FWMxXj Facebook - bit.ly/2FXb2Ue #Lepide #data #datasecurity #cybersecurity...2021-06-3006 minCISO TalksCISO TalksMitigating Risk: What Are We Getting Wrong? | CISO TalksIn this episode of CISO talks, we discuss the mitigation of risk. What are we doing right and more importantly, what are we doing wrong? Our guest is the very experienced CISO, Tim Callahan - who gives us some great insight into our mitigation of risk as an industry. Guest in this episode: Tim Callahan - CISO @ Aflac https://www.linkedin.com/in/tim-callahan-4b39241/ Also available on: IGTV: www.instagram.com/instalepide SoundCloud: bit.ly/2MYHwxR Spotify: spoti.fi/2N0XGXR iTunes: apple.co/2N0sO9P Follow us on Social Media: LinkedIn - bit.ly/2FWHKoM Twitter...2021-06-1610 minCISO to CISO Cybersecurity TalkCISO to CISO Cybersecurity TalkEpisode 15 - Eric Sorenson - Chief Information Security Officer (CISO) at doTERRA International LLCOn this episode of CISO to CISO we would like to welcome Eric Sorenson, Chief Information Security Officer (CISO) at doTERRA International LLC. Eric architects, develops, and implements the technologies that keep private data safe from intrusions and theft. Eric joined dōTERRA in 2016 to build the organization’s first comprehensive, global cybersecurity strategy. From his earlier days at HealthEquity to the CIO/CISO dual role at Arches Health Plan, and now at dōTERRA, Eric has evolved a set of information security programs and technologies that truly enable business and work within the commercial needs of our organization and...2021-05-1735 minQuixy Audio BlogQuixy Audio BlogBreaking down the benefits of No-Code for CEO, CIO, CISO, CFO, and Business LeadersNo-code is a new technology that can help your organization on many levels. Here's how to explain the benefits to your CEO, CIO, CISO, CFO, & Business Leaders!2021-05-1015 minCISO Tradecraft®CISO Tradecraft®#21 - Your First 90 Days as a CISO (with Mark Egan)This special episode features Mark Egan (Former CIO of Symantec as well as VMWare).  Mark discusses what he looks for during interviews with CISOs, what executives need to demonstrate during their first 90 days to be successful, and how he helps the next generation of cyber professionals at Merritt College. Three Questions to ask during any interview: What do you like best about this role? What are the most challenging pieces of this role? What does success look like for this role one year into the future? Five Step Plan for New CISOs: Start with a...2021-03-1943 minCIO Talk Network PodcastCIO Talk Network PodcastBuilding your Relationship Capital as a CISOLeadership is influence, and relationships play an essential role. To ace your performance appraisal as a security leader, you need to develop healthy relationships with the internal security team, organizational peers, management, vendors, and customers. How can CISOs build their relationship capital with all constituents to enable business growth while keeping the fort secure? Guest: Rob Hornbuckle, Chief Information Security Officer, Allegiant Guest Bio: https://www.ciotalknetwork.com/contributor/rob-hornbuckle/ More on this Episode: https://www.ciotalknetwork.com/building-your-relationship-capital-as-a-ciso/ More on Security: https://www.ciotalknetwork.com/topics/security/ More...2021-03-1251 minCIO Talk NetworkCIO Talk NetworkBuilding Your Relationship Capital As A CISOLeadership is influence, and relationships play an essential role. To ace your performance appraisal as a security leader, you need to develop healthy relationships with the internal security team, organizational peers, management, vendors, and customers. How can CISOs build their relationship capital with all constituents to enable business growth while keeping the fort secure? Guest: Rob Hornbuckle Title: Chief Information Security Officer, Allegiant For more details and related content: https://www.ciotalknetwork.com/building-your-relationship-capital-as-a-ciso2021-03-1151 minCIO Talk Network PodcastCIO Talk Network PodcastWhy Cybersecurity is important for Business GrowthCybersecurity is no different from a sports car’s brakes, which is only to keep us safe, not to slow us down as we test our businesses’ limits during such unprecedented times of digital growth and disruptive change. How should a CISO help executive management understand cybersecurity, why it is essential for growth, and how to leverage it to maximize digital potential? Guest: Juan Carlos, Chief Information Security Officer, Metlife Guest Bio: https://www.ciotalknetwork.com/contributor/juan-carlos/ More on this Episode: https://www.ciotalknetwork.com/why-cybersecurity-is-important-for-business-growth/ More on Security: https://www...2021-01-1447 minCIO Talk NetworkCIO Talk NetworkDelivering On The 2021 CISO AgendaFor the upcoming year 2021, how are the CISOs enabling a business-driven cyber strategy, gearing up to take on the broader role, and planning budgets that directly tie to business growth and improved risk management? How are they planning to develop their talent pool and manage security services partnerships to deliver on their 2021 CISO agenda successfully? Guest 1 : Arun DeSouza Title : Chief Information Security & Privacy Officer, Nexteer Automobiles Guest 2 : Jake Margolis Title : Chief Information Security Officer, Metropolitan Water District of Southern California For more details and related content : https://www.ciotalknetwork.com/delivering-on-the-2021-ciso-agenda/2020-11-0455 minCIO Talk Network PodcastCIO Talk Network PodcastDelivering on the 2021 CISO AgendaFor the upcoming year 2021, how are the CISOs enabling a business-driven cyber strategy, gearing up to take on the broader role, and planning budgets that directly tie to business growth and improved risk management? How are they planning to develop their talent pool and manage security services partnerships to deliver on their 2021 CISO agenda successfully? Guest 1: Arun DeSouza, Chief Information Security and Privacy Officer, Nexteer Automobile Guest Bio: https://www.ciotalknetwork.com/contributor/arun-desouza/ Guest 2: Jake Margolis, Chief Information Security Officer, Metropolitan Water District of Southern California Guest Bio: https://www...2020-11-0355 minCIO Talk Network PodcastCIO Talk Network PodcastAddressing the top three CISO challengesDecades ago, CISOs started as the guardian of the firewall, defending a well-defined perimeter. But today, with anytime and anywhere data access imperative, such boundaries are blurred. Securing crown jewels in a cloud environment, with poor under the hood visibility, has been daunting. And, to tackle the daily fires while preparing for what’s ahead, it has been challenging to build a next-gen security talent pool. How are CISOs addressing these top three challenges? Guest 1: Bharat Soni, Chief Information Security Officer (CISO) and Group Head Information Security Group, Guaranty Trust Bank (GTBank) Guest Bio: https://ww...2020-03-1247 minCIO Talk NetworkCIO Talk NetworkAddressing The Top Three CISO ChallengesGuest 1 : Bharat Soni Title : CISO and Group Head Information Security Group, GT Bank Guest 2 : Pablo G.Molina Title : AVP and CISO, Drexel University Decades ago, CISOs started as the guardian of the firewall, defending a well-defined perimeter. But today, with anytime and anywhere data access imperative, such boundaries are blurred. Securing crown jewels in a cloud environment, with poor under the hood visibility, has been daunting. And, to tackle the daily fires while preparing for what’s ahead, it has been challenging to build a next-gen security talent pool. How are CISOs addressing these top three challenges?2020-03-1147 minCIO Talk Network PodcastCIO Talk Network PodcastCISO as a Digital Business LeaderAs a CISO, how are you grooming your team to understand the goals of your digital business, identify and assess the risks, and recommend effective yet cost-efficient solutions in business terms? How are you helping your team members to become effective communicators and problem solvers while you hone your leadership skills? Guest 1: Leon Ravenna, Chief Information Security Officer, KAR Global Guest Bio: https://www.ciotalknetwork.com/contributor/leon-ravenna/ Guest 2: Harshal Mehta, Vice President, Chief Information Security Officer, Carlson Wagonlit Travel (CWT) Guest Bio: https://www.ciotalknetwork.com/contributor/harshal-mehta/ ...2020-01-1053 minCIO Talk NetworkCIO Talk NetworkCISO As A Digital Business LeaderGuest 1 : Harshal Mehta Title : Vice President, Chief Information Security Officer, CWT Guest 2 : Eddie Borrero Title : Chief Information Security Officer, Robert Half Guest 3 : Leon Ravenna Title : Chief Information Security Officer, KAR Auction Services, Inc. As a CISO, how are you grooming your team to understand the goals of your digital business, identify and assess the risks, and recommend effective yet cost-efficient solutions in business terms? How are you helping your team members to become effective communicators and problem solvers while you hone your leadership skills?2020-01-1053 minCIO Talk NetworkCIO Talk NetworkCISO As A Digital Business LeaderGuest 1 : Harshal Mehta Title : Vice President, Chief Information Security Officer, CWT Guest 2 : Eddie Borrero Title : Chief Information Security Officer, Robert Half Guest 3 : Leon Ravenna Title : Chief Information Security Officer, KAR Auction Services, Inc. As a CISO, how are you grooming your team to understand the goals of your digital business, identify and assess the risks, and recommend effective yet cost-efficient solutions in business terms? How are you helping your team members to become effective communicators and problem solvers while you hone your leadership skills?2020-01-0853 minCIO Talk Network PodcastCIO Talk Network PodcastCloud Security as a Shared ResponsibilityPublic and hybrid cloud infrastructure has proven to be a viable option for business but is it the most secure? Security breaches are rampant, with many of them attributed to cloud adoption. How can the business, IT, and cybersecurity leaders work together with the cloud providers to effectively manage cloud security? Guest: Michael Welch, Chief Information Security Officer (CISO), OSI Group Guest Bio: https://www.ciotalknetwork.com/contributor/michael-welch/ More on this Episode: https://www.ciotalknetwork.com/cloud-security-as-a-shared-responsibility/ More on Security: https://www.ciotalknetwork.com/topics/security/ More on...2019-07-1855 minA Geek Leader Podcast - inspiring technical and creative leaders around the worldA Geek Leader Podcast - inspiring technical and creative leaders around the worldAGL 075: Gary Hayslip, CISO at WebrootAs CISO for Webroot, Gary Hayslip advises executive leadership on protecting critical information resources and oversees enterprise cyber-security strategy. His mission includes creating a “risk aware” culture that places a high value on securing and protecting customer information entrusted to Webroot. Hayslip’s career in the fields of enterprise information security and network security spans more than 20 years and includes multiple CIO, CISO, and deputy director of IT positions for the U.S. Navy, the Federal Government, and the City of San Diego. In these positions, he was instrumental in architecting security programs from the ground up, auditing large, disparate networ...2018-10-2937 minCIO Talk Network PodcastCIO Talk Network PodcastSteps To Making Security ForethoughtCXOs are getting fired. Companies are losing credibility and billions in revenue. But many CISOs still have a hard time making security forethought in their organizations. How can CISOs get everyone to embrace security as a forethought for the benefit of all involved? Guest 1: Bharat Soni, Chief Information Security Officer (CISO) and Group Head Information Security Group, Guaranty Trust Bank (GTBank). Guest Bio: https://www.ciotalknetwork.com/contributor/bharat-soni/ Guest 2: Robert Jamieson, Chief Information Security Officer, Mallinckrodt Pharmaceutics. Guest Bio: https://www.ciotalknetwork.com/contrbutor/robert-jamieson/ More on this...2018-05-2355 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 3The most important characteristic in a team member isn’t technology acumen, but ability to communicate effectively and adapt to change, says CIO Skip Rollins. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 3 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-10-0210 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 3The most important characteristic in a team member isn’t technology acumen, but ability to communicate effectively and adapt to change, says CIO Skip Rollins. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 3 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-10-0210 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 2If a vendor partnership is going to be successful, there has to be trust on both sides, says Skip Rollins, who also believes it’s critical that CIOs are willing to walk away if it’s no longer working. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 2 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-09-2010 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 2If a vendor partnership is going to be successful, there has to be trust on both sides, says Skip Rollins, who also believes it’s critical that CIOs are willing to walk away if it’s no longer working. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 2 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-09-2010 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 1Being a community health system means not rushing into major decisions - especially deciding on a core EHR vendor, and finding ways to make sure resources are maximized, says CIO Skip Rollins. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 1 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-09-1210 minhealthsystemCIO.comhealthsystemCIO.comSkip Rollins, CIO & CISO, Freeman Health System, Chapter 1Being a community health system means not rushing into major decisions - especially deciding on a core EHR vendor, and finding ways to make sure resources are maximized, says CIO Skip Rollins. Source: Skip Rollins, CIO & CISO, Freeman Health System, Chapter 1 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2017-09-1210 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 3The key to being a strong leader? Being humble enough to listen, while also having he confidence to make tough decisions, says John Kenagy, who believes that now more than ever, CIOs must be “fearless.” Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 3 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-2614 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 3The key to being a strong leader? Being humble enough to listen, while also having he confidence to make tough decisions, says John Kenagy, who believes that now more than ever, CIOs must be “fearless.” Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 3 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-2614 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 2Being acquired can be unnerving, particularly for a smaller hospital. And so it’s critical for CIOs to choose words carefully, keep the communication lines open, and be respectful, says John Kenagy. Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 2 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-2014 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 2Being acquired can be unnerving, particularly for a smaller hospital. And so it’s critical for CIOs to choose words carefully, keep the communication lines open, and be respectful, says John Kenagy. Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 2 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-2014 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 1If health systems want to sell independent practices on a hosted solution, the key is to establish trust, educate on the benefits of integration, and to avoid, at all costs, the oversell, says CIO John Kenagy. Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 1 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-1317 minhealthsystemCIO.comhealthsystemCIO.comJohn Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 1If health systems want to sell independent practices on a hosted solution, the key is to establish trust, educate on the benefits of integration, and to avoid, at all costs, the oversell, says CIO John Kenagy. Source: John Kenagy, PhD, SVP/CIO & CISO, Legacy Health, Chapter 1 on healthsystemcio.com - healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.2016-07-1317 minBanking Information Security PodcastBanking Information Security PodcastCIO/CISO - Finding the Critical BalanceIn many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?2016-03-2300 minCredit Union Information Security PodcastCredit Union Information Security PodcastCIO/CISO - Finding the Critical BalanceIn many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?2016-03-2300 minGovernment Information Security PodcastGovernment Information Security PodcastCIO/CISO - Finding the Critical BalanceIn many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?2016-03-2300 minInfo Risk Today PodcastInfo Risk Today PodcastCIO/CISO - Finding the Critical BalanceIn many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?2016-03-2300 minData Breach Today PodcastData Breach Today PodcastCIO/CISO - Finding the Critical BalanceIn many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?2016-03-2300 minCIO Talk Network PodcastCIO Talk Network PodcastImproving Cyber Security Awareness and BehaviorWith the rise of data breaches, CIOs and CISOs are quickly learning that internal security breaches as a result of social engineering are occurring more often than they’d like to admit. And while everyone seems to be championing best practices for Cyber Security, awareness is not the same as changing behavior. It’s our human qualities that make us most susceptible to human engineers. If a company were to take the millions they invest in security technology and begin focusing on the people side, how much of a real difference can smarter awareness make? Guest 1: Jeffrey Wrig...2014-10-2956 minCIO Talk Network PodcastCIO Talk Network PodcastCyber Security Readiness: Prevention vs. ResponseConsider this: A high level threat or APT has presented an aggressive and imminent threat on your organization. Depending on the company and the circumstance, you face either severe loss and theft of precious crown jewels, or the disruption and sabotage of your operations from those looking to do harm. You can either prioritize prevention and do all that’s possible to stop the attack, or you can best prepare yourself to respond and make decisions when the attack comes. On this show, we weigh both perspectives and determine which is best for your organization. Guest: David Mc...2014-10-1549 minCIO Talk Network PodcastCIO Talk Network PodcastEstablishing Stronger Standards for Data Breach ProtectionLeft and right, major CISOs have suffered data breaches despite undergoing best practices for security protection. Threats keep surfacing, and there’s no such thing as “perfect security”. Where should organizations rethink security standards and better assess the risks at hand? Understanding those threats starts at putting higher standards in place, but what would a reasonable set of standards entail? Could they be enforced, will they be adopted, and what added cost and impact would meeting these standards put on organizations and their consumers? Guest 1: Alan Levine, Global CISO , Alcoa Inc. Guest Bio: https://www.ciotal...2014-10-0858 minCIO Talk Network PodcastCIO Talk Network PodcastHow to Build an IT Security TeamAs threats from APTs and other attackers continue to rapidly morph, the CISO faces an uphill battle of getting his or her team up to speed on the dangers that face an organization. The traditional model of waiting for a breach and then reacting has changed to be preemptive and preventative, and with that comes a score of new skills and strategies the CISO must develop among his or her team. What challenges are CISOs facing in this regard, and how can they address them? Where can they look for help, talent and added resources? Guest: Adam...2014-08-2757 minCIO Talk NetworkCIO Talk NetworkHow to Build an IT Security TeamGuest : Adam Rice Title : CISO, ATK As threats from APTs and other attackers continue to rapidly morph, the CISO faces an uphill battle of getting his or her team up to speed on the dangers that face an organization. The traditional model of waiting for a breach and then reacting has changed to be preemptive and preventative, and with that comes a score of new skills and strategies the CISO must develop among his or her team. What challenges are CISOs facing in this regard, and how can they address them? Where can they look for help, talent and added...2014-08-2457 minCIO Talk Network PodcastCIO Talk Network PodcastEnabling ‘Big Intelligence’ Against APTsAs the threats of APTs deepen and become increasingly difficult to prevent or detect in a timely fashion, CISOs are rethinking the approach to security, pooling their efforts and information to attain better intelligence on how to respond quickly and appropriately to mitigate damage. What we’re seeing is Big Data transforming into “Big Intelligence” in the security space, with CISOs aiming toward a shared information network by utilizing Big Data and the combined information of those fighting the good fight. So how can we enable such a “Big Intelligence” network, how can CISOs derive actionable intelligence from it, and how wi...2014-04-1656 minCIO Talk Network PodcastCIO Talk Network PodcastManaging Security from The Inside OutThreats to your enterprise have as much chance to come from around the globe as they do across the hall. This much is obvious to the savvy CISO. Your organization may have governance policies in place along with proper education on privacy and security within your organization, but is it possible that investment dollars are not entirely going where they belong? To what extent are organizations overlooking internal security threats? What kind of internal threats are most concerning, be they malicious or unintentional? And where should CISOs be refocusing their efforts? Kevin Novak will be speaking today at the...2013-11-2048 minCIO Talk NetworkCIO Talk NetworkManaging Security from the Inside OutGuest : Kevin Novak Title: CISO & IT Risk Manager, Northern Trust Corporation Threats to your enterprise have as much chance to come from around the globe as they do across the hall. This much is obvious to the savvy CISO. Your organization may have governance policies in place along with proper education on privacy and security within your organization, but is it possible that investment dollars are not entirely going where they belong? To what extent are organizations overlooking internal security threats? What kind of internal threats are most concerning, be they malicious or unintentional? And where should CISOs be refocusing...2013-11-1748 minCIO Talk Network PodcastCIO Talk Network PodcastSteps to Secure BYODBYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal? Guest 1: Michael P. Wilson...2013-10-3156 minCIO Talk Network PodcastCIO Talk Network PodcastCyber Espionage, APTs and EnterprisesIn today’s security landscape, cases of cyber espionage and advanced persistent threats (APTs) have rendered many traditional cyber security practices and vendor software completely ineffective. Big Data has shown potential in providing deeper insights into these sophisticated attacks, but CISOs need to be able to be proactive, they need to understand the threats of APTs and their impact on the enterprise and they need to share that information among peers, the executive suite and the rest of the organization. So how can we allay some fears about the extent of these threats while also building an information pipeline de...2013-10-1655 minCIO Talk Network PodcastCIO Talk Network PodcastSecurity Challenges in Education TodayEducation is an important investment for students and society depends on educational institutions for developing our society’s future leaders and workforce. How safe and secure are the learning environments we are offering students? As schools emphasize and investment in online education, how are the security challenges getting compounded? Guest 1: David Sherry, CISO, Brown University Guest Bio: https://www.ciotalknetwork.com/contributor/david-sherry/ Guest 2: Joshua Beeman, CISO, University of Pennsylvania Guest Bio: https://www.ciotalknetwork.com/contributor/joshua-beeman/ More on this Episode: https://www.ciotalknetwork.com/security-challenges-in-education-today/ Mo...2012-10-1057 minCIO Talk NetworkCIO Talk NetworkSecurity Challenges in Education TodayGuest 1: David Sherry0 Title: CISO, Brown University Guest 2: Joshua Beeman Title: CISO, University of Pennsylvania Education is an important investment for students and society depends on educational institutions for developing our society’s future leaders and workforce. How safe and secure are the learning environments we are offering students? As schools emphasize and investment in online education, how are the security challenges getting compounded?2012-10-0757 minCIO Talk Network PodcastCIO Talk Network PodcastHow Do You Secure Your Extended IT?Today, organizations are outsourcing more and more of their IT applications, systems, and infrastructure, and moving to the cloud. But can their IT leaders depend solely on the vendors’ promises and contract agreements about delivering these services securely? It’s one thing to articulate security concerns but another to live with risks, including job loss, which could arise while someone external has control of these services. How can IT leaders secure these extensions to their IT departments? What has been tried? What has worked or not worked? Guest 1: Dan Blum, VP and Distinguished Analyst, Gartner Gues...2012-03-1457 minCIO Talk NetworkCIO Talk NetworkHow do you secure your extended IT?Guest 1: Robert S. Allen Title: VP and CISO, CNA Guest 2: Dan Blum Title: VP and Distinguished Analyst, Gartner Guest 3: Alan Levine Title: Global CISO, Alcoa Inc. Today, organizations are outsourcing more and more of their IT applications, systems, and infrastructure, and moving to the cloud. But can their IT leaders depend solely on the vendors’ promises and contract agreements about delivering these services securely? It’s one thing to articulate security concerns but another to live with risks, including job loss, which could arise while someone external has control of these services. How can IT leaders secure these extensions to thei...2012-03-1157 minCIO Talk Network PodcastCIO Talk Network PodcastRoadmap to Secure HealthCare DeliveryHealthcare organizations of all types, pharmacies, healthcare vendors, healthcare providers, and health insurance companies are all under pressure to go digital sooner rather than later. At each organization, the IT leader will have to assess the pros and cons of various services and cloud options, each of which comes with its own security concerns. Additionally, these IT leaders will have to implement compliant data security governance. Additionally IT will have to implement security on various mobile devices in various settings (for example, what about a tablet/pad with instructions from a doctor, in an ambulance?). How can we leverage...2011-10-1955 minCIO Talk Network PodcastCIO Talk Network PodcastCloud, Mobility, Social Networking, and Inter/National SecurityAs a world we’re vulnerable to malefactors with a plethora of ways to create havoc and uncertainty in our lives and businesses. On the other hand, as a world, we’ve also elected to be completely plugged in and interconnected. There’s an on-going love affair with instant connectivity to anyone, anywhere, at anytime, using any device. While we may still try to erect walls around ourselves, these walls will also have lots of windows where trouble can creep in. How do we reconcile our mania for connectivity with the desire to live in a safer world? Gues...2010-10-2755 minCIO Talk Network PodcastCIO Talk Network PodcastFrom Information Security to Information Assurance, The Game has changed …Should Players too?What started as computer security, morphed into information security, and is now being called “information assurance.” This includes the managing of all risks related to the use, processing, storage, and transmission of data, the systems and processes involved, and information in digital, analog, and physical forms. So, the game has changed in scope, scale, and complexity. But can a CIO truly delegate all this to his/her CISO and stop worrying? Guest 1: David Stanowick, VP and Chief Information Security Officer, Alliance Data Guest Bio: https://www.ciotalknetwork.com/contributor/david-stanowick/ Guest 2: Rafael C. Diaz...2010-10-0657 minCIO Talk Network PodcastCIO Talk Network PodcastCyber Security: Realistically Handling The Risk of The NewThere are risks inherent in all new technology. Sometimes these risks get blown out of all proportion in comparison to the advantages these new technologies can offer. Rather than letting our worse fears keep us from exploiting these new technologies for the advantages they offer, what steps should IT leaders take to balance their use against their risks, to deliver these new technologies and the value they provide. Guest 1: Lieutenant General Harry D. Raduege Jr. (USAF, Ret), Director, Deloitte & Touche LLP Chairman, The Deloitte Center for Network Innovation Guest Bio: https://www.ciotalknetwork.com/contributor...2009-10-2153 minCIO Talk Network PodcastCIO Talk Network PodcastWhat’s the “state” of State Cyber Security?While each state has its own technology issues, they all face similar internal problems related to cyber security. There is also a need to create a secure collaborative cyber environment among all states. What are the common current gaps each state faces with regards to internal cyber security? Are state administrations giving cyber security the kind of priority and resources needed to properly secure state and national cyber space? In what ways are states handling or not handling cyber security properly? Guest 1: Doug Robinson, Executive Director, NASCIO Guest Bio: https://www.ciotalknetwork.com/contributor/doug-robinson/2009-10-1455 min