Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
CISO Stories Podcast (Audio)

CISO Stories Podcast (Audio)

SC Media

Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
bookmark
Share icon

All episodes

Best episodes

Top 10 CISO Stories Podcast (Audio) Episodes

Goodpods has curated a list of the 10 best CISO Stories Podcast (Audio) episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to CISO Stories Podcast (Audio) for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite CISO Stories Podcast (Audio) episode by adding your comments to the episode page.

In the Fall, 2016, Uber experienced a data breach, and the CISO faced the possibility of prison time for felony obstruction and misprison for failure to report the 2016 breach. He was sentenced in May, 2023 to 3 years’ probation. Join the former CISO of Uber as we discuss the events which led to the prosecution case, the results of the trial and aftermath, and the implications for CISOs and what is needed to move the cybersecurity industry forward.

This segment is sponsored by Google Chrome Enterprise. Visit https://securityweekly.com/chrome to learn more about them!

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Show Notes: https://securityweekly.com/csp-141

bookmark
plus icon
share episode

There are a ton of entry-level candidates for security roles, but we need mid- to late- career cyber candidates to fill our open positions. Hiring managers need to partner with non-security people to build and maintain that pipeline. Let's talk about how to go about getting this done.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Visit https://securityweekly.com/csp for all the latest episodes!

Show Notes: https://securityweekly.com/csp-136

bookmark
plus icon
share episode
CISO Stories Podcast (Audio) - Being a CISO in Higher Education - Lorna Koppel - CSP #129
play

07/04/23 • 23 min

At the surface, being a CISO in Higher Education is very similar to any industry vertical but the opportunities, challenges, and impacts are significantly more complex. Many consider HE to be behind in security practices. While it is true that HE doesn't buy a lot of security tools, we are on the leading edge of focusing on mitigating security risks at the level the institution truly needs. Also, our community requires support for accessibility, gender-identity, and general identity access management that is far above what most technologies can handle. All this leads to a CISO needing to be creative, flexible, and thoughtful to best lead their programs.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Show Notes: https://securityweekly.com/csp-129

bookmark
plus icon
share episode
CISO Stories Podcast (Audio) - Being a CISO in Higher Education - Lorna Koppel - CSP #129
play

07/04/23 • 23 min

At the surface, being a CISO in Higher Education is very similar to any industry vertical but the opportunities, challenges, and impacts are significantly more complex. Many consider HE to be behind in security practices. While it is true that HE doesn't buy a lot of security tools, we are on the leading edge of focusing on mitigating security risks at the level the institution truly needs. Also, our community requires support for accessibility, gender-identity, and general identity access management that is far above what most technologies can handle. All this leads to a CISO needing to be creative, flexible, and thoughtful to best lead their programs. Show Notes: https://securityweekly.com/csp-129
bookmark
plus icon
share episode

Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability to be updated, and robustness (often, OT failures can endanger lives). More recently, as cyber warfare evolves, OT is one of two main attack vectors. This session will explore the threats, and ability to manage them, using war stories.

This segment is sponsored by Arctic Wolf. Visit https://www.cisostoriespodcast.com/arcticwolf to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show Notes: https://cisostoriespodcast.com/csp-168

bookmark
plus icon
share episode

Writing a cybersecurity strategy is an essential role of the CISO. How do you avoid the strategy from becoming outdated? Shelfware? Not in line with the business? Join us as Joey articulates his techniques for gaining stakeholder adoption of the strategy.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Show Notes: https://securityweekly.com/csp120

bookmark
plus icon
share episode

Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-political risk, environmental concerns to maintain business resiliency.

This segment is sponsored by VISO TRUST. Visit https://cisostoriespodcast.com/visotrust to learn more about them!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show Notes: https://cisostoriespodcast.com/csp-165

bookmark
plus icon
share episode
CISO Stories Podcast (Audio) - Intelligent Generative AI Handling - Aaron Weismann - CSP #163
play

02/27/24 • 26 min

Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implications, particularly in the healthcare space, are significant where AI-driven care decisions can drift away from optimal care and have the potential to expose significant care gaps.

Visit https://cisostoriespodcast.com for all the latest episodes!

Show Notes: https://cisostoriespodcast.com/csp-163

bookmark
plus icon
share episode

Ensuring organizations have the proper governance, risk and compliance (GRC) practices is essential to ensuring risks are appropriately mitigated. Join us as we discuss the interconnectedness of risk, the process of GRC , and Michael’s thoughts on how to improve the process.

Visit https://securityweekly.com/csp for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/cyberleaders

Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/

Show Notes: https://securityweekly.com/csp117

bookmark
plus icon
share episode

Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do!

Visit https://cisostoriespodcast.com for all the latest episodes!

Show Notes: https://cisostoriespodcast.com/csp-197

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does CISO Stories Podcast (Audio) have?

CISO Stories Podcast (Audio) currently has 200 episodes available.

What topics does CISO Stories Podcast (Audio) cover?

The podcast is about Tech, Leadership, Hacking, Podcasts, Technology, Ceo, Leaders, Cyber, Business, Cfo, Communications and Cybersecurity.

What is the most popular episode on CISO Stories Podcast (Audio)?

The episode title 'CISO and the Board: Demonstrating value and relevant metrics - Max Shier - CSP #178' is the most popular.

What is the average episode length on CISO Stories Podcast (Audio)?

The average episode length on CISO Stories Podcast (Audio) is 28 minutes.

How often are episodes of CISO Stories Podcast (Audio) released?

Episodes of CISO Stories Podcast (Audio) are typically released every 7 days.

When was the first episode of CISO Stories Podcast (Audio)?

The first episode of CISO Stories Podcast (Audio) was released on Feb 9, 2021.

Show more FAQ

Toggle view more icon

Comments