Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Defense in Depth - Managing Data Leaks Outside Your Perimeter

Managing Data Leaks Outside Your Perimeter

04/18/24 • 29 min

Defense in Depth

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our sponsored guest, Mackenzie Jackson, developer advocate, GitGuardian.

In this episode:

  • How to manage data leaks outside your perimeter?
  • When data leaks increasingly come from third-parties, what can you do to protect your organization?
  • How do we even begin to address this problem?
  • Is there a one size fits all fix?

Thanks to our podcast sponsor, GitGuardian

GitGuardian is a Code Security Platform that caters to the needs of the DevOps generation. It provides a wide range of code security solutions, including Secrets Detection, Infra as Code Security, and Honeytoken, all in one place. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers in all industries. Try now gitguardian.com

plus icon
bookmark

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our sponsored guest, Mackenzie Jackson, developer advocate, GitGuardian.

In this episode:

  • How to manage data leaks outside your perimeter?
  • When data leaks increasingly come from third-parties, what can you do to protect your organization?
  • How do we even begin to address this problem?
  • Is there a one size fits all fix?

Thanks to our podcast sponsor, GitGuardian

GitGuardian is a Code Security Platform that caters to the needs of the DevOps generation. It provides a wide range of code security solutions, including Secrets Detection, Infra as Code Security, and Honeytoken, all in one place. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers in all industries. Try now gitguardian.com

Previous Episode

undefined - What Are the Risks of Being a CISO?

What Are the Risks of Being a CISO?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Phil Davis, attorney, healthcare cybersecurity and privacy, Hall Render.

In this episode:

  • In today's current climate, is the role of the CISO still worth it?
  • Does the position carry a lot of potential liability?
  • Do the upsides still outweigh the risks?
  • Do CISOs tend to have more responsibility than authority?

Thanks to our podcast sponsor, Sonrai Security

A one-click solution that removes excessive permissions and unused services, quarantines unused identities, and restricts specific regions within the cloud. Later, maintain this level of security by automatically enforcing policies as new accounts, roles, permissions, and services are added to your environment.

Start a free trial today! sonrai.co/ciso

Next Episode

undefined - Should CISOs Be More Empathetic Towards Salespeople?

Should CISOs Be More Empathetic Towards Salespeople?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Emily Heath, general partner, Cyberstarts.

In this episode:

  • How do CISOs feel about sales pitches?
  • Do they have legitimate complaints?
  • When do these legitimate complaints cross the line to sounding entitled?
  • Do CISOs need to show a little more empathy to sales?

Thanks to our podcast sponsor, SquareX

SquareX helps organizations detect, mitigate and threat-hunt web attacks happening against their users in real-time, including but not limited to malicious sites, files, scripts, and networks. Find out more at sqrx.com.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/defense-in-depth-132982/managing-data-leaks-outside-your-perimeter-49339826"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to managing data leaks outside your perimeter on goodpods" style="width: 225px" /> </a>

Copy