The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners. Prepare to be enlightened, engaged, perhaps challenged, and definitely informed. Hear first hand what the real security issues are, learn what is behind the issues and g…
Congratulations to Zero Networks for their recognition in the 2021 #CISOChoiceAwards. In this interview, leading analyst Richard Stiennon talks with Benny Lakunishok, Co-Founder and CEO of #ZeroNetworks, to discuss their Access Orchestrator which was recognized in the #NetworkSecurity Technology Category. Zero Networks' #AccessOrchestrator uses #microsegmentation to protect all servers and devices within a network with agentless and automated self-service.
Congratulations to Lynx Technology Partners for their win in the 2021 #CISOChoiceAwards for their Governance, Risk and Compliance offering. In this interview, leading analyst, Richard Stiennon talks with Franklin Donahoe, CEO of Lynx Technology Partners, about their #GRC solutions including Lynx 360 Security which enables proactive security through integration, visibility and communication. If you are a #CISO and would like access to more value-added content, request a complimentary membership to #CISOsConnect today: https://CISOsConnect.com
Congratulations to deepwatch for their win in the 2021 CISO Choice Awards for their MSSP offering. In this interview, leading analyst, Richard Stiennon talks with Tim West, Field CTO for deepwatch, about their Managed Detection and Response which is embraced by the CISOs for its differentiated approach to secure their organizations with an “always-on” security team to combat ongoing threats. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to Salt Security for their win in the 2021 CISO Choice Awards in the Application Security category. In this interview, leading analyst Richard Stiennon talks with Roey Eliyahu, CEO of Salt Security, about Salt's API Protection Platform which is lauded by the CISOs for helping to protect organizations and their assets in an increasingly digitized information world. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to the Telos Corporation for their recognition in the 2021 CISO Choice Awards for their Cloud Security Solution. In this interview, leading analyst Richard Stiennon talks with Tom Badders, a Senior Product Manager for the Telos Corporation, about the Telos Ghost solution which is a virtual-based obfuscation network that works to ensure a totally secure online cloud environment. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to Stacklet for their recognition in the 2021 CISO Choice Awards for their Governance, Risk and Compliance Technology. In this interview, leading analyst Richard Stiennon talks with Travis Stanfield, CEO and Co-Founder of Stacklet, about the Stacklet Platform which is founded on the idea of cloud governance as code. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to RackTop Systems for their recognition in the 2021 CISO Choice Awards. In this interview, leading analyst Richard Stiennon talks with Jonathan Halstuch, CTO and Co-Founder of RackTop Systems, to discuss their BrickStor SP solution which was recognized in the Data Security category. BrickStor SP helps to protect data from malicious actors and potential ransomware attacks through integrated UEBA and SOAR technologies. Stay tuned for more interviews from the CISO Choice Awards and for more value-added professional development and technology content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to Black Kite for their win in the 2021 CISO Choice Awards for their Risk Management solution. In this interview, leading analyst Richard Stiennon talks with Paul Paget, CEO of Black Kite, about Black Kite's Cyber Rating System solution, which was lauded by the CISOs for helping organizations protect themselves against continuous threats from third parties. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to Axonius for their recognition in the 2021 CISO Choice Awards in the Partner in Success category. In this interview, leading analyst Richard Stiennon talks with Chris Cochran, Creative Director and Cybersecurity Advocate for Axonius, about their differentiated approach to working with the CISOs to ensure speedy alert triage and incident response. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
Congratulations to Armorblox for their win in the 2021 CISO Choice Visionary Award for their Email Protection solution. In this interview, leading analyst Richard Stiennon talks with Brian Johnson, CSO of Armorblox, about their vision and their differentiated email solutions which helps to protect companies against threat actors trying to infiltrate through phishing and other targeted attacks. Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com
CISO Choice Awards Judge Richard Stiennon talks about the value of the recognition as the CISO judges base their decisions on real-world experience. The CISO Choice Awards 2021 is made possible with the support of YL Ventures, W2 Communications, PLDT and Smart Communications, Inc.
Submit now: https://securitycurrent.com/ciso-choice-awards-2021 Closing date for applications is midnight (US time) on 15 September 2021. The CISO Choice Awards 2021 Board of Judges includes the following CISOs: Cherokee Nation Businesses CISO Nikk Gilbert Delta Dental CISO Fred Kwong, Ph.D. Dollar Tree Stores VP & CISO Kevin McKenzie Florida Crystals VP, IT Strategy & CISO Christine Vanderpool Invitae CISO Dave Ruedger Markel Corporation CISO & Privacy Officer Patricia Titus Nexteer Automotive CISO Arun DeSouza OneMain Financial CISO Tunde Oni-Daniel Group CISO PLDT Group & Smart Communications Angel Redoble Ricoh USA, Inc. CSO David Levine RWJBarnabas Health CISO Hussein Syed William Blair CISO Ralston Simmons, CISM Also, on the Board of Judges is well-known author and analyst Richard Stiennon who wrote the Security Yearbook 2021, which includes a directory of 2,615 companies. The CISO Choice Awards 2021 is made possible with the support of PLDT, Smart Communications, Inc., YL Ventures and W2 Communications.
Watch CISOs Connect's CISOs Top 100 CISOs (C100) 2021 Esteemed CISO Board of Judges congratulate the winners of the first of its kind CISO recognition honoring the top 100 CISOs across the United States. Winners will be announced on July 7th with a formal ceremony. The C100 recognition is made possible with the support of ePLDT, BlackKite, YLVentures, Orca and rThreat.
CISOs Connect's CISOs Top 100 CISOs (C100) 2021 Distinguished CISO Board of Judges talk about the First of Its Kind CISO-selected CISO Recognition honoring the top 100 CISOs across the United States. Call for entries! Nominate your CISO here: https://bit.ly/3f74qDv There is no registration or nomination fee. The application deadline is April 30th, 2021. Recognizing the CISOs with support from ePLDT, Black Kite, YL Ventures, Orca and rThreat.
Global financial services CISO and Security Current's CISO Choice Awards Board of Judges CISO Matt Hollcraft speaks with the winner of the best Security Startup, Cyral founder and CEO Manav Mital. A data cloud security company, Cyral also was selected by the 12 CISO board as the best Data Security Company. The two leading security experts discuss the cloud, where things stand today and where they are heading in 2021. They also talk about Cyral's cloud-native solution and the importance of being able to observe, control and protect cloud data without impacting performance. Watch to learn more.
WATCH: Legal Expert Mark Rasch and Industry Analyst Richard Stiennon discuss suspected Russian hackers' use of SolarWinds to break into US Government Agencies including DHS, the Treasury and Commerce Departments. https://lnkd.in/gjA8KnK #cybersecurity #security #cyber #datasecurity #infosec #dataprotection #cybercrime #cyberattack #legal #solarwinds #russianhackers #DHS #treasury #commerce
The winners of the CISO Choice Awards 2020 are: VISIONARY VENDOR: ORCA SECURITY PREMIER SECURITY VENDOR: PROOFPOINT STARTUP SECURITY COMPANY: CYRAL COVID-19 PIVOT: ATTACKIQ PARTNER IN SUCCESS: SECURITYSCORECARD NETWORK SECURITY: ZERO NETWORKS ENDPOINT SECURITY: MALWAREBYTES DATA SECURITY: CYRAL IDENTITY AND ACCESS MANAGEMENT (IAM): SEMPERIS GOVERNANCE RISK & COMPLIANCE (GRC): AXONIUS FRAUD PREVENTION: ALLURE SECURITY THREAT INTELLIGENCE: ANOMALI EMAIL SECURITY: ABNORMAL SECURITY SECURITY ANALYTICS: HUNTERS IOT SECURITY: PHOSPHORUS CYBERSECURITY APPLICATION SECURITY: STACKHAWK CLOUD SECURITY SOLUTION: SONRAI SECURITY MANAGED SECURITY SERVICE PROVIDER (MSSPS): DEEPWATCH RISK MANAGEMENT: NORMSHIELD SIEM SOLUTION: DEVO VULNERABILITY MANAGEMENT: KENNA SECURITY SECURITY OPERATIONS: HUNTERS SECURITY EDUCATION/TRAINING: CLOUD RANGE CYBER Thanks to our leading Board of Judges and Sponsor YL Ventures! Canadian National Railway CISO Vaughn L. Hazen Dollar Tree Stores CISO Kevin McKenzie Ellie Mae SVP & CISO Selim Aissi Florida Crystals VP, IT Strategy & CISO Christine Vanderpool Hellman & Friedman CISO Matt Hollcraft LMC, a Lennar Corp VP, Information Security Margarita Rivera, Markel Corporation CISO & Privacy Officer Patricia Titus NFL CISO Tomas Maldonado OneMain Financial CISO Tunde Oni-Daniel Premise Health CISO Joey Johnson RWJBarnabas Health CISO Hussein Syed William Blair CISO Ralston Simmons, and IT-Harvest Analyst Richard Stiennon
Richard Stiennon, leading author and analyst, speaks with Mark Rasch, well-known attorney, on the charges against Joe Sullivan, former Uber CSO. With more than 30 years of experience in cybersecurity and data privacy – including within the U.S. Department of Justice, where he created the DOJ Computer Crime Unit and Cyber-Forensics practice, Mark discusses the implications and what it could mean for CSOs and CISOs.
To submit visit https://securitycurrent.com/ciso-choice-awards
Tomás Maldonado, CISO of the National Football League (NFL), speaks with Ian Keller, CSO of SBV Bank, which operates across Africa and is the only company in South Africa to partner with the South African Reserve Bank to collect banknotes and coins. The two leading security executives talk about their everyday experiences and the commonalities in terms of what they face from business and technical perspectives. They also discuss the convergence of physical and information security. In particular, Ian discusses attacks on their over 700 armored vehicles and how it impacts not only physical security but information security. He also touches on the decline in use of cash and how that impacts the business. Security Current’s host Tomás also discusses today’s technology trends in security with Ian and how there has been a shift to focus on the endpoint which with a remote workforce is outside of a CISOs direct control.
Special thanks for making this video on TPRM to CISOs Mike Davis, Bob Turner, Marcos Marrero, Joey Johnson, David Levine, Al Ghous and Marc Crudgington, MBA, and to our corporate sponsor NormShield CyberSecurity for their continued support of the CISO community. #TPRM #ThirdPartyRiskManagement #CISO #ResearchReport #RiskManagement #thirdpartyrisk #KnowledgeSharing #PeerToPeer #RFI #BuyersGuide #Security #SecurityProfessionals
Dan Bowden, VP and CISO Sentara Healthcare, speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York, about the not-for-profit health system’s journey post COVID-19. The two leaders talk about how each industry - and within healthcare itself - have encountered different issues when ramping up. They discuss security, cloud capabilities, training and more. They also touch on personnel and the importance of taking care of employees while acknowledging the commitment and impressive work Sentara’s team, which serves Virginia and North Carolina, has performed. Listen to learn about the successes and some of the unique challenges Dan has encountered and how he has met them. *Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System
Having conducted a major influenza pandemic exercise in Q4 of last year assuming all employees were sent home, Ellie Mae SVP & CISO Selim Aissi was able to quickly and effectively respond to COVID-19. In this podcast, Selim speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. Selim talks about technology and the importance of endpoint security as the perimeter becomes unknown. He also discusses attack trends he is seeing since COVID-19 hit, noting an increase in phishing using COVID as bait. And he talks about the importance of ensuring the well-being of employees and the need to communicate regularly. Listen now to hear Selim’s invaluable insights. *Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System
Host and moderator Joey Johnson, CISO of Premise Health, will be joined by leading healthcare CISOs Hussein Syed of RWJBarnabas Health and Anahi Santiago of ChristianaCare as they discuss the unique challenges they face as they support frontline and remote medical workers as well as the myriad of other personnel and people. As you’ll hear from Joey in this preview, he will talk about how they are facilitating and securing a diverse workforce as well as patients, what they have learned and where they see things heading. Sponsored by Forescout --- for every registrant, Forescout will donate 10 meals to Feed America.
Jake Margolis, CISO Metropolitan Water District of Southern California – the largest distributor of treated drinking water in the United States, has leveraged tried and true foundational technologies in response to COVID-19 while moving forward with their tech procurement plans. In this conversation with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York, the two leaders discuss the impact the pandemic has had on organizations from a technology, security and personnel perspective. They talk about how today’s changes with the shift to working remotely may impact hiring and the way a business operates in the future. Listen to learn some of the innovative and creative ways Jake has met the challenge facing all CISOs. *Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System
Fannie Mae CISO Christopher Porter speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. The two industry leaders discuss today’s challenging times and the importance of people. They talk about staying connected with and taking care of staff. Chris provides additional insights into his new normal and where he sees things heading. *Any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System.
Global CSO of TikTok Roland Cloutier speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). A seasoned executive, Roland provides guidance on being successful when starting a new role. The two industry leaders also discuss the new normal and what things may look like on the other side. They talk business resiliency and CISO TikToks.
Dr. Pablo Molina, AVP and CISO at Drexel University speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System). Dr. Molina discusses how the university transitioned faculty, staff and students among others to a work remotely and distance learning and the challenges the leading university has encountered. Additionally, he addresses Zoom bombing incidents, increased phishing attempts with bad actors trying to leverage COVID-19 and the need for the university to maintain an open network from a research and academic freedom point of view.
Host and moderator David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York* talks about what to expect when his CISO peers Frank Aiello of Maximus, David Levine of RICOH USA, Colin Anderson of Levi Strauss and Tessian CEO Tim Sadler join him to discuss the people and processes in place due to the pandemic and what to expect moving forward. * The opinions David expresses are his own and do not represent the Federal Reserve Bank of NY or the Federal Reserve System
CISO Colin Anderson of Levi Strauss speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). Colin discusses how Levi Strauss is putting people first and using the current crisis to move the business forward. The two seasoned security professionals also discuss challenges that have arisen due to COVID-19.
What impact has the COVID-19 pandemic had on the security of organizations that have now by and large had to quickly migrate to a remote workforce? David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don’t represent the Federal Reserve Bank of NY or the Federal Reserve System) speaks with David Levine, VP and CISO of RICOH USA, Inc. The experts discuss how the move impacts RICOH and what it has meant in terms of security. Prepare to be enlightened, engaged, and definitely informed on the new normal.
The business of information security is tough: the bad guys only need to get it right once, while the good guys have to get it right all the time. One hundred percent protection of all endpoints is not possible, and eventually, there will be an infection. The question is, how do you react as quickly as you can to detect the most important infections before they wreak havoc in your system? In this Bitdefender-sponsored podcast, IBM Cloud and SaaS Operations Global CISO David Cass talks to Harish Agastya, VP of Enterprise Solutions at Bitdefender, about the challenges in Endpoint Detection and Response (EDR). They explore how EDR is one of many layers of protection and how it works best when it relies on the intelligence of prior layers. Harish emphasizes how the reduction of noise generated by these often-disparate solutions is crucial and how such solutions need to be available to all players in the market – not just to big organizations with deep pockets.
Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers across on-premise and hybrid cloud environments, it is difficult to have visibility into the security policy change process. This complexity, combined with the increasing rate of change, leads to vulnerability in the network. In addition, business owners need to have applications provisioned quickly but have little consideration as to the security implications of their requests. In this Tufin sponsored podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discusses with Sagi Bar-Zvi, Tufin’s Solution Architect for the Americas, the benefits to CISOs of automating security policy orchestration. The two talk about how it delivers agility while verifying change requests – sometimes hundreds per day – will not cause a security breach once made.
Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. Mastercard’s products and solutions make everyday commerce activities – such as shopping, traveling, running a business and managing finances – easier, more efficient and secure for everyone. As Mastercard’s Executive Vice President and CISO, Ron Green is responsible for upholding that mission. In this podcast, Green, a security visionary responsible for both cyber and physical security, speaks with David Cass, Global Partner, Cloud Security and FSS CISO at IBM, about what Mastercard is doing to ensure the promise of security not only today but in the future. Green talks about new technologies and processes, what keeps him up at night, and he provides recommendations to his peers.
The endpoint is becoming the new edge of the business. As the doorway to your data, with more and more breaches getting in via the endpoint, it is turning into one of the weakest links for today’s business. It is critical that businesses can detect new, and real threats at the endpoint, and respond to those threats in near real-time. However, with masses of data being generated and processed, being able to scale and respond effectively is getting harder. As you’ll hear in this SentinelOne sponsored podcast with CEO & Co-founder Tomer Weingarten and Maxim Integrated Chief Cyber Risk Officer Matt Hollcraft, automation and machine learning are key components in being successful in protecting against today’s malware.
CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior. According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by identifying and thwarting attacks earlier. Feris Rifai, CEO of Bay Dynamics, a provider of analytics and UBA solutions, says CISOs are realizing that to effectively protect their organization they need to add a UBA component to their security arsenal. In this sponsored podcast, Rifai and David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discuss what UBA offers and how it is helping organizations across industries.
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns. In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a cloud access security broker. The two experts discuss how cloud is taking off and that despite security being a key concern of CISOs, with the right protections and solutions in place, cloud can be highly secure. In this Bitglass sponsored podcast, the two touch on critical control areas and what CISOs should take into account when adopting and maintaining a cloud strategy.
Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information technology, compliance, audit and vendor risk management. Johnson was just named the winner of the prestigious Information Security Executive® of the Year Award in the Southeast. In this podcast, Johnson speaks with David Cass, IBM Cloud & SaaS Global CISO, about Premise Health’s unique business model and how he uses proactive security and risk management to meet challenging security, compliance and audit demands.
The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part series in Security Current that explores the human element of incident response and how CISOs can identify and resolve trauma in the organization. They also discuss the Board’s role in incident response and why being quick to fire after a breach may not always be the most effective approach. Read the series: Read Part OneRead Part TwoRead Part ThreeRead Part Four
The CISO increasingly has a seat in the boardroom, as the role is becoming more of the rule than the exception in enterprises. During RSA Conference 2017, Marci McCarthy, President & CEO of T.E.N., sat down with David Cass, Global CISO IBM Cloud & SaaS, to discuss the continuing evolution of the information security industry and specifically the role of the executive. McCarthy founded the prestigious ISE® Awards Program, which has helped elevate the role of security executives, who are recognized by their peers for their contributions and specific security projects. In this podcast, McCarthy provides insights into the profession and talks about the shortage of security personnel, the startup ecosystem and where the industry is headed.
The city of San Diego is a $4 billion business and it doesn’t shut down. As you’ll hear in this discussion between Gary Hayslip, the city’s CISO, and David Cass, Global CISO IBM Cloud and SaaS, San Diego is a smart city which is continuously rolling out new technologies to facilitate 'the business' while bolstering its security. In this podcast, recorded during the RSA Conference, Hayslip talks about joining the city as its first CISO some three years ago and how he established a five-year-plan which leveraged established frameworks like the National Institute of Standards and Technology (NIST) to increase the security of the city and its 24 networks and 40 departments. The two also discuss ‘cloud first’ initiatives, resilient networks and the role of the CISO, which Hayslip provides practical guidance on with his book “A CISO Desk Reference Guide: A Practical Guide for CISOs.”
There has been an exponential adoption of Internet of Things (IoT) with experts predicting billions of IoT devices coming into use. And with the strategy more often than not being go to market and secure it later, enterprises are increasingly exposed to a variety of attacks. As you’ll hear in this podcast with David Cass, Global CISO IBM Cloud and SaaS, and Len Rosenberg, ForeScout’s Commercial CTO and VP of Systems Engineering, the IoT is here to stay and security needs to be by design and not an afterthought. They also discuss what CISOs can do today to mitigate their exposure and what they should demand from IoT manufacturers.
With RSA around the corner and more security vendors than you can count, if you are a new CISO at the conference what should your game plan be? As you’ll hear in this podcast, the sheer number of interesting technologies at RSA can potentially overwhelm new CISOs. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professionals (GTP) Security and Risk Management Strategies team and a speaker at the RSA conference leading sessions on threat intelligence, discuss how RSA is a great place to talk to the vendors and their top product executives and see solutions up close. They also stress that people and process gaps and not a “particular box” are what needs to be addressed first. Chuvakin first addresses today’s malware, box fatigue, and critical challenges and ways to think about threat vectors in 2017.
Tokenization is helping render data theft obsolete. Jason Witty, US Bancorp EVP and CISO, is in the midst of completing a multi-year tokenization integration project, for which his team won the recent ISE North America Project of the Year Award in the Financial Services category. He discussed the many benefits of tokenization with David Cass, Global CISO IBM Cloud & SaaS, including fraud prevention and the reduction of risk and the attack surface. They discuss how it is a complex process, which is “simple” to implement but difficult to adopt. Witty also touches on the many unintended business benefits.
What specific things should companies look at when it comes to security monitoring in 2017? As you’ll hear in this podcast, a lot of the security problems facing organizations from the late 1990s and early 2000s have yet to be solved. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professionals (GTP) Security and Risk Management Strategies team, discuss how security executives are still operationally challenged. Chuvakin discusses how the technology landscape is changing but a lot of the challenges with the people themselves actually haven’t changed and the “old problems” haven’t been solved. In this podcast, he talks to Cass about the essential things organizations should be looking at, including newer technology like User Behavior Analytics (UBA) as well as Data Loss Prevention (DLP) solutions.
As you’ll hear in part two of the conversation between David Cass, Global CISO IBM Cloud and SaaS, and Chris Roberts, Acalvio Chief Security Architect, threat detection technology is allowing enterprises to identify intruders quickly. In this sponsored podcast you’ll hear how this burgeoning field of cybersecurity is helping enterprises protect their perimeters and internal infrastructure while shortening the time to discovery.
Ensuring continuous compliance while reducing complexity is essential to bolstering security for many organizations, in particular, those that process credit card data. In this Tufin-sponsored podcast, IBM’s David Cass talks with Monext’s Laurent Klefstad, Leader for Systems, Network and Telecom, about automated security policy orchestration and how it allows the French company to save time and money by reducing the complexity of its networks and firewalls. Klefstad explains how Monext’s implementation of the Tufin solution provided Monext continuous compliance and the ability to reduce its firewall rules, of which there were about 3,000, by upwards of 20 percent. He also talks ROI, staffing implications and business enablement.
It’s becoming an old adage: it isn’t a matter of if an attacker will infiltrate your network but when.” With that being the case and with research showing that attackers often reside on an enterprise’s network for many months doing reconnaissance and exfiltrating data before being identified, what are and can enterprises do? The use of autonomous threat deception technologies to identify an intruder once inside the network is being adopted by enterprises seeking preventive and proactive to technologies. As you’ll hear in this conversation with David Cass, Global CISO IBM Cloud and SaaS CISO, and Chris Roberts, Acalvio Chief Security Architect there has been a significant evolution in threat detection technology to allow enterprises to identify intruders quickly. In this sponsored podcast you’ll hear how a new dynamic and smart approach to traditional honeypots is helping enterprises by allowing them to immediately detect lateral movement, shortening the time to discovery.
In this interview Matt Hollcraft, Maxim Integrated CISO, discusses common threat vectors – what is old and what is new – with Dan Schiappa, SVP & GM, Sophos Enduser Security Group. They talk about ransomware, the mobile workforce, Internet of things and hacking as a business. In this sponsored podcast, you’ll also hear about approaches that enterprises can take to reduce threats, which are increasingly sophisticated and continuous.
In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink CSO, talks about the evolution of the CISO role. A seasoned security executive, with experience reporting to boards-of-directors, Mahon also provides guidance on how to present to a board. He also gives recommendations to current and aspiring CISOs on how to advance their careers.
The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack. In this podcast sponsored by Exabeam, IBM’s David Cass talks with ADP’s V.Jay LaRosa about how UBA provides always on threat hunting to detect and thwart cyber attacks. LaRosa discusses ADP’s selection and implementation of the UBA solution and how his team uses it to quickly and effectively identify potential anomalous behavior. He also talks ROI, staffing and why he wishes he had started sooner.