Imagen de portada del espectáculo Security You Should Know

Security You Should Know

Podcast de CISO Series

inglés

Actualidad y política

Oferta limitada

2 meses por 1 €

Después 4,99 € / mesCancela cuando quieras.

  • 20 horas de audiolibros / mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Empezar

Acerca de Security You Should Know

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.

Todos los episodios

48 episodios

Portada del episodio Rethinking Tabletops with Reflex Security

Rethinking Tabletops with Reflex Security

In this episode, Cassio Goldschmidt [https://www.linkedin.com/in/cassiogoldschmidt/], co-founder and CTO at Reflex Security [https://reflexsecurity.io/], explains how Reflex replaces static, script-driven tabletops with adaptive AI-driven simulations that fight back, measure real human behavior under pressure, and surface the gaps that scripted exercises never reach. Joining him are Nick Espinosa [https://www.linkedin.com/in/nickespinosa/], host of the nationally syndicated Deep Dive Radio Show [https://podcasts.apple.com/us/podcast/the-deep-dive-radio-show-and-nicks-nerd-news/id1262505658], and Jay Wilson [https://www.linkedin.com/in/jaywwilson/], CISO and CIO at Insurity [https://insurity.com/]. Want to know: * Why do traditional tabletops train teams to know the plan rather than execute under pressure? * What's the difference between a team that panics and a team that chokes, and why does it matter? * How does Reflex use AI agents to adapt the simulation based on what the team actually does? * Can you run separate tabletops for technical, legal, and executive audiences without multiplying the workload? * Is there a risk that security leaders optimize for the AI's score rather than genuine preparedness? * How does an AI agent joining a video conference change the way a tabletop runs? * How hard should training be relative to the real thing? Check out the episode for the answers you need. Huge thanks to our sponsor, Reflex Security https://reflexsecurity.io/ Most tabletop exercises are static, predictable, and easy to pass. Reflex Security [https://reflexsecurity.io/] built the first tabletop that fights back, throwing teams into dynamic simulations against intelligent AI adversaries that adapt to your every move. With Reflex, your team can move from checkbox exercises to real crisis readiness.

18 de may de 2026 - 17 min
Portada del episodio Securing Mobile Apps with Guardsquare

Securing Mobile Apps with Guardsquare

In this episode, Ryan Lloyd [https://www.linkedin.com/in/michael-olechna/], Chief Product Officer at Guardsquare [https://hubs.la/Q049Mr580], explains how the platform combines code obfuscation, runtime integrity checks, and real-time threat monitoring to secure mobile apps at the binary level, integrated directly into the CI/CD pipeline. Joining him are TC Niedzialkowski [https://www.linkedin.com/in/tc-niedzialkowski/], Head of IT & Security at Opendoor [https://www.opendoor.com/], and Montez Fitzpatrick [https://www.linkedin.com/in/montezfitzpatrick/], CISO at Navvis [https://www.navvishealthcare.com/]. Want to know: * Why does organizational apathy around mobile app security persist even as mobile becomes the primary customer channel? * What's the difference between app integrity and code integrity, and why does it matter for defending against repackaging attacks? * How does obfuscation function as a real security control rather than just security through obscurity? * How does Guardsquare fit into the CI/CD pipeline, and what does the actual build overhead look like for development teams? * What API and webhook capabilities exist for routing threat monitoring data into your existing security stack? * How does Guardsquare's mobile app attestation model bind server-side APIs to verified legitimate app instances — and why does that matter for stopping bots and credential theft? Huge thanks to our sponsor, Guardsquare Guardsquare delivers mobile app security without compromise, providing advanced protections for both Android and iOS apps. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication. Learn more about how to protect your app at Guardsquare.com [https://hubs.la/Q03_0XJK0].

11 de may de 2026 - 16 min
Portada del episodio Verifying Identities with Trusona

Verifying Identities with Trusona

In this episode, Ori Eisen [https://www.linkedin.com/in/orieisen/], founder and CEO at Trusona [https://www.trusona.com/?utm_source=webinar&utm_medium=referral&utm_campaign=iid_awareness&utm_content=ciso_series], makes a case for getting out of the AI detection arms race entirely. He argues that trying to catch AI-generated fakes with AI detection is the antivirus playbook, and we know how that ends. Trusona instead anchors verification to authoritative sources, DMV records and physical-world signals, things AI can mimic on screen but can't actually own. No pre-registered devices required. And it works in both directions: attackers calling your help desk, and attackers calling your employees while pretending to be IT. Joining him are Eduardo Ortiz [https://www.linkedin.com/in/eduortiz/], VP and Global Head of Cybersecurity at Techtronic Industries [https://www.ttigroup.com/], and Mandy Huth [https://www.linkedin.com/in/mandyhuth/], SVP and CISO at Ultra Clean Technology [https://ultracleantech.com/]. Want to know: * Why do MFA and SSO still leave gaps attackers walk right through? * How Trusona verifies identity with no pre-registered devices or tokens? * Why building AI detection on top of AI fakes is a losing strategy? * How is a false rejection rate of zero achievable without locking out real employees? * What deployment actually looks like, and how fast you can be live? * Which departments beyond IT need identity verification, and where do you start? * How to measure the business value of this beyond just counting blocked account takeovers? * Why is a solid help desk protocol still not enough on its own? Huge thanks to our sponsor, Trusona GenAI supercharges identity impersonation and social engineering attacks – rendering legacy identity verification methods obsolete, especially in high-risk workflows like IT Help Desk password/MFA resets, vendor payment changes, remote employee hiring, or customer account access. Trusona [https://www.trusona.com/?utm_source=webinar&utm_medium=referral&utm_campaign=iid_awareness&utm_content=ciso_series] ATO Protect empowers your team to thwart these attacks across business units and channels. GenAI supercharges identity impersonation and social engineering. It's rapidly eroding traditional authentication, especially in high-risk workflows like help desk password or MFA resets, vendor payment changes, remote employee hiring, and customer account access. Trusona's ATO Protect [https://www.trusona.com/?utm_source=webinar&utm_medium=referral&utm_campaign=iid_awareness&utm_content=ciso_series] addresses deepfakes and social engineering directly—without adding friction or relying on legacy MFA.

4 de may de 2026 - 19 min
Portada del episodio Transitioning to Quantum-Safe Encryption with enQase

Transitioning to Quantum-Safe Encryption with enQase

All links and images can be found on CISO Series. [https://cisoseries.com/transitioning-to-quantum-safe-encryption-with-enqase/] In this episode, Raj Patil [https://www.linkedin.com/in/rajeshpatil/], CTO at enQase [https://enqase.com/], explains how enQase's full-stack platform helps enterprises implement quantum-safe security through a structured, integrated approach. This covers everything from cryptographic asset discovery and governance to out-of-band key generation for network appliances, without requiring organizations to rip and replace existing infrastructure. Joining him are Ross Young [https://www.linkedin.com/in/mrrossyoung/], co-host at CISO Tradecraft [https://www.cisotradecraft.com/], and Adam Palmer [https://www.linkedin.com/in/globalciso/], CISO at First Hawaiian Bank [https://www.fhb.com/en/about-us]. Want to know: * Why is the post-quantum cryptography transition harder than simply implementing new standards? * What three factors should frame every CEO conversation about quantum risk? * Where should a highly regulated enterprise start, and what can reasonably wait three to five years? * Why should we be planning for "harvest now, decrypt later" attacks right now? * How do you build and track a cryptographic bill of materials across hundreds of applications and devices? * Why is crypto agility more important than picking the perfect algorithm? Huge thanks to our sponsor, enQase https://enqase.com?utm_source=cisoseries The enQase Platform empowers enterprises, defense organizations, cloud providers, and critical infrastructure operators to seamlessly adopt quantum-safe technologies while achieving crypto agility across their ecosystems. By combining quantum-grade hardware with software-defined control and interoperability, enQase ensures alignment with NIST standards, delivers unmatched flexibility and compliance readiness, and reduces risk across data, network, and compute layers, all while maintaining business continuity and operational resilience in an evolving cryptographic landscape. Learn more at enqase.com. [https://enqase.com?utm_source=cisoseries]

16 de mar de 2026 - 17 min
Portada del episodio Operationalizing Threat Intelligence with Recorded Future

Operationalizing Threat Intelligence with Recorded Future

All links and images can be found on CISO Series. [https://cisoseries.com/operationalizing-threat-intelligence-with-recorded-future/] In this episode, Jamie Zajac [https://www.linkedin.com/in/jamie-zajac-90b487a/], Chief Product Officer at Recorded Future [https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&utm_content=landingpage_home_hero&_gl=1*1vxg5hw*_gcl_au*NDE4MjA0MjkzLjE3NjQ2ODk1NTU], explains how autonomous threat operations can close this gap by automatically deploying intelligence across security controls at machine speed. Joining him are Dan Holden [https://www.linkedin.com/in/desmondholden/], CISO at Commerce [https://www.bigcommerce.com/], and Arvin Bansal [https://www.linkedin.com/in/arvinbansal/], CISO at C&S Wholesale Grocers [https://www.cswg.com/]. Want to know: * Why do organizations still struggle to operationalize threat intelligence despite massive investments? * How does threat intelligence translate into board-level metrics that demonstrate business impact? * What do autonomous threat operations mean and how do they differ from traditional threat intelligence? * How can intelligence drive faster incident response and more efficient SOC operations? * Why third-party risk intelligence matters more than vendor questionnaire scores? * How AI is changing the threat landscape and what defenders should prioritize? * What does the future of threat intelligence look like in two years? * How to use intelligence for policy decisions and budget building, not just tactical blocking? A huge thanks to our sponsor, Recorded Future Recorded Future is the world's largest threat intelligence company, serving 1,900+ organizations across 80 countries. Its Intelligence Graph® contains 200+ billion nodes of threat data, combining AI analytics with autonomous capabilities to transform manual threat intelligence into automated Intelligence Operations across security ecosystems. Recorded Future was acquired by Mastercard (NYSE: MA) in 2024. Learn more at https://pages.recordedfutureext.com/ [https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&utm_content=landingpage_home_hero&_gl=1*1vxg5hw*_gcl_au*NDE4MjA0MjkzLjE3NjQ2ODk1NTU]

9 de feb de 2026 - 21 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Elige tu suscripción

Más populares

Oferta limitada

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

2 meses por 1 €
Después 4,99 € / mes

Empezar

Premium Plus

100 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Disfruta 30 días gratis
Después 9,99 € / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Empezar

2 meses por 1 €. Después 4,99 € / mes. Cancela cuando quieras.