- CISO Series Newsletter
- Posts
- Join us tomorrow for “Hacking Automated Response”
Join us tomorrow for “Hacking Automated Response”
Join us tomorrow for “Hacking Automated Response”
Join us TOMORROW, Friday [03-04-22], for "Hacking Automated Response"
Our discussion will be
"Hacking Automated Response: An hour of critical thinking about more than just endpoint response capabilities."
It all begins at 10 AM PT/1 PM ET on Friday, March 4, 2022 with guests Wesley Mullins, CTO, deepwatch, and Steve Zalewski, co-host, Defense in Depth. We'll have fun conversation and games, plus at the end of the hour (11 AM PT/2 PM ET) we'll do our meetup.
Thanks to our video chat sponsor, deepwatch
We're Movin' On Up. We're Changing Things!
We've changed the name of
CISO Series Video Chat
to
Super Cyber Friday
! When we first started out, we didn't put too much thought into the original name. But now we've been running the show for a while and we've discovered just how much fun it is, we wanted the vibe to show up in the name.
So, join us tomorrow and every Friday and make it a Super Cyber Friday!
Defense in Depth
Offensive Security
On this week's Defense in Depth, Steve Zalewski and I welcome guest Eric Hussey, CISO, Aptiv. Here are a few of the highlights of our discussion:
Has the definition of offensive security changed?
Can we truly fight back without legal repercussions?
How does it apply when hackers hide behind proxies?
Is hacking back even worth it?
.
Thanks to our podcast sponsor, Varonis
Overheard on Defense in Depth
“[The cloud] is somebody else's computer. But it's somebody else whose whole business value prop is operating that computer, securing that computer, managing it at scale.” - Geoff Belknap, CISO, LinkedIn
Listen to full episode of "
"
Cyber Security Headlines - Week in Review
We're live tomorrow and every Friday at 12:30 PM PT/3:30 PM ET for a short 20-minute discussion of the week's cyber news. Here are a few of the stories we'll be discussing on the show:
Updates on cyber events in the Ukraine-Russia war
Nvidia's hack and hack-back
Half of employees use unauthorized file services at work
You can participate live in the conversation by registering on
.
or subscribe to the daily newsletter.
Thanks to this week's headlines sponsor, Torq
Highlights from CISO Series Video Chat "Hacking Sprawl"
Here are five of the best moments from "Hacking Sprawl" with Ed Bellis, CTO and co-founder, Kenna Security (now part of Cisco), and Collin Boyce, CISO, City of Tucson.
you can watch the video, read the best bad ideas, and best quotes from the chat room.
Thanks to our video chat sponsor, Kenna Security
Overheard on CISO Series Podcast
“We talk a lot about zero trust and specifically zero trust about data. So many organizations don't focus on that data layer of security. They've done network security, they've done endpoint or server hardening, but they've done nothing to limit the amount of data that's accessible to an individual user.” -Matt Radolec, Senior Director, Varonis
Listen to full episode of "
."