How to Market “Zero Trust” Without Making CISOs Cringe

How to Market “Zero Trust” Without Making CISOs Cringe

CISO Series
  • On this week's episode of CISO Series Podcast we discuss marketing “Zero Trust” without making CISOs cringe.

  • Cyber Security Headlines you need to know include: Access to hacked corporate networks strong, Startup to release consumer available text-to-image engine, and China publishes algorithms used by services.

  • And join us next week [08-26-22] for Super Cyber Friday "Hacking the Brilliant Jerk."

CISO Series Podcast

How to Market “Zero Trust” Without Making CISOs Cringe

How to Market “Zero Trust” Without Making CISOs Cringe

Mike Johnson and I welcome guest David Cross, SVP/CISO, Oracle SaaS Cloud to discuss:

  • Should certifications be a requirement on your job listings? 

  • Are the SIEMs failing or do the users not know how to configure them? Or is it both?

  • Why do security professionals treat the term "zero trust" so negatively? How should vendors approach zero trust and how should the C-suite understand it?

Thanks to our podcast sponsor, Protegrity

Protegrity

What I love about cybersecurity...

"It's always dynamic. It's always changing, it's something you can always learn, and it's always ongoing. And so one of the things that really comes out of all of that though, it's a way that you can actually help other people and protect them. So, when you think about jobs, how can you possibly turn that down?" --David Cross, SVP/CISO, Oracle SaaS Cloud

Listen to full episode of

Want to jump to a great segment?

We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.

Check out:

on

CISO Series Podcast

on

Defense in Depth

Overheard on Defense in Depth 

"You have to start by establishing security is not fancy IT. It’s not some off shoot of IT. It’s a very unique multidisciplinary technical domain of its own. Your success of the security program that you’re building and the department that you’re building depends on understanding how the organization works, helping the organization understand what security is that is unique and apart from IT." -- Geoff Belknap, CISO, LinkedIn

Listen to full episode of

Cyber Security Headlines 

Top headlines for Tuesday, August 16, 2022:

  • Access to hacked corporate networks strong

  • Startup to release consumer available text-to-image engine

  • China publishes algorithms used by services

to this episode.

or subscribe to the daily newsletter.

Join the LIVE "Week In Review" for

Cyber Security Headlines

this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering

.

or subscribe to the daily newsletter.

Thanks to our Cyber Security Headlines sponsor, 6clicks

6clicks

Super Cyber Fridays!

Join us NEXT WEEK Friday [08-26-22] for "Hacking the Brilliant Jerk"

Hacking the Brilliant Jerk

Join us next week when our discussion for 

Super Cyber Friday

 will be 

"Hacking the Brilliant Jerk: An hour of critical thinking on how to deal with talented but difficult employees."

It all begins at 1 PM ET/10 AM PT on Friday, August 26, 2022 with guests Hadas Cassorla, CISO, M1, and Mike Johnson, co-host, CISO Series Podcast. We'll have fun conversation and games, plus at the end of the hour (2 PM ET/11 AM PT) we'll do our meetup.