- CISO Series Newsletter
- Posts
- How to Market “Zero Trust” Without Making CISOs Cringe
How to Market “Zero Trust” Without Making CISOs Cringe
How to Market “Zero Trust” Without Making CISOs Cringe
On this week's episode of CISO Series Podcast we discuss marketing “Zero Trust” without making CISOs cringe.
Cyber Security Headlines you need to know include: Access to hacked corporate networks strong, Startup to release consumer available text-to-image engine, and China publishes algorithms used by services.
And join us next week [08-26-22] for Super Cyber Friday "Hacking the Brilliant Jerk."
CISO Series Podcast
How to Market “Zero Trust” Without Making CISOs Cringe
Mike Johnson and I welcome guest David Cross, SVP/CISO, Oracle SaaS Cloud to discuss:
Should certifications be a requirement on your job listings?
Are the SIEMs failing or do the users not know how to configure them? Or is it both?
Why do security professionals treat the term "zero trust" so negatively? How should vendors approach zero trust and how should the C-suite understand it?
Thanks to our podcast sponsor, Protegrity
What I love about cybersecurity...
"It's always dynamic. It's always changing, it's something you can always learn, and it's always ongoing. And so one of the things that really comes out of all of that though, it's a way that you can actually help other people and protect them. So, when you think about jobs, how can you possibly turn that down?" --David Cross, SVP/CISO, Oracle SaaS Cloud
Listen to full episode of
Want to jump to a great segment?
We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.
Check out:
on
CISO Series Podcast
on
Defense in Depth
Overheard on Defense in Depth
"You have to start by establishing security is not fancy IT. It’s not some off shoot of IT. It’s a very unique multidisciplinary technical domain of its own. Your success of the security program that you’re building and the department that you’re building depends on understanding how the organization works, helping the organization understand what security is that is unique and apart from IT." -- Geoff Belknap, CISO, LinkedIn
Listen to full episode of
Cyber Security Headlines
Top headlines for Tuesday, August 16, 2022:
Access to hacked corporate networks strong
Startup to release consumer available text-to-image engine
China publishes algorithms used by services
to this episode.
or subscribe to the daily newsletter.
Join the LIVE "Week In Review" for
Cyber Security Headlines
this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering
.
or subscribe to the daily newsletter.
Thanks to our Cyber Security Headlines sponsor, 6clicks
Super Cyber Fridays!
Join us NEXT WEEK Friday [08-26-22] for "Hacking the Brilliant Jerk"
Join us next week when our discussion for
Super Cyber Friday
will be
"Hacking the Brilliant Jerk: An hour of critical thinking on how to deal with talented but difficult employees."
It all begins at 1 PM ET/10 AM PT on Friday, August 26, 2022 with guests Hadas Cassorla, CISO, M1, and Mike Johnson, co-host, CISO Series Podcast. We'll have fun conversation and games, plus at the end of the hour (2 PM ET/11 AM PT) we'll do our meetup.