CISO Stories Podcast: Hacking Your Way Into Cybersecurity

Kerissa Varma is Group Chief Information Security Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent. Kerissa joins the show to discuss the cybersecurity skills shortage and her initiative … Continue reading CISO Stories Podcast: Hacking Your Way Into Cybersecurity

CISO Stories Podcast: Ransomware Attacks and the True Cost to Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, in… Continue reading CISO Stories Podcast: Ransomware Attacks and the True Cost to Business

CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Speed to market is the mantra of software development today. This does not mean that a process is not followed, it means that an iterative approach to software development produces code changes and usable code much faster.
The post CISO Stories P… Continue reading CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

CISO Roundtable: Ransomware Attacks and the True Cost to Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, inc… Continue reading CISO Roundtable: Ransomware Attacks and the True Cost to Business

CISO Stories Podcast: So You Want to be a Cyber Spy?

Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way – check it out… Continue reading CISO Stories Podcast: So You Want to be a Cyber Spy?

CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

We have limited investment dollars and therefore must ensure we are protecting the right assets. The practical side of determining “what” needs to be protected and “how” is a convoluted maze of academics, taxonomies, frameworks, and inconsistent a… Continue reading CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

CISO Stories Podcast: Is There a Magic Security Control List?

Never in history has the cyber defender had access to so many technologies and tools to defend our companies. This has created a “Fog of More,” making the choices difficult to manage.
This week’s guest is Tony Sager, a 35-year NSA software vulnera… Continue reading CISO Stories Podcast: Is There a Magic Security Control List?