Security You Should Know delivers concise, interview-style conversations with a vendor executive and security leaders. This cadence offers direct access to CISOs and senior security decision-makers, with sponsor-backed episodes. For PR, it's ideal for tech vendors looking to reach a CISO audience; expect rigorous guest requirements and competitive booking.
34 episodes, Weekly, 4.4 rating
<1k, Male, USA
YouTube: 9.2k subscribers
info@cisoseries.com, feedback@cisoseries.com
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that.
Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on:
How to explain the issue to your CEO
What the solution actually does (and doesn’t do)
How the pricing model works
Then, our security leaders ask the tough questions to see what sets this vendor apart.
Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details.
Security You Should Know: Connecting security solutions with security leaders.
Technology, News, Tech News, Business, Careers, Society & Culture
Typical Credentials:
C-suite security leadership (CISO/CSO) or CEO with strong industry visibility; relevant certifications encouraged
Required Achievements:
Led security programs at major organizations or vendors, Built or scaled security platforms with measurable impact, Driven vendor due diligence, GRC, or IAM programs, Contributed to security thought leadership or industry events
Rob Allen - Misconfigurations; Defense Against Configuration (dac); Automated Security Checks, Joe Essenfeld - Shadow Data From Recorded Meetings; Ai-powered Personalized Meeting Summaries; Data Privacy Controls, Rob Allen - Storage Control; Program-level Access Restrictions; Default-deny For Data Access, Franz Fiorim - Creme; Asset Discovery; External Attack Surface Management; Unified Risk View, Mokhtar Bacha - Granular Privilege Access Management; Least Privilege; AI Agents In Identity
cybersecurity, AI, least privilege, privileged access management, data privacy, shadow data, storage control, misconfigurations, external attack surface, vendor risk management