Security You Should Know

Rich Stroffolino
info@cisoseries.com

Booking Overview

Security You Should Know delivers concise, interview-style conversations with a vendor executive and security leaders. This cadence offers direct access to CISOs and senior security decision-makers, with sponsor-backed episodes. For PR, it's ideal for tech vendors looking to reach a CISO audience; expect rigorous guest requirements and competitive booking.

Metrics

34 episodes, Weekly, 4.4 rating
<1k, Male, USA
YouTube: 9.2k subscribers

Contact Information

info@cisoseries.com, feedback@cisoseries.com

Description

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.

Production Team

Host

Rich Stroffolino

Categories

Technology, News, Tech News, Business, Careers, Society & Culture

Booking Intelligence

Booking Requirements

high difficulty
Typical Credentials:  
C-suite security leadership (CISO/CSO) or CEO with strong industry visibility; relevant certifications encouraged
Required Achievements:  
Led security programs at major organizations or vendors, Built or scaled security platforms with measurable impact, Driven vendor due diligence, GRC, or IAM programs, Contributed to security thought leadership or industry events

Recent Guest Discussions

Rob Allen - Misconfigurations; Defense Against Configuration (dac); Automated Security Checks, Joe Essenfeld - Shadow Data From Recorded Meetings; Ai-powered Personalized Meeting Summaries; Data Privacy Controls, Rob Allen - Storage Control; Program-level Access Restrictions; Default-deny For Data Access, Franz Fiorim - Creme; Asset Discovery; External Attack Surface Management; Unified Risk View, Mokhtar Bacha - Granular Privilege Access Management; Least Privilege; AI Agents In Identity

Recent Topics

cybersecurity, AI, least privilege, privileged access management, data privacy, shadow data, storage control, misconfigurations, external attack surface, vendor risk management
Get your clients booked on top podcasts

Try us risk free with a FREE 3 days trial.

Start Your Free Trial

Join hundreds of PR teams using Podseeker to pitch and land bookings