Security You Should Know delivers concise, interview-style conversations with a vendor executive and security leaders. This cadence offers direct access to CISOs and senior security decision-makers, with sponsor-backed episodes. For PR, it's ideal for tech vendors looking to reach a CISO audience; expect rigorous guest requirements and competitive booking.
34 episodes, Weekly, 4.4 rating
<1k, Male, USA
YouTube: 9.2k subscribers
info@cisoseries.com, feedback@cisoseries.com
Technology, News, Tech News, Business, Careers, Society & Culture
Typical Credentials:
C-suite security leadership (CISO/CSO) or CEO with strong industry visibility; relevant certifications encouraged
Required Achievements:
Led security programs at major organizations or vendors, Built or scaled security platforms with measurable impact, Driven vendor due diligence, GRC, or IAM programs, Contributed to security thought leadership or industry events
Rob Allen - Misconfigurations; Defense Against Configuration (dac); Automated Security Checks, Joe Essenfeld - Shadow Data From Recorded Meetings; Ai-powered Personalized Meeting Summaries; Data Privacy Controls, Rob Allen - Storage Control; Program-level Access Restrictions; Default-deny For Data Access, Franz Fiorim - Creme; Asset Discovery; External Attack Surface Management; Unified Risk View, Mokhtar Bacha - Granular Privilege Access Management; Least Privilege; AI Agents In Identity
cybersecurity, AI, least privilege, privileged access management, data privacy, shadow data, storage control, misconfigurations, external attack surface, vendor risk management