DiscoverCapture the CISO
Capture the CISO
Claim Ownership

Capture the CISO

Author: CISO Series

Subscribed: 5Played: 56
Share

Description

Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables: 

Is it innovative?
Does it solve a real need?
How easy is it to deploy?
9 Episodes
Reverse
Welcome to episode three of Capture the CISO Season 2! Our judges are Christina Shannon, CIO, KIK Consumer Products and  Dan Walsh, CISO, VillageMD. Our contestants: Attila Szász, CEO & Founder, BugProve Steve Malone, VP of Product Management, Egress Ben Kliger, CEO, Zenity Huge thanks to all our contestants who are also sponsors of Capture the CISO BugProve BugProve offers a vulnerability management platform for embedded devices.  Its unique feature of identifying zero-day vulnerabilities sets it apart from other solutions, ensuring proactive protection against emerging threats. By providing comprehensive software bills of materials and identifying vulnerabilities in open-source components, it offers a holistic view of device security, and its monitoring function empowers organizations to act fast. These features help companies get compliant with upcoming regulations such as CRA, RED, and Cyber Trust Mark. Its high-speed scans deliver results within minutes, accelerating the testing process significantly. Moreover, with no setup fee or commitment, BugProve ensures rapid return on investment realization. Egress Egress is the only cloud email security platform to use an adaptive security architecture to continuously assess human risk and automate personalized security for each user across the enterprise. Egress Intelligent Email Security integrates seamlessly into Microsoft 365 to deliver AI-powered behavioral-based threat detection that eliminates advanced phishing attacks, human error, and data exfiltration. Combining contextual machine learning and AI, we use zero-trust and pre-generative modeling to provide the highest efficacy of phishing detection to prevent attacks that get through native controls and secure email gateways. For outbound detection, we leverage social graph and pre-trained deep neural networks to detect anomalous behavior and stop accidental data loss and intentional data exfiltration. Our products also deliver behavioral-based micro-training through real-time teachable moments, tangibly reducing risk. Zenity Zenity is a security and governance company that enables businesses to securely unleash business application and AI development throughout the enterprise. Zenity’s agentless platform is built from the ground up with a security-first approach. With SOC 2 Type 2 and GDPR compliance, Zenity is uniquely positioned to help our customers implement strong application security practices throughout AI, low-code, and no-code development.
Welcome to episode one of Capture the CISO Season 2! Our host is Richard Stroffolino and our judges are Arvin Bansal, CISO, C&S Wholesale Grocers and  Brett Conlon, CISO, American Century Investments. Our contestants: David Ratner, CEO, HYAS Russell Spitler, CEO & Co-founder, Nudge Security Patrick Harr, CEO, SlashNext Huge thanks to all our contestants who are also sponsors of Capture the CISO HYAS HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns.  We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable. HYAS’ award-winning threat intelligence and investigation platform and protective DNS solution detects and blocks the beaconing requests of malicious and anomalous command-and-control communication and stops attackers from progressing. Nudge Security Nudge Security helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users. SlashNext SlashNext’s Cloud Email Security leverages our advanced AI platform, purpose built to stop sophisticated BEC and advanced phishing threats. The service delivers industry leading 99.9% detection rate and 1 in 1 million FPs by utilizing Gen AI, natural language parallel prediction, computer vision, relationship graphs, and contextual analysis for: Broad threat coverage due to large and diverse LLMs  Highest accuracy and a 48-hour detection advantage to stop sophisticated zero-hour threats  Increased SecOps and user productivity from using a solution with the highest detections and the lowest FP 360° protection with threat protection across all messaging channels: in email,  mobile and web Request a demo https://slashnext.com/request-a-demo/.
To watch the demo videos, and see the transcript, check out the blog post of this episode on CISOseries.com. Welcome to Season 2 Episode 1 of Capture the CISO, hosted by Richard Stroffolino. Our contestants: Omer Singer, vp, strategy, Anvilogic Satish Veerapuneni, CEO & co-founder, Lumeus Sivan Tehila, CEO, Onyxia   Huge thanks to all our contestants who are also sponsors of Capture the CISO Anvilogic Lumeus Onyxia
Be sure to join us on April 17, 2024 for the return of the Capture the CISO podcast. This unique show is a competition, with three different vendors each sitting in the hot seat while CISO judges see how they stack up against each other. Each vendor is judged on innovation, market need, and ease of deployment. It's the only show that gives you an inside ear on the conversations CISOs and vendors have behind closed doors. We know you're going to love it. You can watch all the vendor demos here to be on the same page as the CISOs at the start of every episode. Be sure you're subscribed on Apple Podcasts, Spotify, and RSS to get the new season on April 17th.
Finals - Season 1

Finals - Season 1

2022-06-2234:27

A fantastic first season of Capture the CISO finishes with a fantastic finale. The show went live last Friday, June 17th, 2022, and you can watch it right here, or please listen to the finished edited audio here. The entire season of Capture the CISO including this finale was hosted by Johna Till Johnson, CEO, Nemertes. Our judges for the final episode were: Yaron Levi, CISO, Dolby Laboratories John Overbaugh, CISO, Alpine Software Group The four contestants in the final episode will be: Ivan Tsarynny, CEO, Feroot Vladimir (Vladi) Sandler, CEO, Lightspin Leonid Belkind, co-founder and CTO, Torq Aviv Grafi, founder and CTO, Votiro Check out the contestants, our shows, links to subscribe to the podcast, and all the vendors demo videos on the Capture the CISO show page. We welcome active discussion and debate about all vendor contestants.  And a huge thanks to our finals contestants who are also sponsors of Capture the CISO. Feroot Lightspin Torq Votiro
To watch the demo videos, and see the transcript, check out the blog post of this episode on CISOseries.com. Welcome to episode three of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes. Our judges are Dan Walsh, CISO, Village MD and Hadas Cassorla, CISO, M1. Our contestants: Ivan Tsarynny, CEO, Feroot David Leone, Sr. Customer Success Manager, Perception Point Zack Ganot, CEO, Sunday Security Huge thanks to all our contestants who are also sponsors of Capture the CISO Feroot Perception Point Sunday Security
Welcome to episode two of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes. Our judges are Edward Contreras, CISO, Frost Bank and Mark Eggleston, CISO, CSC. Our contestants: Vladimir (Vladi) Sandler, CEO, Lightspin Nick Popovich, hacker in residence, PlexTrac Leonid Belkind, co-founder and CTO, Torq Huge thanks to all our contestants who are also sponsors of Capture the CISO. Lightspin Lightspin’s next-gen cloud security platform built on Neo4j graph database prioritizes risk in cloud and Kubernetes environments focusing DevSecOps efforts on the critical issues that matter most. Our developer friendly platform provides plug and play remediation in the form of IaC, and scans pre-production code to catch misconfigurations, which are the main cause of breaches. Lighstpin proudly focuses on small and medium-sized businesses running workloads in the cloud, offering a free version of the platform including the industry’s only graph-based Attack Path risk prioritization. For an affordable, efficient, and secure cloud experience loved by engineers learn more at www.lightspin.io. PlexTrac A better security posture begins and ends with PlexTrac, the Proactive Cybersecurity Management Platform that streamlines your entire security workflow. Maximize ROI by aggregating findings from all your sources, generating robust analytics, cutting reporting time in half, and assigning and tracking remediation — all in one platform. Facilitate collaboration and communication across offensive engagements, monitor team performance, and analyze your security posture in real-time. PlexTrac makes cybersecurity teams more efficient, effective, and proactive to help them win the right security battles. Generate better reports. Promote closer collaboration. Enable faster remediation. Gain more insights. PlexTrac is the must-have platform for security teams. Torq Torq is a no-code automation platform for security teams. It helps people of any skill level automate workflows to streamline and reinforce security processes, using a drag-and-drop editor and guided configurations. Workflows can be built with templates from our ever-growing library, helping users automate even the most complex processes with ease. The platform readily integrates with any other system out of the box—no special connectors, just limitless integrations. With Torq, teams maximize protection while minimizing complexity, creating a more dynamic and enduring security posture.
Welcome to episode one of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes. Please go to the blog post for this episode to check out the demo videos of all the contestants. Our judges are Shawn Bowen, CISO, World Fuel Services and Mike Johnson, co-host, CISO Series Podcast and CISO for Fastly. Our contestants: Christopher Gomes, head of product, Conveyor Jake Flynn, sales engineer, Pentera Aviv Grafi, founder and CTO, Votiro Huge thanks to all our contestants who are also sponsors of Capture the CISO Conveyor Conveyor makes security reviews fast, easy, and accurate for both vendors and their customers. How? By making it easy for 3rd party risk teams to get basic info on vendors, request access to their security docs (like SOC 2s and PenTests), and get their security questions answered without actually issuing a questionnaire. Check out our video to see how Conveyor can save you 71% of your time on your vendor security reviews.   Pentera Pentera’s Automated Security Validation Platform is designed to help teams increase their security posture against modern day threats across the entire attack surface. Evaluate your security readiness with continuous and consistent autonomous testing with granular visibility into every execution along the way. Validate your tools are working effectively by safely emulating attacks & prioritize your remediation efforts with true contextual driven results. With Mitre ATT&CK framework mapping, stay on top and test your environment against adversary techniques to create an optimized process from testing to in-production. Don’t just operate, validate! Votiro Can you trust the files and content entering your organization? Votiro Cloud's Zero Trust open API proactively disarms files of known, unknown, & zero-day malware threats at scale without adding friction, interrupting user or application workflows, or impacting file fidelity. Votiro reduces work, alerts, & risk for IT and security teams while enabling the seamless flow of safe files. Votiro is tool-agnostic, and provides virtually limitless auto-scale capabilities to handle any file throughput and the greatest span of file formats, preventing malicious files uploaded to web apps, portals, data management platforms, and cloud services.
Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?
Comments 
loading
Download from Google Play
Download from App Store