Security You Should Know

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.

Securing Application Delivery with Island

All links and images can be found on CISO Series. Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermines both protection and performance. In this episode, Braden Rogers, chief customer officer at Island, explains how their enterprise browser platform rethinks application delivery by building security services natively into the browsing experience. Joining him are Nick Ryan, former CISO, and Janet Heins, CISO at ChenMed. Want to know: How do you explain this approach to your CEO in plain English? What's the real architecture difference between enterprise browsers and traditional VDI? How do you deploy a new browser to 20,000 users without change management chaos? What happens to your existing security stack when you add an enterprise browser? Can users access personal apps while keeping corporate data protected? What's the offline experience when cloud services fail? How does this handle the surge of AI tools in your organization? What's the difference between browser enforcement and a full enterprise browser? How do you apply different security controls without overwhelming users? What does vendor support actually look like from pilot to production? Huge thanks to our episode sponsor, Island   What if you no longer had to bolt agents, proxies, and gateways onto browsers? Island, the Enterprise Browser, embeds core security, IT, and productivity into the workspace. Intelligent boundaries keep data where it belongs. Orgs have full visibility into all work. And users enjoy a fast, smooth, and productive experience. Learn more at Island.io

11-17
15:55

Optimizing Access Management with Imprivata

Watch our demo with Imprivata on our site. In this episode, Chip Hughes, chief product officer at Imprivata, explains how the company addresses shared access management challenges with specialized solutions that prioritize both security and user experience. Joining him are Kathleen Mullin, former CISO at MyCareGorithm, and Howard Holton, CEO at GigaOm. Want to know: Why does shared access management remain such a persistent challenge across industries? What does Imprivata's solution actually do versus traditional IAM tools? How does passwordless authentication work in high-security, high-speed environments? What authentication modalities beyond badges are organizations adopting? How can organizations integrate access management across devices, operating systems, and applications? What are the unique access challenges in healthcare, law enforcement, and manufacturing? Can shared mobile devices provide enterprise-grade security while reducing hardware costs? Huge thanks to our sponsor, Imprivata Imprivata delivers solutions that provide simple and secure access management for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata solves complex security, workflow, and compliance challenges with solutions that facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership. Learn more at https://www.imprivata.com/

11-03
18:25

Securing Your Attack Path with SpecterOps

All links and images can be found on CISO Series. Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, and hybrid environments, the challenge isn't just understanding who has access to what. It's about understanding how an attacker could chain together seemingly innocent permissions to escalate from an initially compromised user to full environment control. The problem is compounded by privilege creep, where employees accumulate access over time as roles change and exceptions pile up without systematic review. Traditional security tools excel at protecting identities at rest or governing access for individual users. Still, they often miss the needle in the haystack: the cascading attack paths that adversaries actively exploit. In this episode, Justin Kohler, chief product officer at SpecterOps, explains how Bloodhound Enterprise addresses these challenges by proactively uncovering and eliminating attack paths before adversaries can exploit them, transforming abstract permissions into visual maps that show precisely how attackers could move through your environment. Joining him are Angela Williams, SVP and CISO at UL Solutions, and Brett Conlon, CISO at American Century Investments. Want to know: Why does identity security remain such a persistent challenge for organizations? What attack path management actually does versus traditional identity governance tools? How does Bloodhound Enterprise complement other solutions in your stack? How to visualize and prioritize the attack paths that matter most? What emerging identity-based threats should CISOs prioritize over the next 12 months? How has the definition of "identity" evolved beyond just human users? Can continuous attack path mapping keep pace with dynamic cloud environments? Huge thanks to our sponsor, SpecterOps SpecterOps' 2025 State of Attack Path Management report reveals how technical debt transforms into identity risk and provides actionable strategies for security teams. Drawing insights from the creators of BloodHound, this report outlines proven methods for strengthening identity directory security to prevent costly breaches. Learn more at https://specterops.io/.  

10-27
15:22

Turning Trust into a Growth Engine with SafeBase by Drata

All links and images can be found on CISO Series. Earning and maintaining customer trust has become increasingly complex as organizations struggle with manual, repetitive security review processes that frustrate customers and slow revenue cycles. Despite decades of talking about customer trust in security, companies still rely on outdated approaches like sending spreadsheets back and forth for questionnaires. The challenge isn't just about having strong security programs. It's how do you enable sales teams to move deals forward without constantly pulling security experts into routine questions. In this episode, Al Yang, CEO and Co-founder at SafeBase by Drata, explains how their trust center platform addresses these challenges by creating transparent, always up-to-date security portals that streamline NDAs, access requests, and security questionnaires through AI automation. Joining him are Dan Holden, CISO at Commerce, and Terry O'Daniel, former CISO at Amplitude. Huge thanks to our sponsor, SafeBase by Drata SafeBase by Drata is the leading Trust Center platform that helps companies showcase their security posture, streamline security reviews, and accelerate sales. By combining an enterprise-grade, customer-facing Trust Center with AI-powered Questionnaire Assistance, SafeBase enables organizations to share certifications, policies, and security documentation on demand while automating accurate, context-aware questionnaire responses. This reduces manual effort, shortens review cycles, and delivers the trust signals buyers need to move forward. Companies like Asana, Jamf, and OpenSpace use SafeBase to turn security transparency into a competitive advantage and make trust a growth driver. Learn more at https://safebase.io.

10-20
19:51

Tackling Misconfigurations with ThreatLocker

All links and images can be found on CISO Series. Misconfigurations represent one of cybersecurity's most persistent and damaging vulnerabilities. Organizations often fall into the trap of deploying tools with overly permissive "permit everything" default settings, only to struggle with the operational overhead required to lock them down properly. Every configuration change away from these permissive defaults requires extensive testing and validation, creating what amounts to a prohibitive tax on implementing proper security controls. Is it any surprise that teams leave dangerous temporary configurations in place indefinitely? In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Defense Against Configuration (DAC) solution addresses these challenges through automated daily security checks across Windows endpoints that identify common misconfigurations before they lead to breaches. Joining him are Andy Ellis, principal at Duha, and Montez Fitzpatrick, CISO at Navvis. The conversation explores how DAC's automated checks map misconfigurations against compliance frameworks, while ThreatLocker's broader platform consolidates multiple security functions into a single low-impact agent that can replace multiple endpoint tools. Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com

10-06
16:20

Navigating Your Meeting Shadow Data with FORA

All links and images can be found on CISO Series. Organizations excel at generating massive volumes of unstructured data through recorded meetings. The struggle lies in extracting value from it. The reality is that most of this data is never touch again after its created. The temporal nature of voice communication creates unique challenges. These conversations capture real-time insights and concerns that are highly valuable for immediate decision-making. But traditional data management approaches fail to surface actionable intelligence before it becomes stale. In this episode, Joe Essenfeld, CEO and co-founder at FORA, explains how their platform addresses these challenges by automatically processing recorded meetings to generate personalized, contextual summaries while maintaining strict data privacy controls. Joining him are Howard Holton, CEO at GigaOm, and Derek Fisher, Director of Cyber Defense at Temple University. The conversation explores how FORA's AI-powered personalization engine creates individualized meeting cards based on organizational context and project involvement. The platform implements sophisticated filtering to remove personal banter and protects sensitive information through automated labeling systems that can detect IP discussions, HR-sensitive content, and accidental recordings. Huge thanks to our sponsor, FORA   Recorded meetings are the fastest-growing source of shadow data. FORA gives enterprises unified visibility and control—enforcing retention, access, and compliance across platforms. Security teams eliminate blind spots while employees gain powerful insights. With FORA, you know exactly what recorded data exists, where it's stored, and who can access it.  

09-29
16:46

Exploring Storage Control with ThreatLocker

All links and images can be found on CISO Series. In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Storage Control solution addresses these challenges by implementing program-level access restrictions that work alongside traditional user permissions. Joining him are Jonathan Waldrop, CISO-at-large, and Nick Ryan, former CISO at RSM. The conversation explores how ThreatLocker's endpoint-focused approach applies default-deny principles not just to what programs can run, but to what data they can access. This allows users to work normally while preventing unauthorized programs from reaching sensitive information. This streamlined block-request-approve process can resolve access needs within 60 seconds. Huge thanks to our sponsor, ThreatLocker Human error remains one of the top cybersecurity threats. Just one wrong click can open the door to ransomware or data loss. With ThreatLocker, unauthorized apps, scripts, and devices are blocked before they can ever run. See how ThreatLocker can help you gain more control over your environment.  Threatlocker.com/CISO  

09-22
17:01

Transforming Asset Visibility with Trend Micro

All links and images can be found on CISO Series. Asset visibility remains a persistent challenges in cybersecurity. Despite working on this challenge for decades, CISOs continue to struggle with knowing what assets exist in their environments, where they're located, and what risks they present. The problem has only intensified with dynamic cloud resources spinning up and down in seconds, APIs proliferating across environments, and third-party integrations creating complex dependency chain. Traditional scanning tools simply can't keep pace. In this episode, Franz Fiorim, Field CTO at Trend Micro, explains how their Cyber Risk Exposure Management (CREME) solution addresses these challenges through continuous asset discovery and risk prioritization across the entire attack surface. Joining him are Krista Arndt, Associate CISO at St. Luke's University Health Network, and Brett Conlon, CISO at American Century Investments. They discuss how CREME consolidates external attack surface management, cloud security posture management, and vulnerability remediation into a unified platform that discovers hidden assets through multiple methods including agentless cloud integrations, network discovery sensors, and third-party API connections. Huge thanks to our sponsor, Trend Micro Reduce cost, complexity, and tool sprawl by consolidating critical security and risk disciplines like External Attack Surface Management (EASM), Cloud Security Posture Management (CSPM), Vulnerability Risk Management (VRM), Identity Security Posture, Security Awareness and more into one cyber risk exposure management solution. CREM simplifies security and business operations to enable faster, more strategic risk reduction by replacing fragmented point solutions across these domains.

09-15
16:54

Harnessing AI-Native PAM with Formal

All links and images can be found on CISO Series. Most data breaches don't happen because attackers are geniuses. They happen because organizations give too much access to too many people for far too long. Despite decades of security frameworks and best practices, enforcing least privilege remains one of cybersecurity's most persistent challenges. The culprit isn't technology: it's politics. In this episode, Mokhtar Bacha, CEO of Formal, discusses how their granular privilege access management solution operates at the packet level to enforce least privilege across databases and APIs. Joining him are Howard Holton, COO and industry analyst at GigaOm, and Arvin Bansal, a Fortune 100 veteran CSO. The conversation tackles the truth about why access management fails, explores how AI agents are exploding the identity landscape, and examines whether automated policy enforcement can finally solve the political friction that has plagued privilege management for years. Huge thanks to our sponsor, Formal Formal secures humans, AI agent's access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.  

09-08
19:26

Enhancing Humans in Your SOC with RedCarbon

All links and images can be found on CISO Series. In this episode, Simone Rapizzi, CSO at RedCarbon, explains how their AI-powered platform uses specialized models to automate threat detection and response while learning from each customer's unique environment. Joining him are Jonathan Waldrop, former CISO, and John Scrimsher, CISO at Kontoor Brands. Huge thanks to our sponsor, RedCarbon RedCarbon platform enables AI SOC: automates threat detection, incident analysis, and intelligence monitoring across SOCs. Operating 24/7, our AI Agents reduce analyst fatigue and accelerate response times. Seamlessly integrating with SIEM, EDR, and XDR platforms, RedCarbon enables scalable, cost-effective security, adding infinite AI Agents.

08-25
14:56

Proving Trust with Drata

In this episode, Matt Hillary, CISO at Drata, explains how their AI-native trust management platform addresses these challenges by automating evidence collection from integrated systems and reducing manual effort by over 90%. Joining him are Mike Lockhart, CISO at EagleView, and Johna Till Johnson, CEO at Nemertes. We talk about how Drata's platform bridges the policy-execution gap through hundreds of out-of-the-box integrations, AI-assisted questionnaire responses that handle 90% of vendor due diligence automatically, and real-time control monitoring that enables GRC teams to operate more like security operations centers, responding quickly to control failures rather than simply passing audits. Huge thanks to our sponsor, Drata  AI at Drata is embedded across every layer, transforming GRC from a defensive necessity into a proactive business driver. With new Agentic AI innovations, MCP releases, and a long-term vision for AI-native trust management, Drata empowers security teams to work faster, reduce manual tasks, and deliver meaningful, scalable business impact. Learn more at Drata.com

08-18
19:58

Reducing SIEM Costs with Scanner

SIEM costs are spiraling out of control for organizations. Increasing log volumes, longer compliance-driven retention requirements, and the habit of collecting everything "just in case," the list goes on. Traditional SIEM architecture forces painful choices between cost control and security visibility, with teams constantly fighting to keep log volumes down while still maintaining adequate coverage for investigations. In this episode, Cliff Crosland, co-founder and CEO of Scanner, explains how their data lake approach can reduce SIEM costs by 80-90% while giving organizations full custody of their data in their own cloud storage. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Howard Holton, COO and industry analyst at GigaOm. In this episode: Data retention policies The fundamental challenge of managing growing log volumes over time How AI copilots are bridging the gap between security analysts and software engineers in detection workflows. Huge thanks to our sponsor, Scanner Traditional SIEMs are a tax on your security team—bloated, brittle, and budget-killing. Scanner.dev fixes this. Use it as your SIEM, or to supercharge the one you already have. Our AI co-pilot summarizes alerts, suggests next steps, and reduces noise—making analysts faster and smarter. See it in action at Scanner.dev.

08-11
13:28

Evolving Security Awareness with Adaptive Security

All links and images can be found on CISO Series Security awareness is critical to cultivate in your organization. But security awareness training can often miss the mark. Traditional training is slow and reactive. As deepfakes and LLM-enhanced attacks become common, organizations need training solutions that can adapt and provide relevant training. In this episode, Brian Long, CEO of Adaptive Security, explains how their platform provides engaging training that can be customized in a matter of minutes. Joining him are Janet Heins, CISO at ChenMed, and Gary Chan, CISO at SSM Health. Huge thanks to our sponsor, Adaptive Security AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. Adaptive helps security leaders get ahead with an AI-native platform that simulates realistic genAI attacks, and delivers expert-vetted security awareness training — all in one unified solution. And now, with Adaptive's new AI Content Creator, security teams can instantly transform breaking threat intel or updated policy docs into interactive, multilingual training — no instructional design needed. That means faster compliance, better engagement, and less risk. Trusted by Fortune 500s and backed by Andreessen Horowitz and the OpenAI Startup Fund, Adaptive is helping security teams prepare for the next generation of cyber threats. Learn more at adaptivesecurity.com.

08-04
17:27

Securing the Human Element with Trustmi

All links and images can be found on CISO Series. Wire fraud and payment security remain persistent challenges for organizations, with the FBI reporting a 33% increase in BEC losses between 2023 and 2024. The complexity of B2B payment processes creates multiple attack vectors that traditional email security solutions can't fully address. In this episode, Shai Gabay, co-founder and CEO of Trustmi, explains how their platform connects the dots across the entire payment ecosystem to prevent fraud before money leaves the organization. By integrating with existing payment workflows and leveraging AI to build behavioral baselines, Trustmi aims to eliminate the manual controls and siloed systems that make B2B payments vulnerable to attack. Joining him are Bethany De Lude, CISO Emeritus, and Adam Glick, CISO at PSG Equity. Huge thanks to our sponsor, Trustmi Eliminate socially engineered fraud with Trustmi's Behavioral AI platform. Empower IT and finance teams to detect BEC, vendor impersonation, and payment errors in real time—protecting your business and bottom line. Learn more at trustmi.ai.

07-28
16:28

Navigating Cloud Security with TrustOnCloud

Implmenting new technologies for the business is already a daunting task. Cloud and SaaS have made some of the implementation easier, but it also makes it easier to not fully comprehend the risks you're taking on. All it can take is a company credit card. Organizations struggle with shadow IT, misconfigurations, and unauthorized access across multiple cloud environments, often lacking visibility into their actual cloud assets. In this episode, Tyson Garrett, CTO of TrustOnCloud, explains how their platform provides constantly updated threat models for major cloud services, helping organizations implement controls based on their risk appetite. Joining him are Derek Fisher, Director of the Cyber Defense and Information Assurance Program at Temple University, and Davi Ottenheimer, vp, digital trust and ethics at Inrupt. Huge thanks to our sponsor, TrustOnCloud TrustOnCloud delivers actionable, continuously updated threat models for 220+ AWS, Azure, and GCP services. Empower CISOs and security teams to pinpoint risks, adapt controls, and accelerate secure cloud adoption. Stay ahead of cloud threats with research trusted by global systemic banks, enterprises, and governments. Learn more at TrustOnCloud.com

07-21
15:35

Coordinating Security Tools with Tines

Security orchestration sounds great in theory, but in practice, coordinating between different security tools remains a headache. As workflows need to move faster to keep pace with AI-driven attacks, security professionals find themselves overwhelmed with manual "muck work" rather than focusing on business enablement. In this episode, Matt Muller, field CISO at Tines, explains how their no-code workflow automation platform helps security teams eliminate manual work that bogs them down. Joining him are Bil Harmer, information security advisor at Craft Ventures, and Brett Conlon, CISO at American Century Investments. Huge thanks to our sponsor, Tines   Build, run, and monitor your most important workflows with Tines. Tines' AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, or tech stack. From low code, no code to natural language, anyone can get up and running in minutes – not days or weeks. Learn more at Tines.com.

07-14
14:54

Embracing AI-Native DLP with Orion Security

All links and information can be found on CISO Series. DLP can be a bit of a four-letter word in cybersecurity. False positives are a major problem with any traditional DLP solution because setting the right policy for your organization's needs is always a moving target. In this episode, Nitay Milner, co-founder and CEO of Orion Security, explains how they provide a "zero-policy" approach to DLP that brings in the missing piece of context to the category. Joining him are Steve Knight, former CISO at Hyundai Capital America, and Jack Kufahl, CISO at Michigan Medicine. Huge thanks to our sponsor, Orion Security Orion is the first AI-native DLP that prevents data exfiltration with a zero-policy approach. Powered by Orion's proprietary "Indicators of Leakage" AI engine, they automatically detect data incidents with context-aware accuracy - eliminating false positives and manual work. Orion brings a new approach to DLP - it's like EDR for your data. Already trusted by enterprises in finance, aviation, healthcare, and beyond. Learn more at https://orionsec.io  

07-07
18:35

Quantifying, Prioritizing, and Remediating Risk with Qualys

Managing risk is the name of the game for a CISO. Quantification is a major part of that job, but it doesn't end there. Without a means of communicating that quantification to the rest of the business, quantification just adds to the noise. In this episode, UJ Desai, Senior Director of Product Management, Partner Programs at Qualys explains how they provide a comprehensive solution for the Risk Operations Center, with comprehensive ways to ingest data from your applications, make sense of the data, and give your organization the tools to make the right priorities with it. Joining him are our panelists, Montez Fitzpatrick, CISO at Navvis, and Derek Fisher, Director of the Cyber Defense and Information Assurance Program at Temple University. Huge thanks to our sponsor, Qualys     Cut through cybersecurity noise with Qualys Enterprise TruRisk Management. Quantify risk in financial terms, prioritize critical threats, and streamline remediation. Gain actionable insights for faster risk reduction and communicate business impact clearly to stakeholders. Empower your teams to measure, communicate, and eliminate cyber risk more effectively. Learn more at qualys.com/etm.

06-30
16:06

Maximizing the Value of MDR with ThreatLocker

Security teams today are expected to manage two fronts—building and maintaining proactive defenses, and staying ready to respond at any moment to threats that slip through. But unless someone actively watches those alerts 24/7, your detection tools are expensive noise generators. In this episode, Rob Allen, chief product officer at ThreatLocker, lays out why their Cyber Hero® MDR offering is built not as a standalone security strategy, but as a complement to a deny-by-default, proactively hardened environment. With real-time visibility, flexible communication, one-click remediation, and human-backed support—not just automation—ThreatLocker's MDR offering is positioned to deliver value even when the alerts are quiet. Joining him are TC Niedzialkowski, head of IT and security at Opendoor, and Sasha Pereira, CISO at WASH. Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

06-02
18:04

Stopping AI Oversharing with Knostic

Large language models are most useful to your business when they have access to your data. But these models also overshare by default, providing need-to-know information without sophisticated access controls. But organizations that try to limit the data accessed by an LLM risk undersharing within their organization, not giving the information users need to do their jobs more efficiently. In this episode, Sounil Yu, CTO at Knostic, explains how they address internal knowledge segmentation, offer continuous assessments, and help prevent oversharing while also identifying under-sharing opportunities. Joining him are our panelists, Ross Young, CISO-in-residence at Team8, and David Cross, CISO at Atlassian. Huge thanks to our sponsor, Knostic Knostic protects enterprises from LLM oversharing by applying need-to-know access controls to AI tools like Microsoft 365 Copilot. Get visibility into overshared data, fix risky exposures, and deploy AI confidently—without data leakage. If you're rolling out Copilot or Glean, you need Knostic.  

05-28
17:02

Recommend Channels