all InfoSec news
The Do's and Don'ts of Approaching CISOs
Jan. 11, 2024, 11 a.m. |
Defense in Depth cisoseries.com
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Adam Glick, CISO, PSG.
In this episode:
-
Vendors need to reach out to CISOs, but what does a successful approach look like?
-
Do …
adam check ciso cisos conversation don found images links producer series spark steve week
More from cisoseries.com / Defense in Depth
We Want a Solution to Remediate, Not Just Detect Problems
3 days, 13 hours ago |
cisoseries.com
How Do We Build a Security Program to Thwart Deepfakes?
2 weeks, 3 days ago |
cisoseries.com
Where Are Secure Web Gateways Falling Short?
3 weeks, 3 days ago |
cisoseries.com
Should CISOs Be More Empathetic Towards Salespeople?
1 month, 2 weeks ago |
cisoseries.com
Managing Data Leaks Outside Your Perimeter
1 month, 3 weeks ago |
cisoseries.com
Managing Data Leaks Outside Your Perimeter
1 month, 3 weeks ago |
cisoseries.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Senior Security Researcher - Linux MacOS EDR (Cortex)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Sr. Manager, NetSec GTM Programs
@ Palo Alto Networks | Santa Clara, CA, United States
SOC Analyst I
@ Fortress Security Risk Management | Cleveland, OH, United States