Folgen

  • Keys Without People — John Heasman on Cleaning Up Non-Human Access - John Heasman - CSP #220
    Jan 12 2026

    Title: Keys Without People" — John Heasman on Cleaning Up Non-Human Access

    Summary: John breaks today's non-human identity mess into three buckets: core tools your business runs on, old/one-off integrations that linger, and engineer tokens left behind. His playbook is simple: decide what's truly critical, assign a clear owner, keep access minimal, and review it on a schedule. With AI spawning even more "non-human users," basics done well—prioritize, tighten, rotate, repeat—win the day.

    This segment is sponsored by Saviynt. Visit https://cisostoriespodcast.com/saviynt to learn more about them!

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-220

    Mehr anzeigen Weniger anzeigen
    26 Min.
  • Agents at the Door: Vetting Non-Human Identities in External IAM - Rakesh Soni - CSP #219
    Dec 8 2025

    This episode was about agentic IAM—what it is and the risks that come with letting non-human agents act for customers. We defined external IAM, then traced how the industry moved from basic login and MFA to consent, delegation, and now agent-to-agent interactions. Along the way we unpacked key risks for CISOs and practitioners to consider.

    Segment Resources:

    https://www.loginradius.com/

    https://customeriambook.com/

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-219

    Mehr anzeigen Weniger anzeigen
    29 Min.
  • ATT&CK → ATLAS: A CISO's Blueprint for AI Governance - Sandy Dunn - CSP #218
    Nov 10 2025

    CISO Sandy Dunn breaks down her blueprint for AI-ready defense—pairing MITRE ATT&CK v18 with MITRE ATLAS to move from policy to behavior-based detections. We hit practical AI governance, her early focus on defending and understanding AI, and how OWASP GenAI tools turn checklists into action.

    Segment Resources: Article: https://www.linkedin.com/pulse/attck-v18-atlas-blueprint-ai-ready-defense-sandy-dunn-mafoc
    AI Cheat Sheet: https://www.linkedin.com/feed/update/urn:li:activity:7388688396166238208/ OWASP LLM Governance Checklist: https://genai.owasp.org/resource/llm-applications-cybersecurity-and-governance-checklist-english/
    OWASP Threat Defense COMPASS: https://genai.owasp.org/resource/owasp-genai-security-project-threat-defense-compass-1-0/

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-218

    Mehr anzeigen Weniger anzeigen
    28 Min.
  • Security Awareness Through Trust and Influence - Jennifer Selby Long - CSP #217
    Oct 13 2025

    Jennifer Selby Long reframes security awareness as more than training—it's about earning trust and influence with executives and security teams. She shares leadership lessons on how to build stronger alignment and support for security initiatives.

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-217

    Mehr anzeigen Weniger anzeigen
    36 Min.
  • OT on the Frontlines: Threat Intelligence You Can't Ignore - Dawn Cappelli - CSP #216
    Sep 8 2025

    Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine's infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos' OT-CERT program offers free resources to help organizations defend critical infrastructure now.

    Segment Resources: https://www.dragos.com/community/

    This segment is sponsored by NowSecure. Visit https://cisostoriespodcast.com/nowsecure to learn more about them!

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-216

    Mehr anzeigen Weniger anzeigen
    33 Min.
  • Reimagining Security Operations: SOC as a Service and the Role of AI - Kevin Nikkhoo - CSP #215
    Aug 11 2025

    Kevin Nikkhoo joins the show to explore Security Operations Center as a Service (SOCaaS) and how it compares to traditional SOC models. He breaks down which organizations benefit most from this approach and how AI is reshaping modern SOC operations. Listeners will gain a clear understanding of how SOCaaS can enhance detection and response capabilities—and why embracing AI is key to the future of security operations.

    Segment Resources: https://www.xenexsoc.com/ https://www.xenexsoc.com/blog https://www.xenexsoc.com/ebooks

    This segment is sponsored by Tines. Tines' AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, or tech stack. Learn more at https://cisostoriespodcast.com/tines

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-215

    Mehr anzeigen Weniger anzeigen
    28 Min.
  • From Diagram to Cloud: Rethinking Cloud Security in an Age of Uncertainty - Yogita Parulekar - CSP #214
    Jul 14 2025

    From Diagram to Cloud: Rethinking Cloud Security in an Age of Uncertainty

    Episode Summary: In this month's episode of CISO Stories, we dive deep into cloud security with cybersecurity veteran and cloud innovator Yogi Parulekar, founder of InviGrid. Against a backdrop of rising geopolitical tensions and tightening budgets, we explore how organizations can move from reactive security to proactive resilience. Yogi introduces the concept of "diagram to cloud" as a smarter, more efficient alternative to traditional "shift left" approaches, emphasizing secure-by-design principles powered by automation. We also unpack how governance, agility, and cost efficiency play a critical role in cloud strategy—especially when business survival is on the line.

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-214

    Mehr anzeigen Weniger anzeigen
    35 Min.
  • Empowering Developers: Fostering a Culture of Security in AppSec - Danielle Ruderman - CSP #213
    Jun 9 2025

    In this episode, we explore the crucial role of cultivating a strong security culture to drive change in AppSec, where training and collaboration are key. Our distinguished guest, Danielle Ruderman, discusses the importance of executive support in ensuring that application development isn't just about churning out apps on time, but also about adopting a secure-by-design approach. We also dive into how to empower developers, foster psychological safety, and make security everyone's responsibility. Tune in for actionable insights on transforming your security culture within your applications team and beyond.

    Segment Resources: • AWS Security Blog How the unique culture of security at AWS makes a difference: https://aws.amazon.com/blogs/security/how-the-unique-culture-of-security-at-aws-makes-a-difference/ • AWS Security Blog How AWS built the Security Guardians program, a mechanism to distribute security ownership: https://aws.amazon.com/blogs/security/how-aws-built-the-security-guardians-program-a-mechanism-to-distribute-security-ownership/ • AWS Security Blog How to build a Security Guardians program to distribute security ownership (part 2): https://aws.amazon.com/blogs/security/how-to-build-your-own-security-guardians-program/ • Application Security in the AWS Well Architected Framework: https://aws.amazon.com/blogs/security/how-to-build-your-own-security-guardians-program/ • AWS Security Blog How to approach threat modeling: https://aws.amazon.com/blogs/security/how-to-approach-threat-modeling/ • GitHub: Threat Composer is a simple threat modeling tool to help humans to reduce time-to-value when threat modeling: https://github.com/awslabs/threat-composer • Workshop: Threat Modeling the right way for builders: https://catalog.workshops.aws/threatmodel/en-US

    Visit https://cisostoriespodcast.com for all the latest episodes!

    Show Notes: https://cisostoriespodcast.com/csp-213

    Mehr anzeigen Weniger anzeigen
    31 Min.