Security You Should Know Titelbild

Security You Should Know

Security You Should Know

Von: CISO Series
Jetzt kostenlos hören, ohne Abo

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our security leaders ask the tough questions to see what sets this vendor apart. Subscribe now and and stay ahead of the latest security solutions. Visit CISOseries.com for more details. Security You Should Know: Connecting security solutions with security leaders.2018-2025 CISO Series Politik & Regierungen
  • Bridging the Cloud Security Gap with Trend Micro
    Jan 12 2026

    In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integration overhead. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Jason Shockey, CSO at Cenlar FSB.

    Want to know:
    • Why do organizations still struggle with cloud visibility despite years of cloud adoption?
    • How does Trend Micro reconcile security visibility with privacy laws across different jurisdictions?
    • What security frameworks does Trend Micro use to measure and define acceptable risk?
    • How does cyber risk quantification tie technical security metrics to business impact analysis?
    • What questions help determine the financial impact of potential security incidents?
    • How long does implementation take for fully cloud versus hybrid environments?
    • What safeguards prevent overdependence on a single security vendor?
    • Where does Trend Micro draw the line between automated decision-making and human oversight?
    • How does Trend Micro protect AI infrastructure and prevent sensitive data exposure in prompts?
    Huge thanks to our sponsor, Trend Micro

    Cloud risk never sleeps. That's why there's Trend Vision One™ Cloud Security. Gain comprehensive visibility and control over your multi-cloud and hybrid environments. Streamline compliance, manage risks proactively, and enhance operational efficiency with real-time risk assessments, automated vulnerability management, and centralized dashboards. Ensure robust protection and peace of mind for your cloud assets with the trusted leader in CNAPP.
    Mehr anzeigen Weniger anzeigen
    18 Min.
  • Stopping Lateral Movement with Zero Networks
    Jan 5 2026

    All links and images can be found on CISO Series.

    In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaking existing environments. Joining him are Shaun Marion, vp and CSO at Xcel Energy, and Doug Mayer, vp and CSO at WCG.

    Want to know:
    • Why does complexity make lateral movement such a persistent problem despite years of awareness?
    • How can microsegmentation be deployed at scale without becoming a massive science project?
    • How does Zero Networks handle MFA and privileged access management across all asset types?
    • What happens if there's already a threat living in your environment during the learning phase?
    • How to segment OT environments that use different protocols beyond standard IT systems?
    • Can automated learning really create accurate policies without extensive human intervention?
    • How does network segmentation fit into AI capabilities and hybrid cloud strategies?
    • What's the real-world experience of customers who've deployed automated microsegmentation?
    Huge thanks to our sponsor, Zero Networks


    Zero Networks enables organizations to dynamically microsegment 90%+ of their networks in 90 days. The result? A self-defending, resilient network where defenders act with confidence, auditors gain clear assurance, and business operations continue uninterrupted. Step into the Era of the Defender with Zero – get a demo HERE.

    Mehr anzeigen Weniger anzeigen
    17 Min.
  • Verifying Identity with Incode Technologies
    Dec 1 2025

    All links and images can be found on CISO Series.

    Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and existing IAM platforms still trust the human layer far too easily.

    In this episode, Fernanda Sottil, Senior Director of Strategy at Incode Technologies, explains how their solution adds a real-world identity layer that integrates seamlessly with existing IAM systems. Joining her are Nick Espinosa, host of the Deep Dive radio show and Bozidar Spirovski, CISO at Blue Dot.

    Questions answered on the show:

      • How does Incode comply with GDPR when training AI models on employee facial data?
      • What happens when legitimate users get blocked, especially job candidates?
      • How does Incode maintain accuracy across 4,600 document types in 200 countries?
      • Can organizations see error rates and override the system when needed?
      • How quickly can Incode patch new attack vectors as adversarial threats evolve?

      Huge thanks to our sponsor, Incode Technologies

      Incode Workforce helps enterprises stop deepfakes, prevent fraud, and secure every identity moment. By matching an ID to a selfie with AI-powered biometrics, Incode confirms the real person behind each IAM interaction, safeguarding onboarding, access, and recovery with frictionless verification that ensures workforce security and trust at scale.

      Mehr anzeigen Weniger anzeigen
      20 Min.
    Noch keine Rezensionen vorhanden