

CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Episodes
Mentioned books

Sep 9, 2025 • 44min
We All Agree That Prevention Is the Best Advice We're Never Going to Follow
In this discussion, Jason Loomis, CISO at Freshworks and expert in IT service management, sheds light on the crucial yet often ignored topic of preventative cybersecurity measures. He emphasizes the cultural buy-in needed for effective security practices within organizations. The conversation also touches on the isolation CISOs face and the importance of peer support in navigating stress. Additionally, they explore the complexities of cybersecurity decisions and the future implications of quantum encryption, all delivered with a good dose of humor.

Sep 2, 2025 • 40min
We're All for a Responsible AI Rollout as Long as It Goes as Fast as Possible
Jennifer Swann, CISO at Bloomberg Industry Group, dives into the shifting landscape of cybersecurity, highlighting the need to prioritize addressing basic misconfigurations over traditional vulnerability tracking. She discusses trust in open source software and its community validation, underscoring the importance of evaluating quality training data in AI. The conversation also touches on the complexities of managing vulnerabilities and the significant impacts of data poisoning in AI, all while balancing the excitement of innovation with necessary security measures.

Aug 26, 2025 • 34min
New Study Finds No Email Has Ever “Found You Well”
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is David Cross, CISO, Atlassian. In this episode: Breaking the Sales Cycle Leadership Under Fire Predicting the Unpredictable Security Startups' Security Paradox A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Aug 19, 2025 • 36min
I Just Can’t Communicate With the Business. I’ve Tried Condescension AND Derision.
Gary Chan, CISO at SSM Health and a master of security mentalism, dives into the intricate world of cybersecurity communication. He discusses the challenges CISOs face when transitioning from tech to business dialogue. Gary emphasizes that storytelling is key to articulating cybersecurity's business impact. He also highlights the importance of influence over authority and shares insights on navigating decision-making with incomplete information. Personal anecdotes reveal how effective communication can trump technical skills in leadership.

Aug 12, 2025 • 40min
Impressive! Our AI is Approaching “One 9” of Accuracy.
Kevin Tian, co-founder and CEO of Doppel, discusses the pressing challenges of AI in cybersecurity and the rise of social engineering threats. He emphasizes the need for a security mindset shift in response to AI fraud and the limitations of traditional defenses. Tian shares insights on how to proactively dismantle deception with innovative solutions, highlighting the critical balance between AI capabilities and human oversight. The conversation navigates the evolving landscape of ad fraud, revealing the importance of adaptive strategies to tackle modern threats.

Aug 5, 2025 • 34min
They Can’t Hack All Our Tools If We Keep Buying New Ones
Rajan Kapoor, CEO of Material Security, dives into the complexities of cybersecurity in a rapidly evolving landscape. He discusses the dual-edged sword of AI, where its adoption presents both opportunities and challenges. The conversation highlights the need for user-friendly security measures to maintain productivity without compromising safety. Kapoor emphasizes the importance of automating security in tools like Google Workspace to counteract vulnerabilities, especially against phishing attacks and business process weaknesses. Resilience and adversarial testing emerge as crucial strategies in securing organizations.

Jul 29, 2025 • 39min
Cosmo Quiz! 23 Ways to Make Your Vendors Obsessed With Your Security Standards
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: Large enterprise security demands drive vendor improvements Technical expertise becomes leadership liability without delegation EDR evolution needs prevention focus Career breaks require personal ownership and strategic timing A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Jul 22, 2025 • 43min
We’ll Worry About Recovering From the Attack Once We Ace This Audit
Peter Clay, CISO at Aireon, delves into the evolving landscape of cybersecurity. He emphasizes that traditional red and blue teaming concepts may be losing relevance amidst modern threats. Peter advocates for a shift in incident response to examine deeper systemic issues rather than just symptoms. He argues that effective risk management requires business context over mere compliance, and stresses the importance of understanding the balance between performance and process in IT auditing. Listen for fresh insights on navigating complexities in cybersecurity.

Jul 15, 2025 • 39min
Once You Memorize the Manual, Our User Interface is Very Intuitive
Edward Wu, CEO and founder of Dropzone AI, shares insights on enhancing security investigations with AI, bypassing the need for playbooks. He discusses the challenges of user experience in cybersecurity tools and why many designs fail. The conversation dives into the importance of context-aware verification frameworks and how teams can move beyond simple AI replacement narratives. Wu also emphasizes the necessity of building robust systems for crisis situations, showcasing how automation can empower human analysts in Security Operations Centers.

Jul 8, 2025 • 36min
Not Enough Hallucinations? Let’s Outfit Your LLM with Another LLM
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Anthony Candeias, CISO, Weight Watchers. In this episode: AI agents require structured supervision, not autonomy Hiring for potential over credentials in cybersecurity AppSec training effectiveness depends on organizational relevance AI oversight requires purpose-built models, not general solutions A huge thanks to our sponsor, Vanta Vanta’s Trust Management Platform helps 10k+ companies—like Atlassian, Quora, and Chili Piper—start and scale their security programs and build trust with buyers. Vanta saves security teams time and improves program visibility by automating 35+ compliance frameworks, such as SOC 2 and ISO 27001, and GRC workflows, like risk management. Get started at Vanta.com/CISO