
CISO Tradecraft®
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
© Copyright 2025, National Security Corporation. All Rights Reserved
Latest episodes

4 snips
Feb 10, 2025 • 41min
#219 - The Professionalization of CISOs (with Steve Zalewski & Tyson Kopczynski)
This podcast episode discusses the formation of a professional association for CISOs, driven by increasing personal liability risks faced by these executives. The conversation centers on establishing a formal definition and accreditation process for the CISO role, moving beyond existing certifications to demonstrate operational and theoretical expertise. This professionalization effort aims to reduce personal liability through a tailored insurance product, negotiated collectively by the association, and preempt potentially ill-defined government regulations. Ultimately, the goal is to create a structured, respected profession for CISOs, offering benefits such as insurance, professional development, and a unified voice within the industry.
Professional Association of CISOs - https://theciso.org/
Transcripts - https://docs.google.com/document/d/1BNeUzSyPYX-vAYwQl9qCi0GhknYhKnWF/
Chapters
00:00 Introduction to Professionalizing the CISO Role
00:52 The Genesis of a Professional Association
03:39 Challenges and Legal Liabilities for CISOs
04:43 The Value of Joining the Association
06:24 Accreditation and Certification Process
10:38 Insurance and Risk Management for CISOs
18:45 Future Directions and Getting Involved

Feb 3, 2025 • 24min
#218 - How AI Changes Talent Management (with Colleen Lennox)
In this episode of CISO Tradecraft, host G. Mark Hardy and special guest Colleen Lennox dive into the transformative power of AI in HR. Discover how AI can revolutionize identifying, attracting, and retaining cybersecurity talent. They discuss the challenges of finding the right personnel in the cybersecurity field, the innovative AI-driven solutions that can streamline recruitment processes, and how these tools can help in talent management and career progression. Stay tuned as they explore the potential of AI in creating a more effective and bias-free hiring process, while also discussing the future implications for HR and recruiters in the evolving landscape. Big Thanks to our
Sponsors: CruiseCon - Use code CISOTRADECRAFT10 at https://cruisecon.com/ for 10% off registration!
Transcripts: https://docs.google.com/document/d/1f6B9Ye02WHWo7q15avBm0359pxGNqnVu
Chapters
00:00 Introduction: AI and Workforce Concerns
00:28 Welcome to CISO Tradecraft
01:01 Meet Colleen Lennox: AI in HR
01:27 Challenges in Cybersecurity Recruitment
03:11 AI-Powered Recruitment Solutions
07:07 Improving Talent Management with AI
13:36 Addressing Bias in AI Recruitment
17:20 Future of AI in HR and Recruitment
21:04 Conclusion and Contact Information

Jan 27, 2025 • 45min
#217 - Includes No Dirt (with Bill Dougherty)
In this episode of CISO Tradecraft, host G. Mark Hardy sits down with Bill Dougherty, CISO of Omada Health, to discuss a groundbreaking threat model called 'Includes No Dirt'. This comprehensive model integrates security, privacy, and compliance considerations, aiming to streamline and enhance threat modeling processes. The conversation covers the origin and principles of the model, its applicability across different sectors, and the essential aspects of threat modeling. Listeners are also treated to insights on handling third-party risks and adapting to emerging AI challenges. The episode provides practical advice for cybersecurity leaders looking to effectively manage and mitigate risks while reducing redundancy.
Big Thanks to our Sponsors:
ZeroPath - https://zeropath.com/
CruiseCon - Use code CISOTRADECRAFT10 at https://cruisecon.com/ for 10% off registration!
The No DIRT Threat Model can be found here: http://www.includesnodirt.com/nodirt.pdf
Transcripts: https://docs.google.com/document/d/1vWq4Zx7pzM_B65W933m8_TE0fLKaUw3X
Chapters
03:27 The Genesis of Includes No Dirt
05:05 Combining Security, Privacy, and Compliance
07:24 Implementing the No Dirt Model
11:42 Scoring and Evaluating Risks
17:41 Third-Party Risk Management
25:49 Evaluating SaaS Requests Based on Risk
27:55 Adapting Threat Models for AI
31:24 Principles of Minimum Necessary Data
33:42 General Applicability of Security Principles
35:12 Includes No Dirt: A Comprehensive Threat Model
40:15 Final Thoughts and Recommendations

Jan 20, 2025 • 46min
#216 - The TTPs of a Security Champions Program (with Dustin Lehr)
Dustin Lehr, a software engineer and expert in cybersecurity and application security, shares his insights on building security champions in development teams. He discusses the impact of culture change on security practices and the key differences between leadership and management. Learn about effective recruitment strategies for security champions and the importance of defining vision and goals. The conversation also explores the role of gamification to enhance engagement and motivation, providing actionable steps for a robust security champions program.

10 snips
Jan 13, 2025 • 19min
#215 - CISO Predictions for 2025
Cybersecurity is on the brink of transformation as we look toward 2025. Expect AI influencers to become commonplace, reshaping branding and public interactions. A significant collaboration between Google and Apple aims to bolster security standards. The trends will also include consolidation in application security and a shift towards browser-based security solutions. The formalization of the CISO role and the rise of models committees highlight the evolving landscape, all while preparing for the complexities of post-quantum cryptography.

Jan 6, 2025 • 46min
#214 - Deceive to Detect (with Yuriy Gatupov)
🔥 Hackers Beware! Cyber Deception is Changing the Game 🔥
In this must-hear episode of CISO Tradecraft, we expose a mind-blowing cybersecurity strategy that flips the script on attackers. Instead of waiting to be breached, cyber deception technology tricks hackers into revealing themselves—before they can do real damage. 🚨🎭
Imagine laying digital traps—fake credentials, bogus systems, and irresistible bait—that lead cybercriminals straight into a controlled maze where every move they make is tracked.
Early threat detection? ✅
Real-time attacker intel? ✅
Fewer false positives? ✅
🎙️ Featuring deception tech guru Yuriy Gatupov, we break down:
✅ How deception tech works & why it’s a game-changer
✅ How to expose and track hackers in real time
✅ How to prove ROI and make the case for your org Cyber deception isn’t just defense—it’s offense against cyber threats. Are you ready to fight back? Listen now!
Big thanks to our Sponsors
ThreatLocker - https://hubs.ly/Q02_HRGK0
CruiseCon - https://cruisecon.com/
Contact Yuriy Gatupov - info@labyrinth.tech
Yuri's LinkedIn - https://www.linkedin.com/in/yuriy-gatupov-373155281/
Transcripts: https://docs.google.com/document/d/1oyQzCBRoPLbDOCOCypJMGGXxcPI5w75o
Chapters
02:05 History of Cyber Deception
04:57 Advantages of Deception Technology
06:57 Engagement and Detection Strategies
10:18 How Deception Technology Works
16:13 Attack Scenarios and Detection
24:09 Decoys and Deception: A New Paradigm
24:56 Real-World Success Stories
33:30 Deception in OT and SCADA Systems
37:38 Calculating ROI for Deception Technologies

Dec 30, 2024 • 46min
#213 - How to Build a Successful Cybersecurity Startup (with Ross Haleliuk)
In this episode of CISO Tradecraft, host G Mark Hardy interviews Ross Haleliuk, author of 'Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup.' Ross shares valuable insights on starting a cybersecurity company, and emphasizes the importance of understanding market needs, customer engagement, and trust in the industry. They discuss the role of angel investors, the differences between product and service companies, and the challenges founders face. The episode also includes an announcement about CISO Tradecraft's partnership with CruiseCon for an upcoming cybersecurity conference. Additionally, Ross provides a glimpse into his non-traditional background and journey into the cybersecurity space.
Thank you to our sponsors
- ThreatLocker - https://hubs.ly/Q02_HRGK0
- CruiseCon - https://cruisecon.com/
Ross Haleliuk's Book - https://www.amazon.com/Cyber-Builders-Essential-Building-Cybersecurity/dp/173823410X/
Ross Haleliuk's LinkedIn Page - https://www.linkedin.com/in/rosshaleliuk/
Transcripts: https://docs.google.com/document/d/1b8UPolYvYWEYbmO7n_7NqrilObv-HNzo
Chapters
02:28 Ross Haleliuk's Background and Journey
04:32 Discussing the Book: Cyber for Builders
10:52 Insights on Cybersecurity and Business
15:54 Challenges and Realities of Cybersecurity Startups
22:19 Navigating Market Competition
23:15 Entering Established Markets
24:28 Challenges in Security Tool Adoption
25:11 Legacy Vendors and Market Entrenchment
27:35 Building a Company: Beyond the Product
30:02 Validating Market Needs
32:27 Funding Your Startup
35:25 The Role of Angel Investors
43:29 Conclusion and Next Steps

Dec 23, 2024 • 46min
#212 - Repeatable, Attestable, and Defensible AI (with AWS's Former Deputy CISO Merritt Baer)
Merritt Baer, former Deputy CISO at AWS and Harvard Law graduate, offers expert insights on the future of cybersecurity. She discusses the complexities of cloud security and the critical shared responsibility model. AI's dual role as both a tool and a threat is explored, including the risks of AI-generated fraud. Baer emphasizes the importance of sustainable practices in security and predicts key trends for 2025, urging CISOs to adopt robust security measures amid evolving challenges and regulatory scrutiny.

5 snips
Dec 16, 2024 • 28min
#211 - Allowlisting and Ringfencing (with Kieran Human)
Kieran Human, a special project engineer at ThreatLocker with a master's in cybersecurity, shares compelling insights on modern endpoint protection. He explores the evolution from traditional antivirus systems to advanced EDR, revealing the critical role of allowlisting and ring fencing in today's threat landscape. Kieran discusses the limitations of conventional methods against fileless malware and ransomware, emphasizing proactive strategies to safeguard endpoints. Practical tips and real-world experiences highlight how organizations can effectively mitigate cyber risks with ThreatLocker’s innovative solutions.

17 snips
Dec 9, 2024 • 46min
#210 - Salt Typhoon and Vulnerable Telecoms
Join cybersecurity experts Adam Isles and Andreas Kurland from the Chertoff Group as they delve into the pressing 'Salt Typhoon' threat from state actors targeting telecoms. They explore the vulnerabilities within telecommunications infrastructure, emphasizing the importance of encryption and secure communication methods. Learn about the risks of messaging platforms, voice communication security, and best practices for maintaining privacy during virtual meetings. They offer actionable insights to enhance corporate cybersecurity and protect against sophisticated attacks.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.