We're in beta. Stay tuned for updates.x
Loading...
PODCAST

CISO Perspectives (public)

This season on CISO Perspectives, host Kim Jones explores some of the challenges of leading through uncertainty. We explore the complexity of the changing nature of regulation and working with the federal government, the evolution of privacy and fraud, and how emerging technologies like AI and quantum computing are changing cyber. When you don’t know what questions to ask, you’re afraid to ask, or don’t know who to ask, CISO Perspectives provides the foundation for learning in this brave new

All Episodes

27:18
Kill chain models.
en
24:24
Vulnerability Management: An essential tactic for...
en
49:09
Cyber sand table series: 2014 OPM hack.
en
23:07
Pt 2 – Supply chains around the Hash Table.
en
20:56
Pt 1 – Supply chains.
en
36:42
Pt 2 – Students of the game: What are the Hash...
en
39:03
Pt 1 – Students of the game: What are your go-to...
en
24:23
Pt 2 – Mitre ATT&CK: from the Rick the Toolman Series.
en
30:41
Pt 2 – XDR: from the Rick the Toolman Series.
en
19:51
Pt 1 – XDR: from the Rick the Toolman Series.
en
27:53
Pt 1 – Introducing Rick the Toolman Series: Mitre...
en
31:25
Introducing the cyberspace sand table series: The DNC...
en
30:05
Security compliance around the Hash Table.
en
18:09
Security compliance and cybersecurity first principles.
en
32:49
Adversary playbooks around the Hash Table.
en
23:28
Adversary playbooks and cybersecurity first principles.
en
21:59
Orchestrating the security stack around the Hash Table.
en
21:04
Orchestrating the security stack and cybersecurity...
en
24:22
Enterprise backups around the Hash Table.
en
18:21
Enterprise backups and cybersecurity first principles.
en
134 results

Similar Podcasts