Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:57
30:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:57
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:06
25:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:06
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:03
41:03
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
41:03
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:00
26:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:00
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:56
26:56
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:56
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Visit …
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
1
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
30:46
30:46
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:46
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
…
continue reading
1
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
31:24
31:24
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:24
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
…
continue reading
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
…
continue reading
1
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
29:10
29:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:10
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Visit https://cisosto…
…
continue reading
1
CISO and the Board: Demonstrating value and relevant metrics - Max Shier - CSP #178
30:34
30:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:34
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Visit https://cisostori…
…
continue reading
1
Point Vs. Platform: Improving TCO Cost/Benefit - Patrick Benoit - CSP #177
28:38
28:38
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:38
CISOs must prioritize the intelligent selection of cybersecurity products by considering the total cost of ownership (TCO) and whether point products or platforms are best suited. This includes the costs of deployment and operations for people, processes, and technology, as well as the ongoing maintenance and support of a product. By considering th…
…
continue reading
1
Data Governance is Critical to Info Security and Privacy - Michael Redmond - CSP #176
28:44
28:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:44
Data Governance is a key component in protecting the data from different points of view including information security confidentiality, integrity, and availability. There are several standards that have control requirements for Data Governance relating to PCI, HIPAA, and PII, data security and more. Two of the Internal Standards having Data Governa…
…
continue reading
1
The Riddle of Data Governance - Steven Fox - CSP #175
30:17
30:17
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:17
Data is the fuel of modern organizations. Data governance ensures the quality of that fuel, as well as ensure its optimal utilization. It ensures that people use and access data appropriately. This value is timely in the face of artificial intelligence offerings whose utility relies on quality data. This segment is sponsored by Spirion. Visit https…
…
continue reading
1
That Data Sprawl is Here! What Should We Do About it? - Nick Ritter - CSP #174
29:50
29:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:50
As technology has enabled high speed access and massive amounts of inexpensive storage, data is being created at a logarithmic hockey-stick pace. Not all this data is important for the organization, however the organization must understand what data is important to run the business. Join us as we discuss this dilemma, with an eye to protecting esse…
…
continue reading
1
Why CISO’s Fail: Some Practical Lessons for the Future - Barak Engel - CSP #173
25:33
25:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:33
Security is both overcooked and underdeveloped at the same time, and we keep doubling down on insanity. Our own community is at great fault for pushing fear and ignoring service, leading to consistent, negative experiences for all other stakeholders in the organization - and ultimately the CISOs themselves. "Do more cyber" never had, does not, and …
…
continue reading
1
Air Gapped! The Myth of Securing OT - Thomas Johnson - CSP #172
28:50
28:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:50
The terminology of ICS has morphed into OT (Operational Technology) security; however many organizations are lacking in addressing the OT security controls. As some companies talk about air gapping as the primary method of securing OT, the reality is many times true air gapping does not exist. Join us as we discuss why these gaps occur and what nee…
…
continue reading
1
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
28:05
28:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:05
For manufacturing companies, technology has taken over a good deal of the day-to-day operations occurring on the manufacturing floor. Things like robotics, CNC machines and automated inventory management. There are even systems that track what tools are used, by whom and for how long. This technology often works outside of or flies under the radar …
…
continue reading
1
The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170
30:00
30:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:00
Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, PLCs etc. to manage production processes. Compromises of these networks and systems can have devastating consequences, including: • Production disruptions and downtime • Safety hazards: • Data breaches and intell…
…
continue reading
1
Tips for a Successful Cyber Resilience Program - Olusegun Opeyemi-Ajayi - CSP #169
31:15
31:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:15
The cybersecurity threat landscape is constantly evolving, and experience has shown that everyone and every organization is prone to being breached. How do you prepare for what seems inevitable? You assume breach and plan accordingly. Cyber resilience has become a top priority as organizations figure out how to build a network that can either conti…
…
continue reading
1
Operational Technology (OT) and the Art of War - Glenn Kapetansky - CSP #168
32:30
32:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:30
Operational Technology (OT) security is concerned with protecting embedded, purpose-built technologies enabling our industrial processes. You also may have heard “adjacent” buzzwords like Internet of Things (IOT) and Fog (like “cloud” but close to the ground). OT security has significant challenges in terms of cost/size/weight, capability, ability …
…
continue reading
1
Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167
23:00
23:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:00
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
…
continue reading
1
52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166
30:13
30:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:13
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
…
continue reading
1
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
30:49
30:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:49
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
…
continue reading
1
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
24:14
24:14
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
24:14
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
…
continue reading
1
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
26:01
26:01
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:01
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
…
continue reading
1
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
32:58
32:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:58
Responsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald, T. 2019. Chapter 4: Emerging Technologies and Trends in…
…
continue reading
1
The Business Side of AI - Edward Contreras - CSP #161
23:58
23:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:58
Artificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversation? The goal is to engage in an action driven conver…
…
continue reading
1
Generative AI and Corporate Security – Getting it Right - Bill Franks - CSP #160
32:22
32:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:22
Generative AI has hit the world by storm, but unfortunately is widely misunderstood. While it brings great promise for companies, it also has risks. As employees and corporate applications begin making use of generative AI, it is important to ensure that proper safety and security mechanisms are put in place to allow value to be obtained while mini…
…
continue reading
1
Better CISO Health in the New Year: From Burnout to Balance - Steve Shelton - CSP #159
29:05
29:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:05
Heidrick and Struggles released a global CISO survey last year, stating 53% of CISOs were most concerned about significant stress and 60% were concerned about burnout. In Steve’s 20 years of software sales, significant stress and burnout have been longstanding issues that have yet to be effectively addressed and have negatively impacted his own lif…
…
continue reading
1
Cloud Security Staffing in a Hybrid World – It Can Be Done! - Larry Lidz - CSP #158
30:41
30:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:41
Over the course of two years, and during the pandemic, we established a new security team and grew that team from five cloud security people to over eighty. What was our talent strategy to enable that rapid growth, how did we find the right talent in a tight market, and what did we learn from the approach? Additionally, what rituals and tactics ser…
…
continue reading
1
You want the CISO Title & Pay? Responsibility Comes Also! - Malcolm Harkins - CSP #157
35:11
35:11
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:11
Integrity & Materiality. Get them wrong, you jeopardize your organization, its shareholders, possibly customers, as well as yourself. Join us as we discuss CISO role and accountability, Geopolitics, SEC Regulation and materiality, AI Impact, and seismic changes occurring in the past 5 Years as articulated in the 5 year CyberRisk Alliance Blog dated…
…
continue reading
1
Reimagining Risk in the Emerging Cloud: A GRC Perspective - Solomon Ugah - CSP #156
28:07
28:07
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:07
More and more services and products are being cloud-delivered. This leads to a concentration of risk in the hands of a few industry players and a few jurisdictions. It means risk needs to be addressed and thought about differently. Join us as we discuss managing cloud risk from a Governance, Risk and Compliance (GRC) perspective. Fitzgerald, T. 201…
…
continue reading
1
Why Don’t We Care About Identity Security? - Don Baham - CSP #155
27:21
27:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:21
Identity & Access Management - Why do organizations still insist that provisioning/deprovisioning is an IT function? Effective IAM requires collaboration across the business units and responsibilities for multiple departments. Join us as we discuss IAM and some of the challenges organizations are facing today to secure the perimeter – the identity …
…
continue reading
1
High Consequences Cyber: Make or Break the CISO’s Reputation - Andy Jaquith - CSP #154
29:30
29:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:30
“High Consequences Cyber” are high-risk, high-stakes cyber projects that can make or break a company or make or break the CISO’s reputation. These include issues such as, how do you architect your networks if you are a multinational with exposure to high-risk countries? What are key choices you can make when moving critical workloads such as email …
…
continue reading
1
Four Pieces of Transitional Advice: Incoming CISOs - Sean Zadig - CSP #153
32:28
32:28
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:28
There’s been a boom of sudden CISOs for regulatory and practical reasons — forcing technical security leaders to transition. And the transition isn't easy. Join us, as Sean shares the lessons he has learned as he moved into the CISO role from technologist. As CISO Stories also focuses on Identity Management this month, we also discuss architecting …
…
continue reading
1
Is there really an Information Security Jobs Crisis? - Ben Rothke - CSP #152
27:15
27:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:15
Are there really millions of open information security jobs available? Or is much of the numbers hyped up? Join us as we discuss these numbers , boot camps, regional differences, and where these job openings come from. Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow…
…
continue reading
1
Prioritizing Identity and Getting the Fundamentals Right - Bezawit Sumner - CSP #151
29:25
29:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:25
Prioritizing identity and getting the fundamentals right. We are managing more identities than ever – people-people, machine-to-machine, and people-machines. What actions should CISOs be ensuring are being done within the environment to prioritize identities? Join us as we discuss where Bezwit has focused to enhance the identity management process.…
…
continue reading
1
Do You Really Want to Be a CISO? - Spencer Mott - CSP #150
27:21
27:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:21
Reaching the level of CISO in a large corporation requires time and determined application as well as aptitude and very specific professional and personal attributes. It's the role against which many security professionals set their career sights without really knowing what they'll be getting themselves into. Fitzgerald, T. 2019. Chapter 14. CISO S…
…
continue reading
1
All in One CISO: There Is Nothing We Can't Do - Jessica Hoffman - CSP #149
29:22
29:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:22
As a CISO, the opportunities we must positively cultivate the cybersecurity landscape for our organizations are endless. From driving projects to implementing innovative technologies to strengthening basic cybersecurity hygiene, reshaping the organization's culture, protecting from ransomware, and diversifying the cyber workforce, the CISO is a cer…
…
continue reading