The talk show series where we discuss current trends in the world of information
security with CISOs on the front line.

CISO Talks video thumb - image 176

Is the Elimination of Alert Fatigue Really Possible?

Want to Be a Guest on CISO Talks?

CISO Talks video thumb - image 175

Why Do Enterprises Need A Cloud Governance Solution?

CISO Talks video thumb - image 174

How The CISO Role is Changing Ft. Gary Hayslip

CISO Talks video thumb - image 173

Implementing Zero Trust in Stages - Streamlining the Process

CISO Talks video thumb - image 172

Building An Effective Zero Trust Program

CISO Talks video thumb - image 171

Thinking About Zero Trust as a Program and Not Individual Projects

CISO Talks video thumb - image 170

The Biggest Risk Factors For CISOs Today

CISO Talks video thumb - image 169

The Benefits of Getting Both Convenience & Cybersecurity Right

CISO Talks video thumb - image 168

What is Wrong With the Way People Access Online Accounts Today?

CISO Talks video thumb - image 167

User Journeys Explained and How to Implement This Strategy

CISO Talks video thumb - image 166

Identifying and Mitigating Application Level Threats in Cybersecurity

CISO Talks video thumb - image 165

Why is There a Huge Gap in the Market for Application Security?

CISO Talks video thumb - image 164

How Will Cybersecurity of the Near Future Differ in Approach

CISO Talks video thumb - image 163

The Same Problems STILL Exist in Cybersecurity - What Needs to Change?

CISO Talks video thumb - image 162

Detection and Response: Have We Given up on Protection?

CISO Talks video thumb - image 161

How Do Early Stage Organizations Get Started On The Right Path With Cybersecurity?

CISO Talks video thumb - image 160

Why is Foundational Cybersecurity So hard to Get Right?

CISO Talks video thumb - image 159

Are We Overcomplicating Things When Choosing a Cybersecurity Solution?

CISO Talks video thumb - image 158

Biggest Common Cybersecurity Risks for Organizations

CISO Talks video thumb - image 157

Why Zero Trust is Impossible to Implement

CISO Talks video thumb - image 156

How to Ensure Security During Cloud Migration

CISO Talks video thumb - image 155

Implementing an Effective Cloud Security Strategy

CISO Talks video thumb - image 154

Top Cybersecurity Design Principles

CISO Talks video thumb - image 153

Fantastic Cybersecurity Academies and Where to Find Them

CISO Talks video thumb - image 152

Pushing For Diversity in Cybersecurity

CISO Talks video thumb - image 151

What Does the Future of Serverless Security Look Like?

CISO Talks video thumb - image 150

What are the Risks Associated with Serverless Security?

CISO Talks video thumb - image 149

How to Safely Migrate to Serverless Security

CISO Talks video thumb - image 148

The Benefits of Serverless Security

CISO Talks video thumb - image 147

Retaining Cybersecurity Talent in Your Organization

CISO Talks video thumb - image 146

Dealing With Bullying in Cybersecurity

CISO Talks video thumb - image 145

What are the Risks Associated with Serverless Security?

CISO Talks video thumb - image 144

Are We Prepared For a Global Cybersecurity Disaster?

CISO Talks video thumb - image 143

Finding the Best Cybersecurity Solution For Your Business

CISO Talks video thumb - image 142

Why is the Software Market in Cybersecurity So Broken?

CISO Talks video thumb - image 141

Automating Application Security Effectively

CISO Talks video thumb - image 140

Would Teaching Kids Cybersecurity Make us More Secure in the Future?

CISO Talks video thumb - image 139

Reducing Employee Negligence in the Cybersecurity Workspace

CISO Talks video thumb - image 138

Popular Methods For Mitigating Data Leaks

CISO Talks video thumb - image 137

5 Reasons Legacy SIEMs No Longer Work

CISO Talks video thumb - image 136

What Should Be Your Main Focus for Cybersecurity?

CISO Talks video thumb - image 135

Why Detection-as-Code is So Important

CISO Talks video thumb - image 134

An Insight into Starting Your Own Cybersecurity Business

CISO Talks video thumb - image 133

The Biggest Challenges For Passwordless Security

CISO Talks video thumb - image 132

Can We Trust Mobile App Security

CISO Talks video thumb - image 131

Everything You Need to Know About Digital Identity Verification

CISO Talks video thumb - image 130

How can we Move Faster into a Passwordless Future

CISO Talks video thumb - image 129

How the Pandemic has Changed Passwordless Security

CISO Talks video thumb - image 128

Why Going Passwordless Would Reduce Risk

CISO Talks video thumb - image 127

The Benefits of Being a Cybersecurity Startup

CISO Talks video thumb - image 126

Cybersecurity: Marketing Vs Tech - Which is More Important

CISO Talks video thumb - image 125

Advantages of Being in Cybersecurity Without a Cyber Background

CISO Talks video thumb - image 124

The Biggest Cybersecurity Challenges in 2021

CISO Talks video thumb - image 123

Mitigating Risk for Telehealth Platforms in Cybersecurity

CISO Talks video thumb - image 122

Common Cybersecurity Vulnerabilities

CISO Talks video thumb - image 121

Least Privilege: Are Organizations Reducing their Risk Effectively?

CISO Talks video thumb - image 120

Top 5 Data Protection Strategies in 2021

CISO Talks video thumb - image 119

How Effective is Ethical Hacking?

CISO Talks video thumb - image 118

Is Cybersecurity Still a Male Dominated Industry?

CISO Talks video thumb - image 117

Fake Cybersecurity Awards are Ridiculous

CISO Talks video thumb - image 116

Implementing New Security Structures | Passwordless Future

CISO Talks video thumb - image 115

Is Biometric Security Really The Future?

CISO Talks video thumb - image 114

Solving Authentication Problems in Large Enterprises

CISO Talks video thumb - image 113

Checking The Integrity & Security of Your Suppliers Is Vital

CISO Talks video thumb - image 112

So Many Startups, So Little Security

CISO Talks video thumb - image 111

Mitigating Risk: What Are We Getting Wrong

CISO Talks video thumb - image 110

Streamlining Processes & Tracking Your CISO Effectiveness

CISO Talks video thumb - image 109

What Should Your CISO 30 Day Plan Look Like?

CISO Talks video thumb - image 108

Why The CISOs Hard Work Often Goes Unnoticed

CISO Talks video thumb - image 107

Common Challenges When Starting Out as a CISO

CISO Talks video thumb - image 106

Choosing the right solution for your organization as a CISO

CISO Talks video thumb - image 105

Translating Functionality & Streamlining Workflows

CISO Talks video thumb - image 104

Demonstrate More Value to CISOs from a Vendor Perspective

CISO Talks video thumb - image 103

The Perfect Future That Data Can Allow us to Have

CISO Talks video thumb - image 102

Eliminating Fear for Employees Returning to the Workplace

CISO Talks video thumb - image 101

How Data Will Help us Safely Venture Into a Post-Pandemic World

CISO Talks video thumb - image 100

How to Quickly Become More Secure & For Less

CISO Talks video thumb - image 99

The Do's & Dont's of Internal Threat Management

CISO Talks video thumb - image 98

The Human Factors Analysis and Classification System

CISO Talks video thumb - image 97

The Human Factors in Cybersecurity: Preventing Human Error

CISO Talks video thumb - image 96

The Principles of Ultralearning

CISO Talks video thumb - image 95

Starting Your Cybersecurity Journey

CISO Talks video thumb - image 94

CISO Burnouts & Culture mismatch

CISO Talks video thumb - image 93

Cybersecurity Heroes & Heroines: The Values That Make Cybersecurity Experts Tick

CISO Talks video thumb - image 92

The TOP 5 Things You Should Do To Prepare For a Ransomware Attack

CISO Talks video thumb - image 91

Who is Winning the Cyber Race? The Attackers or the Defenders?

CISO Talks video thumb - image 90

Reconfigure Your Approach to Ransomware

CISO Talks video thumb - image 89

Adapting Your Cybersecurity & Staying Safe in 2021

CISO Talks video thumb - image 88

The Rapid Growth of IoT Devices and Properly Securing Them

CISO Talks video thumb - image 87

Insider Threats are the Plague That Continues to Grow in 2020

CISO Talks video thumb - image 86

How Covid-19 Changed Cybersecurity

CISO Talks video thumb - image 85

Stop Responding And Start Preventing

CISO Talks video thumb - image 84

Security Starts With The Data!

CISO Talks video thumb - image 83

Treating Data Like Gold & Implementing Zero Trust Effectively

CISO Talks video thumb - image 82

What Impact Has Covid-19 Had on Cloud Security?

CISO Talks video thumb - image 81

Rules, Regulations & attitudes

CISO Talks video thumb - image 80

Why Have Organizations Been So Slow With Adopting Data Encryption?

CISO Talks video thumb - image 79

Differentiating Between Urgent & Important

CISO Talks video thumb - image 78

Mental Health Is An Organizational Risk In Cybersecurity

CISO Talks video thumb - image 77

Managing Chronic Stress Within Cybersecurity

CISO Talks video thumb - image 76

Has CCPA Made a Fundamental Difference To Data Security

CISO Talks video thumb - image 75

Taking The Next Step As a CISO

CISO Talks video thumb - image 74

How CISOs Can Decipher Between Fact & Fiction Effectively

CISO Talks video thumb - image 73

Improving Decision Making As A CISO

CISO Talks video thumb - image 72

Marketing Is Ruining Cybersecurity

CISO Talks video thumb - image 71

Do Most Organizations Truly Understand Their Data?

CISO Talks video thumb - image 70

Is Your Data Safer When Employees Aren't Working From Home?

CISO Talks video thumb - image 69

What Is Zero Trust Security?

CISO Talks video thumb - image 68

The Covid-19 Exploit

CISO Talks video thumb - image 67

Running An Infosec Business From Home: Is It Possible

CISO Talks video thumb - image 66

How COVID-19 Has Changed Cybersecurity So Far

CISO Talks video thumb - image 65

Rethinking InfoSec with Greg Van Der Gaast

CISO Talks video thumb - image 64

A Simple Analogy That Promotes a Huge Problem in Cybersecurity

CISO Talks video thumb - image 63

CISO Gives Honest Thoughts On Lepide Data Security Platform

CISO Talks video thumb - image 62

The Biggest Misconceptions That Enterprises Have On Security Teams

CISO Talks video thumb - image 61

Building Strong Security Teams To Keep Your Company Safe Ft. Kevin Fielder

CISO Talks video thumb - image 60

6 Ways Lepide Tracks and Monitors Remote Workers

CISO Talks video thumb - image 59

How Will COVID-19 Impact Cybersecurity?

CISO Talks video thumb - image 58

The Top 3 Most Debated Topics on CISO Talks

CISO Talks video thumb - image 57

The Role of A.I. for Cyber Defence and Attack

CISO Talks video thumb - image 56

Why CISOs Fail

CISO Talks video thumb - image 55

Keeping Up With The Evolving Threat Landscape

CISO Talks video thumb - image 54

Why The CISO Role Is So Different

CISO Talks video thumb - image 53

Why Virtual CISOs are Becoming More Popular?

CISO Talks video thumb - image 52

The Virtual CISO: A Closer Look

CISO Talks video thumb - image 51

Is It Actually Safe To Switch To The Cloud? | Has GDPR Impacted Our Safety?

CISO Talks video thumb - image 50

Will Humans In Cybersecurity Be Replaced By A.I.?

CISO Talks video thumb - image 49

The New Age of Zero Trust

CISO Talks video thumb - image 48

How To Improve The CISO / Vendor Relationship

CISO Talks video thumb - image 47

The Future of Finding The Right Vendor

CISO Talks video thumb - image 46

Why Cyber Attacks Will Soon Kill People

CISO Talks video thumb - image 45

Cybersecurity Experts Break Down Hacking Scene From Oceans 8

CISO Talks video thumb - image 44

The Cyber Land of Confusion

CISO Talks video thumb - image 43

Is It Getting Harder To Find The Right Cybersecurity Solution?

CISO Talks video thumb - image 42

Cybersecurity Experts Break Down TV Cyber Attack Scene (Grey's Anatomy)

CISO Talks video thumb - image 41

Mental Health In Cybersecurity

CISO Talks video thumb - image 40

Getting The Board To Understand Cyber-Risk

CISO Talks video thumb - image 39

Virtual CISOs: Are They Worth It?

CISO Talks video thumb - image 38

What Can Analysts Bring To Your Business?

CISO Talks video thumb - image 37

Employee Shortages & Skill Gaps In Cybersecurity

CISO Talks video thumb - image 36

Become Proactive To Protect Your Data

CISO Talks video thumb - image 35

Escaping Loneliness and Finding Trust as a CISO

CISO Talks video thumb - image 34

Is Failure The Key To Success In Data Security?

CISO Talks video thumb - image 33

The Life Of The CISO Today

CISO Talks video thumb - image 32

We Need More Female Leaders In Cybersecurity

CISO Talks video thumb - image 31

Is Data What Really Matters?

CISO Talks video thumb - image 30

Knowledge is Power

CISO Talks video thumb - image 29

Start Configuring Your Cybersecurity Solutions Properly

CISO Talks video thumb - image 28

Security Should Be About Enabling Users

CISO Talks video thumb - image 27

Multiple Solutions Do Not Work

CISO Talks video thumb - image 26

How To Complete the Cybersecurity Puzzle

CISO Talks video thumb - image 25

Why InfoSecurity Europe Needs to Change

CISO Talks video thumb - image 24

Why Visibility is the Key to Security

CISO Talks video thumb - image 23

Are you making the right investments?

CISO Talks video thumb - image 22

Why CISOs Need to Be Curious

CISO Talks video thumb - image 21

Why Are You Ignoring CyberSecurity Basics?

CISO Talks video thumb - image 20

Getting a Return on Your Cybersecurity Investment

CISO Talks video thumb - image 19

Selling Cybersecurity - Advice For Vendors

CISO Talks video thumb - image 18

The Silver Bullet for Cybersecurity

CISO Talks video thumb - image 17

Privileged Access Management for Dummies

CISO Talks video thumb - image 16

Translating Security Into the Workplace

CISO Talks video thumb - image 15

One Trick For Super Data Security

CISO Talks video thumb - image 14

How Do We Get More Women Into Cybersecurity?

CISO Talks video thumb - image 13

Is Cybersecurity Becoming Mainstream?

CISO Talks video thumb - image 12

What makes A Successful CISO?

CISO Talks video thumb - image 11

One Piece of Advice for CISOs

CISO Talks video thumb - image 10

Do CISOs Have the Right Priorities?

CISO Talks video thumb - image 9

Why Should Boards Care About Cybersecurity?

CISO Talks video thumb - image 8

The Secret to CISO/Vendor Success

CISO Talks video thumb - image 7

Is CyberSecurity Broken?

CISO Talks video thumb - image 6

CISOs vs The Board

CISO Talks video thumb - image 5

Are CISOs In Danger?

CISO Talks video thumb - image 4

Biggest Data Security Challenges

CISO Talks video thumb - image 3

Why Red Teaming Will Improve Your Cybersecurity

CISO Talks video thumb - image 2

Common Cybersecurity Models and the Challenges Involved

CISO Talks video thumb - image 1

How Can We Bring More Diversity into Cybersecurity?

See More

REQUEST A FREE RISK ASSESSMENT

See Current Threats and Get Advice on How to Respond

The Lepide Risk Assessment is a completely free, turnkey service that enables organizations to see where their current threats are and how to respond.