The talk show series where we discuss current trends in the world of information
security with CISOs on the front line.

Is the Elimination of Alert Fatigue Really Possible?

Want to Be a Guest on CISO Talks?

Why Do Enterprises Need A Cloud Governance Solution?

How The CISO Role is Changing Ft. Gary Hayslip

Implementing Zero Trust in Stages - Streamlining the Process

Building An Effective Zero Trust Program

Thinking About Zero Trust as a Program and Not Individual Projects

The Biggest Risk Factors For CISOs Today

The Benefits of Getting Both Convenience & Cybersecurity Right

What is Wrong With the Way People Access Online Accounts Today?

User Journeys Explained and How to Implement This Strategy

Identifying and Mitigating Application Level Threats in Cybersecurity

Why is There a Huge Gap in the Market for Application Security?

How Will Cybersecurity of the Near Future Differ in Approach

The Same Problems STILL Exist in Cybersecurity - What Needs to Change?

Detection and Response: Have We Given up on Protection?

How Do Early Stage Organizations Get Started On The Right Path With Cybersecurity?

Why is Foundational Cybersecurity So hard to Get Right?

Are We Overcomplicating Things When Choosing a Cybersecurity Solution?

Biggest Common Cybersecurity Risks for Organizations

Why Zero Trust is Impossible to Implement

How to Ensure Security During Cloud Migration

Implementing an Effective Cloud Security Strategy

Top Cybersecurity Design Principles

Fantastic Cybersecurity Academies and Where to Find Them

Pushing For Diversity in Cybersecurity

What Does the Future of Serverless Security Look Like?

What are the Risks Associated with Serverless Security?

How to Safely Migrate to Serverless Security

The Benefits of Serverless Security

Retaining Cybersecurity Talent in Your Organization

Dealing With Bullying in Cybersecurity

What are the Risks Associated with Serverless Security?

Are We Prepared For a Global Cybersecurity Disaster?

Finding the Best Cybersecurity Solution For Your Business

Why is the Software Market in Cybersecurity So Broken?

Automating Application Security Effectively

Would Teaching Kids Cybersecurity Make us More Secure in the Future?

Reducing Employee Negligence in the Cybersecurity Workspace

Popular Methods For Mitigating Data Leaks

5 Reasons Legacy SIEMs No Longer Work

What Should Be Your Main Focus for Cybersecurity?

Why Detection-as-Code is So Important

An Insight into Starting Your Own Cybersecurity Business

The Biggest Challenges For Passwordless Security

Can We Trust Mobile App Security

Everything You Need to Know About Digital Identity Verification

How can we Move Faster into a Passwordless Future

How the Pandemic has Changed Passwordless Security

Why Going Passwordless Would Reduce Risk

The Benefits of Being a Cybersecurity Startup

Cybersecurity: Marketing Vs Tech - Which is More Important

Advantages of Being in Cybersecurity Without a Cyber Background

The Biggest Cybersecurity Challenges in 2021

Mitigating Risk for Telehealth Platforms in Cybersecurity

Common Cybersecurity Vulnerabilities

Least Privilege: Are Organizations Reducing their Risk Effectively?

Top 5 Data Protection Strategies in 2021

How Effective is Ethical Hacking?

Is Cybersecurity Still a Male Dominated Industry?

Fake Cybersecurity Awards are Ridiculous

Implementing New Security Structures | Passwordless Future

Is Biometric Security Really The Future?

Solving Authentication Problems in Large Enterprises

Checking The Integrity & Security of Your Suppliers Is Vital

So Many Startups, So Little Security

Mitigating Risk: What Are We Getting Wrong

Streamlining Processes & Tracking Your CISO Effectiveness

What Should Your CISO 30 Day Plan Look Like?

Why The CISOs Hard Work Often Goes Unnoticed

Common Challenges When Starting Out as a CISO

Choosing the right solution for your organization as a CISO

Translating Functionality & Streamlining Workflows

Demonstrate More Value to CISOs from a Vendor Perspective

The Perfect Future That Data Can Allow us to Have

Eliminating Fear for Employees Returning to the Workplace

How Data Will Help us Safely Venture Into a Post-Pandemic World

How to Quickly Become More Secure & For Less

The Do's & Dont's of Internal Threat Management

The Human Factors Analysis and Classification System

The Human Factors in Cybersecurity: Preventing Human Error

The Principles of Ultralearning

Starting Your Cybersecurity Journey

CISO Burnouts & Culture mismatch

Cybersecurity Heroes & Heroines: The Values That Make Cybersecurity Experts Tick

The TOP 5 Things You Should Do To Prepare For a Ransomware Attack

Who is Winning the Cyber Race? The Attackers or the Defenders?

Reconfigure Your Approach to Ransomware

Adapting Your Cybersecurity & Staying Safe in 2021

The Rapid Growth of IoT Devices and Properly Securing Them

Insider Threats are the Plague That Continues to Grow in 2020

How Covid-19 Changed Cybersecurity

Stop Responding And Start Preventing

Security Starts With The Data!

Treating Data Like Gold & Implementing Zero Trust Effectively

What Impact Has Covid-19 Had on Cloud Security?

Rules, Regulations & attitudes

Why Have Organizations Been So Slow With Adopting Data Encryption?

Differentiating Between Urgent & Important

Mental Health Is An Organizational Risk In Cybersecurity

Managing Chronic Stress Within Cybersecurity

Has CCPA Made a Fundamental Difference To Data Security

Taking The Next Step As a CISO

How CISOs Can Decipher Between Fact & Fiction Effectively

Improving Decision Making As A CISO

Marketing Is Ruining Cybersecurity

Do Most Organizations Truly Understand Their Data?

Is Your Data Safer When Employees Aren't Working From Home?

What Is Zero Trust Security?

The Covid-19 Exploit

Running An Infosec Business From Home: Is It Possible

How COVID-19 Has Changed Cybersecurity So Far

Rethinking InfoSec with Greg Van Der Gaast

A Simple Analogy That Promotes a Huge Problem in Cybersecurity

CISO Gives Honest Thoughts On Lepide Data Security Platform

The Biggest Misconceptions That Enterprises Have On Security Teams

Building Strong Security Teams To Keep Your Company Safe Ft. Kevin Fielder

6 Ways Lepide Tracks and Monitors Remote Workers

How Will COVID-19 Impact Cybersecurity?

The Top 3 Most Debated Topics on CISO Talks

The Role of A.I. for Cyber Defence and Attack

Why CISOs Fail

Keeping Up With The Evolving Threat Landscape

Why The CISO Role Is So Different

Why Virtual CISOs are Becoming More Popular?

The Virtual CISO: A Closer Look

Is It Actually Safe To Switch To The Cloud? | Has GDPR Impacted Our Safety?

Will Humans In Cybersecurity Be Replaced By A.I.?

The New Age of Zero Trust

How To Improve The CISO / Vendor Relationship

The Future of Finding The Right Vendor

Why Cyber Attacks Will Soon Kill People

Cybersecurity Experts Break Down Hacking Scene From Oceans 8

The Cyber Land of Confusion

Is It Getting Harder To Find The Right Cybersecurity Solution?

Cybersecurity Experts Break Down TV Cyber Attack Scene (Grey's Anatomy)

Mental Health In Cybersecurity

Getting The Board To Understand Cyber-Risk

Virtual CISOs: Are They Worth It?

What Can Analysts Bring To Your Business?

Employee Shortages & Skill Gaps In Cybersecurity

Become Proactive To Protect Your Data

Escaping Loneliness and Finding Trust as a CISO

Is Failure The Key To Success In Data Security?

The Life Of The CISO Today

We Need More Female Leaders In Cybersecurity

Is Data What Really Matters?

Knowledge is Power

Start Configuring Your Cybersecurity Solutions Properly

Security Should Be About Enabling Users

Multiple Solutions Do Not Work

How To Complete the Cybersecurity Puzzle

Why InfoSecurity Europe Needs to Change

Why Visibility is the Key to Security

Are you making the right investments?

Why CISOs Need to Be Curious

Why Are You Ignoring CyberSecurity Basics?

Getting a Return on Your Cybersecurity Investment

Selling Cybersecurity - Advice For Vendors

The Silver Bullet for Cybersecurity

Privileged Access Management for Dummies

Translating Security Into the Workplace

One Trick For Super Data Security

How Do We Get More Women Into Cybersecurity?

Is Cybersecurity Becoming Mainstream?

What makes A Successful CISO?

One Piece of Advice for CISOs

Do CISOs Have the Right Priorities?

Why Should Boards Care About Cybersecurity?

The Secret to CISO/Vendor Success

Is CyberSecurity Broken?

CISOs vs The Board

Are CISOs In Danger?

Biggest Data Security Challenges

Why Red Teaming Will Improve Your Cybersecurity

Common Cybersecurity Models and the Challenges Involved

How Can We Bring More Diversity into Cybersecurity?

See More


See Current Threats and Get Advice on How to Respond

The Lepide Risk Assessment is a completely free, turnkey service that enables organizations to see where their current threats are and how to respond.