The talk show series where we discuss current trends in the world of information
security with CISOs on the front line.

How the Pandemic has Changed Passwordless Security

Want to Be a Guest on CISO Talks?

Why Going Passwordless Would Reduce Risk

The Benefits of Being a Cybersecurity Startup

Cybersecurity: Marketing Vs Tech - Which is More Important

Advantages of Being in Cybersecurity Without a Cyber Background

The Biggest Cybersecurity Challenges in 2021

Mitigating Risk for Telehealth Platforms in Cybersecurity

Common Cybersecurity Vulnerabilities

Least Privilege: Are Organizations Reducing their Risk Effectively?

Top 5 Data Protection Strategies in 2021

How Effective is Ethical Hacking?

Is Cybersecurity Still a Male Dominated Industry?

Fake Cybersecurity Awards are Ridiculous

Implementing New Security Structures | Passwordless Future

Is Biometric Security Really The Future?

Solving Authentication Problems in Large Enterprises

Checking The Integrity & Security of Your Suppliers Is Vital

So Many Startups, So Little Security

Mitigating Risk: What Are We Getting Wrong

Streamlining Processes & Tracking Your CISO Effectiveness

What Should Your CISO 30 Day Plan Look Like?

Why The CISOs Hard Work Often Goes Unnoticed

Common Challenges When Starting Out as a CISO

Choosing the right solution for your organization as a CISO

Translating Functionality & Streamlining Workflows

Demonstrate More Value to CISOs from a Vendor Perspective

The Perfect Future That Data Can Allow us to Have

Eliminating Fear for Employees Returning to the Workplace

How Data Will Help us Safely Venture Into a Post-Pandemic World

How to Quickly Become More Secure & For Less

The Do's & Dont's of Internal Threat Management

The Human Factors Analysis and Classification System

The Human Factors in Cybersecurity: Preventing Human Error

The Principles of Ultralearning

Starting Your Cybersecurity Journey

CISO Burnouts & Culture mismatch

Cybersecurity Heroes & Heroines: The Values That Make Cybersecurity Experts Tick

The TOP 5 Things You Should Do To Prepare For a Ransomware Attack

Who is Winning the Cyber Race? The Attackers or the Defenders?

Reconfigure Your Approach to Ransomware

Adapting Your Cybersecurity & Staying Safe in 2021

The Rapid Growth of IoT Devices and Properly Securing Them

Insider Threats are the Plague That Continues to Grow in 2020

How Covid-19 Changed Cybersecurity

Stop Responding And Start Preventing

Security Starts With The Data!

Treating Data Like Gold & Implementing Zero Trust Effectively

What Impact Has Covid-19 Had on Cloud Security?

Rules, Regulations & attitudes

Why Have Organizations Been So Slow With Adopting Data Encryption?

Differentiating Between Urgent & Important

Mental Health Is An Organizational Risk In Cybersecurity

Managing Chronic Stress Within Cybersecurity

Has CCPA Made a Fundamental Difference To Data Security

Taking The Next Step As a CISO

How CISOs Can Decipher Between Fact & Fiction Effectively

Improving Decision Making As A CISO

Marketing Is Ruining Cybersecurity

Do Most Organizations Truly Understand Their Data?

Is Your Data Safer When Employees Aren't Working From Home?

What Is Zero Trust Security?

The Covid-19 Exploit

Running An Infosec Business From Home: Is It Possible

How COVID-19 Has Changed Cybersecurity So Far

Rethinking InfoSec with Greg Van Der Gaast

A Simple Analogy That Promotes a Huge Problem in Cybersecurity

CISO Gives Honest Thoughts On Lepide Data Security Platform

The Biggest Misconceptions That Enterprises Have On Security Teams

Building Strong Security Teams To Keep Your Company Safe Ft. Kevin Fielder

6 Ways Lepide Tracks and Monitors Remote Workers

How Will COVID-19 Impact Cybersecurity?

The Top 3 Most Debated Topics on CISO Talks

The Role of A.I. for Cyber Defence and Attack

Why CISOs Fail

Keeping Up With The Evolving Threat Landscape

Why The CISO Role Is So Different

Why Virtual CISOs are Becoming More Popular?

The Virtual CISO: A Closer Look

Is It Actually Safe To Switch To The Cloud? | Has GDPR Impacted Our Safety?

Will Humans In Cybersecurity Be Replaced By A.I.?

The New Age of Zero Trust

How To Improve The CISO / Vendor Relationship

The Future of Finding The Right Vendor

Why Cyber Attacks Will Soon Kill People

Cybersecurity Experts Break Down Hacking Scene From Oceans 8

The Cyber Land of Confusion

Is It Getting Harder To Find The Right Cybersecurity Solution?

Cybersecurity Experts Break Down TV Cyber Attack Scene (Grey's Anatomy)

Mental Health In Cybersecurity

Getting The Board To Understand Cyber-Risk

Virtual CISOs: Are They Worth It?

What Can Analysts Bring To Your Business?

Employee Shortages & Skill Gaps In Cybersecurity

Become Proactive To Protect Your Data

Escaping Loneliness and Finding Trust as a CISO

Is Failure The Key To Success In Data Security?

The Life Of The CISO Today

We Need More Female Leaders In Cybersecurity

Is Data What Really Matters?

Knowledge is Power

Start Configuring Your Cybersecurity Solutions Properly

Security Should Be About Enabling Users

Multiple Solutions Do Not Work

How To Complete the Cybersecurity Puzzle

Why InfoSecurity Europe Needs to Change

Why Visibility is the Key to Security

Are you making the right investments?

Why CISOs Need to Be Curious

Why Are You Ignoring CyberSecurity Basics?

Getting a Return on Your Cybersecurity Investment

Selling Cybersecurity - Advice For Vendors

The Silver Bullet for Cybersecurity

Privileged Access Management for Dummies

Translating Security Into the Workplace

One Trick For Super Data Security

How Do We Get More Women Into Cybersecurity?

Is Cybersecurity Becoming Mainstream?

What makes A Successful CISO?

One Piece of Advice for CISOs

Do CISOs Have the Right Priorities?

Why Should Boards Care About Cybersecurity?

The Secret to CISO/Vendor Success

Is CyberSecurity Broken?

CISOs vs The Board

Are CISOs In Danger?

Biggest Data Security Challenges

See More

REQUEST A FREE RISK ASSESSMENT

See Current Threats and Get Advice on How to Respond

The Lepide Risk Assessment is a completely free, turnkey service that enables organizations to see where their current threats are and how to respond.