
Sign up to save your podcasts
Or
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Derek Fisher, Executive director of product security, JPMorgan.
In this episode:
A security program shouldn't stop at compliance, but that doesn't mean we should undervalue it, right?
Why are we so quick to dismiss compliance as simple check boxes?
Why is compliance important and why is it often getting a bad name these days?
What are the elements that make a great solution?
Thanks to our podcast sponsor, RevealSecurity!
Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security
4.8
7373 ratings
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Derek Fisher, Executive director of product security, JPMorgan.
In this episode:
A security program shouldn't stop at compliance, but that doesn't mean we should undervalue it, right?
Why are we so quick to dismiss compliance as simple check boxes?
Why is compliance important and why is it often getting a bad name these days?
What are the elements that make a great solution?
Thanks to our podcast sponsor, RevealSecurity!
Reveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. Visit reveal.security
1,988 Listeners
364 Listeners
640 Listeners
370 Listeners
183 Listeners
1,019 Listeners
318 Listeners
405 Listeners
7,953 Listeners
173 Listeners
190 Listeners
316 Listeners
129 Listeners
43 Listeners
169 Listeners