
Sign up to save your podcasts
Or


All links and images for this episode can be found on CISO Series
Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing be to get back some time?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Jim Rutt, CISO, Dana Foundation.
Thanks to our podcast sponsor, Thinkst
Most companies discover they've been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Hardware, VM and Cloud-based Canaries are deployed and loved on all 7 continents.
In this episode:
By David Spark, Steve Zalewski, Geoff Belknap4.8
7373 ratings
All links and images for this episode can be found on CISO Series
Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing be to get back some time?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Jim Rutt, CISO, Dana Foundation.
Thanks to our podcast sponsor, Thinkst
Most companies discover they've been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Hardware, VM and Cloud-based Canaries are deployed and loved on all 7 continents.
In this episode:

187 Listeners

2,002 Listeners

371 Listeners

375 Listeners

638 Listeners

1,020 Listeners

321 Listeners

414 Listeners

8,008 Listeners

178 Listeners

314 Listeners

189 Listeners

137 Listeners

46 Listeners

171 Listeners