
Sign up to save your podcasts
Or


All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
By David Spark, Mike Johnson, and Andy Ellis4.8
186186 ratings
All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
186 Listeners

2,007 Listeners

372 Listeners

371 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,064 Listeners

179 Listeners

315 Listeners

74 Listeners

139 Listeners

44 Listeners

168 Listeners