
Sign up to save your podcasts
Or


All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
By David Spark, Mike Johnson, and Andy Ellis4.8
190190 ratings
All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
188 Listeners

2,010 Listeners

372 Listeners

372 Listeners

652 Listeners

1,025 Listeners

319 Listeners

419 Listeners

8,082 Listeners

178 Listeners

315 Listeners

73 Listeners

138 Listeners

48 Listeners

9 Listeners