
Sign up to save your podcasts
Or


All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
By David Spark, Mike Johnson, and Andy Ellis4.8
186186 ratings
All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
192 Listeners

2,003 Listeners

375 Listeners

375 Listeners

653 Listeners

1,023 Listeners

319 Listeners

418 Listeners

8,038 Listeners

177 Listeners

316 Listeners

74 Listeners

137 Listeners

46 Listeners

170 Listeners