
Sign up to save your podcasts
Or


All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
By David Spark, Mike Johnson, and Andy Ellis4.8
190190 ratings
All links and images can be found on CISO Series.
This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility.
In this episode
Huge thanks to our sponsor, ThreatLocker
ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com.
186 Listeners

2,005 Listeners

370 Listeners

372 Listeners

649 Listeners

1,031 Listeners

320 Listeners

422 Listeners

8,091 Listeners

178 Listeners

317 Listeners

74 Listeners

137 Listeners

49 Listeners

9 Listeners