
Sign up to save your podcasts
Or
All links and images for this episode can be found on CISO Series.
What happens when you want to adhere to more secure behavior, but the tool you're using forces you to be less secure, solely because they didn't architect in more stringent security when they created the program.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Terrance Cooley, CISO, Air Force JADC2 R&D Center.
Thanks to our podcast sponsor, Varonis
Everyday, your employees share thousands of sensitive files with too many people, exposing data to the entire organization – or even the entire internet. Varonis monitors sharing link activity and intelligently eliminates links that aren’t needed – reducing your risk on a continual basis. Discover more at www.varonis.com/cisoseries.
In this episode:
4.8
183183 ratings
All links and images for this episode can be found on CISO Series.
What happens when you want to adhere to more secure behavior, but the tool you're using forces you to be less secure, solely because they didn't architect in more stringent security when they created the program.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Terrance Cooley, CISO, Air Force JADC2 R&D Center.
Thanks to our podcast sponsor, Varonis
Everyday, your employees share thousands of sensitive files with too many people, exposing data to the entire organization – or even the entire internet. Varonis monitors sharing link activity and intelligently eliminates links that aren’t needed – reducing your risk on a continual basis. Discover more at www.varonis.com/cisoseries.
In this episode:
1,968 Listeners
361 Listeners
627 Listeners
363 Listeners
184 Listeners
1,003 Listeners
311 Listeners
398 Listeners
7,876 Listeners
168 Listeners
314 Listeners
77 Listeners
129 Listeners
33 Listeners
158 Listeners