America's First Sake Podcast. Power to the Sake People! Join your hosts sake otaku John Puma and sake samurai Timothy Sullivan as they explore the world of Japanese Sake. This podcast will help you know where to get started with sake. Every week, we'll teach you something new about sake in a fun and easy to understand segment, we call the "Sake Education Corner". It wouldn't be a sake podcast with out some sake tasting! We'll profile and taste some of our favorite sakes. Check out the show n ...
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Follow Your Spirit provides game day coverage, team analysis, and player interviews for Washington Spirit, a women's professional soccer team.
…
continue reading
1
Interview with Benoit Champagne of Nijikai Sake
31:41
31:41
Play later
Play later
Lists
Like
Liked
31:41
Episode 174. This week we welcome a sake personality from Quebec, Canada to the studio – Mr. Benoit Champagne. With a name like Mr. Champagne, you might well think Benoit was destined for a life involved with sparkling wine, but luckily for the sake lovers of Quebec, he found his way first to Japan and discovered a love of sake, which he now guides…
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
1
Have you ever had a pen tester own your network? - Julian Austin - CSP #199
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
Guessing the answer is yes. Well, let's talk about some of the simple ways you can avoid account compromises by strengthening your identity security through MFA, least privilege, account reviews, and all the things! This segment is sponsored by CyberArk. Visit https://cisostoriespodcast.com/cyberark to learn more about them! This segment is sponsor…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
How important is your relationship with your tool vendors? - Jacob Lorz - CSP #198
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
…
continue reading
1
What level of tool rationalization does your company do and why? - LaLisha Hurt - CSP #197
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
…
continue reading
1
Sake Revolution LIVE! Sake Day 2024 with Brandon Doughan and Shinobu Kato
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17
Episode 173. World Sake Day comes once a year on Oct 1st. For sake fans across the globe, this is our big holiday... think Christmas-4th of July-Halloween all rolled into one! What better way for us to mark the day then with a live recording of Sake Revolution in front of a studio audience and featuring an interview and tasting with our two New Yor…
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Have you consider your team’s cognitive biases when selecting tools? - Dustin Sachs - CSP #196
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
Tokyo DriftSec: Who is going First? Who is going Smooth? - Lisa Landau - CSP #195
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
…
continue reading
1
Finding our Whey: Exploring Sake and Cheese Pairing
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17
Episode 172. "Say Cheese"! If you identify as a curd nerd, join us to explore an exciting new way of pairing with sake! We are joined this week by extra special guest host Myshell who lends her crazy-style palate to our exploration of these pairing possibilities. Listen in as we taste three sakes, each of which has been paired with a show-stopping …
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
Tried and True. Going back to basics with Incident Response - Levone Campbell - CSP #193
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
The vCISO’s role in Incident Response Accountability - William Klusovsky - CSP #192
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
CISO & Legal: Partnerships Needed - Joe Sullivan - CSP #191
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Todd’s Moving On after 185+ Episodes - Future CISO Vision - Todd Fitzgerald - CSP #190
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Vulnerability Management: Tips and Techniques - John Kellerhals - CSP #189
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Are You Vulnerable to Deep Fakes? Controlling the Risk - Paul Neff - CSP #188
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
…
continue reading
1
Back to School: The Sake Studies Center at Brooklyn Kura
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
Episode 171. This week we go back to school...again! Timothy's new role as the Director of Education at the Sake Studies Center at Brooklyn Kura is the focus of today's episode. The Sake Studies Center is the new sake school on the block, offering education, tastings and brewery tours for professionals and sake-curious consumers alike at our state-…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
Focus, Breadth, or Depth: Reduce Vulnerabilities with Less $ - Julian Mihai - CSP #187
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02
Managing vulnerabilities is a large, complex problem that can't be completely fixed. And still, many cybersecurity organizations continue with a traditional approach that attempts to address all vulnerabilities, spreading staff too thin and increasing exploitation windows. With a small set of vulnerabilities being the cause of most of the breaching…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Show N…
…
continue reading
1
No One Succeeds Alone! Why You Must Have an Informal Network - Gene Scriven - CSP #186
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all industries, it's critical to have informal but trusted resources to rely on for advice, information, and just overall "sounding board" opportunities. Visit …
…
continue reading
1
Interview with Ryan Mellinger of Joto Sake
33:24
33:24
Play later
Play later
Lists
Like
Liked
33:24
Episode 170. We were so happy to sit down to chat and sip sake with our friend Ryan Mellinger, the General Manager of the Joto Sake imports portfolio at Kobrand. Ryan explains to us, in an easy to understand way, the intricacies of the complex "three tier system" of alcohol distribution that we have in the States and all that goes into getting fres…
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Driving the Business of Infosec Through the GRC Program - Greg Bee - CSP #185
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20
Join us as we discuss the organization’s GRC program and how GRC helps drive the business of information security from internal and external perspectives to integrate security into the culture, while maintaining compliance with regulations imposed for insurance and public companies. Segment Resources: Webcast: https://www.scmagazine.com/cybercast/t…
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
Evolving from Security to Trust, more than Just Compliance - Mike Towers - CSP #184
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
CISOs need to enhance their strategic influence and operational impact within their organizations. This calls for a departure from traditional, insular security approaches towards a partnership model that aligns security initiatives with business growth and value. By adopting an attitude of listening, humility, and interdisciplinary collaboration, …
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
1
CISO Risk Reduction: Adopting Emerging Technologies - Timothy McKnight - CSP #183
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03
With the vast number of cybersecurity solutions in the marketplace, how do you identify what fits with your company’s strategic goals, then deploy and scale in a reasonable timeframe? Hear a CISO who has built a methodology for assessing and implementing new security technologies and successfully used it at several large global enterprises. Segment…
…
continue reading
Episode 169. This week, we are returning to our series on sake vessels, but this time looking at sake serviceware in particular. We're focusing in on the Tokkuri, the workhorse carafe used for sake service across the world. Tokkuri carafes can be used to serve sake chilled, room temperature, and to warm it up as well. The materials used to make tok…
…
continue reading
1
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
…
continue reading
1
Deep Dive in GRC: Know Your Sources - Jonathan Ruf - CSP #182
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46
As organizations grow, there comes a time when managing by excel spreadsheets is not longer feasible and accurate data sources, regulations, and risk need to be accurately reflected within Governance, Risk and Compliance (GRC) tools. Reporting to the board must be based upon accurate information. Join us as we discuss the important aspects of formi…
…
continue reading
1
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
…
continue reading
1
Governing Cyber Humanely: Leveraging Wellness Techniques - Jothi Dugar - CSP #181
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24
We discuss the topic of Human Centric Cybersecurity and the importance of empowering the 'people' aspect of the People, Process, Tech framework. In this conversation we raise the importance of well-being amongst Tech and Cyber leaders and how to keep calm through the chaos to lead our teams well. Also important is diversity in this field and the Ho…
…
continue reading
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
…
continue reading
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
1
Prefecture Profile: Exploring Oita with Chris Johnson
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00
Episode 168. We are off to explore the sake scene in another region of Japan! This time it is beautiful Oita Prefecture! As we don't know much about Oita, despite there being 33 sake breweries there, we needed to phone-a-friend. Luckily for us, our buddy Chris Johnson (aka The Sake Ninja) lived for 3 years in rural Oita on the Jet program. Chris ge…
…
continue reading
1
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Visit https://cisosto…
…
continue reading
1
As We Implement Zero Trust, Let's Not Forget About Metrics - George Finney - CSP #179
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an architecture) and to prove the value of this investment, we need to start thinking about metrics to demonstrate value. Join us as we discuss some of the metric directions to consider when moving our organizations towards Zero Trust. Show Notes: https://c…
…
continue reading
1
CISO and the Board: Demonstrating value and relevant metrics - Max Shier - CSP #178
30:34
30:34
Play later
Play later
Lists
Like
Liked
30:34
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing the appropriate investment level. Join us as we discuss interactions with the board and leveraging metrics to show business value. Show Notes: https://cis…
…
continue reading