Home
Categories
EXPLORE
Comedy
True Crime
Society & Culture
History
Sports
Music
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/06/a0/d1/06a0d16b-a3c4-85c7-166b-51afb04399ed/mza_9846993492654717071.png/600x600bb.jpg
Capture the CISO
CISO Series
10 episodes
9 months ago
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?
Show more...
Technology
RSS
All content for Capture the CISO is the property of CISO Series and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/06/a0/d1/06a0d16b-a3c4-85c7-166b-51afb04399ed/mza_9846993492654717071.png/600x600bb.jpg
Season 2: HYAS, Nudge Security, and SlashNext
Capture the CISO
38 minutes 58 seconds
1 year ago
Season 2: HYAS, Nudge Security, and SlashNext
Welcome to episode one of Capture the CISO Season 2! Our host is Richard Stroffolino and our judges are Arvin Bansal, CISO, C&S Wholesale Grocers and  Brett Conlon, CISO, American Century Investments. Our contestants: David Ratner, CEO, HYAS Russell Spitler, CEO & Co-founder, Nudge Security Patrick Harr, CEO, SlashNext Huge thanks to all our contestants who are also sponsors of Capture the CISO HYAS HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns.  We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable. HYAS’ award-winning threat intelligence and investigation platform and protective DNS solution detects and blocks the beaconing requests of malicious and anomalous command-and-control communication and stops attackers from progressing. Nudge Security Nudge Security helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users. SlashNext SlashNext’s Cloud Email Security leverages our advanced AI platform, purpose built to stop sophisticated BEC and advanced phishing threats. The service delivers industry leading 99.9% detection rate and 1 in 1 million FPs by utilizing Gen AI, natural language parallel prediction, computer vision, relationship graphs, and contextual analysis for: Broad threat coverage due to large and diverse LLMs  Highest accuracy and a 48-hour detection advantage to stop sophisticated zero-hour threats  Increased SecOps and user productivity from using a solution with the highest detections and the lowest FP 360° protection with threat protection across all messaging channels: in email,  mobile and web Request a demo https://slashnext.com/request-a-demo/.
Capture the CISO
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?