Where security practitioners come to learn about innovative ways to solve business challenges.
Welcome to the finals of Capture the CISO Season 2!
Our host is Rich Stroffolino and our judges are Alexandra Landegger, executive director and CISO, Collins Aerospace, and Edward Contreras, EVP and CISO, Frost Bank.
Our contestants:
BugProve
BugProve offers a vulnerability management platform for embedded devices.
Its unique feature of identifying zero-day vulnerabilities sets it apart from other solutions, ensuring proactive protection against emerging threats. By providing comprehensive software bills of materials and identifying vulnerabilities in open-source components, it offers a holistic view of device security, and its monitoring function empowers organizations to act fast.
These features help companies get compliant with upcoming regulations such as CRA, RED, and Cyber Trust Mark.
Its high-speed scans deliver results within minutes, accelerating the testing process significantly. Moreover, with no setup fee or commitment, BugProve ensures rapid return on investment realization.
Anvilogic
Anvilogic breaks the SIEM lock-in that drives detection gaps and high costs for enterprise SOCs. It enables detection engineers and threat hunters to keep using their existing SIEM while seamlessly adopting a scalable and cost-effective data lake for high-volume data sources and advanced analytics use cases. By eliminating the need for rip-and-replace, Anvilogic allows security leaders to confidently join the rest of the enterprise on the modern data stack without disrupting existing processes. Security operations teams at banks, airlines, and large tech companies use Anvilogic’s modular detection engine, thousands of curated threat scenarios, and AI security copilot to improve detection coverage and save millions of dollars.
Nudge Security
Nudge Security helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users.
Welcome to episode three of Capture the CISO Season 2!
Our judges are Christina Shannon, CIO, KIK Consumer Products and Dan Walsh, CISO, VillageMD.
Our contestants:
Huge thanks to all our contestants who are also sponsors of Capture the CISO
BugProve
BugProve offers a vulnerability management platform for embedded devices.
Its unique feature of identifying zero-day vulnerabilities sets it apart from other solutions, ensuring proactive protection against emerging threats. By providing comprehensive software bills of materials and identifying vulnerabilities in open-source components, it offers a holistic view of device security, and its monitoring function empowers organizations to act fast.
These features help companies get compliant with upcoming regulations such as CRA, RED, and Cyber Trust Mark.
Its high-speed scans deliver results within minutes, accelerating the testing process significantly. Moreover, with no setup fee or commitment, BugProve ensures rapid return on investment realization.
Egress
Egress is the only cloud email security platform to use an adaptive security architecture to continuously assess human risk and automate personalized security for each user across the enterprise. Egress Intelligent Email Security integrates seamlessly into Microsoft 365 to deliver AI-powered behavioral-based threat detection that eliminates advanced phishing attacks, human error, and data exfiltration.
Combining contextual machine learning and AI, we use zero-trust and pre-generative modeling to provide the highest efficacy of phishing detection to prevent attacks that get through native controls and secure email gateways. For outbound detection, we leverage social graph and pre-trained deep neural networks to detect anomalous behavior and stop accidental data loss and intentional data exfiltration. Our products also deliver behavioral-based micro-training through real-time teachable moments, tangibly reducing risk.
Zenity
Zenity is a security and governance company that enables businesses to securely unleash business application and AI development throughout the enterprise. Zenity’s agentless platform is built from the ground up with a security-first approach. With SOC 2 Type 2 and GDPR compliance, Zenity is uniquely positioned to help our customers implement strong application security practices throughout AI, low-code, and no-code development.
Welcome to episode one of Capture the CISO Season 2!
Our host is Richard Stroffolino and our judges are Arvin Bansal, CISO, C&S Wholesale Grocers and Brett Conlon, CISO, American Century Investments.
Our contestants:
Huge thanks to all our contestants who are also sponsors of Capture the CISO
HYAS
HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns.
We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable.
HYAS’ award-winning threat intelligence and investigation platform and protective DNS solution detects and blocks the beaconing requests of malicious and anomalous command-and-control communication and stops attackers from progressing.
Nudge Security
Nudge Security helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users.
SlashNext
SlashNext’s Cloud Email Security leverages our advanced AI platform, purpose built to stop sophisticated BEC and advanced phishing threats. The service delivers industry leading 99.9% detection rate and 1 in 1 million FPs by utilizing Gen AI, natural language parallel prediction, computer vision, relationship graphs, and contextual analysis for:
Request a demo https://slashnext.com/request-a-demo/.
To watch the demo videos, and see the transcript, check out the blog post of this episode on CISOseries.com.
Welcome to Season 2 Episode 1 of Capture the CISO, hosted by Richard Stroffolino.
Our contestants:
Huge thanks to all our contestants who are also sponsors of Capture the CISO
Anvilogic
Lumeus
Onyxia
Be sure to join us on April 17, 2024 for the return of the Capture the CISO podcast. This unique show is a competition, with three different vendors each sitting in the hot seat while CISO judges see how they stack up against each other. Each vendor is judged on innovation, market need, and ease of deployment. It's the only show that gives you an inside ear on the conversations CISOs and vendors have behind closed doors. We know you're going to love it. You can watch all the vendor demos here to be on the same page as the CISOs at the start of every episode.
Be sure you're subscribed on Apple Podcasts, Spotify, and RSS to get the new season on April 17th.
A fantastic first season of Capture the CISO finishes with a fantastic finale.
The show went live last Friday, June 17th, 2022, and you can watch it right here, or please listen to the finished edited audio here.
The entire season of Capture the CISO including this finale was hosted by Johna Till Johnson, CEO, Nemertes.
Our judges for the final episode were:
The four contestants in the final episode will be:
Check out the contestants, our shows, links to subscribe to the podcast, and all the vendors demo videos on the Capture the CISO show page.
We welcome active discussion and debate about all vendor contestants.
And a huge thanks to our finals contestants who are also sponsors of Capture the CISO.
Feroot
Lightspin
Torq
To watch the demo videos, and see the transcript, check out the blog post of this episode on CISOseries.com.
Welcome to episode three of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.
Our judges are Dan Walsh, CISO, Village MD and Hadas Cassorla, CISO, M1.
Our contestants:
Huge thanks to all our contestants who are also sponsors of Capture the CISO
Feroot
Perception Point
Sunday Security
Welcome to episode two of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.
Our judges are Edward Contreras, CISO, Frost Bank and Mark Eggleston, CISO, CSC.
Our contestants:
Vladimir (Vladi) Sandler, CEO, Lightspin
Nick Popovich, hacker in residence, PlexTrac
Leonid Belkind, co-founder and CTO, Torq
Huge thanks to all our contestants who are also sponsors of Capture the CISO.
Lightspin
Lightspin’s next-gen cloud security platform built on Neo4j graph database prioritizes risk in cloud and Kubernetes environments focusing DevSecOps efforts on the critical issues that matter most. Our developer friendly platform provides plug and play remediation in the form of IaC, and scans pre-production code to catch misconfigurations, which are the main cause of breaches. Lighstpin proudly focuses on small and medium-sized businesses running workloads in the cloud, offering a free version of the platform including the industry’s only graph-based Attack Path risk prioritization. For an affordable, efficient, and secure cloud experience loved by engineers learn more at www.lightspin.io.
PlexTrac
A better security posture begins and ends with PlexTrac, the Proactive Cybersecurity Management Platform that streamlines your entire security workflow. Maximize ROI by aggregating findings from all your sources, generating robust analytics, cutting reporting time in half, and assigning and tracking remediation — all in one platform. Facilitate collaboration and communication across offensive engagements, monitor team performance, and analyze your security posture in real-time. PlexTrac makes cybersecurity teams more efficient, effective, and proactive to help them win the right security battles.
Generate better reports. Promote closer collaboration. Enable faster remediation. Gain more insights. PlexTrac is the must-have platform for security teams.
Torq
Torq is a no-code automation platform for security teams. It helps people of any skill level automate workflows to streamline and reinforce security processes, using a drag-and-drop editor and guided configurations. Workflows can be built with templates from our ever-growing library, helping users automate even the most complex processes with ease. The platform readily integrates with any other system out of the box—no special connectors, just limitless integrations. With Torq, teams maximize protection while minimizing complexity, creating a more dynamic and enduring security posture.
Welcome to episode one of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.
Please go to the blog post for this episode to check out the demo videos of all the contestants.
Our judges are Shawn Bowen, CISO, World Fuel Services and Mike Johnson, co-host, CISO Series Podcast and CISO for Fastly.
Our contestants:
Huge thanks to all our contestants who are also sponsors of Capture the CISO
Conveyor
Conveyor makes security reviews fast, easy, and accurate for both vendors and their customers. How? By making it easy for 3rd party risk teams to get basic info on vendors, request access to their security docs (like SOC 2s and PenTests), and get their security questions answered without actually issuing a questionnaire. Check out our video to see how Conveyor can save you 71% of your time on your vendor security reviews.
Pentera
Pentera’s Automated Security Validation Platform is designed to help teams increase their security posture against modern day threats across the entire attack surface. Evaluate your security readiness with continuous and consistent autonomous testing with granular visibility into every execution along the way. Validate your tools are working effectively by safely emulating attacks & prioritize your remediation efforts with true contextual driven results. With Mitre ATT&CK framework mapping, stay on top and test your environment against adversary techniques to create an optimized process from testing to in-production. Don’t just operate, validate!
Votiro
Can you trust the files and content entering your organization? Votiro Cloud's Zero Trust open API proactively disarms files of known, unknown, & zero-day malware threats at scale without adding friction, interrupting user or application workflows, or impacting file fidelity. Votiro reduces work, alerts, & risk for IT and security teams while enabling the seamless flow of safe files.
Votiro is tool-agnostic, and provides virtually limitless auto-scale capabilities to handle any file throughput and the greatest span of file formats, preventing malicious files uploaded to web apps, portals, data management platforms, and cloud services.
Your feedback is valuable to us. Should you encounter any bugs, glitches, lack of functionality or other problems, please email us on [email protected] or join Moon.FM Telegram Group where you can talk directly to the dev team who are happy to answer any queries.