• 17 minutes 27 seconds
    Rethinking Tabletops with Reflex Security

    In this episode, Cassio Goldschmidt, co-founder and CTO at Reflex Security, explains how Reflex replaces static, script-driven tabletops with adaptive AI-driven simulations that fight back, measure real human behavior under pressure, and surface the gaps that scripted exercises never reach. Joining him are Nick Espinosa, host of the nationally syndicated Deep Dive Radio Show, and Jay Wilson, CISO and CIO at Insurity.

    Want to know:
    • Why do traditional tabletops train teams to know the plan rather than execute under pressure?
    • What's the difference between a team that panics and a team that chokes, and why does it matter?
    • How does Reflex use AI agents to adapt the simulation based on what the team actually does?
    • Can you run separate tabletops for technical, legal, and executive audiences without multiplying the workload?
    • Is there a risk that security leaders optimize for the AI's score rather than genuine preparedness?
    • How does an AI agent joining a video conference change the way a tabletop runs?
    • How hard should training be relative to the real thing?

    Check out the episode for the answers you need.

    Huge thanks to our sponsor, Reflex Security

    Most tabletop exercises are static, predictable, and easy to pass. Reflex Security built the first tabletop that fights back, throwing teams into dynamic simulations against intelligent AI adversaries that adapt to your every move. With Reflex, your team can move from checkbox exercises to real crisis readiness.

    18 May 2026, 12:55 pm
  • 16 minutes 57 seconds
    Securing Mobile Apps with Guardsquare

    In this episode, Ryan Lloyd, Chief Product Officer at Guardsquare, explains how the platform combines code obfuscation, runtime integrity checks, and real-time threat monitoring to secure mobile apps at the binary level, integrated directly into the CI/CD pipeline. Joining him are TC Niedzialkowski, Head of IT & Security at Opendoor, and Montez Fitzpatrick, CISO at Navvis.

    Want to know:

    • Why does organizational apathy around mobile app security persist even as mobile becomes the primary customer channel?
    • What's the difference between app integrity and code integrity, and why does it matter for defending against repackaging attacks?
    • How does obfuscation function as a real security control rather than just security through obscurity?
    • How does Guardsquare fit into the CI/CD pipeline, and what does the actual build overhead look like for development teams?
    • What API and webhook capabilities exist for routing threat monitoring data into your existing security stack?
    • How does Guardsquare's mobile app attestation model bind server-side APIs to verified legitimate app instances — and why does that matter for stopping bots and credential theft?

    Huge thanks to our sponsor, Guardsquare

    Guardsquare delivers mobile app security without compromise, providing advanced protections for both Android and iOS apps. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication. Learn more about how to protect your app at Guardsquare.com.

    11 May 2026, 10:00 am
  • 19 minutes 41 seconds
    Verifying Identities with Trusona

    In this episode, Ori Eisen, founder and CEO at Trusona, makes a case for getting out of the AI detection arms race entirely. He argues that trying to catch AI-generated fakes with AI detection is the antivirus playbook, and we know how that ends. Trusona instead anchors verification to authoritative sources, DMV records and physical-world signals, things AI can mimic on screen but can't actually own. No pre-registered devices required. And it works in both directions: attackers calling your help desk, and attackers calling your employees while pretending to be IT. Joining him are Eduardo Ortiz, VP and Global Head of Cybersecurity at Techtronic Industries, and Mandy Huth, SVP and CISO at Ultra Clean Technology.

    Want to know:

    • Why do MFA and SSO still leave gaps attackers walk right through?
    • How Trusona verifies identity with no pre-registered devices or tokens?
    • Why building AI detection on top of AI fakes is a losing strategy?
    • How is a false rejection rate of zero achievable without locking out real employees?
    • What deployment actually looks like, and how fast you can be live?
    • Which departments beyond IT need identity verification, and where do you start?
    • How to measure the business value of this beyond just counting blocked account takeovers?
    • Why is a solid help desk protocol still not enough on its own?

    Huge thanks to our sponsor, Trusona

    GenAI supercharges identity impersonation and social engineering attacks – rendering legacy identity verification methods obsolete, especially in high-risk workflows like IT Help Desk password/MFA resets, vendor payment changes, remote employee hiring, or customer account access. Trusona ATO Protect empowers your team to thwart these attacks across business units and channels. GenAI supercharges identity impersonation and social engineering. It's rapidly eroding traditional authentication, especially in high-risk workflows like help desk password or MFA resets, vendor payment changes, remote employee hiring, and customer account access. Trusona's ATO Protect addresses deepfakes and social engineering directly—without adding friction or relying on legacy MFA.

    4 May 2026, 10:00 am
  • 17 minutes 33 seconds
    Transitioning to Quantum-Safe Encryption with enQase

    All links and images can be found on CISO Series.

    In this episode, Raj Patil, CTO at enQase, explains how enQase's full-stack platform helps enterprises implement quantum-safe security through a structured, integrated approach. This covers everything from cryptographic asset discovery and governance to out-of-band key generation for network appliances, without requiring organizations to rip and replace existing infrastructure. Joining him are Ross Young, co-host at CISO Tradecraft, and Adam Palmer, CISO at First Hawaiian Bank.

    Want to know:

    • Why is the post-quantum cryptography transition harder than simply implementing new standards?
    • What three factors should frame every CEO conversation about quantum risk?
    • Where should a highly regulated enterprise start, and what can reasonably wait three to five years?
    • Why should we be planning for "harvest now, decrypt later" attacks right now?
    • How do you build and track a cryptographic bill of materials across hundreds of applications and devices?
    • Why is crypto agility more important than picking the perfect algorithm?

    Huge thanks to our sponsor, enQase

    The enQase Platform empowers enterprises, defense organizations, cloud providers, and critical infrastructure operators to seamlessly adopt quantum-safe technologies while achieving crypto agility across their ecosystems. By combining quantum-grade hardware with software-defined control and interoperability, enQase ensures alignment with NIST standards, delivers unmatched flexibility and compliance readiness, and reduces risk across data, network, and compute layers, all while maintaining business continuity and operational resilience in an evolving cryptographic landscape. Learn more at enqase.com.

    16 March 2026, 10:00 am
  • 18 minutes 44 seconds
    Solving GRC Complexity with Anecdotes
    23 February 2026, 11:00 am
  • 21 minutes 10 seconds
    Operationalizing Threat Intelligence with Recorded Future

    All links and images can be found on CISO Series.

    In this episode, Jamie Zajac, Chief Product Officer at Recorded Future, explains how autonomous threat operations can close this gap by automatically deploying intelligence across security controls at machine speed. Joining him are Dan Holden, CISO at Commerce, and Arvin Bansal, CISO at C&S Wholesale Grocers.

    Want to know:
    • Why do organizations still struggle to operationalize threat intelligence despite massive investments?
    • How does threat intelligence translate into board-level metrics that demonstrate business impact?
    • What do autonomous threat operations mean and how do they differ from traditional threat intelligence?
    • How can intelligence drive faster incident response and more efficient SOC operations?
    • Why third-party risk intelligence matters more than vendor questionnaire scores?
    • How AI is changing the threat landscape and what defenders should prioritize?
    • What does the future of threat intelligence look like in two years?
    • How to use intelligence for policy decisions and budget building, not just tactical blocking?

    A huge thanks to our sponsor, Recorded Future

    Recorded Future is the world's largest threat intelligence company, serving 1,900+ organizations across 80 countries. Its Intelligence Graph® contains 200+ billion nodes of threat data, combining AI analytics with autonomous capabilities to transform manual threat intelligence into automated Intelligence Operations across security ecosystems. Recorded Future was acquired by Mastercard (NYSE: MA) in 2024. Learn more at https://pages.recordedfutureext.com/

    9 February 2026, 11:00 am
  • 21 minutes 42 seconds
    Getting Visibility into AI Usage with Harmonic Security

    All links and images can be found on CISO Series.

    In this episode, Alastair Paterson, CEO and co-founder at Harmonic Security, explains how Harmonic Protect addresses these challenges by securing workforce AI adoption through browser-based visibility, endpoint agents, and MCP gateways. Joining him are Ross Young, co-host at CISO Tradecraft, and Johna Till Johnson, CEO and founder at Nemertes.

    Want to know:

    • Why are enterprises still struggling with AI governance despite years of motivation to solve it?
    • How does Harmonic keep pace with 50,000+ AI products when the landscape changes monthly?
    • What's the difference between visibility, coaching, and blocking in AI governance?
    • How do you implement AI controls without creating thousands of new alerts for security teams?
    • Where does Harmonic fit in the multi-step process of setting policy, monitoring compliance, and enforcement?
    • How can CISOs measure the ROI of AI governance tools and benchmark against industry peers?
    • What's Harmonic's strategy with secure AI browsers?
    • Why should AI browsers be blocked by default in the enterprise?
    • What should CISOs prioritize for AI security in 2026?

    Huge thanks to our sponsor, Harmonic Security

    As every employee adopts AI in their work, organizations need control and visibility. Harmonic Security delivers AI Governance and Control, the intelligent control layer that secures and enables the AI-First workforce. By understanding user intent and data context in real time, Harmonic gives security leaders all they need to help their companies innovate at pace. Learn more at www.harmonic.security.

    2 February 2026, 11:00 am
  • 21 minutes 52 seconds
    Unifying Detection and Response with Athena Security

    In this episode, Peter Worth, founder, president, and CEO at Athena Security, explains how their security operations platform addresses these challenges through unified detection and response. Joining him are Jason Taule, CISO at Luminous Health, and Will Gregorian, head of security at Galileo Medical.

    Want to know:

    • Why are security teams still struggling with alert fatigue despite decades of awareness?
    • How does security product fragmentation create blind spots in enterprise defense?
    • What's the difference between indicators of compromise and indicators of attack?
    • How do AI anomaly detection systems avoid declaring malicious activity "normal"?
    • What strategies prevent model drift and adversarial poisoning in AI-based threat detection?
    • Why does each client need their own behavioral baseline model?
    • How do open source foundations impact enterprise security platform reliability?
    • Why are CISOs increasingly held personally accountable for security incidents?

    Huge thanks to our episode sponsor, Athena Security Group

    Athena Security Group delivers a best in class, AI enabled, Cyber Defense solution (SIEM, EDR, XDR & MDR) on top of Wazuh's award winning open-source SIEM/EDR platform, synthesizing and consolidating cyber security alert management and response across the entire security operations landscape, facilitating intelligent and efficient cybersecurity decision making and response for the modern enterprise, table stakes in the age of AI.

    26 January 2026, 11:00 am
  • 17 minutes 55 seconds
    Bridging the Cloud Security Gap with Trend Micro

    In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integration overhead. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Jason Shockey, CSO at Cenlar FSB.

    Want to know:
    • Why do organizations still struggle with cloud visibility despite years of cloud adoption?
    • How does Trend Micro reconcile security visibility with privacy laws across different jurisdictions?
    • What security frameworks does Trend Micro use to measure and define acceptable risk?
    • How does cyber risk quantification tie technical security metrics to business impact analysis?
    • What questions help determine the financial impact of potential security incidents?
    • How long does implementation take for fully cloud versus hybrid environments?
    • What safeguards prevent overdependence on a single security vendor?
    • Where does Trend Micro draw the line between automated decision-making and human oversight?
    • How does Trend Micro protect AI infrastructure and prevent sensitive data exposure in prompts?
    Huge thanks to our sponsor, Trend Micro

    Cloud risk never sleeps. That's why there's Trend Vision One™ Cloud Security. Gain comprehensive visibility and control over your multi-cloud and hybrid environments. Streamline compliance, manage risks proactively, and enhance operational efficiency with real-time risk assessments, automated vulnerability management, and centralized dashboards. Ensure robust protection and peace of mind for your cloud assets with the trusted leader in CNAPP.
    12 January 2026, 3:17 pm
  • 16 minutes 53 seconds
    Stopping Lateral Movement with Zero Networks

    All links and images can be found on CISO Series.

    In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaking existing environments. Joining him are Shaun Marion, vp and CSO at Xcel Energy, and Doug Mayer, vp and CSO at WCG.

    Want to know:
    • Why does complexity make lateral movement such a persistent problem despite years of awareness?
    • How can microsegmentation be deployed at scale without becoming a massive science project?
    • How does Zero Networks handle MFA and privileged access management across all asset types?
    • What happens if there's already a threat living in your environment during the learning phase?
    • How to segment OT environments that use different protocols beyond standard IT systems?
    • Can automated learning really create accurate policies without extensive human intervention?
    • How does network segmentation fit into AI capabilities and hybrid cloud strategies?
    • What's the real-world experience of customers who've deployed automated microsegmentation?
    Huge thanks to our sponsor, Zero Networks

    Zero Networks enables organizations to dynamically microsegment 90%+ of their networks in 90 days. The result? A self-defending, resilient network where defenders act with confidence, auditors gain clear assurance, and business operations continue uninterrupted. Step into the Era of the Defender with Zero – get a demo HERE.

    5 January 2026, 3:13 pm
  • 19 minutes 59 seconds
    Verifying Identity with Incode Technologies

    All links and images can be found on CISO Series.

    Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and existing IAM platforms still trust the human layer far too easily.

    In this episode, Fernanda Sottil, Senior Director of Strategy at Incode Technologies, explains how their solution adds a real-world identity layer that integrates seamlessly with existing IAM systems. Joining her are Nick Espinosa, host of the Deep Dive radio show and Bozidar Spirovski, CISO at Blue Dot.

    Questions answered on the show:

    • How does Incode comply with GDPR when training AI models on employee facial data?
    • What happens when legitimate users get blocked, especially job candidates?
    • How does Incode maintain accuracy across 4,600 document types in 200 countries?
    • Can organizations see error rates and override the system when needed?
    • How quickly can Incode patch new attack vectors as adversarial threats evolve?

    Huge thanks to our sponsor, Incode Technologies

    Incode Workforce helps enterprises stop deepfakes, prevent fraud, and secure every identity moment. By matching an ID to a selfie with AI-powered biometrics, Incode confirms the real person behind each IAM interaction, safeguarding onboarding, access, and recovery with frictionless verification that ensures workforce security and trust at scale.

    1 December 2025, 11:00 am
  • More Episodes? Get the App