All links and images can be found on CISO Series.
In this episode, Raj Patil, CTO at enQase, explains how enQase's full-stack platform helps enterprises implement quantum-safe security through a structured, integrated approach. This covers everything from cryptographic asset discovery and governance to out-of-band key generation for network appliances, without requiring organizations to rip and replace existing infrastructure. Joining him are Ross Young, co-host at CISO Tradecraft, and Adam Palmer, CISO at First Hawaiian Bank.
Want to know:Huge thanks to our sponsor, enQase
The enQase Platform empowers enterprises, defense organizations, cloud providers, and critical infrastructure operators to seamlessly adopt quantum-safe technologies while achieving crypto agility across their ecosystems. By combining quantum-grade hardware with software-defined control and interoperability, enQase ensures alignment with NIST standards, delivers unmatched flexibility and compliance readiness, and reduces risk across data, network, and compute layers, all while maintaining business continuity and operational resilience in an evolving cryptographic landscape. Learn more at enqase.com.
All links and images can be found on CISO Series.
In this episode, Jamie Zajac, Chief Product Officer at Recorded Future, explains how autonomous threat operations can close this gap by automatically deploying intelligence across security controls at machine speed. Joining him are Dan Holden, CISO at Commerce, and Arvin Bansal, CISO at C&S Wholesale Grocers.
Want to know:A huge thanks to our sponsor, Recorded Future
Recorded Future is the world's largest threat intelligence company, serving 1,900+ organizations across 80 countries. Its Intelligence Graph® contains 200+ billion nodes of threat data, combining AI analytics with autonomous capabilities to transform manual threat intelligence into automated Intelligence Operations across security ecosystems. Recorded Future was acquired by Mastercard (NYSE: MA) in 2024. Learn more at https://pages.recordedfutureext.com/
All links and images can be found on CISO Series.
In this episode, Alastair Paterson, CEO and co-founder at Harmonic Security, explains how Harmonic Protect addresses these challenges by securing workforce AI adoption through browser-based visibility, endpoint agents, and MCP gateways. Joining him are Ross Young, co-host at CISO Tradecraft, and Johna Till Johnson, CEO and founder at Nemertes.
Want to know:
Huge thanks to our sponsor, Harmonic Security As every employee adopts AI in their work, organizations need control and visibility. Harmonic Security delivers AI Governance and Control, the intelligent control layer that secures and enables the AI-First workforce. By understanding user intent and data context in real time, Harmonic gives security leaders all they need to help their companies innovate at pace. Learn more at www.harmonic.security.
In this episode, Peter Worth, founder, president, and CEO at Athena Security, explains how their security operations platform addresses these challenges through unified detection and response. Joining him are Jason Taule, CISO at Luminous Health, and Will Gregorian, head of security at Galileo Medical.
Want to know:Huge thanks to our episode sponsor, Athena Security Group
Athena Security Group delivers a best in class, AI enabled, Cyber Defense solution (SIEM, EDR, XDR & MDR) on top of Wazuh's award winning open-source SIEM/EDR platform, synthesizing and consolidating cyber security alert management and response across the entire security operations landscape, facilitating intelligent and efficient cybersecurity decision making and response for the modern enterprise, table stakes in the age of AI.
In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integration overhead. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Jason Shockey, CSO at Cenlar FSB.
Want to know:All links and images can be found on CISO Series.
In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaking existing environments. Joining him are Shaun Marion, vp and CSO at Xcel Energy, and Doug Mayer, vp and CSO at WCG.
Want to know:Zero Networks enables organizations to dynamically microsegment 90%+ of their networks in 90 days. The result? A self-defending, resilient network where defenders act with confidence, auditors gain clear assurance, and business operations continue uninterrupted. Step into the Era of the Defender with Zero – get a demo HERE.
All links and images can be found on CISO Series.
Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and existing IAM platforms still trust the human layer far too easily.
In this episode, Fernanda Sottil, Senior Director of Strategy at Incode Technologies, explains how their solution adds a real-world identity layer that integrates seamlessly with existing IAM systems. Joining her are Nick Espinosa, host of the Deep Dive radio show and Bozidar Spirovski, CISO at Blue Dot.
Questions answered on the show:Huge thanks to our sponsor, Incode Technologies
Incode Workforce helps enterprises stop deepfakes, prevent fraud, and secure every identity moment. By matching an ID to a selfie with AI-powered biometrics, Incode confirms the real person behind each IAM interaction, safeguarding onboarding, access, and recovery with frictionless verification that ensures workforce security and trust at scale.
All links and images can be found on CISO Series.
Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermines both protection and performance.
In this episode, Braden Rogers, chief customer officer at Island, explains how their enterprise browser platform rethinks application delivery by building security services natively into the browsing experience. Joining him are Nick Ryan, former CISO, and Janet Heins, CISO at ChenMed.
Want to know:
Watch our demo with Imprivata on our site.
In this episode, Chip Hughes, chief product officer at Imprivata, explains how the company addresses shared access management challenges with specialized solutions that prioritize both security and user experience. Joining him are Kathleen Mullin, former CISO at MyCareGorithm, and Howard Holton, CEO at GigaOm.
Want to know:
Huge thanks to our sponsor, Imprivata
Imprivata delivers solutions that provide simple and secure access management for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata solves complex security, workflow, and compliance challenges with solutions that facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership. Learn more at https://www.imprivata.com/
All links and images can be found on CISO Series.
Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, and hybrid environments, the challenge isn't just understanding who has access to what. It's about understanding how an attacker could chain together seemingly innocent permissions to escalate from an initially compromised user to full environment control.
The problem is compounded by privilege creep, where employees accumulate access over time as roles change and exceptions pile up without systematic review. Traditional security tools excel at protecting identities at rest or governing access for individual users. Still, they often miss the needle in the haystack: the cascading attack paths that adversaries actively exploit.
In this episode, Justin Kohler, chief product officer at SpecterOps, explains how Bloodhound Enterprise addresses these challenges by proactively uncovering and eliminating attack paths before adversaries can exploit them, transforming abstract permissions into visual maps that show precisely how attackers could move through your environment. Joining him are Angela Williams, SVP and CISO at UL Solutions, and Brett Conlon, CISO at American Century Investments.
Want to know:
Huge thanks to our sponsor, SpecterOps
SpecterOps' 2025 State of Attack Path Management report reveals how technical debt transforms into identity risk and provides actionable strategies for security teams. Drawing insights from the creators of BloodHound, this report outlines proven methods for strengthening identity directory security to prevent costly breaches. Learn more at https://specterops.io/.