Avsnitt

  • A fantastic first season of Capture the CISO finishes with a fantastic finale.

    The show went live last Friday, June 17th, 2022, and you can watch it right here, or please listen to the finished edited audio here.

    The entire season of Capture the CISO including this finale was hosted by Johna Till Johnson, CEO, Nemertes.

    Our judges for the final episode were:

    Yaron Levi, CISO, Dolby Laboratories John Overbaugh, CISO, Alpine Software Group

    The four contestants in the final episode will be:

    Ivan Tsarynny, CEO, Feroot Vladimir (Vladi) Sandler, CEO, Lightspin Leonid Belkind, co-founder and CTO, Torq Aviv Grafi, founder and CTO, Votiro

    Check out the contestants, our shows, links to subscribe to the podcast, and all the vendors demo videos on the Capture the CISO show page.

    We welcome active discussion and debate about all vendor contestants.

    And a huge thanks to our finals contestants who are also sponsors of Capture the CISO.

    Feroot

    Lightspin

    Torq

    Votiro

  • To watch the demo videos, and see the transcript, check out the blog post of this episode on CISOseries.com.

    Welcome to episode three of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.

    Our judges are Dan Walsh, CISO, Village MD and Hadas Cassorla, CISO, M1.

    Our contestants:

    Ivan Tsarynny, CEO, Feroot David Leone, Sr. Customer Success Manager, Perception Point Zack Ganot, CEO, Sunday Security

    Huge thanks to all our contestants who are also sponsors of Capture the CISO

    Feroot

    Perception Point

    Sunday Security

  • Saknas det avsnitt?

    Klicka här för att uppdatera flödet manuellt.

  • Welcome to episode two of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.

    Our judges are Edward Contreras, CISO, Frost Bank and Mark Eggleston, CISO, CSC.

    Our contestants:

    Vladimir (Vladi) Sandler, CEO, Lightspin
    Nick Popovich, hacker in residence, PlexTrac
    Leonid Belkind, co-founder and CTO, Torq

    Huge thanks to all our contestants who are also sponsors of Capture the CISO.

    Lightspin

    Lightspin’s next-gen cloud security platform built on Neo4j graph database prioritizes risk in cloud and Kubernetes environments focusing DevSecOps efforts on the critical issues that matter most. Our developer friendly platform provides plug and play remediation in the form of IaC, and scans pre-production code to catch misconfigurations, which are the main cause of breaches. Lighstpin proudly focuses on small and medium-sized businesses running workloads in the cloud, offering a free version of the platform including the industry’s only graph-based Attack Path risk prioritization. For an affordable, efficient, and secure cloud experience loved by engineers learn more at www.lightspin.io.

    PlexTrac

    A better security posture begins and ends with PlexTrac, the Proactive Cybersecurity Management Platform that streamlines your entire security workflow. Maximize ROI by aggregating findings from all your sources, generating robust analytics, cutting reporting time in half, and assigning and tracking remediation — all in one platform. Facilitate collaboration and communication across offensive engagements, monitor team performance, and analyze your security posture in real-time. PlexTrac makes cybersecurity teams more efficient, effective, and proactive to help them win the right security battles.

    Generate better reports. Promote closer collaboration. Enable faster remediation. Gain more insights. PlexTrac is the must-have platform for security teams.

    Torq

    Torq is a no-code automation platform for security teams. It helps people of any skill level automate workflows to streamline and reinforce security processes, using a drag-and-drop editor and guided configurations. Workflows can be built with templates from our ever-growing library, helping users automate even the most complex processes with ease. The platform readily integrates with any other system out of the box—no special connectors, just limitless integrations. With Torq, teams maximize protection while minimizing complexity, creating a more dynamic and enduring security posture.

  • Welcome to episode one of Capture the CISO, hosted by Johna Till Johnson, CEO, Nemertes.

    Please go to the blog post for this episode to check out the demo videos of all the contestants.

    Our judges are Shawn Bowen, CISO, World Fuel Services and Mike Johnson, co-host, CISO Series Podcast and CISO for Fastly.

    Our contestants:

    Christopher Gomes, head of product, Conveyor Jake Flynn, sales engineer, Pentera Aviv Grafi, founder and CTO, Votiro

    Huge thanks to all our contestants who are also sponsors of Capture the CISO

    Conveyor

    Conveyor makes security reviews fast, easy, and accurate for both vendors and their customers. How? By making it easy for 3rd party risk teams to get basic info on vendors, request access to their security docs (like SOC 2s and PenTests), and get their security questions answered without actually issuing a questionnaire. Check out our video to see how Conveyor can save you 71% of your time on your vendor security reviews.

    Pentera

    Pentera’s Automated Security Validation Platform is designed to help teams increase their security posture against modern day threats across the entire attack surface. Evaluate your security readiness with continuous and consistent autonomous testing with granular visibility into every execution along the way. Validate your tools are working effectively by safely emulating attacks & prioritize your remediation efforts with true contextual driven results. With Mitre ATT&CK framework mapping, stay on top and test your environment against adversary techniques to create an optimized process from testing to in-production. Don’t just operate, validate!

    Votiro

    Can you trust the files and content entering your organization? Votiro Cloud's Zero Trust open API proactively disarms files of known, unknown, & zero-day malware threats at scale without adding friction, interrupting user or application workflows, or impacting file fidelity. Votiro reduces work, alerts, & risk for IT and security teams while enabling the seamless flow of safe files.

    Votiro is tool-agnostic, and provides virtually limitless auto-scale capabilities to handle any file throughput and the greatest span of file formats, preventing malicious files uploaded to web apps, portals, data management platforms, and cloud services.

  • Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables: Is it innovative?
    Does it solve a real need?
    How easy is it to deploy?