CSO Perspectives (public)

CSO Perspectives (public)

Encore episodes available free
This is not your typical security interview show. Join CSO and Chief Analyst, Rick Howard, as he discusses the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. Rick is regularly joined by CyberWire's Hash Table experts to offer opposing viewpoints, diverse perspectives and hash out differences when theory and practice collide.
Join Pro Today
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.


Recent Episodes

Ep 19 | 10.11.21

Data loss protection: around the Hash Table.

Four members of the CyberWire’s hash table of experts discuss the things they worry about when it comes to data loss protection.

Ep 18 | 10.4.21

Data loss protection: a first principle idea.

Rick discusses data loss protection as a first principle strategy using NIST and Forrester as a guide. The new thing to consider is running a deception network.

Ep 17 | 9.27.21

Incident response: around the Hash Table.

Four members of the CyberWire’s hash table of experts: Jerry Archer - Sallie Mae CSO Ted Wagner - SAP National Security Services CISO Steve Winterfeld - Akamai Advisory CISO Rick Doten - Centene CISO discuss the things they worry about when it comes to incident response.

Ep 16 | 9.20.21

Incident response: a first principle idea.

Rick discusses incident response as a best practice for the network defender community, talks briefly about Zoom and how well their communications plan worked earlier this year when the network defender community called their web conferencing app out on several security issues, and how poorly OPM handled their incident response when the Chinese stole the PII of every person that worked in the U.S. government. Finally, he talks about the birth of incident response and the most influential cybersecurity book ever: “The Cuckoo’s Egg.”

Ep 15 | 9.13.21

Security operations centers: around the Hash Table.

Four members of the CyberWire’s Hash Table of experts: Don Welch: Interim CIO of Penn State University Helen Patton: CISO for Ohio State University Bob Turner: CISO for the University of Wisconsin at Madison Kevin Ford: CISO for the State of North Dakota discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.

Load More
CSO Perspectives (public)
Rick Howard
Hash Table logo
Rick Howard is the CSO, Chief Analyst, and Senior Fellow at the CyberWire. Past lives include CSO at Palo Alto Networks, TASC, iDefense GM, Counterpane SOC Director, and the Army's Computer Emergency Response Team (CERT) Commander. Rick served 25 years in the Army, taught computer science at West Point, and edited two books. Rick is regularly joined by the CyberWire's Hash Table experts.
Schedule: Mondays (in season)
Credits: Edited by John Petrik and executive produced by Peter Kilpe. Our them song is by Blue Dot Sessions, remixed by the insanely talented Elliott Peltzman, who also does the show's mixing, sound, and original score
Creator: CyberWire, Inc.
CyberWire logo