• Getting Visibility into AI Usage with Harmonic Security
    Feb 2 2026

    All links and images can be found on CISO Series.

    In this episode, Alastair Paterson, CEO and co-founder at Harmonic Security, explains how Harmonic Protect addresses these challenges by securing workforce AI adoption through browser-based visibility, endpoint agents, and MCP gateways. Joining him are Ross Young, co-host at CISO Tradecraft, and Johna Till Johnson, CEO and founder at Nemertes.

    Want to know:

    • Why are enterprises still struggling with AI governance despite years of motivation to solve it?
    • How does Harmonic keep pace with 50,000+ AI products when the landscape changes monthly?
    • What's the difference between visibility, coaching, and blocking in AI governance?
    • How do you implement AI controls without creating thousands of new alerts for security teams?
    • Where does Harmonic fit in the multi-step process of setting policy, monitoring compliance, and enforcement?
    • How can CISOs measure the ROI of AI governance tools and benchmark against industry peers?
    • What's Harmonic's strategy with secure AI browsers?
    • Why should AI browsers be blocked by default in the enterprise?
    • What should CISOs prioritize for AI security in 2026?

    Huge thanks to our sponsor, Harmonic Security

    As every employee adopts AI in their work, organizations need control and visibility. Harmonic Security delivers AI Governance and Control, the intelligent control layer that secures and enables the AI-First workforce. By understanding user intent and data context in real time, Harmonic gives security leaders all they need to help their companies innovate at pace. Learn more at www.harmonic.security.

    Show More Show Less
    22 mins
  • Unifying Detection and Response with Athena Security
    Jan 26 2026

    In this episode, Peter Worth, founder, president, and CEO at Athena Security, explains how their security operations platform addresses these challenges through unified detection and response. Joining him are Jason Taule, CISO at Luminous Health, and Will Gregorian, head of security at Galileo Medical.

    Want to know:

    • Why are security teams still struggling with alert fatigue despite decades of awareness?
    • How does security product fragmentation create blind spots in enterprise defense?
    • What's the difference between indicators of compromise and indicators of attack?
    • How do AI anomaly detection systems avoid declaring malicious activity "normal"?
    • What strategies prevent model drift and adversarial poisoning in AI-based threat detection?
    • Why does each client need their own behavioral baseline model?
    • How do open source foundations impact enterprise security platform reliability?
    • Why are CISOs increasingly held personally accountable for security incidents?

    Huge thanks to our episode sponsor, Athena Security Group

    Athena Security Group delivers a best in class, AI enabled, Cyber Defense solution (SIEM, EDR, XDR & MDR) on top of Wazuh's award winning open-source SIEM/EDR platform, synthesizing and consolidating cyber security alert management and response across the entire security operations landscape, facilitating intelligent and efficient cybersecurity decision making and response for the modern enterprise, table stakes in the age of AI.

    Show More Show Less
    22 mins
  • Bridging the Cloud Security Gap with Trend Micro
    Jan 12 2026

    In this episode, Franz Fiorim, field CTO at Trend Micro, explains how Trend Vision One consolidates multiple cloud security tools across AWS, GCP, Azure, Oracle Cloud, and Alibaba Cloud to streamline management, automate controls, and reduce integration overhead. Joining him are Nick Espinosa, host of the Deep Dive Radio Show, and Jason Shockey, CSO at Cenlar FSB.

    Want to know:
    • Why do organizations still struggle with cloud visibility despite years of cloud adoption?
    • How does Trend Micro reconcile security visibility with privacy laws across different jurisdictions?
    • What security frameworks does Trend Micro use to measure and define acceptable risk?
    • How does cyber risk quantification tie technical security metrics to business impact analysis?
    • What questions help determine the financial impact of potential security incidents?
    • How long does implementation take for fully cloud versus hybrid environments?
    • What safeguards prevent overdependence on a single security vendor?
    • Where does Trend Micro draw the line between automated decision-making and human oversight?
    • How does Trend Micro protect AI infrastructure and prevent sensitive data exposure in prompts?
    Huge thanks to our sponsor, Trend Micro

    Cloud risk never sleeps. That's why there's Trend Vision One™ Cloud Security. Gain comprehensive visibility and control over your multi-cloud and hybrid environments. Streamline compliance, manage risks proactively, and enhance operational efficiency with real-time risk assessments, automated vulnerability management, and centralized dashboards. Ensure robust protection and peace of mind for your cloud assets with the trusted leader in CNAPP.
    Show More Show Less
    18 mins
  • Stopping Lateral Movement with Zero Networks
    Jan 5 2026

    All links and images can be found on CISO Series.

    In this episode, Benny Lakunishok, co-founder and CEO at Zero Networks, explains how their automated approach to microsegmentation addresses these challenges by putting a network bubble around every asset, from clients and servers to OT devices and cloud resources, without requiring agents or breaking existing environments. Joining him are Shaun Marion, vp and CSO at Xcel Energy, and Doug Mayer, vp and CSO at WCG.

    Want to know:
    • Why does complexity make lateral movement such a persistent problem despite years of awareness?
    • How can microsegmentation be deployed at scale without becoming a massive science project?
    • How does Zero Networks handle MFA and privileged access management across all asset types?
    • What happens if there's already a threat living in your environment during the learning phase?
    • How to segment OT environments that use different protocols beyond standard IT systems?
    • Can automated learning really create accurate policies without extensive human intervention?
    • How does network segmentation fit into AI capabilities and hybrid cloud strategies?
    • What's the real-world experience of customers who've deployed automated microsegmentation?
    Huge thanks to our sponsor, Zero Networks


    Zero Networks enables organizations to dynamically microsegment 90%+ of their networks in 90 days. The result? A self-defending, resilient network where defenders act with confidence, auditors gain clear assurance, and business operations continue uninterrupted. Step into the Era of the Defender with Zero – get a demo HERE.

    Show More Show Less
    17 mins
  • Verifying Identity with Incode Technologies
    Dec 1 2025

    All links and images can be found on CISO Series.

    Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and existing IAM platforms still trust the human layer far too easily.

    In this episode, Fernanda Sottil, Senior Director of Strategy at Incode Technologies, explains how their solution adds a real-world identity layer that integrates seamlessly with existing IAM systems. Joining her are Nick Espinosa, host of the Deep Dive radio show and Bozidar Spirovski, CISO at Blue Dot.

    Questions answered on the show:

      • How does Incode comply with GDPR when training AI models on employee facial data?
      • What happens when legitimate users get blocked, especially job candidates?
      • How does Incode maintain accuracy across 4,600 document types in 200 countries?
      • Can organizations see error rates and override the system when needed?
      • How quickly can Incode patch new attack vectors as adversarial threats evolve?

      Huge thanks to our sponsor, Incode Technologies

      Incode Workforce helps enterprises stop deepfakes, prevent fraud, and secure every identity moment. By matching an ID to a selfie with AI-powered biometrics, Incode confirms the real person behind each IAM interaction, safeguarding onboarding, access, and recovery with frictionless verification that ensures workforce security and trust at scale.

      Show More Show Less
      20 mins
    • Securing Application Delivery with Island
      Nov 17 2025

      All links and images can be found on CISO Series.

      Modern application security has become a tangled mess of VPNs, proxies, DLP, CASBs, and remote browser tools—all creating friction for users and security teams alike. The root issue? Browsers were built for consumers, not enterprise security, forcing organizations to pile on complexity that undermines both protection and performance.

      In this episode, Braden Rogers, chief customer officer at Island, explains how their enterprise browser platform rethinks application delivery by building security services natively into the browsing experience. Joining him are Nick Ryan, former CISO, and Janet Heins, CISO at ChenMed.

      Want to know:

      • How do you explain this approach to your CEO in plain English?
      • What's the real architecture difference between enterprise browsers and traditional VDI?
      • How do you deploy a new browser to 20,000 users without change management chaos?
      • What happens to your existing security stack when you add an enterprise browser?
      • Can users access personal apps while keeping corporate data protected?
      • What's the offline experience when cloud services fail?
      • How does this handle the surge of AI tools in your organization?
      • What's the difference between browser enforcement and a full enterprise browser?
      • How do you apply different security controls without overwhelming users?
      • What does vendor support actually look like from pilot to production?
      Huge thanks to our episode sponsor, Island What if you no longer had to bolt agents, proxies, and gateways onto browsers? Island, the Enterprise Browser, embeds core security, IT, and productivity into the workspace. Intelligent boundaries keep data where it belongs. Orgs have full visibility into all work. And users enjoy a fast, smooth, and productive experience. Learn more at Island.io
      Show More Show Less
      16 mins
    • Optimizing Access Management with Imprivata
      Nov 3 2025

      Watch our demo with Imprivata on our site.

      In this episode, Chip Hughes, chief product officer at Imprivata, explains how the company addresses shared access management challenges with specialized solutions that prioritize both security and user experience. Joining him are Kathleen Mullin, former CISO at MyCareGorithm, and Howard Holton, CEO at GigaOm.

      Want to know:

      • Why does shared access management remain such a persistent challenge across industries?
      • What does Imprivata's solution actually do versus traditional IAM tools?
      • How does passwordless authentication work in high-security, high-speed environments?
      • What authentication modalities beyond badges are organizations adopting?
      • How can organizations integrate access management across devices, operating systems, and applications?
      • What are the unique access challenges in healthcare, law enforcement, and manufacturing?
      • Can shared mobile devices provide enterprise-grade security while reducing hardware costs?

      Huge thanks to our sponsor, Imprivata

      Imprivata delivers solutions that provide simple and secure access management for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure. Imprivata solves complex security, workflow, and compliance challenges with solutions that facilitate seamless user access, protect against internal and external security threats, and reduce total cost of ownership. Learn more at https://www.imprivata.com/

      Show More Show Less
      18 mins
    • Securing Your Attack Path with SpecterOps
      Oct 27 2025

      All links and images can be found on CISO Series.

      Identity has become the Gordian knot of cybersecurity. Threat actors no longer need to break in. They log in. As organizations manage increasingly complex ecosystems spanning cloud, on-premises, and hybrid environments, the challenge isn't just understanding who has access to what. It's about understanding how an attacker could chain together seemingly innocent permissions to escalate from an initially compromised user to full environment control.

      The problem is compounded by privilege creep, where employees accumulate access over time as roles change and exceptions pile up without systematic review. Traditional security tools excel at protecting identities at rest or governing access for individual users. Still, they often miss the needle in the haystack: the cascading attack paths that adversaries actively exploit.

      In this episode, Justin Kohler, chief product officer at SpecterOps, explains how Bloodhound Enterprise addresses these challenges by proactively uncovering and eliminating attack paths before adversaries can exploit them, transforming abstract permissions into visual maps that show precisely how attackers could move through your environment. Joining him are Angela Williams, SVP and CISO at UL Solutions, and Brett Conlon, CISO at American Century Investments.

      Want to know:

      • Why does identity security remain such a persistent challenge for organizations?
      • What attack path management actually does versus traditional identity governance tools?
      • How does Bloodhound Enterprise complement other solutions in your stack?
      • How to visualize and prioritize the attack paths that matter most?
      • What emerging identity-based threats should CISOs prioritize over the next 12 months?
      • How has the definition of "identity" evolved beyond just human users?
      • Can continuous attack path mapping keep pace with dynamic cloud environments?

      Huge thanks to our sponsor, SpecterOps

      SpecterOps' 2025 State of Attack Path Management report reveals how technical debt transforms into identity risk and provides actionable strategies for security teams. Drawing insights from the creators of BloodHound, this report outlines proven methods for strengthening identity directory security to prevent costly breaches. Learn more at https://specterops.io/.

      Show More Show Less
      15 mins