Menu
Sign In Search Podcasts Libraries Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

CISO Series Podcast

Step 1: Deploy New AI Tool. Step 2: Discover Security Flaws. Step 3: Repeat. (LIVE in Orlando)

28 Apr 2026

Transcription

Chapter 1: What are the biggest mistakes in cybersecurity?

0.031 - 3.478 Unknown

biggest mistake I ever made in security. Go.

0

4.139 - 22.815 Rob Allen

I may have accidentally once left a OMG cable at a security conference that I was demonstrating with and I forgot to put it in my bag and I left it around. So there's probably somebody now charging their phone with an OMG cable. So I'm sorry.

0

23.943 - 30.983 Unknown

It's time to begin the CISO Series podcast recorded in front of a live audience in Orlando.

0

40.902 - 70.824 David Spark

Welcome to the CISO Series podcast. I'm David Spark. I am the host and the producer of the CISO Series. And joining me to my immediate left is my guest co-host for this episode. It is the CISO of Movement Mortgage, Michelle Wilson. Let's hear it for her. We are available at CISOseries.com. And if you don't know it, our sponsor for today's episode is ThreatLocker.

0

71.305 - 100.592 David Spark

Allow what you need, block everything else by default, including ransomware and rogue code. We are at Zero Trust World in Orlando right now. Let's hear it for everybody. Thank you for coming on out. And I also want to introduce our sponsor guest, who's to my far left over here, and he usually goes by the title of Chief Product Officer for ThreatLocker, Rob Allen. Let's hear it for Rob.

100.632 - 103.259 David Spark

Not today, friends. Not today. Not today.

103.741 - 122.819 Rob Allen

Chief... Podcast officer today. And I want to give a shout out to Paola, one of our marketing rock stars who organized this for me. I also want to give a shout out to David Covert for organizing this and convincing me to actually get on stage with David Spark again. And I want to give a massive shout out.

122.919 - 131.727 Rob Allen

I know it's been mentioned already, but Heather and all of the events team who have put this entire event together. Bigger, better than ever. And I want to praise

131.707 - 157.495 Rob Allen

proper right round of applause i want some whoops i want some hollers come on come on there we go thank you very much thank you very much so yes chief podcast officer for the day michelle you haven't spoken yet people don't know your voice yet it's okay they'll they'll get to hear me they'll get to hear you plenty all right okay what's the risk

Chapter 2: How can organizations build a risk-aware culture?

717.378 - 724.349 David Spark

First of all, have you tried any agentic efforts in your environment? We have some pilots going at this point.

0

724.369 - 735.548 Michelle Wilson

And what have you discovered? We had to build a kill switch to be able to turn it off if it was doing something that we didn't want in the environment. So that's part of our incident response plan now.

0

736.355 - 741.329 David Spark

And did it behave well? Did you have to hit the kill switch?

0

741.349 - 744.799 Michelle Wilson

It actually behaved fine. We just wanted to make sure we had that ready.

0

745.381 - 748.49 David Spark

Right. Understandably.

749.453 - 751.258 Unknown

Who's our sponsor this week?

753.145 - 774.607 David Spark

Surprise, our sponsor is ThreatLocker. You all know them, but let me tell you a little about them if you don't know all this. CISOs don't lose sleep over the malware they see. They lose sleep over the things they trusted that they shouldn't have because that's how modern breaches happen. Not through zero days, through everyday tools, doing things no one realized they could do.

775.088 - 799.498 David Spark

And that's exactly the problem ThreatLocker eliminates. ThreatLocker enforces default deny, as was just mentioned, at the point of execution. If it's not approved, it doesn't run, period. Your attack surface collapses from, quote, everything on the endpoint, end quote, to only what you say is allowed. And the real power? ThreatLocker controls how trusted tools behave.

800.139 - 818.962 David Spark

PowerShell can't start scraping credentials. Chrome can't start launching scripts. And your Remote Monitoring and Management, or RMM, can't suddenly turn into an attacker's remote access platform. CISOs say the same thing, quote, this is the first time I've felt actual control instead of alert fatigue.

Chapter 3: How can we manage security risks effectively?

985.831 - 986.472 Michelle Wilson

I'm in a breach.

0

986.893 - 992.908 David Spark

Much worse than just being hated. But the lasting pain of this second scenario, that's better? Yeah.

0

992.888 - 995.511 Michelle Wilson

I can I can rewind trust.

0

996.052 - 998.094 David Spark

No, no, no. It's questionable.

0

998.114 - 998.595 Michelle Wilson

It's forever.

999.036 - 1001.198 David Spark

Yeah, this is going to be you can't rewrite the scenario.

1001.218 - 1002.64 Michelle Wilson

I'd still rather not have the breach.

1003.04 - 1012.452 David Spark

Well, I know. I don't know. So you could you'd rather be continuously hated. Absolutely. Then have a breach. Absolutely. OK, that's good. All right. Let's hear it.

1012.472 - 1016.837 Rob Allen

Rob, same thing here. Can I just say, first of all, this isn't on my piece of paper, right?

Chapter 4: What role do AI agents play in cybersecurity?

1403.993 - 1427.361 David Spark

All right, by applause, how many people here think Michelle wins? By applause. In both cases. Anyone think Rob's going to win here by applause? Rob, your host. Okay, can we just have one that involves ransomware, please? All right, click a new attack again. Let's see if we get a ransomware one. I have no idea. A disgruntled employee steals sensitive data company.

0

1427.381 - 1430.747 Rob Allen

You're hosed. I reject the premise of this game.

0

1433.258 - 1435.502 Unknown

That might not have been the best decision.

0

1438.686 - 1460.16 David Spark

All right, a door with a combination lock whose code is printed on it is no longer locked. David Travis, City of Auburn, posted a photo of the offending door lock to mock it and show how the blast radius expands when someone bypasses the control. And it was just a photo of a lock and literally had the four-digit code printed right above the lock.

0

1460.14 - 1474.02 David Spark

Now, that's the knee-jerk reaction, though, what David Travis said, of a security professional and understandable. You know, at one time, that door did need to be locked. But it's possible systems have changed. That door doesn't need to be locked anymore.

1474.581 - 1500.316 David Spark

If that's the case, honestly, it's far easier and cheaper to just post a code on top of the lock than finding a locksmith to remove the no longer needed lock. So system design requires security professionals to walk in users' footsteps. When do you ask, and I'll start with you, Rob, here, why is this control here? And what risk is mitigated by having this control?

1500.336 - 1507.866 David Spark

I mean, is this the regular process you go through to audit your security controls or do you do something else? How do you handle it?

1509.061 - 1517.092 Rob Allen

That was a really long-winded way of getting around to a question about reviewing controls. I'm trying to set it up with a colorful picture.

1517.152 - 1522.86 David Spark

I was going to say, you were painting a picture there, David. I could have started the segment, how do you review controls, Robin?

Comments

There are no comments yet.

Please log in to write the first comment.