Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
News
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/06/a0/d1/06a0d16b-a3c4-85c7-166b-51afb04399ed/mza_9846993492654717071.png/600x600bb.jpg
Capture the CISO
CISO Series
10 episodes
9 months ago
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?
Show more...
Technology
RSS
All content for Capture the CISO is the property of CISO Series and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/06/a0/d1/06a0d16b-a3c4-85c7-166b-51afb04399ed/mza_9846993492654717071.png/600x600bb.jpg
Season 2: BugProve, Egress, Zenity
Capture the CISO
37 minutes 48 seconds
1 year ago
Season 2: BugProve, Egress, Zenity
Welcome to episode three of Capture the CISO Season 2! Our judges are Christina Shannon, CIO, KIK Consumer Products and  Dan Walsh, CISO, VillageMD. Our contestants: Attila Szász, CEO & Founder, BugProve Steve Malone, VP of Product Management, Egress Ben Kliger, CEO, Zenity Huge thanks to all our contestants who are also sponsors of Capture the CISO BugProve BugProve offers a vulnerability management platform for embedded devices.  Its unique feature of identifying zero-day vulnerabilities sets it apart from other solutions, ensuring proactive protection against emerging threats. By providing comprehensive software bills of materials and identifying vulnerabilities in open-source components, it offers a holistic view of device security, and its monitoring function empowers organizations to act fast. These features help companies get compliant with upcoming regulations such as CRA, RED, and Cyber Trust Mark. Its high-speed scans deliver results within minutes, accelerating the testing process significantly. Moreover, with no setup fee or commitment, BugProve ensures rapid return on investment realization. Egress Egress is the only cloud email security platform to use an adaptive security architecture to continuously assess human risk and automate personalized security for each user across the enterprise. Egress Intelligent Email Security integrates seamlessly into Microsoft 365 to deliver AI-powered behavioral-based threat detection that eliminates advanced phishing attacks, human error, and data exfiltration. Combining contextual machine learning and AI, we use zero-trust and pre-generative modeling to provide the highest efficacy of phishing detection to prevent attacks that get through native controls and secure email gateways. For outbound detection, we leverage social graph and pre-trained deep neural networks to detect anomalous behavior and stop accidental data loss and intentional data exfiltration. Our products also deliver behavioral-based micro-training through real-time teachable moments, tangibly reducing risk. Zenity Zenity is a security and governance company that enables businesses to securely unleash business application and AI development throughout the enterprise. Zenity’s agentless platform is built from the ground up with a security-first approach. With SOC 2 Type 2 and GDPR compliance, Zenity is uniquely positioned to help our customers implement strong application security practices throughout AI, low-code, and no-code development.
Capture the CISO
Hosted by Johna Till Johnson, Capture the CISO is the conversation interested CISOs have with vendors about their solutions. It’s also a competition, with vendors are judged across three variables:  Is it innovative? Does it solve a real need? How easy is it to deploy?