<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Candid CISO]]></title><description><![CDATA[No BS insights, guidance, and best practices from experienced CISOs for CISOs to help organizations improve their cybersecurity posture and business outcomes.]]></description><link>https://www.candidciso.com</link><image><url>https://substackcdn.com/image/fetch/$s_!mK6U!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png</url><title>The Candid CISO</title><link>https://www.candidciso.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 11:22:02 GMT</lastBuildDate><atom:link href="https://www.candidciso.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tout Media]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[candidciso@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[candidciso@substack.com]]></itunes:email><itunes:name><![CDATA[Steve Tout]]></itunes:name></itunes:owner><itunes:author><![CDATA[Steve Tout]]></itunes:author><googleplay:owner><![CDATA[candidciso@substack.com]]></googleplay:owner><googleplay:email><![CDATA[candidciso@substack.com]]></googleplay:email><googleplay:author><![CDATA[Steve Tout]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Security as Business Leadership]]></title><description><![CDATA[Why today&#8217;s CISOs must speak the language of value, lead in the boardroom, and prove ROI.]]></description><link>https://www.candidciso.com/p/security-as-business-leadership</link><guid isPermaLink="false">https://www.candidciso.com/p/security-as-business-leadership</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 10 Sep 2025 19:04:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VLcC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>For years, the role of the Chief Information Security Officer (CISO) was defined in technical terms: securing systems, patching vulnerabilities, stopping breaches. But in Season 1 of the <em>Candid CISO</em> podcast, one truth emerged again and again: <strong>CISOs today are business leaders first, technologists second.</strong></p><p>This shift isn&#8217;t optional. According to research from EY, CISOs contribute up to <strong>20% of the value of strategic projects</strong>&#8212;yet they are too often excluded from the earliest decision-making stages. The same study found that effective cybersecurity initiatives can add <strong>$36 million of enterprise value per project</strong>[1]. Leaving CISOs out of the conversation doesn&#8217;t just <a href="https://www.strategylayer.com/p/from-compliance-theater-to-human">weaken security</a>&#8212;it leaves money on the table.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VLcC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VLcC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VLcC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg" width="564" height="317.25" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:564,&quot;bytes&quot;:3904108,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.candidciso.com/i/173293463?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VLcC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VLcC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc58d89d0-3be5-476c-a6f1-b6fbca34e8f2_3840x2160.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">CISOs in the boardroom: translating cybersecurity into strategy, value, and resilience.&#8221;</figcaption></figure></div><h2>Speaking the Language of Business</h2><p>When Chirag Shah reflected on his MBA journey during Episode 3, he wasn&#8217;t celebrating a credential. He was describing a new lens.</p><blockquote><p><em>&#8220;MBA gave me the comprehensive understanding of various business functions&#8230; Now I can actually sit with finance and understand their motives and incentives. Cybersecurity operators exist in this context because the things around it need to function together.&#8221;</em></p></blockquote><p>It was a reminder that credibility in the C-suite isn&#8217;t earned through technical detail&#8212;it&#8217;s earned by speaking the same language as finance, sales, and operations.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;e78c25fd-0605-4347-9b25-08e027a34d3b&quot;,&quot;caption&quot;:&quot;Send us a text&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Leadership, AI, and Continuing Education with Chirag Shah&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-30T20:05:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/dm9jj3pnqir0ntvrvzurmze90l8g?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.candidciso.com/p/leadership-ai-and-continuing-education-094&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818790,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Mandy Andress, in Episode 9, drove this point home from a leadership perspective:</p><blockquote><p><em>&#8220;It&#8217;s the opposite of command-and-control. It&#8217;s building trust, rapport, and understanding the business drivers&#8230; Successful CISOs really understand how to navigate those components of an organization.&#8221;</em></p></blockquote><p>The best CISOs don&#8217;t fight for relevance&#8212;they create it, by showing how security supports revenue growth, market trust, and operational resilience.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2c9ffcf1-1685-49a7-bef2-1ddd8d1c73bb&quot;,&quot;caption&quot;:&quot;Send us a text&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Innovating in Cybersecurity with AI and Inclusive Leadership&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-11T19:00:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/vkqo776yxzqrc9dq7e00avuzablb?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.candidciso.com/p/innovating-in-cybersecurity-with-dc2&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818785,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>Boardroom Conversations That Stick</h2><p>Season 1 also revealed a candid truth: many boards still see cybersecurity as a black box. The leaders who break through are those who translate complexity into clarity.</p><p>Jason Elrod, in Episode 10, reframed the question of how to &#8220;speak to the board&#8221; in very human terms:</p><blockquote><p><em>&#8220;Let&#8217;s say I&#8217;ll put it in the context of speaking to a board of directors. A lot of people say like, how do you speak to the board, right? The board. You know, the board is actually made up of people. So you need to understand the people.&#8221;</em> </p></blockquote><p>This reminder cuts through the intimidation that often comes with boardroom interactions. It&#8217;s not about delivering a flawless performance; it&#8217;s about understanding each director&#8217;s background, preferences, and decision-making style.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ddf3df4a-b7bf-4ea2-8a2d-49685596a9d0&quot;,&quot;caption&quot;:&quot;Send us a text&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Resilience On The Trails And In Cybersecurity: A Journey with Jason Elrod&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-25T19:18:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/v3hu9co4kynyr50j0vjulkyxkh1k?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.candidciso.com/p/resilience-on-the-trails-and-in-cybersecurity-34a&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818784,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>That simplicity is powerful. According to NACD, boards now expect CISOs to move beyond threat reports and instead link cybersecurity to business continuity, M&amp;A activity, and strategic growth[2].</p><p>The strongest leaders don&#8217;t overwhelm boards with jargon or dashboards. They tell a story&#8212;where security isn&#8217;t just defense, but an enabler of enterprise resilience.</p><h2>Proving ROI: From Cost Center to Value Creator</h2><p>If aligning with the business and engaging boards are essential, proving ROI may be the hardest and most necessary evolution. Security leaders are being asked to show that every dollar invested generates measurable outcomes.</p><p>In Episode 4, Aysha Khan explained how she reframed the role of security inside her organization:</p><blockquote><p><em>&#8220;Security needs to be a function of enablement&#8230; We run in parallel to innovation, not against it.&#8221;</em></p></blockquote><p>This mindset is key to proving return on investment. CISOs must show that security not only prevents losses, but also enables innovation and accelerates business initiatives.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;51c9ee95-c1e8-4bce-83ed-76a897b47cb9&quot;,&quot;caption&quot;:&quot;Send us a text&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cybersecurity Leadership: Humanity, Diversity, and Impact&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-06-30T23:49:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/ujd30opwky8fa2nhg4spojhga8mk?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.candidciso.com/p/cybersecurity-leadership-humanity-cdf&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818789,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>That&#8217;s the focus of Identient&#8217;s upcoming <a href="https://www.identient.ai/workshops/strategic-finance-for-cybersecurity-leaders/">Strategic Finance for Cybersecurity Leaders</a> workshop, which explores how CISOs can:</p><ul><li><p>Translate security investments into risk-adjusted returns.</p></li><li><p>Build financial scenarios that demonstrate value creation.</p></li><li><p>Move conversations from cost avoidance to enterprise impact.</p></li></ul><p>And it&#8217;s also a central theme of my book, <em>The CISO on the Razor&#8217;s Edge</em>. The next generation of security leaders won&#8217;t just manage controls&#8212;they&#8217;ll manage capital, proving that resilience is a business multiplier.</p><h2>The Takeaway from Season 1</h2><p>Season 1 of <em>Candid CISO</em> left us with a clear message: CISOs are no longer technicians at the edge of the network&#8212;they are <a href="https://www.strategylayer.com/p/from-technician-to-strategic-multiplier">strategic multipliers</a> at the center of enterprise value.</p><p>The ones who succeed will:</p><ul><li><p>Align security initiatives directly with business outcomes.</p></li><li><p>Simplify complexity into board-level conversations.</p></li><li><p>Prove ROI with the same rigor as their peers in finance.</p></li></ul><p>The job still demands technical expertise, but leadership now requires something deeper: storytelling, influence, and financial fluency.</p><h2>Call to Action</h2><p>If these insights resonate, here are three ways to continue the journey:</p><p>&#127897;&#65039; <em>Explore more episodes from Season 1 of the <a href="https://www.candidciso.com/podcast">Candid CISO</a></em></p><p>&#128202; <em>Join the <a href="https://www.linkedin.com/events/strategicfinanceforcybersecurit7369022272361144322/">upcoming webinar </a>on Strategic Finance for Cybersecurity Leaders</em>.</p><p>&#128214; <em>Grab a copy of The CISO on the Razor&#8217;s Edge</em> from <a href="https://a.co/d/10MBSfw">Amazon</a> or <a href="https://www.barnesandnoble.com/w/the-ciso-on-the-razors-edge-steve-tout/1147508234?ean=9798218686963">Barnes &amp; Noble</a>.</p><p>And if your company is interested in <strong>sponsoring Season 2 of the podcast</strong>, message me and let&#8217;s talk.</p><h2>Footnotes</h2><ol><li><p>&#8220;EY study: How cybersecurity adds $36M value per initiative.&#8221; <em>Cyber Magazine</em>, June 2, 2025. Retrieved from: <a href="https://cybermagazine.com/news/ey-study-how-cybersecurity-adds-36m-value-per-initiative">https://cybermagazine.com/news/ey-study-how-cybersecurity-adds-36m-value-per-initiative</a> </p></li><li><p>&#8220;How CISOs can drive strategic board conversations.&#8221; <em>NACD Directorship Magazine Online Exclusive</em>, Q2 2025. Retrieved from: <a href="https://www.nacdonline.org/all-governance/governance-resources/directorship-magazine/online-exclusives/2025/q2-2025/CISO-board-conversations/">https://www.nacdonline.org/all-governance/governance-resources/directorship-magazine/online-exclusives/2025/q2-2025/CISO-board-conversations/ </a></p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Before the Breach: What 12 CISOs Taught Us About Leadership in 2024]]></title><description><![CDATA[12 CISOs. 1 year of hard truths, real talk, and lessons from the edge of security leadership.]]></description><link>https://www.candidciso.com/p/before-the-breach-what-12-cisos-taught</link><guid isPermaLink="false">https://www.candidciso.com/p/before-the-breach-what-12-cisos-taught</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Thu, 26 Jun 2025 21:22:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hk81!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You learn a lot just by listening.<br>Not for soundbites. Not for headlines. Just to understand what people are really dealing with.</p><p>That&#8217;s what Season 1 of <em>The Candid CISO</em> turned into. I didn&#8217;t set out to run a research project&#8212;but after 12 deep conversations with security leaders across industries, it started to feel like one. An oral history of cybersecurity leadership in 2024, told one brutally honest story at a time.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hk81!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hk81!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hk81!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png" width="550" height="309.375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:550,&quot;bytes&quot;:839204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://candidciso.substack.com/i/166926030?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hk81!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!Hk81!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febc226b4-7bed-4fbc-ae67-2a7cc93af06d_960x540.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Every CISO leads uphill, often alone. The journey isn&#8217;t just technical&#8212;it&#8217;s personal.</figcaption></figure></div><p>A barefoot ultramarathon through the woods. A career that started in compliance and landed in the boardroom. A hacker turned government CISO. A virtual CISO rethinking how work gets done. These weren&#8217;t just r&#233;sum&#233;s&#8212;they were signals. Signals of a role in motion, an industry under pressure, and a leadership archetype that&#8217;s still being figured out in real time.</p><p>By the end of the season, it was clear:<br>The job description was obsolete.<br>The pressures were mounting.<br>And the people doing the work? Still showing up&#8212;with humor, grit, and surprising clarity.</p><h2><strong>The Year Before the Pivot</strong></h2><p>2024 wasn&#8217;t a breaking point&#8212;but you could feel something bending.</p><p>It was a year of friction. Pressure from the board. Pressure from regulators. Pressure from inside the org to "just make it work." And underneath it all, a growing tension: the job was getting bigger, but the support wasn&#8217;t catching up.</p><p>You could hear it in conversations with people like</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;28432313-9102-48e2-9c3a-d2b44a6bb5eb&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Innovating in Cybersecurity with AI and Inclusive Leadership&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-11T19:00:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/vkqo776yxzqrc9dq7e00avuzablb?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/innovating-in-cybersecurity-with-dc2&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818785,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p> <strong><a href="https://candidciso.substack.com/p/innovating-in-cybersecurity-with-dc2">Mandy Andress</a></strong>, who talked about how AI was already reshaping the threat landscape&#8212;and how security teams were expected to respond without skipping a beat. Or <strong><a href="https://candidciso.substack.com/p/rethinking-cybersecurity-the-power-dd0">Tyler Pinckard</a></strong>, who made the case that compliance isn&#8217;t just table stakes anymore&#8212;it&#8217;s a competitive advantage, if you know how to use it.</p><p>And then there was <strong><a href="https://candidciso.substack.com/p/cybersecurity-leadership-humanity-cdf">Aysha Khan</a></strong>, who reminded us that leadership isn't just about technology&#8212;it&#8217;s about empathy, clarity, and the willingness to face fear head-on. These weren&#8217;t abstract theories. These were real reflections from people navigating real tradeoffs.</p><p>Nobody framed 2024 as a crisis year. But almost every guest hinted at the same thing:<br>The role was shifting.<br>The noise was rising.<br>And the window to reimagine leadership&#8212;before the job hardened into something unrecognizable&#8212;was starting to close.</p><h2><strong>Seven Things That Stood Out from Season 1</strong></h2><h3><strong>1. Everyone&#8217;s Figuring It Out in Real Time</strong></h3><p>There was no consensus on what it means to &#8220;do the CISO job well&#8221; in 2024. Not because people weren&#8217;t trying&#8212;but because the expectations keep shifting.<br><strong>Mandy Andress</strong> described how the role has become more defined in terms of business impact&#8212;but also more volatile. In her experience, the job requires continuous recalibration based on technology trends, regulatory pressure, and evolving organizational needs.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f48610b7-ca42-4257-a1f6-d034b9f5ae89&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Navigating Leadership in the Security World with Joel Fulton&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-09-30T19:39:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/p2douk7p3duohhvw9p7z4oy88ame?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/navigating-leadership-in-the-security-1df&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818786,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong><a href="https://candidciso.substack.com/p/navigating-leadership-in-the-security-1df">Joel Fulton</a></strong> offered a different angle. He spoke openly about the transition from being an individual contributor to leading people&#8212;and how that shift demands not just skill, but self-awareness. The takeaway across the board was this: there is no steady state. The modern CISO is expected to evolve in place.</p><p>This wasn&#8217;t about lack of competence. It was about the reality of a job that outpaces its own definition. The best leaders weren&#8217;t chasing a perfect model&#8212;they were staying adaptive, curious, and grounded in their own values.</p><h3><strong>2. Security is Becoming a Business Conversation&#8212;Not Just a Technical One</strong></h3><p>Several guests described the need to reposition security&#8212;not as a blocker, but as an enabler.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;35a37e2c-92e7-4277-8a2e-c2f9083f5d6b&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The CISO Who Rebuilt Giants with Rinki Sethi&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-25T19:19:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/810dcyg4otpqcm97l7kozvwhtxiy?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/the-ciso-who-rebuilt-giants-with-b75&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818783,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><br><strong><a href="https://candidciso.substack.com/p/the-ciso-who-rebuilt-giants-with-b75">Rinki Sethi</a></strong><a href="https://candidciso.substack.com/p/the-ciso-who-rebuilt-giants-with-b75"> </a>spoke about how security can actually reduce business friction, especially when it comes to compliance and sales. By integrating with the business early, rather than coming in as an afterthought, she was able to shorten sales cycles and build stronger stakeholder trust.</p><p><strong>Tyler Pinckard</strong> echoed this, arguing that compliance&#8212;when used proactively&#8212;can become a growth engine. He framed SOC 2 and ISO not just as requirements, but as trust signals that accelerate customer acquisition.</p><p>This shift&#8212;from "protecting" to "partnering"&#8212;was one of the clearest signals of the year. CISOs aren&#8217;t just being asked to manage risk. They&#8217;re being asked to connect the dots between security, revenue, and reputation.</p><h3><strong>3. Communication is Now a Core Leadership Skill</strong></h3><p>It&#8217;s no longer enough to be technically competent or strategically aligned. Every guest, in their own way, emphasized the importance of clear, candid communication.</p><p><strong>Jason Elrod</strong> described his approach to board conversations as radically human. He doesn&#8217;t lead with jargon&#8212;he leads with clarity. He talks about risk in ways that make people care. And he&#8217;s not afraid to admit what he doesn&#8217;t know.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c005fd92-d2fc-4e35-b309-ee5ca47158b0&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Reimagining Risk and the Virtual CISO&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-06T17:25:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/01wd2bge49n8syko94za31p5hfom?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/reimagining-risk-and-the-virtual-6fc&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818782,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong><a href="https://candidciso.substack.com/p/reimagining-risk-and-the-virtual-6fc">Carlota Sage</a></strong>, reflecting on her work as a virtual CISO, pointed out how boundary-setting and communication go hand in hand. In roles that often span multiple teams or organizations, being explicit&#8212;about priorities, limitations, and tradeoffs&#8212;is essential.</p><p>The conversations reminded us that security doesn&#8217;t scale through control. It scales through trust&#8212;and trust starts with how you communicate, especially when the stakes are high.</p><h3><strong>4. Diversity of Thought Isn&#8217;t a Slogan&#8212;It&#8217;s an Operating Principle</strong></h3><p>This wasn&#8217;t about checking boxes. It was about how diverse perspectives actually shape better security outcomes.</p><p><strong>Aysha Khan</strong> spoke about leading with humanity&#8212;not as a style, but as a necessity. She shared how her personal journey shaped her leadership, and how creating space for different viewpoints wasn&#8217;t just inclusive&#8212;it was strategic.</p><p><strong>Mandy Andress</strong> described how being a gay woman in cybersecurity has influenced how she leads. She didn&#8217;t frame it as a challenge to overcome. She framed it as an advantage&#8212;something that made her more empathetic, more attuned to cultural dynamics, and more equipped to build resilient teams.</p><p>Others, like</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;0ecb5fb5-f9dd-48f4-8763-4c884d9bfb3d&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Leadership, AI, and Continuing Education with Chirag Shah&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-30T20:05:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/dm9jj3pnqir0ntvrvzurmze90l8g?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/leadership-ai-and-continuing-education-094&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818790,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p> <strong><a href="https://candidciso.substack.com/p/leadership-ai-and-continuing-education-094">Chirag Shah</a></strong>, emphasized the value of inclusivity in boardrooms and M&amp;A discussions, where multiple dimensions of risk&#8212;financial, technical, cultural&#8212;collide. The strongest leaders weren&#8217;t just diverse themselves. They actively sought out different ways of thinking and built environments where those voices were heard.</p><h3><strong>5. Resilience Doesn&#8217;t Come From the Job&#8212;It Comes From Outside It</strong></h3><p>One of the most striking patterns across the season was how many guests had found grounding <em>outside</em> their day job.</p><p><strong>Jason Elrod</strong> told the story of getting lost on a trail run and finishing 19 miles barefoot. It wasn&#8217;t a planned metaphor&#8212;but it became one. For him, running wasn&#8217;t just fitness&#8212;it was reflection, perspective, and emotional reset. That kind of physical and mental discipline translated directly into how he leads under pressure.</p><p><strong><a href="https://candidciso.substack.com/p/from-hacker-to-ciso-carlos-de-leons-450">Carlos De Leon</a></strong> talked about community&#8212;how participating in hacker culture, networking events, and groups like Hacker Summer Camp have been essential to his longevity in the field. The job can be isolating. Community makes it sustainable.</p><p>And <strong>Carlota Sage</strong> pointed to burnout directly&#8212;how boundary-setting and peer connection weren&#8217;t just self-care, but strategic necessities for staying in the work. For many guests, resilience wasn&#8217;t a character trait. It was a practice&#8212;and it almost always involved stepping away from the screen.</p><h3><strong>6. AI Was Already Changing the Job&#8212;Even if Nobody Had the Full Picture</strong></h3><p>By mid-2024, AI had moved beyond theoretical conversation. It was changing workflows, surfacing new threats, and raising hard questions about accountability and readiness.</p><p><strong>Mandy Andress</strong> spoke to the pressure to respond quickly and intelligently to AI-driven threats, even while the rules of engagement were still being written. She acknowledged that while the hype was everywhere, the operational impact was real&#8212;and often outpacing what most teams were prepared to handle.</p><p><strong>Tyler Pinckard</strong> was more direct. He saw AI and automation as necessary tools&#8212;not just for detection and response, but for keeping pace with the speed of business. He advocated for using AI to increase efficiency in areas like static analysis and case summarization, while staying mindful of human oversight and judgment.</p><p>Across these conversations, one thing was clear: AI wasn&#8217;t a separate topic from cybersecurity. It was becoming part of the fabric&#8212;both as a capability and a challenge. And CISOs were trying to figure out what that meant for hiring, tooling, and strategy in real time.</p><h3><strong>7. There&#8217;s No One Way to Lead&#8212;And No One Path In</strong></h3><p>Perhaps the most encouraging insight of the season was this: the role of CISO is being shaped by the people in it, not the other way around.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ffb188f5-0290-436f-be9a-fc25364ae092&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Leading Fearlessly in High-Growth Environments with Jimmy Sanders&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:310338397,&quot;name&quot;:&quot;Steve Tout&quot;,&quot;bio&quot;:&quot;Founder, advisor, podcaster, runner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea7d9bf-ea75-451b-b59d-9b6893739c8a_1177x1179.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-27T21:51:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://storage.buzzsprout.com/8s0pxo5uu1zpypd5kfe7ish0g45y?.jpg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://candidciso.substack.com/p/leading-fearlessly-in-high-growth-e66&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166818781,&quot;type&quot;:&quot;podcast&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Candid CISO&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mK6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5752615c-93c7-4c85-87c0-66032d59bac5_440x440.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><strong><a href="https://candidciso.substack.com/p/leading-fearlessly-in-high-growth-e66">Jimmy Sanders</a></strong> shared how his journey started with an internship at a beef jerky company&#8212;hardly a traditional on-ramp into security. From there, he moved into leadership roles at Netflix, Samsung, and eventually ISSA, always bringing an unconventional but fearless mindset to the work.</p><p><strong>Carlota Sage</strong>, now a respected vCISO, came into the role through a non-linear path as well, and emphasized that her multifaceted background has been one of her greatest strengths&#8212;not a liability to overcome.</p><p>Even <strong>Joel Fulton</strong>, with years of executive experience, spoke openly about avoiding toxic environments and choosing to work with people whose values align with his own. Leadership, in his view, begins with that kind of intentionality.</p><p>Together, these guests showed that there&#8217;s no archetype. No singular mold. The most effective security leaders were defining their own terms&#8212;rooted in who they are, what they care about, and how they show up for their teams.</p><h2><strong>The Real Takeaway</strong></h2><p>Looking back on Season 1, what stuck with me wasn&#8217;t a framework or a trend. It was the tone.</p><p>These conversations weren&#8217;t theoretical. They were human. A little messy. Sometimes conflicted. Often hopeful.</p><p>What I heard, again and again, was a kind of quiet courage&#8212;CISOs who knew the role was broken in places, who felt the pressure rising, but who still chose to lean in and lead anyway. Not because they had all the answers. But because they cared. About the work, about the people, and about making security better&#8212;on their own terms.</p><p>There was no single way to lead. No agreed-upon future. But there was a shared willingness to keep going, even when the map ran out.</p><p>That&#8217;s what I&#8217;ll remember from this season. Not the job title. The posture.</p><p>And that&#8217;s why I&#8217;m grateful to every guest who showed up&#8212;not just to talk, but to tell the truth.</p><h2><strong>What&#8217;s Next?</strong></h2><p>If you&#8217;ve made it this far, thank you.</p><p>If Season 1 gave you something to think about&#8212;or helped you feel a little less alone in the chaos&#8212;consider subscribing to <em>The Candid CISO</em> wherever you listen to podcasts. It helps more than you know.</p><p>And I&#8217;d love to hear from you:</p><ul><li><p>What stuck with you from Season 1?</p></li><li><p>What topics or themes do you want more of in Season 2?</p></li><li><p>And which CISO should we sit down with next?</p></li></ul><p>Drop your thoughts in the comments&#8212;or even better, swing by our website and check in via the <strong>Chat</strong> feature. We&#8217;d love to know what you're seeing in the field and how we can shape the next season together.</p><p>And if you&#8217;d like to support the podcast and help us keep this work going, click on <strong>Membership</strong> and contribute in whatever way makes sense for you. Every bit helps.</p><p>Thanks for being part of the journey. Season 2 is coming soon.</p><h2><strong>Want to Sponsor Season 2?</strong></h2><p>We&#8217;re currently lining up sponsors for Season 2 of <em>The Candid CISO</em>. If your company believes in honest conversations, thoughtful leadership, and elevating the voices of real practitioners in cybersecurity, we&#8217;d love to partner with you.</p><p>Check out the <strong><a href="https://docs.google.com/presentation/d/1lnJtQ_hNShc653kAutWeM1k74l6mMwxg4jn_Rr4Nnoo/edit?usp=sharing">Sponsorship Deck</a></strong> for details&#8212;then reach out if it resonates. Let&#8217;s build something meaningful together.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://docs.google.com/presentation/d/1lnJtQ_hNShc653kAutWeM1k74l6mMwxg4jn_Rr4Nnoo/edit?usp=sharing" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tIA7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tIA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png" width="580" height="326.25" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:158032,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://docs.google.com/presentation/d/1lnJtQ_hNShc653kAutWeM1k74l6mMwxg4jn_Rr4Nnoo/edit?usp=sharing&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://candidciso.substack.com/i/166926030?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tIA7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!tIA7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa657edc2-6c71-4c10-be60-d7afc26782f8_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Season 2 Sponsorship Opportunities</figcaption></figure></div><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[More Pressure, More Clarity: Candid CISO Season 2 Is Coming]]></title><description><![CDATA[First, thank you.]]></description><link>https://www.candidciso.com/p/more-pressure-more-clarity-candid</link><guid isPermaLink="false">https://www.candidciso.com/p/more-pressure-more-clarity-candid</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 25 Jun 2025 18:11:06 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d6810e26-e885-49d2-9209-a718fef581b3_960x540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>First, thank you.</p><p>If you&#8217;ve been with us since Season 1&#8212;or even just joined recently&#8212;thank you for subscribing, listening, and hanging in there while we found the right moment to return. Your support means the world.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>We&#8217;ve spent the past year watching the world shift beneath our feet. The economic signals are noisy. AI is moving faster than governance frameworks can catch up. CISOs are facing contradictory expectations: deliver transformation without friction, ensure airtight security while cutting costs, be technical, be strategic, be everywhere&#8212;but don't burn out.</p><p>These pressures&#8212;and the widening gap between what CISOs are <em>expected</em> to be and what the role actually <em>requires</em>&#8212;compelled us to come back.</p><p>So here we are&#8212;Season 2 of <em>Candid CISO</em> is on the way.</p><p>This time, we&#8217;re not just reacting&#8212;we&#8217;re helping shape the narrative.</p><h3>&#127897;&#65039; What We&#8217;re Talking About This Season</h3><p>This year, the stakes are higher&#8212;and the conversations are deeper. Here&#8217;s a glimpse of what we&#8217;ll be unpacking together in Season 2:</p><ul><li><p><strong>AI meets cybersecurity</strong>: How do we manage AI security posture when most orgs are still figuring out their cloud posture?</p></li><li><p><strong>Data governance as a business enabler</strong>: It&#8217;s not just compliance&#8212;it&#8217;s strategy. Let&#8217;s talk about how smart CISOs are shifting the conversation.</p></li><li><p><strong>Culture and team health</strong>: Burnout is real. So is toxicity. How do we build resilient security teams that don&#8217;t self-destruct?</p></li><li><p><strong>Tech debt and transformation politics</strong>: Security doesn&#8217;t live in a vacuum. We&#8217;ll dig into the real power dynamics behind modernization efforts.</p></li><li><p><strong>Strategic leadership in the age of AI</strong>: What does it mean to lead when the rules keep changing? Spoiler: it&#8217;s not just about tech.</p></li><li><p><strong>Identity, trust, and resilience</strong>: From governance to boardroom dynamics, we&#8217;re exploring how trust is built&#8212;and broken&#8212;in today&#8217;s orgs.</p></li></ul><p>We&#8217;re not here to chase hype. We&#8217;re here to explore the real stuff&#8212;what&#8217;s working, what&#8217;s not, and what it <em>really</em> means to lead in security right now.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nP7Y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nP7Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nP7Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png" width="549" height="308.8125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:549,&quot;bytes&quot;:156727,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://candidciso.substack.com/i/166830811?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nP7Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!nP7Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77e93a5a-3235-45fd-9447-66a099bf623a_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>&#128172; What&#8217;s New This Season (Launching Q3)</h3><p>Season 2 is coming soon&#8212;dropping in Q3&#8212;and we&#8217;re building something bolder, smarter, and more connected than ever before. Here&#8217;s what&#8217;s new:</p><ul><li><p>We&#8217;ll be posting <strong>more frequently</strong>&#8212;sharing insights, behind-the-scenes updates, and quick reflections between episodes.</p></li><li><p><strong>Chat is open</strong>&#8212;so listeners, guests, and curious leaders can connect directly, ask questions, and discuss each episode in real time.</p></li><li><p>You&#8217;ll get notified about <strong>new episodes</strong>, <strong>live Q&amp;A opportunities</strong>, and the occasional hot take from the front lines.</p></li><li><p>And for those who want to go deeper&#8212;<br>&#128274; <strong>You can now support us financially.</strong> Become a <strong>Founding Member</strong> and get access to:</p><ul><li><p><strong>Private briefings</strong> on the state of cybersecurity leadership</p></li><li><p><strong>Exclusive strategic playbooks</strong> and frameworks from the Candid CISO vault</p></li><li><p>And early invites to future live events, panels, and more</p></li></ul></li></ul><p>Your support helps us keep the conversation candid, independent, and ad-free&#8212;and it means the world to us.</p><p>We&#8217;re excited to be back&#8212;and we&#8217;re just getting started.<br>If you're leading security today, or plan to tomorrow, this season was made for you.</p><p>Let&#8217;s go.</p><p>&#8212;Steve &amp; John<br><em>Hosts of Candid CISO</em></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.candidciso.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Candid CISO is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Leading Fearlessly in High-Growth Environments with Jimmy Sanders]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/leading-fearlessly-in-high-growth-e66</link><guid isPermaLink="false">https://www.candidciso.com/p/leading-fearlessly-in-high-growth-e66</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 27 Nov 2024 21:51:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818781/9ea9c2b757460624f841e98f531caa1c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of the Candid CISO Podcast, John Donovan sits down with Jimmy Sanders, a cybersecurity leader whose journey from interning at a beef jerky company to leading security teams at Netflix and Samsung is nothing short of inspiring. Join us as Jimmy shares his experience of <em>leading fearlessly in high-growth environments</em>, where the pressure to innovate never stops and the stakes are sky-high. He reveals how he balanced security and rapid development, motivated teams beyond monetary incentives, and built proactive, resilient defenses in environments where risk was a given. We also explore Jimmy's unique perspective on diversity in tech, the grit required to overcome obstacles, and his current role as International President of ISSA, where he&#8217;s shaping the future of cybersecurity leadership. Whether you&#8217;re a security professional or a business leader, this episode will provide practical insights and thought-provoking strategies to lead cybersecurity teams and programs with courage and vision.</p><p><strong>Key Takeaways</strong></p><ul><li><p>Integrate security into development in ways that accelerate innovation, making protection a catalyst rather than a constraint.</p></li><li><p>Harness individual intrinsic motivators to inspire your team, transforming engagement from compliance to passionate commitment.</p></li><li><p>Embed security as a shared objective early, ensuring risk discussions influence key decisions rather than follow them.</p></li><li><p>Think ahead of threats by building a culture of continuous testing, turning defense into an anticipatory advantage.</p></li><li><p>Align your leadership approach with organizational values to drive influence and lasting change across cultural differences.</p></li><li><p>Forge alliances across teams to dismantle silos, using trust as the foundation for more resilient security strategies.</p></li><li><p>Leverage your position to challenge status quo thinking and push for diversity that enriches the entire industry.</p></li><li><p>Shift from pure technical talk to storytelling and empathy, making complex security issues relatable and urgent for all.</p></li><li><p>Future-proof talent by immersing them in the technologies reshaping security, fostering adaptability over mere expertise.</p></li><li><p>Don&#8217;t just wait for doors to open; cultivate opportunities by acting decisively and positioning yourself for growth.</p></li></ul><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p>V2</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Reimagining Risk and the Virtual CISO]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/reimagining-risk-and-the-virtual-6fc</link><guid isPermaLink="false">https://www.candidciso.com/p/reimagining-risk-and-the-virtual-6fc</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Wed, 06 Nov 2024 17:25:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818782/63a5dd7fa497053940c5b44a74033223.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this insightful Candid CISO episode, John Donovan interviews Carlota Sage, a vCISO with a unique, multifaceted background in tech and cybersecurity. They discuss the strengths and challenges of the vCISO role versus full-time CISO positions, emphasizing the flexibility and affordability vCISOs bring to organizations that can't justify a full-time CISO. Carlota shares her experiences at major security conferences, the increasing role of compliance in driving security initiatives, and the critical importance of community, diversity, and boundary-setting in tech. Her candid stories reveal her journey from unconventional beginnings in tech to her current advocacy for strong security programs. This episode is particularly valuable for its real-world advice on leveraging compliance as a business enabler and the power of community and diversity in cybersecurity.</p><p><strong>Key Takeaways:</strong></p><ul><li><p><strong>vCISOs provide flexible, high-quality security expertise</strong> &#8211; Ideal for companies needing CISO-level support without full-time costs.</p></li><li><p><strong>Compliance often drives SMB security efforts</strong> &#8211; Many startups only implement security when clients or contracts require it.</p></li><li><p><strong>Boundary-setting is crucial in cybersecurity</strong> &#8211; Protecting personal time preserves energy and prevents burnout in demanding roles.</p></li><li><p><strong>Security as a sales enabler</strong> &#8211; Compliance readiness can differentiate startups and drive new business.</p></li><li><p><strong>Community combats cybersecurity burnout</strong> &#8211; Engaging in networks like B-sides and Diana Initiative supports career longevity.</p></li><li><p><strong>Diversity of thought strengthens security</strong> &#8211; Unique perspectives, not just backgrounds, drive more resilient cybersecurity programs.</p></li><li><p><strong>Introverts and extroverts complement in cybersecurity</strong> &#8211; Collaboration can bring quieter, skilled professionals into the spotlight.</p></li><li><p><strong>Third-party compliance impacts everyone</strong> &#8211; Big enterprises push smaller vendors to meet higher compliance standards.</p></li><li><p><strong>Speaking at conferences builds visibility</strong> &#8211; Being a security speaker, even at small events, raises professional credibility.</p></li><li><p><strong>Leverage security metrics for funding</strong> &#8211; Know customer acquisition costs and use them to justify security budgets.</p></li></ul><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[The CISO Who Rebuilt Giants with Rinki Sethi]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/the-ciso-who-rebuilt-giants-with-b75</link><guid isPermaLink="false">https://www.candidciso.com/p/the-ciso-who-rebuilt-giants-with-b75</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 25 Oct 2024 19:19:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818783/4cec1e23e79e4e315054821ec11345a6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of <em>The Candid CISO</em>, Rinki Sethi, a trailblazing cybersecurity leader, shares her incredible journey from an unexpected start in the industry to her rise as a prominent figure in security leadership with host John Donovan. Rinki opens up about the challenges she faced, the importance of mentorship, and how vulnerability and communication have been crucial to her success. She provides insightful guidance on building strong security teams, navigating crisis management, and fostering a supportive cybersecurity community. Tune in for practical advice and inspiration for advancing your own cybersecurity career.</p><p><strong>Key topics include<br></strong></p><ol><li><p>Discovering your specific passion within the broad field of cybersecurity is crucial for a fulfilling career, as Rinki Sethi&#8217;s own journey from compliance to developer training demonstrates.</p></li><li><p>Mentorship can be found in unexpected places, from peers to senior leaders, and actively seeking guidance from those around you can significantly shape your career path.</p></li><li><p>Securing executive buy-in is essential for building a strong security culture, and aligning security goals with business objectives helps demonstrate the value of security initiatives.</p></li><li><p>To effectively advocate for security investments, it is crucial to present security as a business enabler, highlighting its ability to improve efficiency, reduce friction, and even create a competitive advantage.</p></li><li><p>Sharing real-world examples of how security programs have reduced business friction, such as streamlining compliance processes or shortening sales cycles, can help garner support for future security initiatives.</p></li><li><p>Transparency and clear communication are vital when implementing security programs, especially those that may be perceived as intrusive, to ensure understanding and minimize resistance.</p></li><li><p>Prioritizing mental health in the demanding field of cybersecurity is crucial, and creating a supportive environment where team members feel comfortable seeking help and addressing mental well-being is essential.</p></li><li><p>Crisis management exercises, including surprise breach simulations, can be invaluable for preparing executive teams and other stakeholders to effectively navigate real-world security incidents.</p></li><li><p>Networking outside of your immediate professional circle can lead to unexpected mentorship opportunities, board positions, and valuable connections that can benefit your career in the long run.</p></li><li><p>Giving back to the cybersecurity community by mentoring others, sharing your experiences, and encouraging newcomers is crucial for fostering a strong and inclusive industry.</p></li></ol><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Resilience On The Trails And In Cybersecurity: A Journey with Jason Elrod]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/resilience-on-the-trails-and-in-cybersecurity-34a</link><guid isPermaLink="false">https://www.candidciso.com/p/resilience-on-the-trails-and-in-cybersecurity-34a</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 25 Oct 2024 19:18:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818784/6fa70cecaf44dae3a367eb52a1221406.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of the <em>Candid CISO</em>, Co-Host John Donovan sits down with <strong>Jason Elrod</strong>, CISO of MultiCare Health Systems, who shares how getting lost on a trail run and running barefoot for 19 miles became a metaphor for leadership in cybersecurity. Jason dives into the tough realities of protecting critical infrastructure, balancing security and compliance, and tackling imposter syndrome head-on. He also reveals why being fiercely dangerous (ethically, of course) is essential for a successful cybersecurity career. From personal lessons on resilience to high-candor takes on navigating boardrooms, Jason keeps it real&#8212;and a bit ironic&#8212;by showing how getting off track can sometimes lead to the best insights. Follow along for an unexpected and entertaining ride!</p><p><strong>Key topics include&nbsp;<br></strong></p><ul><li><p>How getting lost on a trail run turned into a lesson on leadership and staying present.</p></li><li><p>Why facing your fears and doing what scares you leads to growth&#8212;both on trails and in cybersecurity</p></li><li><p>The power of fierce, mission-driven cybersecurity professionals and why being 'ethically dangerous' matters</p></li><li><p>How imposter syndrome is universal&#8212;and why accepting it can make you a more confident leader</p></li><li><p>Balancing security and compliance: How to prioritize safety without getting lost in the checkbox mentality</p></li><li><p>Jason's candid take on communicating cybersecurity risks to executives and boards in a way they&#8217;ll understand</p></li><li><p>How ultra-running teaches resilience, focus, and mindfulness&#8212;and how that applies to a high-stress CISO role</p></li><li><p>The importance of finding a restorative practice to reset and thrive in high-pressure leadership positions</p></li><li><p>Why being both the smartest and 'dumbest' in the room drives better teamwork and collaboration</p></li><li><p>How showing vulnerability and high candor can help you lead more authentically and inspire your team</p></li></ul><p><strong>Thanks to our season sponsors</strong></p><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Innovating in Cybersecurity with AI and Inclusive Leadership]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/innovating-in-cybersecurity-with-dc2</link><guid isPermaLink="false">https://www.candidciso.com/p/innovating-in-cybersecurity-with-dc2</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 11 Oct 2024 19:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818785/a3febcf24b214d6f50460e474589eade.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of the Candid CISO podcast, host John Donovan sits down with Mandy Andress, an experienced CISO, investor, and board member, to explore her career journey in the cybersecurity industry. Mandy discusses how her diverse roles have shaped her perspective on implementing security measures tailored to different organizations, taking into account their culture, communication styles, and technological infrastructure. She also opens up about her personal experiences as a gay woman working in tech, offering insight into how diversity has influenced her leadership approach and decision-making processes.</p><p>The conversation touches on the evolving responsibilities of a CISO, especially in the context of remote work and the rise of AI-driven cyberattacks. Mandy reflects on her experiences balancing compliance and security in both traditional and tech-forward industries, sharing her strategies for building effective security teams and fostering collaboration.</p><p><strong>Key Takeaways</strong></p><ul><li><p>Mandy emphasizes the importance of aligning security strategies with an organization's unique culture, communication style, and tech stack to ensure they are effective and sustainable.</p></li><li><p>She talks about how her experience as a gay woman in cybersecurity shows that diversity enhances problem-solving, fosters collaboration, and strengthens team performance.</p></li><li><p>Mandy believes in creating a safe and supportive environment for team members by being a good listener, sharing personal experiences, and being open to vulnerability.</p></li><li><p>The role of a CISO continues to evolve, and while it has become more defined in terms of business impact, it still requires constant adaptation due to the fast-paced changes in technology and cyber threats.</p></li><li><p>Remote work presents unique challenges for leadership and team cohesion, but it also offers opportunities to redefine communication and collaboration through virtual means.</p></li><li><p>Mandy advocates for taking on lateral career moves, as they can provide valuable learning experiences that contribute to broader skill sets, particularly in leadership and security roles.</p></li><li><p>Building trust and rapport within an organization is crucial for a CISO, especially when influencing security decisions and balancing the organization's risk appetite with technical considerations.</p></li><li><p>Mandy underscores the importance of balancing compliance and security, recognizing that they do not always align perfectly, and making informed decisions on when to prioritize one over the other.</p></li><li><p>The rise of AI-driven cyberattacks is a growing concern, and security teams need to rethink their approach, focusing on speed, adaptability, and leveraging AI tools for defense.</p></li><li><p>Lastly, Mandy encourages cybersecurity professionals to stay curious, remain open to learning, and take calculated risks in their careers, always keeping an eye on long-term growth and opportunities.</p></li></ul><p><strong>IdRamp</strong> is a sponsor of the Candid CISO podcast. Visit their website at:&nbsp;<a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p><strong>TrustLogix</strong> is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links,</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Navigating Leadership in the Security World with Joel Fulton]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/navigating-leadership-in-the-security-1df</link><guid isPermaLink="false">https://www.candidciso.com/p/navigating-leadership-in-the-security-1df</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Mon, 30 Sep 2024 19:39:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818786/6d1af3b98ebae9759cbea281a25225d0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode, John Donovan sits down with cybersecurity expert and entrepreneur Dr. Joel Fulton for an insightful conversation covering leadership, resilience, and career growth. Joel shares his journey from an unconventional upbringing to becoming a successful CISO and startup founder. He discusses the challenges of transitioning from individual contributor to leader, the evolving nature of the CISO role, and the importance of self-awareness in leadership. Listeners can expect actionable advice on building balanced teams, effective communication, and leveraging professional communities for growth and support.</p><p>Takeaways</p><ul><li><p><strong>Pursue Passion Projects Cautiously</strong>: Dream projects like writing require patience, planning, and multiple efforts to gain traction.</p></li><li><p><strong>Learn from Personal Struggles</strong>: Overcoming tough life experiences can build resilience and redefine success in your career.</p></li><li><p><strong>Work with People You Respect</strong>: Prioritize working with individuals who align with your values to avoid toxic environments.</p></li><li><p><strong>Self-awareness in Leadership</strong>: Understand your strengths and weaknesses to better lead and collaborate with others.</p></li><li><p><strong>Avoid Comparison in Leadership</strong>: The CISO role is evolving&#8212;don&#8217;t compare yourself to others; create your own leadership path.</p></li><li><p><strong>Build Balanced Teams</strong>: Combine technical skills, risk tolerance, and leadership within your team for maximum effectiveness.</p></li><li><p><strong>Communicate Clearly as a Leader</strong>: Ensure your brainstorming sessions are not misinterpreted as directives; leave space for team input.</p></li><li><p><strong>Delegate to Empower Growth</strong>: As a manager, trust and empower your team by avoiding micromanagement.</p></li><li><p><strong>Startups Require Flexibility</strong>: Starting a business involves unexpected challenges; embrace uncertainty and adapt quickly.</p></li><li><p><strong>Leverage Peer Communities</strong>: Build and engage in professional communities to access advice, mentorship, and problem-solving support.</p></li></ul><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Rethinking Cybersecurity: The Power of AI and Preparation with Tyler Pinckard]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/rethinking-cybersecurity-the-power-dd0</link><guid isPermaLink="false">https://www.candidciso.com/p/rethinking-cybersecurity-the-power-dd0</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Thu, 29 Aug 2024 20:42:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818787/4daccaba139809ed300773907783b55c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of the Candid CISO podcast, Tyler Pinckard, Head of Security and Data Protection Officer at Support Logic, shares his provocative insights on the evolving landscape of cybersecurity. Tyler challenges the traditional view of security as merely a cost center, arguing that when leveraged correctly, compliance and AI can become powerful competitive advantages. He delves into the critical role of preparation and rehearsals, emphasizing that many security failures stem from a lack of planning rather than the complexity of threats. Tyler also advocates for embracing AI and automation to stay ahead in the fast-paced tech environment, urging CISOs to disrupt rather than be disrupted. This episode is a must-listen for security leaders looking to sharpen their strategic edge and rethink their approach to modern cybersecurity challenges.</p><p>Takeaways</p><ul><li><p><strong>Security as a Strategic Advantage</strong>: Compliance and AI can turn security into a competitive edge.</p></li><li><p><strong>Preparation is Key</strong>: Many security failures result from poor planning, not just complex threats.</p></li><li><p><strong>Embrace Disruption</strong>: CISOs should leverage AI and automation to disrupt, rather than be disrupted.</p></li><li><p><strong>The Power of Rehearsals</strong>: Regular rehearsals and preparation prevent failures during critical security incidents.</p></li><li><p><strong>Compliance as a Crowbar</strong>: Compliance like SOC 2 and ISO is essential for customer trust and retention.</p></li><li><p><strong>AI's Role in Cybersecurity</strong>: AI can enhance efficiency, particularly in tasks like static analysis and case summarization.</p></li><li><p><strong>Practical Use of AI</strong>: AI should assist with tasks while maintaining human oversight for critical decisions.</p></li><li><p><strong>Startups and Security</strong>: Aligning security with business goals is crucial for success in fast-paced startups.</p></li><li><p><strong>Leadership in Cybersecurity</strong>: Effective leaders delegate and empower teams rather than micromanaging technical tasks.</p></li><li><p><strong>Diversity Drives Success</strong>: Diverse teams offer varied perspectives, reducing risks and improving security outcomes.</p></li><li><p><strong>Pragmatic Use of Tools</strong>: Use tools like GitHub Co-Pilot to maximize team efficiency and effectiveness.</p></li><li><p><strong>Security for the Modern CISO</strong>: CISOs must continuously adapt, applying both traditional strategies and modern tech solutions.</p></li></ul><p> IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>For show notes, transcripts, links, and more episodes visit <a href="https://www.candidciso.com">https://www.candidciso.com</a></p><p>The Candid CISO podcast is produced by Nonconformist Innovation Media.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[From Hacker to CISO: Carlos De Leon's Journey and Career Advice]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/from-hacker-to-ciso-carlos-de-leons-450</link><guid isPermaLink="false">https://www.candidciso.com/p/from-hacker-to-ciso-carlos-de-leons-450</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 16 Aug 2024 22:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818788/34072a66446704e01ed5382d7b18796f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of the Candid CISO podcast, Co-Host John Donovan interviews Carlos de Leon, CISO at the Washington State Department of Revenue. They discuss various topics related to cybersecurity leadership and strategy, including the challenges and rewards of the CISO role, the importance of compliance, and the need for strong communication and people skills. They also touch on incident response and threat management, highlighting the lessons learned from the CrowdStrike incident and a cloning incident at Carlos' agency. The conversation concludes with a discussion on the impact of technology and organizational factors on the CISO role, as well as Carlos' personal career journey. Also in this conversation, Carlos shares insights and advice on thinking creatively, his early hacker days, and career development in cybersecurity. He emphasizes the importance of an adversarial mindset and thinking outside the box to solve problems. Carlos provides advice for those looking to enter the cybersecurity field and become a CISO. The conversation concludes with a discussion on Hacker Summer Camp and the importance of networking and community in the cybersecurity industry.</p><p>Segments</p><p>00:00 -&nbsp;Introduction and Background</p><p>03:03 -&nbsp;CISO Role: Challenges and Rewards</p><p>07:02 -&nbsp;Compliance in the CISO Role</p><p>09:57 -&nbsp;Lessons from Incident Response and Threat Management</p><p>13:24 -&nbsp;Balancing Technology and Organizational Factors as a CISO</p><p>20:30 -&nbsp;Insights from a Personal Career Journey</p><p>29:19 -&nbsp;Thinking Creatively and Developing an Adversarial Mindset</p><p>31:34 -&nbsp;Career Development in Cybersecurity</p><p>35:27 -&nbsp;The Importance of Networking and Community in Cybersecurity</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity Leadership: Humanity, Diversity, and Impact]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/cybersecurity-leadership-humanity-cdf</link><guid isPermaLink="false">https://www.candidciso.com/p/cybersecurity-leadership-humanity-cdf</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Sun, 30 Jun 2024 23:49:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818789/7cf860987bba04f5d305d0cfe46265d9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>Steve Tout has a conversation with Aysha Khan, the CISO and CIO at Treasure Data in Mountain View, California. Aysha has 20 years of experience in Information Technology and Security at Fortune 500 companies. She is passionate about aligning strategy with agile execution to drive business results and customer satisfaction. Aysha has successfully built and led technology, security, compliance, risk, and operations functions from scratch. She has also turned around disjointed organizations into cohesive and collaborative environments.</p><p>Get ready to hear about her unexpected journey into cybersecurity and how she's transforming the field with empathy and bold leadership. Aysha shares the surprising twists that led her to become a Chief Security Officer and how she views cybersecurity not just as a technical challenge but as a vital business risk. During the conversation we discuss her unique leadership style, where humanity and empathy take center stage, and hear real-life stories of how this approach has shaped her decisions and projects.</p><p>Aysha will reveal personal turning points that helped her break barriers and offer strategies for aspiring leaders to make a meaningful impact. She'll also talk about her fearless approach to facing tough challenges, sharing how she tackles fear head-on and turns obstacles into opportunities.</p><p>Plus, she'll discuss the importance of giving back and her vision for a future where diversity and high performance go hand in hand.</p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>Candid CISO is produced by Nonconformist Innovation Media</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Leadership, AI, and Continuing Education with Chirag Shah]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/leadership-ai-and-continuing-education-094</link><guid isPermaLink="false">https://www.candidciso.com/p/leadership-ai-and-continuing-education-094</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Tue, 30 Apr 2024 20:05:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818790/637953de4240300fe9df877d25565e0f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode, Steve has a conversation with Chirag Shah. Chirag is the the Global Security Officer and Data Privacy Officer at Model N, a publicly traded software company in San Mateo, California. Chirag is a security and technology leader with over 24 years experience building leading-edge information security, security compliance, IT &amp; network initiatives from the ground up. He is an inclusive leader with a passion for information security management, cooking, and continuous learning.</p><p>Steve and Chirag discuss his career journey and the evolving role of the CISO. He emphasizes the importance of integrating the security program with the business and providing value beyond technical aspects. Chirag also highlights the role of the CISO in the boardroom, particularly in mergers and acquisitions, and the need for transparency and accountability. He discusses the expanding responsibilities of CISOs, including AI, DEI, and privacy regulations. Chirag also touches on the role of a chief identity officer and the importance of ethics in cybersecurity.</p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>IdRamp is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.idramp.com/candidciso">https://www.idramp.com/candidciso</a></p><p>Candid CISO is produced by Nonconformist Innovation Media</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Candid CISO: Trailer]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/candid-ciso-trailer-ee0</link><guid isPermaLink="false">https://www.candidciso.com/p/candid-ciso-trailer-ee0</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 02 Feb 2024 23:55:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818791/feaf5066fb084cd280b04b3fcaec50b4.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>Welcome to the Candid CISO podcast, illuminating your path to impact. Get straightforward insights from seasoned CISOs and leaders who are not just talking about change, but driving it.</p><p>The Candid CISO podcast is supported by our sponsors:</p><p><strong>IdRamp:</strong> IdRamp offers an integrated, comprehensive identity orchestration solution that automates operations, integrations, compliance, security, and digital transformation.&nbsp;</p><p><strong>TrustLogix:</strong> The TrustLogix Cloud Data Security Platform provides data owners and security owners with a single point of visibility and control of sensitive data access across all clouds and data platforms.&nbsp;</p><p>The Candid CISO podcast is produced by <a href="https://www.nonconformistinnovation.com">Nonconformist Innovation Meda, LLC</a>.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Data Security and Privacy with Ganesh Kirti]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/data-security-and-privacy-with-ganesh-12d</link><guid isPermaLink="false">https://www.candidciso.com/p/data-security-and-privacy-with-ganesh-12d</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 02 Feb 2024 23:47:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818792/fbf9ed76100e5694d1909457322d39e0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode, Ganesh Kirti, the founder and CEO of TrustLogix, discusses the challenges of securing data in the cloud and the need for comprehensive data security solutions. He explains how the modernization of data platforms and the increasing amount of data being stored and accessed in the cloud has made data security a complex problem. Ganesh also highlights the importance of security observability and granular access controls in protecting sensitive data. Ganesh emphasizes the need for collaboration between CISOs and CDOs and adopting interoperable and cloud-native solutions. Additionally, Ganesh discusses the partnership between TrustLogix and Snowflake and the role of AI in data security. He concludes by offering advice on protecting personal and enterprise data in an increasingly breached world.</p><p>TrustLogix is a sponsor of the Candid CISO podcast. Visit their website at: <a href="https://www.trustlogix.io/candidciso">https://www.trustlogix.io/candidciso</a></p><p>Visit <a href="https://www.candidciso.com">https://www.candidciso.com</a> for show notes and more episodes.&nbsp;</p><p>Candid CISO is produced by <a href="https://www.nonconformistinnovation.com">Nonconformist Innovation Media</a>.</p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item><item><title><![CDATA[Candid Conversations with Chris Roberts]]></title><description><![CDATA[Send us a text]]></description><link>https://www.candidciso.com/p/candid-conversations-with-chris-roberts-7e6</link><guid isPermaLink="false">https://www.candidciso.com/p/candid-conversations-with-chris-roberts-7e6</guid><dc:creator><![CDATA[Steve Tout]]></dc:creator><pubDate>Fri, 02 Feb 2024 23:34:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/166818793/ed39e9d24bdd8bbc7374de7026414c0e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.buzzsprout.com/twilio/text_messages/2508300/open_sms">Send us a text</a></p><p>In this episode of Candid CISO, host John Donovan has a conversation with Chris Roberts, CISO at Boom Supersonic. Together they discuss the importance of being candid and authentic in the cybersecurity industry. He emphasizes the need for CISOs to protect not only the organization but also the people within it. Roberts also shares advice for those looking to break into the security field, suggesting that they get involved in the community, contribute to research, and attend conferences. He also highlights the importance of articulating ideas effectively and understanding the business side of cybersecurity. Overall, Roberts encourages open communication and a willingness to learn and adapt in order to be successful in the industry.</p><p>Visit <a href="https://www.candidciso.com">https://www.candidciso.com</a> for show notes and more episodes.</p><p>Candid CISO is produced by <a href="https://www.nonconformistinnovation.com">Nonconformist Innovation Media</a></p><p><a href="https://www.candidciso.com/2508300/support">Support the show</a></p>]]></content:encoded></item></channel></rss>