<description>&lt;p&gt;All links and images for this episode can be found on &lt;a class="ql-link" href="https://cisoseries.com/" target= "_blank" rel="noopener noreferrer"&gt;CISO Series&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;This week's episode is hosted by me, &lt;a class="ql-link" href="https://www.linkedin.com/in/davidspark/" target="_blank" rel= "noopener noreferrer"&gt;David Spark&lt;/a&gt;, producer of CISO Series and &lt;a class="ql-link" href="https://www.linkedin.com/in/csoandy/" target="_blank" rel="noopener noreferrer"&gt;Andy Ellis&lt;/a&gt;, partner, &lt;a class="ql-link" href= "https://www.linkedin.com/company/yl-ventures/" target="_blank" rel="noopener noreferrer"&gt;YL Ventures&lt;/a&gt;. Joining us is &lt;a class= "ql-link" href="https://www.linkedin.com/in/mike-d-arezzo-34511a8/" target="_blank" rel="noopener noreferrer"&gt;Mike D'Arezzo&lt;/a&gt;, executive director of infosec and GRC, &lt;a class="ql-link" href= "https://www.linkedin.com/company/wellstar-health-system/" target= "_blank" rel="noopener noreferrer"&gt;Wellstar Health Systems&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;In this episode:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;The shift left myth&lt;/li&gt; &lt;li&gt;Reconsidering CISO evaluations&lt;/li&gt; &lt;li&gt;The power of "how"&lt;/li&gt; &lt;li&gt;Building bridges&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Huge thanks to our sponsor, ThreatLocker&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;a href= "https://www.threatlocker.com?utm_source=ciso-series&amp;utm_medium=sponsor&amp;utm_campaign=ciso_series_danny_q1_25&amp;utm_content=ciso_series_danny&amp;utm_term=podcast"&gt; &lt;strong&gt;&lt;img src= "//assets.libsyn.com/show/24425/banner-ad-ThreatLocker_Ciso_Banners_600x100.png" alt="" width="601" height="100" /&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit &lt;a class="ql-link" href= "http://www.threatlocker/com/pages/solutions?utm_source=ciso-series&amp;utm_medium=sponsor&amp;utm_campaign=ciso-series-podcast_q4_24&amp;utm_content=ciso-series-podcast&amp;utm_term=podcast" target="_blank" rel= "noopener noreferrer"&gt;ThreatLocker.com&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;</description>

CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don't Matter

APR 15, 202540 MIN
CISO Series Podcast

Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don't Matter

APR 15, 202540 MIN

Description

All links and images for this episode can be found on CISO Series.

This week's episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Mike D'Arezzo, executive director of infosec and GRC, Wellstar Health Systems.

In this episode:

  • The shift left myth
  • Reconsidering CISO evaluations
  • The power of "how"
  • Building bridges

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.