<description>&lt;p&gt;&lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;Welcome to episode one of &lt;em&gt;Capture the CISO&lt;/em&gt; Season 2!&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;Our host is &lt;a href= "https://www.linkedin.com/in/richard-stroffolino/"&gt;Richard Stroffolino&lt;/a&gt; and our judges are &lt;a href= "https://www.linkedin.com/in/arvinbansal/" target="_blank" rel= "noreferrer noopener"&gt;Arvin Bansal&lt;/a&gt;, CISO, &lt;a href= "https://www.cswg.com/" target="_blank" rel= "noreferrer noopener"&gt;C&amp;S Wholesale Grocers&lt;/a&gt; and  &lt;a href="https://www.linkedin.com/in/brettconlon/" target= "_blank" rel="noreferrer noopener"&gt;Brett Conlon&lt;/a&gt;, CISO, &lt;a href="https://www.americancentury.com/home/" target= "_blank" rel="noreferrer noopener"&gt;American Century Investments&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;Our contestants:&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:list --&gt;&lt;/p&gt; &lt;ul&gt;&lt;!-- wp:list-item --&gt; &lt;li&gt;&lt;a href="https://www.linkedin.com/in/davidhratner/" target= "_blank" rel="noreferrer noopener"&gt;David Ratner&lt;/a&gt;, CEO, &lt;a href= "https://www.hyas.com/" target="_blank" rel= "noreferrer noopener"&gt;HYAS&lt;/a&gt;&lt;/li&gt; &lt;!-- /wp:list-item --&gt; &lt;li&gt;&lt;a href="https://www.linkedin.com/in/russell-spitler/" target= "_blank" rel="noreferrer noopener"&gt;Russell Spitler&lt;/a&gt;, CEO &amp; Co-founder, &lt;a href="https://www.nudgesecurity.com/" target= "_blank" rel="noreferrer noopener"&gt;Nudge Security&lt;/a&gt;&lt;/li&gt; &lt;!-- wp:list-item --&gt;&lt;!-- /wp:list-item --&gt; &lt;li&gt;&lt;a href="https://www.linkedin.com/in/patrickharr/" target= "_blank" rel="noreferrer noopener"&gt;Patrick Harr&lt;/a&gt;, CEO, &lt;a href= "https://slashnext.com/"&gt;SlashNext&lt;/a&gt;&lt;/li&gt; &lt;!-- wp:list-item --&gt;&lt;!-- /wp:list-item --&gt;&lt;/ul&gt; &lt;p&gt;&lt;!-- /wp:list --&gt; &lt;!-- wp:paragraph {"align":"center"} --&gt;&lt;/p&gt; &lt;h2 class="wp-block-heading"&gt;Huge thanks to all our contestants who are also sponsors of &lt;em&gt;Capture the CISO&lt;/em&gt;&lt;/h2&gt; &lt;p&gt;&lt;!-- /wp:heading --&gt; &lt;!-- wp:heading --&gt;&lt;/p&gt; &lt;h2 class="wp-block-heading"&gt;HYAS&lt;/h2&gt; &lt;p&gt;&lt;!-- /wp:embed --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;&lt;a href="https://www.hyas.com" target="_blank" rel= "noreferrer noopener"&gt;HYAS&lt;/a&gt; is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns. &lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable.&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;HYAS’ award-winning threat intelligence and investigation platform and protective DNS solution detects and blocks the beaconing requests of malicious and anomalous command-and-control communication and stops attackers from progressing.&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt;  &lt;!-- wp:image {"align":"center","id":24354,"sizeSlug":"full","linkDestination":"custom"} --&gt;&lt;/p&gt; &lt;figure class="wp-block-image aligncenter size-full"&gt;&lt;a href= "https://www.hyas.com" target="_blank" rel= "noreferrer noopener"&gt;&lt;img class="wp-image-24354" src= "https://cisoseries.com/wp-content/uploads/2024/04/banner-ad-HYAS-CtC-600x100-1.webp" alt="HYAS" /&gt;&lt;/a&gt;&lt;/figure&gt; &lt;p&gt;&lt;!-- /wp:image --&gt; &lt;!-- wp:heading --&gt;&lt;/p&gt; &lt;h2 class="wp-block-heading"&gt;Nudge Security&lt;/h2&gt; &lt;p&gt;&lt;!-- /wp:embed --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;&lt;a href= "https://www.nudgesecurity.com/?utm_medium=sponsored&amp;utm_source=cisoseries&amp;utm_content=podcast&amp;utm_campaign=saas_security&amp;utm_term=24Q2" target="_blank" rel="noreferrer noopener"&gt;Nudge Security&lt;/a&gt; helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users.&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt;  &lt;!-- wp:image {"align":"center","id":24355,"sizeSlug":"full","linkDestination":"custom"} --&gt;&lt;/p&gt; &lt;figure class="wp-block-image aligncenter size-full"&gt;&lt;a href= "https://www.nudgesecurity.com/?utm_medium=sponsored&amp;utm_source=cisoseries&amp;utm_content=podcast&amp;utm_campaign=saas_security&amp;utm_term=24Q2" target="_blank" rel="noreferrer noopener"&gt;&lt;img class= "wp-image-24355" src= "https://cisoseries.com/wp-content/uploads/2024/04/banner-ad-Nudge-Security-600x100-Discover-and-secure-all-shadow-SaaS-1.webp" alt="Nudge Security" /&gt;&lt;/a&gt;&lt;/figure&gt; &lt;p&gt;&lt;!-- /wp:image --&gt; &lt;!-- wp:heading --&gt;&lt;/p&gt; &lt;h2 class="wp-block-heading"&gt;SlashNext&lt;/h2&gt; &lt;p&gt;&lt;!-- /wp:embed --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;&lt;a href="https://slashnext.com/request-a-demo/" target="_blank" rel="noreferrer noopener"&gt;SlashNext’s&lt;/a&gt; Cloud Email Security leverages our advanced AI platform, purpose built to stop sophisticated BEC and advanced phishing threats. The service delivers industry leading 99.9% detection rate and 1 in 1 million FPs by utilizing Gen AI, natural language parallel prediction, computer vision, relationship graphs, and contextual analysis for:&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt; &lt;!-- wp:list --&gt;&lt;/p&gt; &lt;ul&gt;&lt;!-- wp:list-item --&gt; &lt;li&gt;Broad threat coverage due to large and diverse LLMs &lt;/li&gt; &lt;!-- /wp:list-item --&gt;&lt;!-- wp:list-item --&gt; &lt;li&gt;Highest accuracy and a 48-hour detection advantage to stop sophisticated zero-hour threats &lt;/li&gt; &lt;!-- /wp:list-item --&gt;&lt;!-- wp:list-item --&gt; &lt;li&gt;Increased SecOps and user productivity from using a solution with the highest detections and the lowest FP&lt;/li&gt; &lt;!-- /wp:list-item --&gt;&lt;!-- wp:list-item --&gt; &lt;li&gt;360° protection with threat protection across all messaging channels: in email,  mobile and web&lt;/li&gt; &lt;!-- /wp:list-item --&gt;&lt;/ul&gt; &lt;p&gt;&lt;!-- /wp:list --&gt; &lt;!-- wp:paragraph --&gt;&lt;/p&gt; &lt;p&gt;Request a demo &lt;a href= "https://slashnext.com/request-a-demo/"&gt;https://slashnext.com/request-a-demo/&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;!-- /wp:paragraph --&gt;  &lt;!-- wp:image {"align":"center","id":24356,"sizeSlug":"full","linkDestination":"custom"} --&gt;&lt;/p&gt; &lt;figure class="wp-block-image aligncenter size-full"&gt;&lt;a href= "https://slashnext.com/request-a-demo/" target="_blank" rel= "noreferrer noopener"&gt;&lt;img class="wp-image-24356" src= "https://cisoseries.com/wp-content/uploads/2024/04/banner-ad-SlashNext-600x100-L2R1-1.webp" alt="SlashNext" /&gt;&lt;/a&gt;&lt;/figure&gt; &lt;p&gt;&lt;!-- /wp:image --&gt;&lt;/p&gt;</description>

Capture the CISO

CISO Series

Season 2: HYAS, Nudge Security, and SlashNext

APR 24, 202438 MIN
Capture the CISO

Season 2: HYAS, Nudge Security, and SlashNext

APR 24, 202438 MIN

Description

Welcome to episode one of Capture the CISO Season 2!

Our host is Richard Stroffolino and our judges are Arvin Bansal, CISO, C&S Wholesale Grocers and  Brett Conlon, CISO, American Century Investments.

Our contestants:

Huge thanks to all our contestants who are also sponsors of Capture the CISO

HYAS

HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns. 

We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable.

HYAS’ award-winning threat intelligence and investigation platform and protective DNS solution detects and blocks the beaconing requests of malicious and anomalous command-and-control communication and stops attackers from progressing.

Nudge Security

Nudge Security helps modern organizations manage SaaS security and governance at scale. Our patented SaaS discovery method eliminates blind spots, giving customers a full, continuously updated SaaS asset inventory from Day One. With AI-driven risk insights, security teams can readily understand their SaaS risk posture, prioritize security efforts, and regain control of IT governance. And, a human-centric approach to SaaS security orchestration helps security teams ensure proper governance while minimizing manual effort for themselves and friction for end users.

SlashNext

SlashNext’s Cloud Email Security leverages our advanced AI platform, purpose built to stop sophisticated BEC and advanced phishing threats. The service delivers industry leading 99.9% detection rate and 1 in 1 million FPs by utilizing Gen AI, natural language parallel prediction, computer vision, relationship graphs, and contextual analysis for:

  • Broad threat coverage due to large and diverse LLMs 
  • Highest accuracy and a 48-hour detection advantage to stop sophisticated zero-hour threats 
  • Increased SecOps and user productivity from using a solution with the highest detections and the lowest FP
  • 360° protection with threat protection across all messaging channels: in email,  mobile and web

Request a demo https://slashnext.com/request-a-demo/.