Transcript
A (0:02)
You're listening to the cyberwire network.
B (0:04)
Powered by n2k.
A (0:11)
This exclusive N2K Pro Subscriber only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter building full stack zero trust networks from the ground up. Trusted by security and network leaders everywhere, Meter delivers fast, secure by design and scalable connectivity without the frustration, friction, complexity and cost of managing an endless proliferation of vendors and tools. Meter gives your enterprise a complete networking stack, secure, wired, wireless and cellular in one integrated solution built for performance, resilience and scale. Go to meter.com CISOP today to learn more and book your demo. That's M-E T E R.com CISOP Foreign.
B (1:09)
Welcome back to CISO Perspectives. I'm Ethan Cook. I'm the writer here at N2K and editor of the CISO Perspectives podcast. Throughout the series, Kim's been pulling the deep conversations out of the conference and tackling some of the most complex issues facing our industry from every angle. Over the past few episodes, we've had some incredible guests. Leaders who've built, broken and rebuilt security programs, tackled talent gaps head on, and reshaped what it means to be a strategic leader in cybersecurity. Now we're pulling back the curtain a bit to give you a deeper look into what we've been building here at CISO Perspectives. In this episode, we're hitting pause to reflect on the insights we've uncovered so far and set the stage for what's next. Today, the mic turns to Kim. As he becomes the guest, I'll be asking him to look back on the past eight episodes and share what stood out and talk about where the conversation goes from here.
A (2:27)
I gotta tell you, it's different being on the other side of the microphone,
B (2:31)
but I don't know, I was gonna say a little role reversal here.
A (2:35)
Just a little. Yeah.
B (2:37)
So, you know, as we've gone through this journey together, you know, I've been on the behind the scenes, watching the episodes, writing the blog posts, seeing how these conversations have transformed, making me look smart.
A (2:48)
And I'm very grateful for that. Thank you.
B (2:50)
Only a little bit. Most of it's you. The conversations have been really striking to me from someone who doesn't come from a CISO perspective, doesn't have a traditional role in cybersecurity. But I think something that has continued to stand out throughout this conversation is not only how complex the problem is, but how multifaceted it is as every guest that you've talked to has approached it from a different viewpoint. So While we have had the various episodes kind of evolve over time, we. One of the ones that stood out to me was episode four with Will Markow.
![Mid season reflection with Kim Jones. [CISOP] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F3995c5ee-181c-11f1-9795-87670bdd6683%2Fimage%2F4576c79a6260b29daaff0ea0480913c0.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)