Listen "Orchestrating the security stack around the Hash Table."
Episode Synopsis
Orchestrating the security stack is a cybersecurity first principle strategy.
Our security stack has grown unwieldy. The complexity breeds vulnerability. Orchestration may be our only hope. Rick reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools. The Hash Table identifies data governance and policy strategy as a crucial first step. They also talk about the first principles of speaking with the C-suite, as well as the darkside of automation and orchestration.
With Rick Howard, the CyberWire’s CSO and Chief Analyst, joined by Bob Turner, the Fortinet Field CISO for Education, and Kevin Magee, the CSO for Microsoft Canada, discuss orchestration as a first principle strategy.
Cybersecurity professional development and continued education.
You will learn about: SOAR/SIEM and SASE for large scale orchestration, data governance, the three components of a good SASE platform, data materiality and gap analyses, the dark side of automation
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more orchestration and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Our security stack has grown unwieldy. The complexity breeds vulnerability. Orchestration may be our only hope. Rick reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools. The Hash Table identifies data governance and policy strategy as a crucial first step. They also talk about the first principles of speaking with the C-suite, as well as the darkside of automation and orchestration.
With Rick Howard, the CyberWire’s CSO and Chief Analyst, joined by Bob Turner, the Fortinet Field CISO for Education, and Kevin Magee, the CSO for Microsoft Canada, discuss orchestration as a first principle strategy.
Cybersecurity professional development and continued education.
You will learn about: SOAR/SIEM and SASE for large scale orchestration, data governance, the three components of a good SASE platform, data materiality and gap analyses, the dark side of automation
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more orchestration and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
More episodes of the podcast CISO Perspectives (public)
The existing state of regulation.
23/09/2025
The return of CISO Perspectives.
16/09/2025
Bringing it all together.
08/07/2025
Mid season reflection with Kim Jones.
10/06/2025
Are we a trade or a profession?
22/04/2025
Is the cyber talent ecosystem broken?
15/04/2025
CISO Perspectives is back!
08/04/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.