CyberWire Daily - Fraud and Identity [CISO Perspectives]

Episode Date: November 18, 2025

Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated... with new emerging technologies. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks. Want more CISO Perspectives? Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter, building full-stack zero-trust networks from the ground up. Trusted by security and network leaders everywhere, meter delivers fast, secure by digital. design and scalable connectivity without the frustration, friction, complexity, and cost of managing an endless proliferation of vendors and tools. Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular in one integrated solution built for performance, resilience, and scale. Go to meter.com slash CISOP today to learn more and book your demo. That's M-E-T-E-R-com slash C-I-S-O-P.
Starting point is 00:01:08 Consider the following four individuals. A British fashion designer, an American rap artist, a Filipino influencer, and an old security guy. While there are many, many differences between these folks, there is one important similarity
Starting point is 00:01:26 that is relevant to this discussion. And that is this. Each of these individuals is named Kim Jones. With in-person interactions, the differences between these four Kim Joneses would be obvious. It would be as difficult for Kim Jones, the Filipino influencer, to masquerade as Kim Jones, the old security guy,
Starting point is 00:01:48 as it would be for me to impersonate the rapper Little Kim. Online, though, any of these individuals could at least begin the process of accessing data that is restricted to my personal use by honestly and truthfully providing their names. This example illustrates one of the fundamental challenges with combating online fraud, establishing identity in a non-reputable yet convenient manner. While we understand that merely a name is nowadays woefully insufficient in establishing
Starting point is 00:02:22 online identity, adding both layers of complexity, such as geolocation and authorizing financial transaction, and additional factors for authentication have yet to stop the seemingly exponential advancement of fraudsters. As we provide more data to organizations, it's theoretically possible to create a unique identity using seemingly innocuous non-regulated information, but this ignores another fundamental problem with establishing identity. Capturing the identity information in a pseudo-fifference physical or atomic fashion. Once identifying information is given and stored in some fashion, that identity becomes a
Starting point is 00:03:05 de facto token, and tokens can be tampered with or stolen. If we wish to get a handle on fraud, then it's time for us to start re-examining how identity works and functions online. Rather than assuming that traditional models of identity are the only solution, we need to start exploring concepts such as making identity by directional, reinforcing or strengthening a session or transactional identity, and exploring the concept of secretless identity. I've written and spoken about these concepts before, all with the caveat that these concepts are by no means the only potential solutions to the problem. That said, it is clear that we
Starting point is 00:03:51 need to move beyond rehashing or even complexifying old models of identity, which fail to address the real needs of our data-driven world. By two cents. Welcome back to CESO Perspectives. I'm Kim Jones, and I'm thrilled that you're here for this season's journey. Throughout this season, we will be exploring some of the most pressing problems facing our industry today and discussing with experts how we can better address them. Today, we're looking at fraud from a different angle than we did last episode.
Starting point is 00:04:44 This time, we're going to look at fraud from an identity perspective. Let's get into it. Richard Bird is an internationally recognized expert on the topic of identity. Richard's goal, his push for our community, rather, is to look beyond the traditional bounds and mechanisms of how we approach identity and explore innovative solutions to this topic. I sat down with Richard to explore the concept of identity and how getting identity right might solve a plethora of challenges to include fraud within cyber security. A quick note that the opinions expressed by Richard in this segment are personal. It should not be interpreted as representing the opinions of any organization that Richard
Starting point is 00:05:39 has worked for past or present. Richard is really great to see you, man. We don't get to see one another that often. Yeah, it is great to be having the opportunity to catch up with you. I would suspect that most of my audience, if not knows you, knows. of you, but I don't want to be presumptive. So take a couple of minutes and tell my audience about Richard Byrd. Yeah, it's always so weird.
Starting point is 00:06:06 People are always like, well, you've got imposter syndrome. That's why you struggle to talk about yourself. And I'm like, no. And what's weird is where my career has gone over the last three decades. Most folks have heard this story, 20 plus years in the corporate side, had this great opportunity to work first in IT operations. when I came into technology, also a big advocate for, you know, non-traditional technologists.
Starting point is 00:06:30 I was a liberal arts major that got out of the Army and had been doing construction project management. One day some guy said, if you can manage a construction project, you can manage a mainframe migration. Let's hope those opportunities continue to persist as the world changes. There was tequila involved. Only a little, only a little. Only a little.
Starting point is 00:06:52 But I made an unexpected transition into security halfway through that career and ended up accidentally, truthfully, being the global head of identity for J.P. Morgan Chase's consumer businesses. And that led to a CISO role. So I've done both CIO and CISO. And I realized that I wanted to do something different and left and moved into the startup world. And that's really where people know me from, is that, I was given the opportunity to begin public speaking, which I'd never done before. And all of the sudden, people were coming up to me saying, you don't speak like any technologist that we know. And I said, well, that's because I'm not a really good technologist, but I grew up in a family fishing business and learned how to tell stories. And all of that has created a lot of energy that has created a really unexpected personal brand in the marketplace. But I love having my hands in the startup world, working on new technologies, advising,
Starting point is 00:07:58 participating in any number of different conversations about, you know, where standards are going, and how do we change the hockey stick curve of cyber losses. And to be able to just every day have that be your job and you get to have these really interesting and meaningful conversations and then hopefully be able to, like, change things. It's a freaking awesome career, and I'm super, super humbled by all the opportunities that I get to be able to participate in these conversations. And we're glad you're here, man. As someone who's internationally recognized in this topic that not enough people care about, I'm here to actually talk to you today about this thing called identity. And I'm going to take it all the way back to basic concepts and get into challenges and concern.
Starting point is 00:08:48 So let's not make assumptions. Let's start with when I use the phrase identity from a cyber standpoint, how do you define that as an expert? Yeah, my focus on identity when we talk about it in the current age is identity is the pathway that moves a human actor into the digital world, right? And I always love how John Kinderberg phrases it a couple years ago, John's an old friend, and he saw. said, he said, I don't understand why people are using this non-human identity label. He goes, all identities in the digital are non-human. And I got to pause for a second, right? And what he said is really kind of impression, it's observant, right?
Starting point is 00:09:35 He's saying everything that is an identity in the digital world is functionally a proxy for a human equivalent. Now, maybe not a full human, which gets into things like AI and that type of thing. but maybe in a human function. And so, yeah, for me, it is how do I move from this keyboard, from this device, to the digital world, and then how do I navigate that digital world? And all of that is associated to identity. Which means that every interaction that we have, you know, is being done by this proxy called our identity within the environment. So the challenge that I see as an old guy and an old cyber guy is that if we get identity wrong, then I either, A, do not have the ability to do the things I need to do, or B, have give someone else the ability to do things that I don't want them doing.
Starting point is 00:10:37 I like to use the example. I give a presentation of identity, and I put five pictures up there and say, you know, what's the common thing for all these pictures? And the answer is all of those folks are Kim Jones to include the female influencer, to include Little Kim, the rapper, to include the British fashion designer, et cetera. So, you know, there's lots of opportunity for identity to go wrong. So what has been our approach to identity up till now? And what are the challenges with that approach? So that's why I was very specific in my choice of words in the current age.
Starting point is 00:11:15 talk to me when we're talking about identity because the history of digital access is problematic and it's problematic from the standpoint of how it started
Starting point is 00:11:26 which was it wasn't a representation of me in the system it was an access control mechanism to get into a system
Starting point is 00:11:39 so I always like to use the example of first of all I'm more of a history geek, then I am a tech geek, but then you combine the two, and then I go and research stuff that nobody really has ever written about. So a great example is, is when we're the first account and password constructs created? 1961. Why is 1961 an interesting date? It's because it's a time when IBM set up a brand new mainframe lab at MIT, and it was only available to
Starting point is 00:12:10 compute graduate students. And they got four hours of computer. few time a week and it took exactly 11 hours for some dude to figure out how to spool off the access control dog and hack the system so the graduate students in the mainframe programming classes could sell each other their four hours of time right and so like when you when you hear that story you immediately go oh well i can understand why access is screwed up today because Because we, not only did we start out with this construct that it was, and it's also really important to understand what that was replacing. The reason why this identity or this access control mechanism was created was you actually used to get into compute devices with real physical keys. Yeah.
Starting point is 00:13:01 Right. And so this was a digital means, the very first digital means. So we treated from 1961 until about 2012 or 13, we treated. identity only as access administration and only as access control. And I always like to tell people, like in 09-ish or whatever, when I got my first identity gig, my corporate CIO congratulated my promotion. He said, way to go. You've got the easiest job ever.
Starting point is 00:13:33 And I said, I was like, what do you mean? And he goes, it's just giving people access to stuff. How hard can it be? And so the whole idea of de-accessing people. or deprovisioning or roles, profiles, grants, entitlements, all the complexities that really drive identity are completely obfuscated from most people in any organization. And because they always equate things
Starting point is 00:14:03 with just giving access to something as being identity, we've had this very, very stunted, you know, thought process around identity and why I think this is an important conversation is a number of years ago, Julie Smith, when she was at IDSA, and I started working on something where I was like writing articles about why is identity the only control domain, recognized in NIST, recognized in ISO, very clearly we are cybersecurity kids at a big dinner table, but why is identity the only security control domain that doesn't use security language? We talk about access, we talk about entitlements, we talk about grants. times our brethren's in the other domain and sister and in the other domains are talking about attack surfaces, exploit surfaces, you know, time to remediate all of these different mechanisms and we are still talking about, even within identity security, we're still talking about identity and access administration terms. And I think that's a big, big contributor to the problem.
Starting point is 00:15:07 So when we think about identity as a proxy for us in the digital world, what should, not what does, but what should that change about our thought processes regarding identity as a cyber professional? Well, boy, that's a tricky question. We got time.
Starting point is 00:15:33 I know, but it opens up that whole can of worms of which end of the whale do you start with? I want you to go there, so let's take both sides of that. Well, you mentioned something that I think is a real key part of the mess that we're in, which is I'll use Chase as an example. I've been a Chase customer for 32-some-odd years back to Bank One, right? But I've been a Chase employee. I'm also a Chase former executive director, which when you leave Chase provides you with some interesting benefits.
Starting point is 00:16:09 But each one of those is a different meet. right so there's no singular representation of me like there is in in the in the analog in digital systems and because of a propagation of 16 different versions of me we run into massive conflicts and the use case it's always so easy to prove where as acts or where as identity specialists experts we should be focusing solving problems is a very simple one. I am a employee of a company for 27 years. I leave that company and retire. Now I'm a retiree, former employee, but I come back six months later as a contractor. That simple use case usually blows most people's identity frameworks and identity stack apart because that contractor comes back and there's some connection point that happens. happens in all of their old accesses that were never hygiened and taken away because it was, you know,
Starting point is 00:17:19 we disconnected at AD or Azure AD, but we never disabled at core application or core function. When you just look at the simple use cases like that, the problems that we have still not resolved in identity, just bloom right in front of your eyes. And, you know, I think that, you know, a lot of our questioning about, identity needs to come back to did we ever actually build a functional taxonomy for the function?
Starting point is 00:17:53 I raised this point, actually at the last identiverse, I said, have a question about this whole is an AI and an identity, which is a really interesting big philosophical divide going on right now. And, you know, of course, all the identity people are like, of course, it's an identity. And I said, great. I said, who's ready to go talk to an enterprise buyer and tell them that their octable is going to go up by 50% in any given year because they're going to get thousands and tens of thousands of AI agents that all need an identity now? And it's all valumetric and subscription-based licensing. And they were like, oh, and I said, maybe the real problem here is what we are terribly bad at identity
Starting point is 00:18:34 is the way that we have been abstracting identities. So we tend to specify identities and go dive fast into, you know, authorization, auth, Z, entitlements, grants, privileges. And I'm like, maybe our entity classification at that top layer has never happened where an AI is an identity, but it's a different type of entity. And a great example of this is one we've already mentioned, which is I love all of the excitement about this thing called NHI, right? But I always ask, and I know all the NHI players, and I always ask them the same question. I'm like, so we didn't have anything other than workforce identities until two years ago when NIH companies just blew up, right? And everyone kind of pauses. And I'm like, this is a 50-year-old problem. Like, we have contractors that are not humans because they're
Starting point is 00:19:32 actually financial contracts. We have service accounts that aren't human, and I used to certify two $2.7 million service accounts a quarter under SOX obligations back when I ran identity at Chase. I'm like, this has been a problem that's existed forever. How all of a sudden is this now a new thing? And it's a new thing, functionally, because we never did the top layer entity assignment. We've missed an entire layer in the taxonomy because if I had an entity that was called a contractor, or a temporal worker, then the way that I would have managed
Starting point is 00:20:13 that identity would have been different than trying to take that contractor and then stuffing it into my workforce solution and then in the state of California be sued because I have contractors in a human resources-related system and now those, by default, they are considered to be full-time employees.
Starting point is 00:20:31 This entity classification thing has been really scratching that made for the last several months in the AI space because now we're seeing it in very aggressively happening in conversations around AI and I'm like, and AI is not an actual full human.
Starting point is 00:20:48 So if you stuff it into a workforce system, probably's not going to work, right? And it's going to get even more interesting as you begin to get more agentic AI operating out there. So now I've got additional functionality for this entity that more closely replicates what the human proxy can do
Starting point is 00:21:04 within the environment. That's going to get even more interesting. ...height... ...their... Have you ever Have you ever imagined how you'd redesign and secure your network infrastructure if you could start from scratch? What if you could build the hardware, firmware, and software with a vision of frictionless
Starting point is 00:22:16 integration, resilience, and scalability? What if you could turn complexity into simplicity? Forget about constant patching, streamline the number of vendors you use, reduce those ever-expanding costs, and instead spend your time focusing on helping your business and customers thrive. Meet Meter. the company building full-stack zero-trust networks from the ground up with security at the core, at the edge, and everywhere in between.
Starting point is 00:22:46 METER designs, deploys, and manages everything in enterprise needs for fast, reliable, and secure connectivity. They eliminate the hidden costs and maintenance burdens, patching risks, and reduce the inefficiencies of traditional infrastructure. From wired, wireless, and cellular to routing, switching, firewalls, DNS security, and VPN, every layer is integrated, segmented, and continuously protected
Starting point is 00:23:13 through a single unified platform. And because Meeter provides networking as a service, enterprises avoid heavy capital expenses and unpredictable upgrade cycles. Meter even buys back your old infrastructure to make switching that much easier. Go to meter.com slash CISOP today to learn more about
Starting point is 00:23:35 about the future of secure networking and book your demo. That's M-E-T-E-R.com slash C-I-S-O-P. Question for you. You mentioned that a lot of the focus in terms of fixing the problem of looking at identity as more than just access happened around 2012. what happened around 2012? Cloud, right? The very beginnings of cloud
Starting point is 00:24:12 and, you know, commercialized cloud when it was very clear that none of the access control solutions that were currently present on the market were going to be able to manage what at that time was predominantly AWS, right? Now has become the complexities of multi-cloud, multi-CSP, right?
Starting point is 00:24:32 But, you know, you have to hand it to you know companies like octa um i i had octa coming to my office in 2014 when i was a ceo and try and sell me right and um and and i remember like the conversations of like why would i put my identity stores in the cloud that seemed like a very bad idea and and yet the the you know with a lot of tenacity and and again this is why i give a lot of respect to to mckinon because he had to hold on for a long time until the world caught up to to real full cloud enablement. But the cloud brought into focus the inability for us to manage identity at the technical stack
Starting point is 00:25:20 layer across a broad, diverse infrastructure deployment. I think this is an interesting repeat. Really, we saw major technical advancements, technological advancements during kind of the boom cloud years with identity. And it wasn't just that. It was cloud identity. It was, you know, a whole laundry list of names you can think of beyond identity, Delinia, ping, you know, going ping cloud, like everybody, you know, finally got there.
Starting point is 00:25:53 I think AI is the next massive litmus test, catalyst, for advanced changes in identity security. Because, yeah, go ahead. Let me push you a little bit. Yeah. This is more devil's advocate than anything else. Yeah, yeah. While I see the advances that we made in terms of understanding that we can't manage identity, you know, not just in-house, but need to actually expand it and expand the capabilities,
Starting point is 00:26:23 I'm not necessarily sure we saw the mindset shift regarding what identity is other than just another form of access. go along with that advancement in technology. Because I still see a lot of vendors using good companies who are still looking at this as just another method of managing access. Do you disagree? And if so, why I'm good with that? And if you agree, what do we need to do to fix that still? Because it sounds like all we've done is migrate,
Starting point is 00:26:53 taking the same problem that started 50 years ago that we're dealing with now and migrating it and making it more effective and efficient to be broken. Yeah, yeah. I love that observation, right? Because you're absolutely right, except this is going to be interesting. But it's not a technological problem. Now, I'm going to be very, very specific. It's not a technological problem on the workforce side. And the reason I say that is because the triad always holds true. People process and technology. So it was probably about six years ago that I started saying something that sounded really contentious in the marketplace, which was if you get popped on a workforce identity related hack. It's your own fault because the tech is here and there's no reason that you should get hit in the workforce space. We're fully mature in that space. And I definitely still fully believe that today. But we can use an example of how the people in process part has failed to keep pace with the technological advancement specifically in
Starting point is 00:28:02 workforce identity with another example with octa the mGM breach right the mGM breach was was really interesting social engineering fishing happening to a to a help desk right and that help desk then enabling the bad actors with access at the engineering level that was had too many privileges it was over entitled right now who made that choice like i hope don't make any mad at MGM, I'm currently staying in an MGM resort. That would be bad. Yeah, but who made that choice to allow persistent excessive privilege and access for the engineer, that engineer's account? MGM did, right?
Starting point is 00:28:51 Somebody with an MGM made a decision that maybe one day this engineer needs this really heightened access capability. in order to be able to continue to do their job. Therefore, we're not going to extract that from them because they are too important of an employee, a resource for us. This is the guy that if he steps off the curb and gets hits by a bus or production system, stop. So we cannot take segment that information or that access and put it into privilege access management.
Starting point is 00:29:24 That has nothing to do with technology. That is a series of process and people-related decisions that represent that antiquated mindset of access versus control. And that's why, and this is why I really love that you went there, that's why I think the AI era is the catalyst for the next gear change. And the reason is, is because I have never heard non-identity people talk about the fine-grained control layer as much as I hear about it today, which is that fine-grained control layer is what those bad guys were capitalizing on in the MGM hack,
Starting point is 00:30:07 knowing that the fine-grained control layer was subject to the people in process weaknesses. If you want to allow people in process weaknesses and an AI agent, I'm going to guarantee you right now you're going to have a very bad day, multiple days in a row. And faster. And faster. Because AI agents do not suffer from indecision bias. right they will do what they have been tasked and coded to do and they will capitalize on all of those same weaknesses if it allows them to accomplish that mission that you have tasked them to do
Starting point is 00:30:43 the only way that we're going to get our arms around that is is diving into fine grain control deep waters that i'm going to be really frank like identity people we're terrified of it right and the reason that we're terrified of it is because we don't control authentic then and off Z. We distributed that to the developers years ago, and if we think about the construct and the framework of that entity into identity, and who should have been controlling those fine grant entitlement's grants privileges, when we gave things like authorization control over to developers, they didn't even bother to associate those as the authorization calls to
Starting point is 00:31:24 users. They associated them to the app. Yep. So if you get access to the app, you can control the app through the authorization layer, whether or not it's assigned to you or not. We've seen AI agents doing this already, actually, in the last year. And so this is why I really, like, it's so weird that for everyone else is freaking out about AI, I am stoked, not because of all the cool things that AI can do,
Starting point is 00:31:50 but because AI is going to become the 10-ton weight, the grand piano dropping on Wiley Coyote, that wakes up everybody in security beyond just identity to go, oh, my gosh, our architecting of this rude goldwork device that we call identity for the last 30 years, 35 years, is going to get absolutely destroyed by AI unless we start talking about these difficult problems, get after it.
Starting point is 00:32:22 Okay, so let's, well, that's a perfect segue. Let's double click on that. So I may see so of a company smaller than Chase, significantly smaller than Chase. What do I do today? There's an argument that says AI is already here, which means this problem's already here, which means I'm already at least one to four steps behind. Right. But let us assume that by listening to this podcast, I realize, well, crap, I'm probably five to six steps behind.
Starting point is 00:32:49 I need to catch up. What do I do today to try and get in front of this? And I want to get more operational versus strategic. What should CISO be doing? Yeah. Yeah. The very first thing that every CISO needs to ask is what AI am I allowing into my organization? Because frankly, 90 plus percent, 99 plus percent of most companies' exposure to AI is external, right?
Starting point is 00:33:17 It is not in-house developed. And because of that, that means I'm allowing things into my network. And the network still exists, and the network still is a protection layer. So every CISO needs to demand a full inventory and visibility into everything AI that is coming into the organization. Question number one, right? Once there's knowledge around that, question number two is which of these AI services features functions or agents has persistent access that is not challenging. or verified on a transactional basis. The other question that I ask that I think is another first starting point for CSAs is I ask,
Starting point is 00:34:03 okay, what's your relationship with AI innovation within the organization? And they say, well, I've been told to just block the services that we don't have an enterprise contract for. And I look at a CISO, I'm like, okay, can we be intellectually honest for a moment? Are you blocking everything? Oh, hell, no. And you see every... I don't even know everything I should be blocking.
Starting point is 00:34:23 Yeah. And you see every CISO. And I do think that there's a certain hold your nose and throw up in your mouth a little bit right now that CISOs are having to deal with because of, you know, the grand hope and dream of all the things that AI can do on the business side. Now, I will say that this is also the first time in my career where I'm seeing a lot of CIOs who are responsible for that innovation, who are like something with no guardrails is probably bad. Yeah, right? That's a good, that's a good evolutionary movement, right? We want to, you know, we want to progress the conversation. The way that people become security aware is not because they do cybersecurity awareness training. You know, nobody learns how to run away from a bear by reading a book about running away from a bear, right? A CIO who's now understanding that the reward component of AI comes with a very, possible risk component or damage component, like to see that kind of recognition among other sea level technologists is incredibly important. Absolutely. And that's why I think AI is driving
Starting point is 00:35:34 these really interesting conversation. I am so glad, like this is going to sound melodramatic, but I'm so glad that I'm not retired. I'm so glad that I'm not, I'm so glad that I didn't hang my cleats up, you know, a couple years ago and just say that I'm going to go do whatever, Like, I think we're in a super exciting time for security and identity specifically because of AI,
Starting point is 00:36:00 because it's forcing us to think about all the things that we, A, did bad in the past, and that's a lot, right? And B, what we're going to have to do not to repeat those things, because like you said, the consequence, the catastrophic consequences are faster, the blast radius is bigger, the damage is going to be insane, right? and it's forcing conversations that I haven't heard in the practitioner community in years and years and years. Let's end this the way I end all my podcasts and give you an opportunity to tell my audience one thing that you want them to know that we haven't brought up, we haven't discussed, et cetera. Well, the thing that I talk about a lot now is while we're talking about all of these founders in the AI space that are. just so eager to hype up what they're doing, right? There's a reality here that I think is both exciting and fascinating, which is we're in an age of technology that is the first what I call pop culture age of technology.
Starting point is 00:37:07 So my mom, 79 years old, my mom has asked me if she needs to be concerned about AI. Wow. My mom has never asked me what my qualis scam. results were, right? Like, my mom has never expressed any interest in what I do on, on the security side. And there's huge opportunity for conversations as families, as parents, as children amongst each other about technology and what it means in our lives because of what's happening currently with AI. I think there's a need for us to kind of collectively, as human beings, to embrace this pop culture moment of AI and go okay like what could we do what could change for the better what
Starting point is 00:37:59 could we leverage these capabilities to do besides you know lay off a thousand call center workers right like let's be more um let's be more thoughtful too many people feel like this AI thing is such a tidal wave that is just washing everything out into the ocean and they can't keep up with it. And I'm like, that's not really true. Like, just, just be observant. Dig into it. I think that's, that's really what I'm encouraged people to do. And that's a wrap for today's episode. Thanks so much for tuning in and for your supporters and 2K Pro subscribers. Your continued support enables us to keep making shows like this one, and we couldn't do it without you. If you enjoyed today's conversation and are
Starting point is 00:39:01 interested in learning more, please visit the CSO Perspectives page to read our accompanying blog post, which provides you with additional resources and analysis on today's topic. There's a link in the show notes. This episode was edited by Ethan Cook, with content strategy provided by Myon Plot, produced by Liz Stokes, executive produced by Jennifer Ivan, and mixing sound design and original music by Elliot Peltzman. I'm Kim Jones. See you next episode. Securing and managing enterprise networks shouldn't mean juggling vendors,
Starting point is 00:40:02 patching hardware, or managing endless complexity. Meter builds full-stack zero-trust networks from the ground up, secure by design, and automatically kept up to date. Every layer, from wired and wireless to firewalls, DNS, and VPN, is integrated, segmented, and continuously protected through one unified platform. With meter security is built in, not bolted on. Learn more and book your demo at meter.com slash CISOP. That's METER.com slash CISOP.
Starting point is 00:40:39 And we thank Meeter for their support in unlocking this N2K Pro episode for all Cyberwire listeners. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.