CyberWire Daily - Mid season reflection with Kim Jones. [CISO Perspectives]

Episode Date: February 3, 2026

Please enjoy this encore of CISO Perspectives. In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring theme...s that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter, building full-stack zero-trust networks from the ground up. Trusted by security and network leaders everywhere, meter delivers fast, secure by design, and scalable connectivity without the frustration, friction, complexity, and calm. of managing an endless proliferation of vendors and tools. Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular in one integrated solution built for performance, resilience, and scale. Go to meter.com slash CISOP today to learn more and book your demo.
Starting point is 00:00:57 That's METER.com slash CISOP. Welcome back to this is. So, I'm Ethan Cook. I'm the writer here and 2K and editor of the Sissau Perspectives podcast. Throughout the series, Kim's been pulling the deep conversations out of the conference and tackling some of the most complex issues facing our industry from every angle. Over the past few episodes, we've had some incredible guests. Leaders who've built, broken, and rebuilt security programs,
Starting point is 00:01:32 tackled talent gaps head on and reshaped what it means to be a strategic leader in cybersecurity. Now we're pulling back the curtain a bit to give you a deeper look into what we've been building here at SISO perspectives. In this episode, we're hitting pause to reflect on the insights we've uncovered so far and set the stage for what's next. Today, the mic turns to Kim as he becomes the guest. I'll be asking him to look pack on the past eight episodes and share what stood out and talk about where the conversation goes from here. I got to tell you, it's different being on the other side of the microphone. I was going to say a little role reversal here. Just a little, yeah.
Starting point is 00:02:37 So, you know, as we've gone through this journey together, you know, I've been on the behind the scenes, watching the episodes, writing the blog post, seeing how these conversations have transformed. Making me look smart, and I'm very grateful for that. Thank you. Only a little bit. Most of it's you. The conversations have been really striking to me from someone who doesn't come from a
Starting point is 00:02:58 Sissau perspective. It doesn't have a traditional. role in cybersecurity. But I think something that has continued to stand out throughout this conversation is not only how complex the problem is, but how multifaceted it is, as every guest that you've talked to has approached it from a different viewpoint. So while we have had the various episodes kind of evolve over time, one of the ones that stood out to me was episode four with Will Markow. Oh yeah. Yeah, one of my favorites. So let me take a step back first and get to what you talked about about the multifaceted aspect of this, Ethan.
Starting point is 00:03:35 And this gets back to one of the things we've wanted to do with this podcast. You know, there's a lot of conversation everywhere I go and all my media feeds regarding some of the more complex issues, including this one regarding talent. Everyone seems to have an opinion, and everyone seems to give that opinion in the soundbite, I just came back from a conference out in Denver where I was talking and listening to people talk about talent issues and concerns. And whether or not college is worthwhile or not, whether or not certifications are worthwhile or not, whether or not there is a cyber talent gap. And everyone is very quick to render a soundbite opinion that is firmly steeped in their own experience. or just adamant, passionate belief.
Starting point is 00:04:33 And when you start to get them to peel that onion away, no one seems to have time. No one seems to have time to do the work to do the research. And nobody seems to, in some cases, maybe even have the desire because they're too busy fighting the fires that they have to fight today. So I'm not trying to disparage anyone
Starting point is 00:04:52 who doesn't have the time to get down and dirty with things. but you miss some of the nuance and complexity if you don't do that. Then as you've said, Ethan, we're seeing that, we're definitely seeing that as we go forth. I was going to say, people have this unwillingness,
Starting point is 00:05:12 whether it's maybe because of a lack of time or maybe because a lack of desire to really investigate this problem, dive into it, and instead are focusing on fighting the fight that is incredibly important across the nation. And this is a theme that has come up, not just in Will's episode, but across many of our episodes about why do we have this misconception? Why do we have the sound bite moments or people unwilling to?
Starting point is 00:05:37 And Will stood out to me in his conversation. It would be a nice little transition to talk about that episode a little bit more. But he talked about how people are engaging in this almost bloodbath, I think, was the term he used. To acquire top talent and will always, you know, kind of feast upon talent and engage in the this sort of arms race almost to a degree rather than nurturing and developing talent. And that was a theme that we found throughout many of the conversation. So, you know, I think I would love you to dive a little deeper into that and talk about, is that because it's simpler?
Starting point is 00:06:09 Is that because it's more cost effective? Is that because why do you think that we have this bloodbath, so to speak? Several reasons. I genuinely believe it is not an issue of negligence. or malfeasance, I think it's an issue of time more than anything else on one end. A lot of people don't have the time, given the firefight that they're in, to look at investing in a long-term strategic approach when the issue is tactically, I need someone who can do this now.
Starting point is 00:06:49 The other end of that is fear. one of the things I said at the keynote I did at the conference is that we're living in a cycle that's being driven by fear as cyber professionals, which is really interesting since we talk about driving out fear, uncertainty, and doubt. And here's where I'm coming from with that. As the job description gets larger, as the stakes potentially get larger in terms of fines, penalties, sanctioned by the SEC, even potentially jail time by other organizations. The challenge here is nobody wants to make a mistake. We have created an environment in that ecosystem that says, I have to be right 100% of the time,
Starting point is 00:07:47 which by definition sets the profession up for failure. yet we have set ourselves up and created an expectation that we can't fail, we can't get it wrong. And we perpetuate that with our constituents. So why am I going to take someone who has the potential for doing great and wonderful things and nurture them and grow them, etc., when I can steal someone who has the ability to do it, now has demonstrated they have the ability to do it now. All I have to do is pay them 5 to 10% more than they were making over there, and I can grab them and bring them here. So there's a lot of fear within our ecosystem that is perpetuating this problem,
Starting point is 00:08:39 if that makes any sense. No, absolutely. I think there is a question that I kind of come back to then, which is then how do we change this perspective? Is this something that we have to do internally? Is this something, you know, you mentioned fines, that's something that comes from a government body? Is that something we have to change from an executive perspective? Where do we bridge this gap?
Starting point is 00:09:02 Or how do we even begin to solve this? Because this was a reoccurring problem that we found throughout the season so far. Well, I think, and, you know, the short, flippant, yet accurate answer is listen to the season up to now as well as the other four episodes that are coming. Because that's what we're trying to tee up within the environment. But that's the short, flippant, though accurate answer. What I would say the long answer is, is consistency. And the thing that I think, with the direction I think I'm heading in right now, is there a perfect one-size-fits-all answer out there?
Starting point is 00:09:48 No. But you have to be consistent in your approach. And as an example, you can't tell me that college doesn't matter, yet the only place you recruit from are people with college degrees and universities. You can't tell me that all it matters is skill sets and your ability and not define. And there's that dirty, nasty word I use every episode, knowledge, skills, abilities, and experience. and can't define the KSAEs that you're looking for, or you're not testing for those KSAEs when you go to interview people
Starting point is 00:10:27 and you're not accurately putting them within your job descriptions. So what I'm beginning to get a sense of, just based upon me stepping back and talking to the thought leaders within this space for eight episodes and four more to come, is if I were to label our biggest headache, its inconsistency. And whichever approach we choose to take either as a profession or you as a C-So within your
Starting point is 00:10:57 organization, I contend that the vast majority of us are being inconsistent in our approach. And that's what's shooting us in the foot. So again, I think the first solution is consistency, regardless of what opinion you have as to what the correct, big air quotes, correct approach to the problem is. And I feel comfortable saying, and again, I said this recently at a conference, we have nothing, if not, inconsistent regarding our approach to this problem, and we continue to be. No, I think that is a great starting point. You know, and I think a thing you noted in there where, you know, how we assess and approach
Starting point is 00:11:41 talent ties into another episode that we had. And this episode revolved around diversity and in assessing where we get talent, what is the value of talent and the different values that various people coming from different backgrounds bring to your organization. But this episode was a little different
Starting point is 00:11:59 from the other ones that we did. This episode, we did not have a guest. You ran this one by yourself. So before we talk about the content of what you talked about in that episode, I would love for you to kind of shed some light for our audience about why you chose to take this one head on.
Starting point is 00:12:13 Yeah. Diversity, equity, and inclusion have become a contentious rallying point within our nation right now. There are political ramifications and overtones that sit around that issue. And I got to tell you, I've had almost 40 years of experience and intelligence and security and risk. You know, about 25% of that, you know, in service to my nation. And I've done a lot of hard things. And to this day, I have been in situations where people have questioned whether or not I've earned the right to be where I am. Questioned whether or not I'm just a diversity hire, despite the fact that I tend to take the jobs
Starting point is 00:13:14 that nobody else wants to take. In this environment, it's difficult to make statements regarding DEI that people don't assume are politically motivated. And the way I've chosen to approach DEI is, look, on one end, I don't want anyone to assume that I'm making a political statement. I tend to be very apolitical regarding things.
Starting point is 00:13:51 I have opinions. I'm not averse to expressing my opinions, but I'm also not qualified to make statements regarding politics or economics within the environment. Where I am qualified, more than most, to be very direct, is to talk about security. and is to talk about the potential impact of diversity or a lack thereof on our ability to secure this great nation, on our ability to meet the needs of our constituents. So it's important to me as an African-American male who were members when there are only 27 CSOs in the entire U.S. who looked like me, and we all know.
Starting point is 00:14:44 knew one another and several of us are still in the game to make sure that I am communicating properly and factually where I can regarding the importance of diversity within cybersecurity. And I would contend that it's not a political issue. It's an issue regarding critical thinking. And given that our job is to make lemonade out of two apples of grapefruit, to come caught and make it look easy and move from telling people no to trying to tell them how to do something in a more secure fashion than the idiotic method they may have approached this with. I need people who can think outside of the box.
Starting point is 00:15:29 And for me, outside of the box, and I think I said this during that episode, is just applying previous experience and knowledge in a different way to the problem that you have here now. And if we all have similar backgrounds, similar ethnicity, you know, similar stories, et cetera, then we're all going to think about the problem in a similar fashion. That limits our creativity. It limits our ability as teams to think critically and therefore to come up with unique and innovative solutions to problems that work in this fast-paced state-driven economy. So I fervently and staunchly believe that diversity, is absolutely essential for a cyber professional and their team to succeed.
Starting point is 00:16:14 Well, I think you're right. You know, outside of your episode where you talked about this issue, when I wrote the blog post that kind of echoed that, the evidence supports everything you say. There are studies that have supported it about the value it brings, not just from a business perspective in terms of returns and productivity, but also in terms of within a team, we're making less errors, accounting for errors, raising more facts, et cetera.
Starting point is 00:16:41 And that extends beyond just race or gender. It extends to background. And I think that also... Background, economic status. The list goes on. You know, I'm not just talking race and gender. Those are definite factors. But I'm also talking, like, any measure, I don't want people who think like me.
Starting point is 00:17:02 I know how I think and I know how crazy I am. I want people who think different. I want people who are going to challenge the way I look at problems. I tell this war story and you know in terms of thinking critically about a problem, thinking differently about a problem. One of my last CSO gigs, I was a physical as well as information security officers where I ran the guns and the geeks and I used to walk our two buildings every day. So the first two hours of my day were nothing but going on a walkabout.
Starting point is 00:17:35 this one morning, three of my best engineers were huddled around the desk, tried to deal with Rob. And I, as I normally, say, hey, do you need me? And they said, nope, okay, fine. You know, the boss doesn't need to stick his nose in. He's going to keep going. I got back an hour and a half later, and they were still huddled around the desk. That's a lot of thought power.
Starting point is 00:17:58 That's a lot of money sitting around. It's like, okay, you guys have been here for 90 minutes. What's going on? So what happened was we were putting in a new security tool. We owned our data centers, and the requirement for the tool was that we have high availability, preferably between two data centers. The problem is one of our data centers was tapped out for power. We could not put another box in that data center.
Starting point is 00:18:23 So they were trying to figure out how we create a high availability situation, given the fact I couldn't put anything in two data centers. So I stopped for 30 seconds and said, okay, wait a second. Correct me if I'm wrong. Both of our data centers have power coming from two separate transformers, right? And the plugs are labeled regarding the two separate transformers they come from. So if I were to put two boxes in the same data center plugged into power that comes from two separate transformers, it's not perfect. But I can create a high availability situation until we can get more power on the same.
Starting point is 00:19:05 the other data center, right? And the person who has to approve that is the first senior vice president in the food chain, which, oh, by the way, happens to be me. So why can't we do that? I had three very, very smart technical people who I would trust my infrastructure to any given day, who had spent an hour and a half and admitted freely that it never occurred to them. They had never even thought that that was a possibility. That's the value of critical thinking. That's the value of making lemonade out of two apples or grapefruit and a cumquot. I came up differently than they had, you know, from my military background, et cetera, and I'm used to solving problems with duct tape chewing gum and bailing wire. And it allowed me to look at the problem a little differently than
Starting point is 00:20:00 they had, there's only really two ways to develop better critical thinking skills. One is experience. The other is somebody else's experience. And unless you want to be old like I am, you know, wait for four decades. I like to lean on other people's experience and learn from them and get better. Have you ever imagined how you'd redesign and secure your network infrastructure if you could start from scratch? What if you could build the hardware, firmware, and software with a vision of frictionless integration, resilience, and scalability?
Starting point is 00:21:13 What if you could turn complexity into simplicity? Forget about constant patching, streamline the number of vendors you use, reduce those ever-expanding costs, and instead spend your time focusing on helping your business and customers thrive. Meet Meter, the company building full-stack zero-trust networks from the ground,
Starting point is 00:21:33 up with security at the core, at the edge, and everywhere in between. Meter designs, deploys, and manages everything in enterprise needs for fast, reliable, and secure connectivity. They eliminate the hidden costs and maintenance burdens, patching risks, and reduce the inefficiencies of traditional infrastructure. From wired, wireless, and cellular to routing, switching, firewalls, DNS security, and VPN, every layer is integrated, segmented, and continuously protected through a single unified platform. And because Meter provides networking as a service, enterprises avoid heavy capital expenses and unpredictable upgrade cycles.
Starting point is 00:22:19 Meter even buys back your old infrastructure to make switching that much easier. Go to meter.com slash CISOP today to learn more about the future of secure networking and book your debt. That's M-E-T-E-R-com slash C-I-S-O-P. So jumping gears a little bit here. You mentioned the key word at the end of that phrase, and that was experience and the value of gaining experience. And this was a conversation in episode seven where you sat down with Laura and talked about education.
Starting point is 00:23:02 Yeah. And talked about how colleges structure their programs and some of the difficulties that people have had getting experience to their students. And my favorite sign, and all this came from a different episode, but I think it applies very much so to Lars' episode, was there are no such thing as purple unicorns. Yeah. And I love that, and it has stuck with me since the very beginning of the season,
Starting point is 00:23:29 and I felt like it came full circle with that episode. So I would love for you to talk about, you know, what it means to get, get experience, the challenges associate a little bit more and dive into why you tapped Laura for that episode and why her perspective on that really shed some light. So let's answer the last question first. Dr. Laura Ferry is now the vice president of research at Arizona State. I met Laura because she had the dubious distinction of being my boss when I was building a cyber degree program at ASU. So she got some direct exposure to some of the challenges associated with cybersecurity in general. Combined with me learning how to maneuver within a university setting,
Starting point is 00:24:17 which if you've never done it, you don't fully understand some of the real challenges that exist in terms of trying to make certain that we're meeting the mission of the university, the needs of the university and academia, while they continue to figure out how to meet the needs of the business they support. And one of the things that I tapped Laura Ford was because they're in the midst of the cyber talent argument, there is this, well, I'll go so far as to say there is this staunch misperception that college is worthless and that there is no need for you to have a college degree to get into cyber. Well, yes, there are jobs that do not require a college degree,
Starting point is 00:25:11 but there's a one, there's some value proposition, part of that is critical thinking, because it forces you to do and think about things that are outside of your realm of expertise if you do it properly. But there are also a lot of good programs out there that are attempting to make certain, that students come out with some real-world hands-on experience so that they understand not only the tool sets, but the realities associated with operating cyber in any sort of environment to go forth. And I would contend that that bias against academia and that very, very staunch, it's almost like a civil.
Starting point is 00:25:58 war within cybersecurity is truly hurting our ability to solve the talent problem. You know, despite the fact that while we're biased against it, we're still recruiting from colleges and universities, you know, in many organizations as we go forth. So, well, that's why I asked Laura, and that's why I wanted to talk about the value of college. But the experience piece, which has come up a couple of times to include the Purple Unicorn first episode that we did. It gets to the, we're stealing talent.
Starting point is 00:26:32 We're not creating talent. We're stealing talent. And we're breaking our talent decisions on experience. I want you to have already done what I am looking for you to do and have done that specifically for me to hire you. So we're stealing people. And there's a great mind and I'm going to steal it from, I told Will Mark how I was going to steal this.
Starting point is 00:27:00 We're hiring mercenaries, not missionaries. We're hiring people who can come in and say, hey, for 10% more money, we'll come in and do this thing for you. I know you don't care about training or growing me, et cetera, so that when somebody offers me 10% more than you offer me, I'll go somewhere else. And then we're complaining that we can't find the talent or resources, and we don't want to spend the time to build it. So we're looking for that purple unicorn with the rainbow butterfly, wings sitting out there right now who has three years of experience in exactly the tools I'm looking for, has all the certifications I'm looking for and wants to work for $50,000 a year. And then we complain when we can't find him or her.
Starting point is 00:27:44 And I think it goes to the point that we're brought up, which was when we design these programs or when she was designing these programs and working with industry leaders, there was this huge expectation, well, I want you to code the way I can. code. I want you to use the tools that I use. It's not that I don't want just to your point, I just want you to have experience. I want you to have hyper-specific experience. Which is antithetical to what a college can or should be doing. Because, and again, I'm probably going to paraphrase Laura in the episode, we now create an individual who is absolutely positively perfect for your job requirement, but may not be high.
Starting point is 00:28:27 anywhere else or promotable anywhere else in the environment, neither of which is we should want any university or, hell, even any trade school, to be. I mean, that's a problem. And I found it to be a funny, you know, conversation because, you know, I graduated from college a couple years ago for my undergrad, but there was a point where I was sitting during the episode and writing the blog post where I sat to myself and asked this question. it sounds like businesses or organizations are trying to offload training costs onto the individual
Starting point is 00:29:03 or the college, the college will train them to get exactly what they want. They get the person right out the gate who they want or the experience, whatever they want without having to put in any of the work. And kind of feeds into this mercenary mindset where it's, I don't really want to develop or nurture any talent. I want the solution now. And if the person can do it on their own time, all the better. Yeah, and it also harkens back to episode two that I did with very wide side, which is, are we a trade versus a profession?
Starting point is 00:29:32 And there's a lot of truth to say that we may be both and that there's a pivot point for both, but we still haven't been consistent regarding what the requirements are during that trade. So if we're going to be a trade, then, and we say that we need these technical things, we need to create, there's that nasty C word again, consistent. regarding what those things are. And if we were willing to say that if you knew these things, then I can take you and drop you into any of my environments to do any of the things that I need to, then I would buy the fact that, yeah, you know, it's okay for us to expect that a university or an individual or a two-year college or insert method here should be training that individual
Starting point is 00:30:29 so that when they get out, they can do this thing, that thing can go anywhere. That's not what we want. We want to do this specific thing, pivoted about five degrees that I've done customized here, and I want you to prove it by doing it somewhere else. So in that respect, yes, we are inappropriately, unfairly, and unrealistically.
Starting point is 00:30:54 attempting to shirk, you know, responsibilities of any good profession and any good trade to make sure that we create a virtuous cycle that allows for training and growth. This relates to another, you know, really good conversation that you had with my former boss, Simone. You all talked about, and one of the things that she stood out and mentioned was, you know, you brought up her law background and the value of implementing a bar-like association for cyber. and this universal certification system that's accepted across the board within lawyers and the legal profession. And akinning that to some of the – because with her background and certifications and how muddy, I guess, that sector has become, so to speak. Yeah, I mentioned at the time, I think, and I know you pull the reference to the blog post,
Starting point is 00:31:46 that there were like over 450 separate search that you could get within cyber and what's required and what's not. But the challenge that we have here is when somebody asked me, and this was another question I answered at the conference I was at last week, actually, no, this wasn't the conference. One of the other things I do is I'm a lecturer in UC Berkeley's Master's and Information and Cybersecurity Program. And I was talking to a group of incoming students. And they normally have one of the professors talk to the students with some of the people in the program. and some of the grads so that the new students can figure out what it's like. So I was supposed to talk for five or ten minutes, and then we were going to open up the questions,
Starting point is 00:32:32 and I answered questions for 45 minutes. And one, because these are, some of them are straight from bachelor's into master's degree, but a lot of them are working professionals, either working professionals in IT who want to go cyber or career transitioning, et cetera, within the environment. and I was talking to a network engineer who was passionate about going to cyber, in addition to getting his master's program, asking what certifications he should get that would be recognized by industry as something that is valuable that will help him
Starting point is 00:33:11 or him get his next job or break into the profession. So the challenges that we've had is as we've begun to narrow in on certain skill sets and certain capabilities, et cetera, and we're looking for certain specific things within the environment, it's getting to the point that there are specific certifications for specific technologies or specific functions. And if you don't know what specific function that you wish to deal with or what specific technology, the company you wish to go with is using, it gets very difficult to say, which certification should you get A or B? Well, yes.
Starting point is 00:33:55 And then conversely, there are more generic certifications out there that tend to be more holistic, such as I'll pick on the CISP. You write wrong or indifferent. The CISSP does give you a good holistic viewpoint of the various aspects and the common bodies of knowledge that need to be looked at within cyber. But to get the CISP, you have to have five years of experience. So where do you start? What do you get? And remember, all of these things cost money and time. So where do I tell someone who knows that they want to get into cybersecurity, but doesn't necessarily know all of the potential jobs and opportunities that exist in cybersecurity, what certification should they take?
Starting point is 00:34:41 And how many should they have? the network engineer I was talking to said at one point, I had 15 different sets of letters after my name. And at one point early in my career, I had 22. So, you know, figuring out what makes sense and what's useful and what's not useful, et cetera, is hard. Yet we sit there and in some cases we use certifications as screenouts. There are folks who, because of the automated tool sets, etc.,
Starting point is 00:35:13 are looking for the CISP. They're looking for, okay, if you don't have a CISP, we're going to flush you and not even take you to the next step where a human being looks at your resume, which gets very interesting because they're looking for this for entry-level positions with two years of experience and you can't get the CISP until you have five. And then you get others that if I don't have the right certification,
Starting point is 00:35:36 then I don't think you know enough about your particular, you know, the job that I'm looking for. Yet conversely, I know, and I think I mentioned this in the episode, I know some great cyber professionals who genuinely suck at test taking. So, you know, certification has become more of an industry or business to include the continuing professional education credits associated with maintaining them. It has become more of an industry or a business in many cases than something that proves. out your ability to do the gig. Now, let me take a half step back. I do believe, and I talk about this in detail with Simone,
Starting point is 00:36:22 that there are some value propositions to certifications, and there's a right way to do it. So I am not denigrating, dissing, poo-pooing certifications, you know, any blanket statement. And if you still don't believe me, please take a moment and go listen to the episode when we talk about some of the pros and cons that are there. But it's important to remember that just as there are a pro,
Starting point is 00:36:43 there for certifications, and I still maintain several of them, there are also some cons and challenges to, you know, what they are, how we get them, and how we are using them, you know, in terms of seeking talent and maintaining talent in the environment. Well, I think it harpins back to the point you made earlier. Consistency. Yes. And consistency from both... That nasty sewers going to be there for a long time.
Starting point is 00:37:09 Consistency from both a organizational perspective. consistency from a CISO perspective, shout out to the show name, consistency from an employee perspective or a prospective talent. And being consistent in how you approach it, how we approach it as an organization, how we approach it as an industry, I think will be critical.
Starting point is 00:37:29 And I look forward to the conversations that are to come and the conversations that we have yet to have over the next three episodes and eventually the season finale where we break down this conversation even further and look at it from a few other angles. Yeah. So, Kim, I appreciate you taking the time to sit down and take this brief moment to reflect on how far we've come through this season and take a step back and give some perspective on both what you think about the season as well as share that with the audience who may not have had the chance to see some of these episodes. And if you have not, I highly recommend becoming an N2K pro subscriber. So thank you for your time.
Starting point is 00:38:06 Yeah, I appreciate that. So for those who are interested, we've teased that there are more episodes coming, and there are more episodes coming this season. I would echo what you said. Subscribe if you're interested, because I think you will enjoy the depth and breadth of the conversation we're having. So with that, Ethan, I appreciate you allowing us to flip the mic for a change. Yeah, it was fun. I hope it's been useful. It's been incredibly useful and it's been incredibly enlightening.
Starting point is 00:38:36 Thank you for coming on. Kim. Thanks for having me. Today was a moment for reflection. An opportunity to look back at the journey we've taken this season and we visit the powerful insights shared by the guests who joined us. From tackling the cyber talent crunch to reimagining what strong security leadership looks like in a shifting threat landscape, we've covered a lot of ground. If you've been with us all season as a pro subscriber, thank you. We hope these conversations sparked new ideas. challenged your thinking and offered actionable takeaways to bring back to your organizations. And if you've only caught the first few episodes, now is the perfect time to subscribe.
Starting point is 00:39:33 There's more ahead, and you won't want to miss it. Speaking of what's ahead, our season finale is just around a corner. I'll be sitting down with Ethan Cook, who's been closely tracking each episode and authoring the companion blog posts all season long. Today he interviewed me. Next, I get to turn the tables and interview him. We'll bring it all together in one final conversation, weaving together the themes from across the season
Starting point is 00:40:00 to explore where the role of the CISO is headed next. So make sure you're subscribed, and we'll see you back here for the finale. That's a wrap for today's episode. Your continued support enables us to keep making shows like this one. Tune in next week for more expert insights in meaningful discussions from CISO perspectives. This episode was edited by Ethan Cook,
Starting point is 00:40:38 with content strategy provided by MyOn Plot, produced by Liz Stokes, executive produced by Jennifer Ivan, and mixing sound design and original music by Elliot Pelsman. I'm Kim Jones, and thank you for listening. Securing and managing enterprise networks shouldn't mean juggling vendors, patching hardware, or managing endless complexity.
Starting point is 00:41:09 Meter builds full-stack, zero-trust networks from the ground up, secure by design, and automatically kept up to date. Every layer, from wired and wireless to firewalls,
Starting point is 00:41:20 DNS security, and VPN is integrated, segmented, and continuously protected through one unified platform. With meter security is built in,
Starting point is 00:41:31 not bolted on. Learn more and book your demo at meter.com slash CISOP. That's METER.com slash CISOP. And we thank Meeter for their support in unlocking this N2K Pro episode for all Cyberwire listeners.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.