false
Registration for .conf25 is open! Join us in Boston September 8–11.
Registration for .conf25 is open! Join us in Boston September 8–11.
CISO Circle

Latest articles

CISO Circle 4 Min Read

Codify to Fortify: The Strategic Advantage of Detection as Code

Learn how codifying detections improves coverage, automates workflows, and builds a smarter SOC.
CISO Circle 8 Min Read

What To Know Before Agentic AI Starts Driving Security and Fraud Workflows

The essential guardrails for safe AI deployment in financial services.
CISO Circle 5 Min Read

When AI Joins the Chat: EchoLeak, End-to-End Encryption, and Silent Data Exposure

AI and private communications can coexist — as long as transparency, opt-in control, and privacy are part of the conversation.
CISO Circle 6 Min Read

Beyond the Music: Lessons from Spotify's Fleet Management Journey

Learn how Spotify leverages standardized tooling, automated pipelines, and organizational alignment to transform challenges into opportunities for innovation.
CISO Circle 5 Min Read

When Should You Trust AI For Mission-Critical Tasks in the SOC?

AI can transform security operations, but human intuition still reigns in mission-critical SOC decisions.
CISO Circle 4 Min Read

Agency is the Leadership Skill Required to Thrive in the Agentic AI Era

Redefining leadership when action isn’t only human anymore.
CISO Circle 5 Min Read

Your AI’s Blind Spot is Bigger Than You Think

There are more AI models than ever and not enough visibility. Here’s how to close the gap.
CISO Circle 5 Min Read

Build or Buy? Deciding the Best Path for Your Next AI Cybersecurity Tool

How to weigh the true costs of building or buying your AI solution
CISO Circle 5 Min Read

When CISOs are Heard, the Whole Business Stays Safer

Aligning CISOs and their boards on key priorities, KPIs, and goals accelerates business progress. Here’s how.

Subscribe to Perspectives by Splunk for curated C‑suite insights, delivered to your inbox every month.