
Free the CISO, a podcast series that attempts to free CISOs from their shackles so they can focus on securing their organization, is produced by CIO.com in partnership with DataBee®, from Comcast Technology Solutions.
In each episode, Robin Das, Executive Director at Comcast under the DataBee team, explores the CISO’s role through the position’s relationship with other security stakeholders, from regulators and the Board of Directors to internal personnel and outside vendors.
Defending the Hive: A CISO Fireside Chat
At RSAC 2024, DataBee® VP and General Manager, Nicole Bucala, had an opportunity to interview two prominent CISOs: Jesse Whaley from Amtrak and Noopur Davis from Comcast Corporation. They discussed the unique challenges facing security leaders of critical infrastructure organizations including compliance and making compliance a trackable metric; approaches to managing their organizations’ “security data estate” and being able to ask and extract the answers they need for cybersecurity, compliance and privacy from the data; AI and gen-AI use cases and how Amtrak and Comcast are each leveraging AI; and a look into the future and what might be top of mind for CISOs in 2029.
More posts


Unlock actionable data security insights with DataBee. Correlate and normalize data across sources for real-time threat detection, compliance, and AI-driven ops.


Discover how context-aware AI for security helps transform compliance by delivering explainable, evidence-backed insights powered by unified data from DataBee’s security data fabric.


Regulated industries face rising threats and stricter rules. Explore why compliance alone isn’t enough—and how unified control data strengthens both security and resilience.
Discover what DataBee® can do for you

Developed and proven at scale, DataBee® delivers connected security and compliance data and insights that can work for everyone in your organization

Built to protect critical government and enterprise networks, BluVector delivers AI-powered NDR for visibility across network, devices, users, files and data to discover and hunt skilled and motivated threat actors

