Defense in Depth

By David Spark

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by David Spark

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 74
Reviews: 0
Episodes: 258

Description

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Episode Date
Managing Data Leaks Outside Your Perimeter
Apr 18, 2024
What Are the Risks of Being a CISO?
Apr 11, 2024
Onboarding Security Professionals
Apr 04, 2024
How to Improve Your Relationship With Your Boss
Mar 28, 2024
Improving the Responsiveness of Your SOC
Mar 21, 2024
The Demand for Affordable Blue Team Training
Mar 14, 2024
Why are CISOs Excluded from Executive Leadership?
Mar 07, 2024
What Is Your SOC's Single Search of Truth?
Feb 29, 2024
When Is Data an Asset and When Is It a Liability?
Feb 22, 2024
Tracking Anomalous Behaviors of Legitimate Identities
Feb 15, 2024
Why Do Cybersecurity Startups Fail?
Feb 08, 2024
Is "Compliance Doesn't Equal Security" a Pointless Argument?
Feb 01, 2024
CISOs Responsibilities Before and After an M&A
Jan 25, 2024
Use Red Teaming To Build, Not Validate, Your Security Program
Jan 18, 2024
The Do's and Don'ts of Approaching CISOs
Jan 11, 2024
Doing Third Party Risk Management Right
Jan 04, 2024
Warning Signs You're About To Be Attacked
Dec 14, 2023
Do We Have to Fix ALL the Critical Vulnerabilities?
Dec 07, 2023
Mitigating Generative AI Risks
Nov 30, 2023
Building a Cyber Strategy for Unknown Unknowns
Nov 16, 2023
Responsibly Embracing Generative AI
Nov 09, 2023
People Are the Top Attack Vector (Not the Weakest Link)
Nov 02, 2023
What's Entry Level in Cybersecurity?
Oct 26, 2023
New SEC Rules for Cyber Security
Oct 19, 2023
The Value of RSA, Black Hat, and Mega Cyber Tradeshows
Oct 12, 2023
Is Remote Work Helping or Hurting Cybersecurity?
Oct 05, 2023
How to Manage Users' Desires for New Technology
Sep 28, 2023
Cybersecurity Questions Heard Around the Kitchen Table
Sep 21, 2023
How to Prime Your Data Lake
Sep 14, 2023
Getting Ahead Of Your Threat Intelligence Program
Sep 07, 2023
How Security Leaders Deal with Intense Stress
Aug 31, 2023
How Do We Influence Secure Behavior?
Aug 24, 2023
Security Concerns with ChatGPT
Aug 17, 2023
Create A Pipeline of Cyber Talent
Aug 10, 2023
Improving Adoption of Least Privileged Access
Aug 03, 2023
Securing SaaS Applications
Jul 27, 2023
How Do We Get Better Control of Cloud Data?
Jul 20, 2023
Finding Your Security Community
Jul 13, 2023
Let's Write Better Cybersecurity Job Descriptions
Jul 06, 2023
How Should Security Better Engage with Application Owners?
Jun 29, 2023
How To Get More People Into Cybersecurity
Jun 22, 2023
How to Create a Positive Security Culture
Jun 15, 2023
How Should We Trust Entry Level Employees?
Jun 08, 2023
How Must Processes Change to Reduce Risk?
Jun 01, 2023
Reputational Damage from Breaches
May 25, 2023
Do RFPs Work?
May 18, 2023
Successful Cloud Security
May 11, 2023
How Should Security Vendors Engage With CISOs?
May 04, 2023
Gartner Created Product Categories
Apr 27, 2023
How to Always Make a Business Case for Security
Apr 20, 2023
Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?
Apr 13, 2023
What We Love About Working in Cybersecurity
Apr 06, 2023
Security That Accounts for Human Fallibility
Mar 30, 2023
Why You Should Be Your Company's Next CISO
Mar 23, 2023
How to Become a CISO
Mar 16, 2023
Can You Build a Security Program on Open Source?
Mar 09, 2023
Third Party Risk vs. Third Party Trust
Mar 02, 2023
How Can We Improve the Cyber Sales Cycle?
Feb 23, 2023
What Leads a Security Program: Risk or Maturity?
Feb 16, 2023
Limitations of Security Frameworks
Feb 09, 2023
Why Is There a Cybersecurity Skills Gap?
Feb 02, 2023
What Can the Cyber Haves Do for the Cyber Have Nots?
Jan 26, 2023
Securing Unmanaged Assets
Jan 19, 2023
Ambulance Chasing Security Vendors
Jan 12, 2023
Do CISOs Have More Stress than Other C-Suite Jobs
Jan 05, 2023
How Should We Discuss Cyber With the C-Suite?
Dec 15, 2022
Can You Be a vCISO If You’ve Never Been a CISO?
Dec 08, 2022
How Should We Gauge a Company's Cyber Health?
Dec 01, 2022
Reducing the Attack Surface
Nov 17, 2022
Do We Need a Marketing Manager for the Security Team?
Nov 10, 2022
Cybersecurity Budgets
Nov 03, 2022
How Can We Make Sense of Cybersecurity Titles?
Oct 27, 2022
Walk a Mile in a Security Recruiter's Shoes
Oct 20, 2022
Moving Security from a Prevention to a Resilience Strategy
Oct 13, 2022
How to Engage with Non-Technical Business Leaders
Oct 06, 2022
Cybersecurity Burnout
Sep 29, 2022
How to Build a Greenfield Security Program
Sep 22, 2022
Managing the Onslaught of Files
Sep 15, 2022
Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?
Sep 08, 2022
How to Follow Up With a CISO
Sep 01, 2022
Roles to Prepare You to Be a CISO
Aug 25, 2022
Minimizing Damage from a Breach
Aug 18, 2022
We're All Still Learning Cyber
Aug 11, 2022
Practical Cybersecurity for IT Professionals
Aug 04, 2022
Data Protection for Whatever Comes Next
Jul 28, 2022
What Is Attack Surface Profiling?
Jul 21, 2022
How Can You Tell If Your Security Program Is Improving?
Jul 14, 2022
How Can We Improve Recruiting of CISOs and Security Leaders?
Jul 07, 2022
How Is Our Data Being Weaponized Against Us?
Jun 30, 2022
Can Security Be a Profit Center?
Jun 23, 2022
Getting Ahead of the Ongoing Malware Fight
Jun 16, 2022
Building a Security Awareness Training Program
Jun 09, 2022
Onboarding Cyber Professionals with No Experience
Jun 02, 2022
Where's the Trust in Zero Trust?
May 26, 2022
Who Investigates Cyber Solutions?
May 19, 2022
Does the Cybersecurity Industry Suck?
May 12, 2022
Are We Taking Zero Trust Too Far?
May 05, 2022
Is Shift Left Working?
Apr 28, 2022
Technical vs. Compliance Professionals
Apr 21, 2022
Why Do So Many Cybersecurity Products Suck?
Apr 14, 2022
Training for a Cyber Disaster
Apr 07, 2022
Virtual Patching
Mar 31, 2022
Start a Cybersecurity Department from Scratch
Mar 24, 2022
How to Think Like a Cybercrook
Mar 17, 2022
Building a Data-First Security Program
Mar 10, 2022
Offensive Security
Mar 03, 2022
When Vendors Pounce on New CISOs
Feb 24, 2022
Building a Cybersecurity Culture
Feb 17, 2022
How to Pitch to a Security Analyst
Feb 10, 2022
Is Your Data Safer in the Cloud?
Feb 03, 2022
What Should We Stop Doing in Cybersecurity?
Jan 27, 2022
DDoS Solutions
Jan 20, 2022
Making Cybersecurity Faster and More Responsive
Jan 13, 2022
Promises of Automation
Jan 06, 2022
When Social Engineering Bypasses Our Cyber Tools
Dec 16, 2021
How Can We Simplify Security?
Dec 09, 2021
Convergence of Physical and Digital Security
Dec 02, 2021
How Do You Measure Cybersecurity Success?
Nov 18, 2021
How Do We Turn Tables Against Adversaries?
Nov 11, 2021
Ageism in Cybersecurity
Nov 04, 2021
Proactive Vulnerability Management
Oct 28, 2021
Why Is Security Recruiting So Broken?
Oct 21, 2021
How to Be a Vendor that CISOs Love
Oct 14, 2021
The "Are We Secure?" Question
Oct 07, 2021
Ransomware Kill Chain
Sep 30, 2021
Can Technology Solve Phishing?
Sep 23, 2021
Convergence of SIEM and SOAR
Sep 16, 2021
Cybersecurity Is Not Easy to Get Into
Sep 09, 2021
Preventing Ransomware
Sep 02, 2021
Managing Lateral Movement
Aug 26, 2021
First Steps as a CISO
Aug 19, 2021
How Does Ransomware Enter the Network?
Aug 12, 2021
What's the Value of Certifications?
Aug 05, 2021
Measuring the Success of Cloud Security
Jul 29, 2021
How do I get my first cybersecurity job?
Jul 22, 2021
Educating the Board About Cybersecurity
Jul 15, 2021
CISO Recruiting Is Broken
Jul 05, 2021
Retaining Cyber Talent
Jul 01, 2021
Salesforce Security
Jun 24, 2021
Cloud Configuration Fails
Jun 17, 2021
Starting Pay for Cyber Staff
Jun 10, 2021
Fear of Automation
Jun 03, 2021
Hiring Talent with No Security Experience
May 27, 2021
Security Hygiene for Software Development
May 20, 2021
How Much Do You Know About Your Data?
May 13, 2021
Do Startups Need a CISO?
May 06, 2021
Insider Risk
Apr 29, 2021
What’s the Obsession with Zero Trust?
Apr 22, 2021
Mentoring
Apr 15, 2021
Securing the Super Bowl and Other Huge Events
Apr 08, 2021
Cybersecurity Isn’t That Difficult
Apr 01, 2021
Cloud Security Myths
Mar 25, 2021
What Is Security's Mission?
Mar 18, 2021
Vendor CISOs
Mar 11, 2021
How Much Log Data Is Enough?
Mar 04, 2021
Should Finance or Legal Mentor Cyber?
Feb 25, 2021
Data Destruction
Feb 18, 2021
How to Make Cybersecurity More Efficient
Feb 11, 2021
Does a CISO Need Tech Skills?
Feb 04, 2021
How Do You Know if You're Good at Security?
Jan 28, 2021
Building a Security Team
Jan 21, 2021
Are our Data Protection Strategies Evolving?
Jan 14, 2021
Should CISOs Be Licensed Professionals?
Jan 07, 2021
Inherently Vulnerable By Design
Dec 17, 2020
Imposter Syndrome
Dec 10, 2020
Why Don't More Companies Take Cybersecurity Seriously?
Dec 03, 2020
Data Protection and Visibility
Nov 19, 2020
What's an Entry Level Cybersecurity Job?
Nov 12, 2020
Securing Digital Transformations
Oct 29, 2020
Leaked Secrets in Code Repositories
Oct 22, 2020
Measuring the Success of Your Security Program
Oct 15, 2020
Privacy Is An Uphill Battle
Oct 08, 2020
Legal Protection for CISOs
Oct 01, 2020
XDR: Extended Detection and Response
Sep 24, 2020
Calling Users Stupid
Sep 17, 2020
Is College Necessary for a Job in Cybersecurity?
Sep 10, 2020
When Red Teams Break Down
Sep 03, 2020
What Cyber Pro Are You Trying to Hire?
Aug 27, 2020
Junior Cyber People
Aug 20, 2020
Trusting Security Vendor Claims
Aug 13, 2020
How Vendors Should Approach CISOs
Aug 06, 2020
Secure Access
Jul 30, 2020
InfoSec Fatigue
Jul 23, 2020
Securing a Cloud Migration
Jul 16, 2020
API Security
Jul 09, 2020
Shared Threat Intelligence
Jul 02, 2020
Drudgery of Cybercrime
Jun 25, 2020
Security Budgets
Jun 18, 2020
Role of the BISO
Jun 11, 2020
Shared Accounts
Jun 04, 2020
Bug Bounties
May 28, 2020
Data Classification
May 21, 2020
Prevention vs. Detection and Containment
May 14, 2020
Asset Valuation
May 07, 2020
DevSecOps
Apr 30, 2020
Fix Security Problems with What You've Got
Apr 23, 2020
Should Risk Lead GRC?
Apr 16, 2020
Responsible Disclosure
Apr 09, 2020
Internet of Things
Apr 02, 2020
Is Governance the Most Important Part of GRC?
Mar 26, 2020
Who Should the CISO Report To?
Mar 19, 2020
Hybrid Cloud
Mar 12, 2020
CISO Tenure
Mar 05, 2020
Toxic Security Teams
Feb 27, 2020
Personality Tests in the Workplace
Feb 20, 2020
Lack of Diversity in Cybersecurity
Feb 13, 2020
When Are CISOs Responsible for Breaches?
Feb 06, 2020
Post Breach Desperation and Salary Negotiations
Jan 30, 2020
Presenting to the Board
Jan 23, 2020
The Iran Cybersecurity Threat
Jan 16, 2020
Building a Fully Remote Security Team
Jan 09, 2020
Account Takeover
Dec 19, 2019
UX in Cybersecurity
Dec 12, 2019
InfoSec Trends for 2020
Dec 05, 2019
Cybersecurity Readiness as Hiring Criteria
Nov 21, 2019
Cybersecurity and the Media
Nov 14, 2019
The Cloud and Shared Security
Nov 07, 2019
Is Product Security Improving?
Oct 31, 2019
Best Starting Security Framework
Oct 24, 2019
Cyber Defense Matrix
Oct 17, 2019
User-Centric Security
Oct 10, 2019
Securing the New Internet
Oct 03, 2019
Resiliency
Sep 26, 2019
Ransomware
Sep 19, 2019
Top CISO Communication Issues
Sep 12, 2019
Cybersecurity Excuses
Sep 05, 2019
Employee Hacking
Aug 29, 2019
100% Security
Aug 22, 2019
Proactive Security
Aug 15, 2019
ATT&CK Matrix
Aug 08, 2019
Hacker Culture
Aug 01, 2019
Bad Best Practices
Jul 25, 2019
Cyber Harassment
Jul 18, 2019
CISO Series One Year Review
Jun 25, 2019
Economics of Data
Jun 25, 2019
Tool Consolidation
Jun 19, 2019
Camry Security
Jun 12, 2019
Amplifying Your Security Posture
Jun 04, 2019
ERP Security
May 30, 2019
Managing Obsolete (Yet Business Critical) Systems
May 22, 2019
Cybersecurity Hiring
May 16, 2019
How CISOs Discover New Solutions
May 09, 2019
Is the Cybersecurity Industry Solving Our Problems?
May 01, 2019
Vulnerability Management
Apr 25, 2019
Privileged Access Management
Apr 17, 2019
Machine Learning Failures
Apr 10, 2019
Software Fixing Hardware Problems
Apr 04, 2019
Tools for Managing 3rd Party Risk
Mar 28, 2019
CISO Burnout
Mar 21, 2019
RSA 2019: Success or Failure?
Mar 14, 2019
Security IS the Business
Mar 07, 2019
Threat Intelligence
Feb 27, 2019
Secure Controls Framework
Feb 21, 2019
Insider Threats
Feb 14, 2019
Building an Information Security Council
Feb 07, 2019
Privacy
Jan 31, 2019
Security Metrics
Jan 23, 2019
Welcome to Defense in Depth
Jan 21, 2019