1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
The Pattern of Early Adoption of Security Tools

The Pattern of Early Adoption of Security Tools

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of C…

00:29:28  |   Thu 11 Sep 2025
How Are You Managing the Flow of AI Data

How Are You Managing the Flow of AI Data

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Se…

00:31:25  |   Thu 04 Sep 2025
How to Deal with Last Minute Compliance Requirements

How to Deal with Last Minute Compliance Requirements

All links and images can be found on CISO Series.

Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode c…

00:31:40  |   Thu 28 Aug 2025
Do You Have a Functional Policy or Did You Just Write One?

Do You Have a Functional Policy or Did You Just Write One?

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CI…

00:32:20  |   Thu 21 Aug 2025
Where are We Struggling with Zero Trust

Where are We Struggling with Zero Trust

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CI…

00:33:54  |   Thu 14 Aug 2025
Cybersecurity Has a Prioritization Problem

Cybersecurity Has a Prioritization Problem

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CIS…

00:31:26  |   Thu 07 Aug 2025
How Can AI Provide Useful Guidance from Fragmented Security Data?

How Can AI Provide Useful Guidance from Fragmented Security Data?

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Se…

00:29:42  |   Thu 31 Jul 2025
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem

Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CI…

00:28:40  |   Thu 24 Jul 2025
What Are the Cybersecurity Trends We Need To Follow?

What Are the Cybersecurity Trends We Need To Follow?

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of C…

00:24:23  |   Thu 17 Jul 2025
Is It Even Possible to Fast-Track Your Way Into Cybersecurity?

Is It Even Possible to Fast-Track Your Way Into Cybersecurity?

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CI…

00:27:03  |   Thu 10 Jul 2025
What's the Most Efficient Way to Rate Third Party Vendors?

What's the Most Efficient Way to Rate Third Party Vendors?

All posts and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CI…

00:28:27  |   Thu 03 Jul 2025
Don't Ask

Don't Ask "Can" We Secure It, But "How" Can We Secure It

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Se…

00:28:29  |   Thu 26 Jun 2025
Has the Shared Security Model for SaaS Shifted?

Has the Shared Security Model for SaaS Shifted?

All links and images can be found on CISO Series.

Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, Dav…

00:28:55  |   Thu 12 Jun 2025
Improving the Efficiency of Your Threat Intelligence

Improving the Efficiency of Your Threat Intelligence

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the prod…

00:26:40  |   Thu 05 Jun 2025
Why Cybersecurity Professionals Lie on Their Resumes

Why Cybersecurity Professionals Lie on Their Resumes

All images and links can be found on CISO Series.

Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hos…

00:32:19  |   Thu 29 May 2025
What Should Be in a CISO Job Description?

What Should Be in a CISO Job Description?

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the produ…

00:30:17  |   Thu 22 May 2025
The CISO's Job Is Impossible

The CISO's Job Is Impossible

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:33:10  |   Thu 15 May 2025
Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:29:07  |   Thu 08 May 2025
How Much Should Salespeople Know About Their Product?

How Much Should Salespeople Know About Their Product?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the pr…

00:27:18  |   Thu 01 May 2025
Why Are We Still Struggling to Fix Application Security?

Why Are We Still Struggling to Fix Application Security?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, th…

00:28:14  |   Thu 24 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.