1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Making Cybersecurity Faster and More Responsive

Making Cybersecurity Faster and More Responsive

All links and images for this episode can be found on CISO Series

Knowing is only one-third the battle. Another third is responding. And the last third is responding quickly. It’s not enough to just…

00:30:53  |   Thu 13 Jan 2022
Promises of Automation

Promises of Automation

All links and images for this episode can be found on CISO Series

Automation was supposed to make cybersecurity professionals’ lives simpler. And it was supposed to solve the talent shortage. Has any…

00:26:59  |   Thu 06 Jan 2022
When Social Engineering Bypasses Our Cyber Tools

When Social Engineering Bypasses Our Cyber Tools

All links and images for this episode can be found on CISO Series

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:28:51  |   Thu 16 Dec 2021
How Can We Simplify Security?

How Can We Simplify Security?

All links and images for this episode can be found on CISO Series

Why is cybersecurity becoming so complex? What is one thing we can do, even if it's small, to head us off in the right direction of …

00:28:17  |   Thu 09 Dec 2021
Convergence of Physical and Digital Security

Convergence of Physical and Digital Security

All links and images for this episode can be found on CISO Series

Security convergence is the melding of all security functions from physical to digital and personal to business. The concept has bee…

00:30:39  |   Thu 02 Dec 2021
How Do You Measure Cybersecurity Success?

How Do You Measure Cybersecurity Success?

All links and images for this episode can be found on CISO Series

In most jobs there’s often a clear indicator if you’re doing a good job. In security, specifically security leadership, it’s not so …

00:29:00  |   Thu 18 Nov 2021
How Do We Turn Tables Against Adversaries?

How Do We Turn Tables Against Adversaries?

All links and images for this episode can be found on CISO Series

If we’re going to turn the tables against our adversaries, everything from our attitude to our action needs to change to a format wh…

00:26:47  |   Thu 11 Nov 2021
Ageism in Cybersecurity

Ageism in Cybersecurity

All links and images for this episode can be found on CISO Series

Is it too much experience? Is it that they're difficult to work with? Do they want too much money? Will they not be motivated? Are cy…

00:31:46  |   Thu 04 Nov 2021
Proactive Vulnerability Management

Proactive Vulnerability Management

All links and images for this episode can be found on CISO Series

How do we turn the tide from reactive to proactive patch management? Does anyone feel good about where they are with their own patch…

00:32:36  |   Thu 28 Oct 2021
Why Is Security Recruiting So Broken?

Why Is Security Recruiting So Broken?

All links and images for this episode can be found on CISO Series

Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of …

00:32:55  |   Thu 21 Oct 2021
How to Be a Vendor that CISOs Love

How to Be a Vendor that CISOs Love

All links and images for this episode can be found on CISO Series

Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of C…

00:30:02  |   Thu 14 Oct 2021
The

The "Are We Secure?" Question

All links and images for this episode can be found on CISO Series

When a senior person at your company asks you, "Are we secure?" how should you respond?

Check out this post for the basis for our con…

00:28:33  |   Thu 07 Oct 2021
Ransomware Kill Chain

Ransomware Kill Chain

What are the tell tale signs you've got ransomware before you receive the actual ransomware threat?

Check out this post and this post for the basis for our conversation on this week’s episode which …

00:31:05  |   Thu 30 Sep 2021
Can Technology Solve Phishing?

Can Technology Solve Phishing?

All links and images for this episode can be found on CISO Series

Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of …

00:30:33  |   Thu 23 Sep 2021
Convergence of SIEM and SOAR

Convergence of SIEM and SOAR

All links and images for this episode can be found on CISO Series

SIEM tools that ingest and analyze data are ubiquitous in security operations centers. But just knowing what's happening in your env…

00:27:02  |   Thu 16 Sep 2021
Cybersecurity Is Not Easy to Get Into

Cybersecurity Is Not Easy to Get Into

All links and images for this episode can be found on CISO Series

Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of …

00:31:08  |   Thu 09 Sep 2021
Preventing Ransomware

Preventing Ransomware

All links and images for this episode can be found on CISO Series

What is the most critical step to preventing ransomware? Security professionals may be quick to judge users and say it's a lack of cy…

00:27:16  |   Thu 02 Sep 2021
Managing Lateral Movement

Managing Lateral Movement

All links and images for this episode can be found on CISO Series

For four years in a row, Verizon's DBIR, has touted compromised credentials as the top cause of data breaches. That means bad people…

00:29:03  |   Thu 26 Aug 2021
First Steps as a CISO

First Steps as a CISO

All links and images for this episode can be found on CISO Series

You've just joined a company as CISO, what's the very first step you would take to improve the security posture of your new company?

00:30:21  |   Thu 19 Aug 2021
How Does Ransomware Enter the Network?

How Does Ransomware Enter the Network?

All links and images for this episode can be found on CISO Series

How is ransomware getting into your network? Is the path direct, like via email, or does it take a more circuitous route?

Check out 

00:28:47  |   Thu 12 Aug 2021
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.