Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-what-is-securitys-mission/
What's the mission of your security program? Is it to proactively…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-vendor-cisos/
It's hard to be a CISO. But, what's it like to be a CISO at a security vendor,…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-how-much-log-data-do-you-need
You're a CISO struggling with an influx of log data into your…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber
Cybersecurity leaders are constantly looking for ways …
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-data-destruction
How do you deal with data at end of life? Holding onto data too long can be…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-how-to-make-cybersecurity-more-efficient/
You're a new CISO told to hold headcount even and…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-does-a-ciso-need-tech-skills
Does a CISO need technical skills to be an effective cybersecur…
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-how-do-you-know-if-youre-good-at-security/
What metrics or indicators signal to you that an…
All links and images for this episode can be found on CISO Series
You're a new CISO at a new org given a headcount of ten to build a cybersecurity team. What's your strategy to build that team?
C…
All links and images for this episode can be found on CISO Series
(https://cisoseries.com/defense-in-depth-are-our-data-protection-strategies-evolving/)
As we're evolving from putting data on premise…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-cisos-be-licensed-professionals/)
Many professionals are required to obtain a licens…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-inherently-vulnerable-by-design/)
Much of what we do as practitioners is to prevent inadver…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-imposter-syndrome/)
For CISOs and other security leaders, suffering from imposter syndrome …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-why-dont-more-companies-take-cybersecurity-seriously/)
With every cybersecurity breach, we …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-protection-and-visibility/)
Where is your data? Who's accessing it? You may know if yo…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-whats-an-entry-level-cybersecurity-job/)
Naomi Buckwalter, director of information security…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-digital-transformations/)
Digital transformation. It's definition is broad. Meanin…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-leaked-secrets-in-code-repositories/)
Secrets, such as passwords and credentials, are out i…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-measuring-the-success-of-your-security-program/)
How does a CISO measure the performance of…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-privacy-is-an-uphill-battle/)
Privacy is an uphill battle. The problem is those gathering t…