1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Legal Protection for CISOs

Legal Protection for CISOs

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-legal-protection-for-cisos/)

What's the legal responsibility of a CISO? New cases are placi…

00:29:21  |   Thu 01 Oct 2020
XDR: Extended Detection and Response

XDR: Extended Detection and Response

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-xdr-extended-detection-and-response/)

Is XDR changing the investigative landscape for secur…

00:25:03  |   Thu 24 Sep 2020
Calling Users Stupid

Calling Users Stupid

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-calling-users-stupid/)

Many cybersecurity professionals use derogatory terms towards their …

00:27:27  |   Thu 17 Sep 2020
Is College Necessary for a Job in Cybersecurity?

Is College Necessary for a Job in Cybersecurity?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-college-necessary-for-a-job-in-cybersecurity/)

Where is the best education for our cyber…

00:28:14  |   Thu 10 Sep 2020
When Red Teams Break Down

When Red Teams Break Down

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-when-red-teams-break-down/)

What happens when red team engagements go sideways? The idea of…

00:25:17  |   Thu 03 Sep 2020
What Cyber Pro Are You Trying to Hire?

What Cyber Pro Are You Trying to Hire?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-what-cyber-pro-are-you-trying-to-hire/)

Do companies hiring cybersecurity talent even know w…

00:28:35  |   Thu 27 Aug 2020
Junior Cyber People

Junior Cyber People

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-junior-cyber-people/)

There are so few jobs available for junior cybersecurity professionals…

00:29:17  |   Thu 20 Aug 2020
Trusting Security Vendor Claims

Trusting Security Vendor Claims

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-trusting-security-vendor-claims/)

Do security vendors deliver on their claims and heck, are …

00:27:55  |   Thu 13 Aug 2020
How Vendors Should Approach CISOs

How Vendors Should Approach CISOs

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-how-vendors-should-approach-cisos/)

"How do I approach a CISO?" It's the most common questio…

00:30:12  |   Thu 06 Aug 2020
Secure Access

Secure Access

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-secure-access/)

What is the Holy Grail of secure access? There are many options, all of whic…

00:22:53  |   Thu 30 Jul 2020
InfoSec Fatigue

InfoSec Fatigue

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-fatigue/)

Have we reached peak InfoSec fatigue? Revolving CISOs and endless cyber re…

00:28:23  |   Thu 23 Jul 2020
Securing a Cloud Migration

Securing a Cloud Migration

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-a-cloud-migration/)

You're migrating to the cloud. When did you develop your securi…

00:25:54  |   Thu 16 Jul 2020
API Security

API Security

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-api-security/)

APIs are gateways in and out of our kingdom and thus they're also great acces…

00:23:28  |   Thu 09 Jul 2020
Shared Threat Intelligence

Shared Threat Intelligence

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-threat-intelligence/)

We all know that shared intelligence has value, yet we're retic…

00:27:07  |   Thu 02 Jul 2020
Drudgery of Cybercrime

Drudgery of Cybercrime

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-drudgery-of-cybercrime/)

Why does the press persist on referring to all cyber breaches as so…

00:26:05  |   Thu 25 Jun 2020
Security Budgets

Security Budgets

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-security-budgets/)

How do you calculate a security budget? Is it a percentage of the IT budg…

00:25:43  |   Thu 18 Jun 2020
Role of the BISO

Role of the BISO

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-role-of-the-biso/)

What is a business information security officer or BISO? Do you need one?…

00:28:52  |   Thu 11 Jun 2020
Shared Accounts

Shared Accounts

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-accounts/)

As bad as all security professionals know, shared accounts are a fact in t…

00:26:21  |   Thu 04 Jun 2020
Bug Bounties

Bug Bounties

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/)

What is the successful formula for a bug bounty program? Should it be run int…

00:29:30  |   Thu 28 May 2020
Data Classification

Data Classification

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-classification/)

The more data we horde, the less useful any of it becomes, and the mor…

00:24:41  |   Thu 21 May 2020
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.