1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Prevention vs. Detection and Containment

Prevention vs. Detection and Containment

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-prevention-vs-detection-and-containment/)

We agree that preventing a cyber attack is better …

00:26:40  |   Thu 14 May 2020
Asset Valuation

Asset Valuation

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-asset-valuation/)

What's the value of your assets? Do you even understand what they are to y…

00:28:26  |   Thu 07 May 2020
DevSecOps

DevSecOps

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-devsecops/)

We know that security plays a role in DevOps, but we've been having a hard time …

00:26:39  |   Thu 30 Apr 2020
Fix Security Problems with What You've Got

Fix Security Problems with What You've Got

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-fix-security-problems-with-what-youve-got/)

Stop buying security products. You probably have…

00:28:22  |   Thu 23 Apr 2020
Should Risk Lead GRC?

Should Risk Lead GRC?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-risk-lead-grc/)

Defining risk for the business. Is that where a governance, risk, and…

00:24:57  |   Thu 16 Apr 2020
Responsible Disclosure

Responsible Disclosure

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-responsible-disclosure/)

Security researchers and hackers find vulnerabilities. What's their…

00:25:10  |   Thu 09 Apr 2020
Internet of Things

Internet of Things

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth:-internet-of-things/)

When Internet of Things or IoT devices first came onto the market, sec…

00:29:13  |   Thu 02 Apr 2020
Is Governance the Most Important Part of GRC?

Is Governance the Most Important Part of GRC?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-governance-the-most-important-part-of-grc)

Your policy should rarely change. But your abi…

00:27:16  |   Thu 26 Mar 2020
Who Should the CISO Report To?

Who Should the CISO Report To?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-who-should-the-ciso-report-to/)

Who should the CISO report to? What factors determine that d…

00:24:35  |   Thu 19 Mar 2020
Hybrid Cloud

Hybrid Cloud

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hybrid-cloud/)

The consistency of your security program becomes a challenge once you introdu…

00:27:45  |   Thu 12 Mar 2020
CISO Tenure

CISO Tenure

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ciso-tenure/)

The CISO has the shortest tenure of any C-level role. Why so brief? Is it the …

00:29:16  |   Thu 05 Mar 2020
Toxic Security Teams

Toxic Security Teams

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-toxic-security-teams/)

There's an endless number of variables that contribute to creating a …

00:25:34  |   Thu 27 Feb 2020
Personality Tests in the Workplace

Personality Tests in the Workplace

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-personality-tests-in-the-workplace/)

As a cybersecurity leader, should you use personality t…

00:23:26  |   Thu 20 Feb 2020
Lack of Diversity in Cybersecurity

Lack of Diversity in Cybersecurity

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-lack-of-diversity-in-cybersecurity/)

Cybersecurity teams are notoriously not diverse. At the…

00:27:50  |   Thu 13 Feb 2020
When Are CISOs Responsible for Breaches?

When Are CISOs Responsible for Breaches?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-when-are-cisos-responsible-for-breaches/)

When is a CISO responsible for a breach or cyber i…

00:28:37  |   Thu 06 Feb 2020
Post Breach Desperation and Salary Negotiations

Post Breach Desperation and Salary Negotiations

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-post-breach-desperation-and-salary-negotiations/)

A data breach usually spells financial and…

00:26:20  |   Thu 30 Jan 2020
Presenting to the Board

Presenting to the Board

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-presenting-to-the-board/)

What metrics, reports, or strategies should a security professiona…

00:25:11  |   Thu 23 Jan 2020
The Iran Cybersecurity Threat

The Iran Cybersecurity Threat

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-iran-cybersecurity-threat/)

The Iran conflict has threatened new retaliations and we don…

00:26:28  |   Thu 16 Jan 2020
Building a Fully Remote Security Team

Building a Fully Remote Security Team

Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-building-a-fully-remote-security-team/)

Could you be successful with a fully virtual InfoSec tea…

00:25:33  |   Thu 09 Jan 2020
Account Takeover

Account Takeover

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-account-takeover/)

An account takeover traditionally follows a methodical path that takes co…

00:25:38  |   Thu 19 Dec 2019
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.