1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
UX in Cybersecurity

UX in Cybersecurity

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ux-in-cybersecurity/)

Security products and programs may be functional and work correctly, b…

00:26:31  |   Thu 12 Dec 2019
InfoSec Trends for 2020

InfoSec Trends for 2020

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-trends-for-2020/)

We're coming to the end of the year and that means it's time to ma…

00:26:20  |   Thu 05 Dec 2019
Cybersecurity Readiness as Hiring Criteria

Cybersecurity Readiness as Hiring Criteria

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-readiness-as-hiring-criteria/)

What if every candidate interviewed was tested …

00:26:22  |   Thu 21 Nov 2019
Cybersecurity and the Media

Cybersecurity and the Media

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-and-the-media/)

Cybersecurity and the media. It rides the line between providi…

00:29:47  |   Thu 14 Nov 2019
The Cloud and Shared Security

The Cloud and Shared Security

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-cloud-and-shared-security/)

When your business enters the cloud, you are transferring ri…

00:24:57  |   Thu 07 Nov 2019
Is Product Security Improving?

Is Product Security Improving?

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-product-security-improving/)

We've been at this cybersecurity thing for a long time. Are …

00:26:06  |   Thu 31 Oct 2019
Best Starting Security Framework

Best Starting Security Framework

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-best-starting-security-framework/)

If you were building a security program from scratch, whi…

00:26:46  |   Thu 24 Oct 2019
Cyber Defense Matrix

Cyber Defense Matrix

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/)

A simple way to visualize your entire security program and all the to…

00:27:46  |   Thu 17 Oct 2019
User-Centric Security

User-Centric Security

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-user-centric-security/)

How can software and our security programs better be architected to …

00:28:54  |   Thu 10 Oct 2019
Securing the New Internet

Securing the New Internet

All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-securing-the-new-internet/)

If you could re-invent the entire Internet, starting all over a…

00:32:22  |   Thu 03 Oct 2019
Resiliency

Resiliency

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-resiliency/)

How fortified is the business to withstand cyberattacks? Can it absorb the impa…

00:26:24  |   Thu 26 Sep 2019
Ransomware

Ransomware

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ransomware/)

Why is Ransomware so prevalent? Why are so many getting caught in its net? And …

00:26:04  |   Thu 19 Sep 2019
Top CISO Communication Issues

Top CISO Communication Issues

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-top-ciso-communication-issues/)

Understanding risk. Communicating with the board. Getting ot…

00:27:40  |   Thu 12 Sep 2019
Cybersecurity Excuses

Cybersecurity Excuses

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-excuses/)

"I've got all the security I need."

"I'm not a target for hackers…

00:24:40  |   Thu 05 Sep 2019
Employee Hacking

Employee Hacking

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-employee-hacking/)

A cyber professional needs their staff, non-IT workers, and the board to …

00:25:40  |   Thu 29 Aug 2019
100% Security

100% Security

100% Security. A great idea that's impossible to achieve. Regardless, CEOs are still asking for it. How should security people respond and we'll discuss the philosophical implications of 100% securit…

00:24:56  |   Thu 22 Aug 2019
Proactive Security

Proactive Security

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-proactive-security/)

How proactive should we be about security? What's the value of threat i…

00:28:35  |   Thu 15 Aug 2019
ATT&CK Matrix

ATT&CK Matrix

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-attck-matrix/)

Is the ATT&CK Matrix the best model to build resiliency in your security team…

00:24:59  |   Thu 08 Aug 2019
Hacker Culture

Hacker Culture

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hacker-culture/)

The hacker community needs a new PR campaign. Far too many people equate ha…

00:25:29  |   Thu 01 Aug 2019
Bad Best Practices

Bad Best Practices

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bad-best-practices/)

All professionals like to glom onto "best practices." But in security, …

00:23:33  |   Thu 25 Jul 2019
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.