Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ux-in-cybersecurity/)
Security products and programs may be functional and work correctly, b…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-trends-for-2020/)
We're coming to the end of the year and that means it's time to ma…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-readiness-as-hiring-criteria/)
What if every candidate interviewed was tested …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-and-the-media/)
Cybersecurity and the media. It rides the line between providi…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-cloud-and-shared-security/)
When your business enters the cloud, you are transferring ri…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-product-security-improving/)
We've been at this cybersecurity thing for a long time. Are …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-best-starting-security-framework/)
If you were building a security program from scratch, whi…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/)
A simple way to visualize your entire security program and all the to…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-user-centric-security/)
How can software and our security programs better be architected to …
All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-securing-the-new-internet/)
If you could re-invent the entire Internet, starting all over a…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-resiliency/)
How fortified is the business to withstand cyberattacks? Can it absorb the impa…
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ransomware/)
Why is Ransomware so prevalent? Why are so many getting caught in its net? And …
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-top-ciso-communication-issues/)
Understanding risk. Communicating with the board. Getting ot…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-excuses/)
"I've got all the security I need."
"I'm not a target for hackers…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-employee-hacking/)
A cyber professional needs their staff, non-IT workers, and the board to …
100% Security. A great idea that's impossible to achieve. Regardless, CEOs are still asking for it. How should security people respond and we'll discuss the philosophical implications of 100% securit…
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-proactive-security/)
How proactive should we be about security? What's the value of threat i…
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-attck-matrix/)
Is the ATT&CK Matrix the best model to build resiliency in your security team…
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hacker-culture/)
The hacker community needs a new PR campaign. Far too many people equate ha…
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bad-best-practices/)
All professionals like to glom onto "best practices." But in security, …