1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Cyber Harassment

Cyber Harassment

All images and links are available on CISO Series (https://cisoseries.com/defense-in-depth-cyber-harassment/)

Whether a jilted lover or someone trying to wield their power over another, cyber harassm…

00:23:43  |   Thu 18 Jul 2019
CISO Series One Year Review

CISO Series One Year Review

Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ciso-series-one-year-review/) 

The CISO/Security Vendor Relationship Podcast is now more than a …

00:28:09  |   Tue 25 Jun 2019
Economics of Data

Economics of Data

All images and links for this episode available at CISO Series (https://cisoseries.com/defense-in-depth-economics-of-data/) 

Do we understand the value of our data? Do our adversaries? And is the way…

00:27:42  |   Tue 25 Jun 2019
Tool Consolidation

Tool Consolidation

All links and images can be found on CISO Series (https://cisoseries.com/defense-in-depth-tool-consolidation/)

While cybersecurity professionals always want more tools, more often than not they're de…

00:23:52  |   Wed 19 Jun 2019
Camry Security

Camry Security

Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-camry-security/)

The Camry is not the fastest car, nor is it the sexiest. But, it is one of the …

00:22:21  |   Wed 12 Jun 2019
Amplifying Your Security Posture

Amplifying Your Security Posture

All links and images can be found on CISO Series (https://cisoseries.com/defense-in-depth-amplifying-your-security-posture/)

In security, you never have enough of anything. But the scarecest resource…

00:26:52  |   Tue 04 Jun 2019
ERP Security

ERP Security

All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-erp-security/)

For most organizations, their ERP solution holds its crown jewels. Should cus…

00:21:41  |   Thu 30 May 2019
Managing Obsolete (Yet Business Critical) Systems

Managing Obsolete (Yet Business Critical) Systems

All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-managing-obsolete-yet-business-critical-systems/)

Obsolete systems that are critical to you…

00:28:23  |   Wed 22 May 2019
Cybersecurity Hiring

Cybersecurity Hiring

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-hiring/)

Everyone needs more security talent, but what kind of talent, how spe…

00:25:30  |   Thu 16 May 2019
How CISOs Discover New Solutions

How CISOs Discover New Solutions

Find images and links for this episode on CISO Series (https://cisoseries.com/defense-in-depth-how-cisos-discover-new-solutions/)

Are security professionals so burned out by aggressive cybersecurity …

00:29:28  |   Thu 09 May 2019
Is the Cybersecurity Industry Solving Our Problems?

Is the Cybersecurity Industry Solving Our Problems?

Find all links and images from this episode on CISO Series (https://cisoseries.com/defense-in-depth-is-the-cybersecurity-industry-solving-our-problems/)

Is the cybersecurity industry solving our prob…

00:29:51  |   Wed 01 May 2019
Vulnerability Management

Vulnerability Management

This is a special episode of Defense in Depth being shared on this feed. Find the full post with links and images on the CISO Series site here (https://cisoseries.com/defense-in-depth-vulnerability-m…

00:21:29  |   Thu 25 Apr 2019
Privileged Access Management

Privileged Access Management

If you can't see all the show notes (with images and links) head here: https://cisoseries.com/defense-in-depth-privileged-access-management-pam/

Where does privileged access management (PAM) fit in t…

00:25:14  |   Wed 17 Apr 2019
Machine Learning Failures

Machine Learning Failures

Full post for this episode (https://cisoseries.com/defense-in-depth-machine-learning-failures/)

Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation?

00:31:43  |   Wed 10 Apr 2019
Software Fixing Hardware Problems

Software Fixing Hardware Problems

The full post (if you're not seeing links and images) can be found here (https://cisoseries.com/defense-in-depth-software-fixing-hardware-problems/)

As we have seen with the Boeing 737 MAX crashes, w…

00:22:55  |   Thu 04 Apr 2019
Tools for Managing 3rd Party Risk

Tools for Managing 3rd Party Risk

To see all the notes and links for this episode, go here (https://cisoseries.com/defense-in-depth-tools-for-managing-3rd-party-risk/)

Are there any good tools that really help to manage third-party r…

00:25:03  |   Thu 28 Mar 2019
CISO Burnout

CISO Burnout

Are CISOs the most stressed individuals on a security team, or do mental health issues affect everyone in security?

Check out this post and discussion for the basis of our conversation on this week’…

00:27:13  |   Thu 21 Mar 2019
RSA 2019: Success or Failure?

RSA 2019: Success or Failure?

Is the RSA Conference a must attend for security professionals? Or is it enough to "just be in San Francisco that week"?

Check out this post and discussion for the basis of our conversation on this …

00:29:36  |   Thu 14 Mar 2019
Security IS the Business

Security IS the Business

If a company's brand and value is built on trust, then your security department is critical to building the value of the company.

Check out this post and discussion for the basis of our conversation…

00:25:59  |   Thu 07 Mar 2019
Threat Intelligence

Threat Intelligence

Do companies who deliver "threat intelligence" deliver on that promise, or is there more the customer needs to bring to the table to be able to take action?

Check out this post and discussion for th…

00:20:59  |   Wed 27 Feb 2019
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.