1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
How Are New SEC Rules Impacting CISOs?

How Are New SEC Rules Impacting CISOs?

All links and images for this episode can be found on CISO Series.

Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark

00:34:32  |   Thu 07 Nov 2024
Managing the Risk of GenAI Tools

Managing the Risk of GenAI Tools

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:01  |   Thu 31 Oct 2024
Defending Against What Criminals Know About You

Defending Against What Criminals Know About You

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:35  |   Thu 24 Oct 2024
Will We Ever Go Back From Work From Home?

Will We Ever Go Back From Work From Home?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:32:59  |   Thu 17 Oct 2024
The Lurking Dangers of Neglected Security Tools

The Lurking Dangers of Neglected Security Tools

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:39  |   Thu 10 Oct 2024
When You Just Can't Take It Anymore in Cyber

When You Just Can't Take It Anymore in Cyber

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:18  |   Thu 03 Oct 2024
Is It Possible to Inject Integrity Into AI?

Is It Possible to Inject Integrity Into AI?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:37:13  |   Thu 26 Sep 2024
Are Phishing Tests Helping or Hurting Our Security Program?

Are Phishing Tests Helping or Hurting Our Security Program?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:27:36  |   Thu 19 Sep 2024
​​Who Is Responsible for Securing SaaS Tools?

​​Who Is Responsible for Securing SaaS Tools?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:35:23  |   Thu 12 Sep 2024
Hiring Cyber Teenagers with Criminal Records

Hiring Cyber Teenagers with Criminal Records

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:47  |   Thu 05 Sep 2024
What's Working With Third-Party Risk Management?

What's Working With Third-Party Risk Management?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:02  |   Thu 29 Aug 2024
What Triggers a CISO?

What Triggers a CISO?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:33:27  |   Thu 22 Aug 2024
Information Security vs. Cybersecurity

Information Security vs. Cybersecurity

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:26:41  |   Thu 15 Aug 2024
Should Deny By Default Be the Cornerstone of Zero Trust?

Should Deny By Default Be the Cornerstone of Zero Trust?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:30:08  |   Thu 08 Aug 2024
What Is a Field CISO?

What Is a Field CISO?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:32  |   Thu 01 Aug 2024
Cybersecurity Is a Communications Problem

Cybersecurity Is a Communications Problem

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:35  |   Thu 25 Jul 2024
Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?

Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:26:48  |   Thu 18 Jul 2024
Telling Stories with Security Metrics

Telling Stories with Security Metrics

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:30  |   Thu 11 Jul 2024
Securing Identities in the Cloud

Securing Identities in the Cloud

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (

00:32:33  |   Thu 27 Jun 2024
How AI Is Making Data Security Possible

How AI Is Making Data Security Possible

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:28:16  |   Thu 20 Jun 2024
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.