1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
What Makes a Successful CISO?

What Makes a Successful CISO?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:33:40  |   Thu 13 Jun 2024
We Want a Solution to Remediate, Not Just Detect Problems

We Want a Solution to Remediate, Not Just Detect Problems

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:25:12  |   Thu 06 Jun 2024
Recruiting from the Help Desk

Recruiting from the Help Desk

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:32  |   Thu 30 May 2024
How Do We Build a Security Program to Thwart Deepfakes?

How Do We Build a Security Program to Thwart Deepfakes?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:29:25  |   Thu 23 May 2024
Where Are Secure Web Gateways Falling Short?

Where Are Secure Web Gateways Falling Short?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:28:14  |   Thu 16 May 2024
Understanding the Zero-Trust Landscape

Understanding the Zero-Trust Landscape

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:30:39  |   Thu 09 May 2024
Scaling Least Privilege for the Cloud

Scaling Least Privilege for the Cloud

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:35:00  |   Thu 02 May 2024
Should CISOs Be More Empathetic Towards Salespeople?

Should CISOs Be More Empathetic Towards Salespeople?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:34:40  |   Thu 25 Apr 2024
Managing Data Leaks Outside Your Perimeter

Managing Data Leaks Outside Your Perimeter

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:29:56  |   Thu 18 Apr 2024
What Are the Risks of Being a CISO?

What Are the Risks of Being a CISO?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:35:46  |   Thu 11 Apr 2024
Onboarding Security Professionals

Onboarding Security Professionals

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:17  |   Thu 04 Apr 2024
How to Improve Your Relationship With Your Boss

How to Improve Your Relationship With Your Boss

All links and images for this episode can be found on CISO Series.

Check out this post Monte Pedersen of The CDA Group for the discussion that is the basis of our conversation on this week’s episode…

00:29:16  |   Thu 28 Mar 2024
Improving the Responsiveness of Your SOC

Improving the Responsiveness of Your SOC

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:27:46  |   Thu 21 Mar 2024
The Demand for Affordable Blue Team Training

The Demand for Affordable Blue Team Training

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:22  |   Thu 14 Mar 2024
Why are CISOs Excluded from Executive Leadership?

Why are CISOs Excluded from Executive Leadership?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:33:04  |   Thu 07 Mar 2024
What Is Your SOC's Single Search of Truth?

What Is Your SOC's Single Search of Truth?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:30:44  |   Thu 29 Feb 2024
When Is Data an Asset and When Is It a Liability?

When Is Data an Asset and When Is It a Liability?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:34:49  |   Thu 22 Feb 2024
Tracking Anomalous Behaviors of Legitimate Identities

Tracking Anomalous Behaviors of Legitimate Identities

All links and images for this episode can be found on CISO Series.

The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only s…

00:34:01  |   Thu 15 Feb 2024
Why Do Cybersecurity Startups Fail?

Why Do Cybersecurity Startups Fail?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:43  |   Thu 08 Feb 2024
Is

Is "Compliance Doesn't Equal Security" a Pointless Argument?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:33:33  |   Thu 01 Feb 2024
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.