1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
CISOs Responsibilities Before and After an M&A

CISOs Responsibilities Before and After an M&A

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:33  |   Thu 25 Jan 2024
Use Red Teaming To Build, Not Validate, Your Security Program

Use Red Teaming To Build, Not Validate, Your Security Program

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:34  |   Thu 18 Jan 2024
The Do's and Don'ts of Approaching CISOs

The Do's and Don'ts of Approaching CISOs

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:31:36  |   Thu 11 Jan 2024
Doing Third Party Risk Management Right

Doing Third Party Risk Management Right

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:30  |   Thu 04 Jan 2024
Warning Signs You're About To Be Attacked

Warning Signs You're About To Be Attacked

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:33:07  |   Thu 14 Dec 2023
Do We Have to Fix ALL the Critical Vulnerabilities?

Do We Have to Fix ALL the Critical Vulnerabilities?

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:30:48  |   Thu 07 Dec 2023
Mitigating Generative AI Risks

Mitigating Generative AI Risks

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:32:38  |   Thu 30 Nov 2023
Building a Cyber Strategy for Unknown Unknowns

Building a Cyber Strategy for Unknown Unknowns

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:29:57  |   Thu 16 Nov 2023
Responsibly Embracing Generative AI

Responsibly Embracing Generative AI

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@…

00:33:23  |   Thu 09 Nov 2023
People Are the Top Attack Vector (Not the Weakest Link)

People Are the Top Attack Vector (Not the Weakest Link)

All links and images for this episode can be found on CISO Series.

In increasingly complex technical defenses, threat actors frequently target the human element. This makes them a top attack vectors,…

00:30:35  |   Thu 02 Nov 2023
What's Entry Level in Cybersecurity?

What's Entry Level in Cybersecurity?

All links and images for this episode can be found on CISO Series.

We often talk about the contradiction of seemingly entry-level security jobs requiring years of experience. But maybe that's because…

00:31:11  |   Thu 26 Oct 2023
New SEC Rules for Cyber Security

New SEC Rules for Cyber Security

All links and images for this episode can be found on CISO Series.

The Securities and Exchange Commission issued new cyber rules. What do these new rules mean for CISOs and will they ultimately impro…

00:35:57  |   Thu 19 Oct 2023
The Value of RSA, Black Hat, and Mega Cyber Tradeshows

The Value of RSA, Black Hat, and Mega Cyber Tradeshows

All links and images for this episode can be found on CISO Series.

Are trade shows like RSA getting so big that there's not enough economic value for a CISO to attend? Or do these events have enough …

00:29:33  |   Thu 12 Oct 2023
Is Remote Work Helping or Hurting Cybersecurity?

Is Remote Work Helping or Hurting Cybersecurity?

All links and images for this episode can be found on CISO Series.

Work from home flourished during the pandemic. Many workers love it and don't want to go back. Some organizations are pushing for a …

00:31:25  |   Thu 05 Oct 2023
How to Manage Users' Desires for New Technology

How to Manage Users' Desires for New Technology

All links and images for this episode can be found on CISO Series.

Large language models and generative AI are today's disruptive technology. This is not the first time companies just want to ban a n…

00:23:54  |   Thu 28 Sep 2023
Cybersecurity Questions Heard Around the Kitchen Table

Cybersecurity Questions Heard Around the Kitchen Table

All links and images for this episode can be found on CISO Series.

What do the people least in the know about cyber, want to know? What are they asking?

Check out this post for the discussion that i…

00:30:29  |   Thu 21 Sep 2023
How to Prime Your Data Lake

How to Prime Your Data Lake

All links and images for this episode can be found on CISO Series.

A security data lake, a data repository of everything you need to analyze and get analyzed sounds wonderful. But priming that lake, …

00:27:18  |   Thu 14 Sep 2023
Getting Ahead Of Your Threat Intelligence Program

Getting Ahead Of Your Threat Intelligence Program

All links and images for this episode can be found on CISO Series.

A threat intelligence program sounds like a sound effort in any security program. But, can you pull it off? There are so many phases…

00:33:33  |   Thu 07 Sep 2023
How Security Leaders Deal with Intense Stress

How Security Leaders Deal with Intense Stress

All links and images for this episode can be found on CISO Series.

When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not …

00:40:46  |   Thu 31 Aug 2023
How Do We Influence Secure Behavior?

How Do We Influence Secure Behavior?

All links and images for this episode can be found on CISO Series.

We all know that our employees need to be more security aware, but what are the methods to get them there? How can we make our emplo…

00:31:49  |   Thu 24 Aug 2023
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.