1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Security Concerns with ChatGPT

Security Concerns with ChatGPT

All links and images for this episode can be found on CISO Series.

Users have tried to upload sensitive company information and PII, personally identifiable information, into ChatGPT. Those who are s…

00:28:59  |   Thu 17 Aug 2023
Create A Pipeline of Cyber Talent

Create A Pipeline of Cyber Talent

All links and images for this episode can be found on CISO Series.

The demand for cybertalent is sky high. It's very competitive to get those people with skills. What if you were to train your staff …

00:32:05  |   Thu 10 Aug 2023
Improving Adoption of Least Privileged Access

Improving Adoption of Least Privileged Access

All links and images for this episode can be found on CISO Series.

What are we doing to improve access management? Make it too loose and it's the number one way organizations get breached. Put on too…

00:27:39  |   Thu 03 Aug 2023
Securing SaaS Applications

Securing SaaS Applications

All links and images for this episode can be found on CISO Series.

With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy?

Check out …

00:30:33  |   Thu 27 Jul 2023
How Do We Get Better Control of Cloud Data?

How Do We Get Better Control of Cloud Data?

All links and images for this episode can be found on CISO Series.

When it comes to data, compliance, and reducing risk, where are we gaining control? Where are we losing control? And what are we do…

00:30:15  |   Thu 20 Jul 2023
Finding Your Security Community

Finding Your Security Community

All links and images for this episode can be found on CISO Series.

If you're struggling to get your first job in security or you're trying to get back into the industry after being laid off, you nee…

00:29:55  |   Thu 13 Jul 2023
Let's Write Better Cybersecurity Job Descriptions

Let's Write Better Cybersecurity Job Descriptions

All links and images for this episode can be found on CISO Series.

What should a cyber job description require, and what shouldn't it? What's reasonable and not reasonable?

Check out this post f…

00:30:18  |   Thu 06 Jul 2023
How Should Security Better Engage with Application Owners?

How Should Security Better Engage with Application Owners?

All links and images for this episode can be found on CISO Series.

Since so much technology today is not launched by the IT department, but by business units themselves. How do security professionals…

00:30:48  |   Thu 29 Jun 2023
How To Get More People Into Cybersecurity

How To Get More People Into Cybersecurity

All links and images for this episode can be found on CISO Series.

There are millions of cybersecurity jobs open. Over time, that number has just been growing. What we're doing now does not seem to b…

00:29:52  |   Thu 22 Jun 2023
How to Create a Positive Security Culture

How to Create a Positive Security Culture

All links and images for this episode can be found on CISO Series.

How do you create a positive security culture? It's rarely the first concept anyone wants to embrace, yet it's important everyone un…

00:30:59  |   Thu 15 Jun 2023
How Should We Trust Entry Level Employees?

How Should We Trust Entry Level Employees?

All links and images for this episode can be found on CISO Series.

All experienced security professionals were at one time very green. Entry level status means risk to your organization. That's if y…

00:30:57  |   Thu 08 Jun 2023
How Must Processes Change to Reduce Risk?

How Must Processes Change to Reduce Risk?

All links and images for this episode can be found on CISO Series.

What do we need to do to fix our processes to truly reduce risk and vulnerabilities?

Check out this post for the discussion that is…

00:28:47  |   Thu 01 Jun 2023
Reputational Damage from Breaches

Reputational Damage from Breaches

All links and images for this episode can be found on CISO Series.

Security professionals talk a lot about the reputational damage from breaches. And it seems logical, but major companies still do ge…

00:30:45  |   Thu 25 May 2023
Do RFPs Work?

Do RFPs Work?

All links and images for this episode can be found on CISO Series.

Do RFPs or request for proposals work as intended? It seems they're loaded with flaws yet for some organizations who must follow pro…

00:27:36  |   Thu 18 May 2023
Successful Cloud Security

Successful Cloud Security

All links and images for this episode can be found on CISO Series.

What are the moves we should be making in cloud to improve our security? What constitutes a good cloud security posture?

Check out t…

00:31:13  |   Thu 11 May 2023
How Should Security Vendors Engage With CISOs?

How Should Security Vendors Engage With CISOs?

All links and images for this episode can be found on CISO Series.

One CISO has had enough of the security vendor marketing emails and cold sales calls. He's blocking them all. But it's not a call to…

00:37:14  |   Thu 04 May 2023
Gartner Created Product Categories

Gartner Created Product Categories

All links and images for this episode can be found on CISO Series.

Do we really need more categories of security products? Every new Gartner magic quadrant complicates the marketplace but at the same…

00:34:32  |   Thu 27 Apr 2023
How to Always Make a Business Case for Security

How to Always Make a Business Case for Security

All links and images for this episode can be found on CISO Series.

How can security leaders and how do they go about matching business case to every security action you want to take? Is this the righ…

00:31:07  |   Thu 20 Apr 2023
Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

All links and images for this episode can be found on CISO Series.

Security tools are supposed to do a job. Either they need to alert you, protect you, or remediate an issue. But they don't always wo…

00:32:27  |   Thu 13 Apr 2023
What We Love About Working in Cybersecurity

What We Love About Working in Cybersecurity

All links and images for this episode can be found on CISO Series.

We talk a lot on this show about what makes cybersecurity such a hard job, yet there are so many people who are in it and love it. W…

00:28:53  |   Thu 06 Apr 2023
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.