Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
All links and images for this episode can be found on CISO Series.
We expect our users to be perfect security responders even when the adversaries are doing everything in their power to trick them. T…
All links and images for this episode can be found on CISO Series.
How do you make the argument that your company needs a CISO, and that YOU should be that leader? What do you need to demonstrate to …
All links and images for this episode can be found on CISO Series.
How do you become a CISO? It doesn't follow a linear pattern as many other professions. There are many different paths and there are…
All links and images for this episode can be found on CISO Series.
What would it take to build your entire security program on open source software, tools, and intelligence?
Check out this post for …
All links and images for this episode can be found on CISO Series.
Businesses grow based on trust, but they have to operate in a world of risk. Even cybersecurity operates this way, but when it comes…
All links and images for this episode can be found on CISO Series
The cybersecurity sales process is so terribly inefficient. And everyone, the targets and cybersecurity leaders, are losing valuable …
All links and images for this episode can be found on CISO Series.
When you think about building a plan (and budget!) for your security program, do you lead with risk, maturity, or something else?
Ch…
All links and images for this episode can be found on CISO Series
Why do strongly supported security frameworks have such severe limitations when building a security program?
Check out this post for …
All links and images for this episode can be found on CISO Series.
Why is there a cybersecurity skills gap? Practically everyone is looking to hire, and there are ton of people getting training and t…
All links and images for this episode can be found on CISO Series.
Given that your company's security is dependent on the security of your partners and others, what can we do to get more organization…
All links and images for this episode can be found on CISO Series.
"When the asset discovery market launched, every single company that offered a solution used the line, “You can’t protect what you …
All links and images for this episode can be found on CISO Series
A good high profile security threat seems like a good time to alert potential customers about how your product could help or even pre…
All links and images for this episode can be found on CISO Series
Why do CISOs seem more stressed out than other C-level executives?
Check out this post for the discussions that are the basis of our…
All links and images for this episode can be found on CISO Series
How detailed do we get in our conversation with business leaders? Do we dumb it down? Or is that a recipe for trouble?
All links and images for this episode can be found on CISO Series
Why are there so many vCISOs who have never been a CISO? Isn't it difficult to advise on a role you've never done? Do organizations …
All links and images for this episode can be found on CISO Series
As an outside observer, how can you tell if a company is staying cyber healthy? While there is no financial statement equivalency to…
All links and images for this episode can be found on CISO Series
The cyber attack surface just keeps growing to the point that it seems endless. Protecting it all is impossible. Is there anything th…
All links and images for this episode can be found on CISO Series
Those reports on security procedures for the business are falling short. No one is reading them. What good are security controls if …
All links and images for this episode can be found on CISO Series
Cybersecurity budgets are increasing, by a lot. What's fueling the increase and where are those budgets being spent?
Check out this p…
All links and images for this episode can be found on CISO Series
What's the difference between a head of security, a vp of security, and a CISO? Do job responsibilities change whether you're a secu…