Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
All links and images for this episode can be found on CISO Series
Instead of complaining about the security hiring process, walk a mile in a recruiter's shoes and have a little compassion to what th…
All links and images for this episode can be found on CISO Series
Are security programs drifting from a prevention to a resilience strategy? If so, are you truly operating in a resilient environment…
All links and images for this episode can be found on CISO Series
How do you talk to non-technical business leaders about cybersecurity? It's a concern, it's a risk, they want to know so they can ma…
All links and images for this episode can be found on CISO Series
Why are cybersecurity professionals burning out? What's the dynamic of the job, the pressures being put on them, that causes the best…
All links and images for this episode can be found on CISO Series
You're starting a security program from scratch and you're trying to figure out where to start, what to prioritize, and how to archi…
All links and images for this episode can be found on CISO Series
Files are still the core of how people do business. How are you dealing with the onslaught of files coming into your network? People…
All links and images for this episode can be found on CISO Series
Hiring managers speak about looking for culture fit and diversity, but never at the same time. Can they coexist? Are they mutually e…
All links and images for this episode can be found on CISO Series
Cyber sales is hard. But don't let the difficulty of doing it get in way of your good judgement. So what is the right way to follow u…
All links and images for this episode can be found on CISO Series
One day you want to be a CISO. What area of security you begin your studies? Or maybe you shouldn't be studying security.
Check out …
All links and images for this episode can be found on CISO Series
What can we do to reduce the damage of a breach and the duration of detection and remediation?
Check out this post for the discussi…
All links and images for this episode can be found on CISO Series
Learning cyber is not a question for those who are just starting out. It's for everybody. Where and how do we learn at every stage of…
All links and images for this episode can be found on CISO Series
You’re a CISO, vCISO, or MSSP rolling into a company that has yet to launch a cybersecurity department. How do you communicate about…
All links and images for this episode can be found on CISO Series
Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is …
All links and images for this episode can be found on CISO Series
Is attack surface profiling the same as a pen test? If it isn't what unique insight can attack surface profiling deliver?
Check out …
All links and images for this episode can be found on CISO Series
What’s your best indicator that your security program is actually improving? And besides you and your team, is anyone impressed?
Che…
All links and images for this episode can be found on CISO Series
Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gate…
All links and images for this episode can be found on CISO Series
How are nefarious actors using our own data (and metadata) against us? And given that, in what way have we lost our way protecting d…
All links and images for this episode can be found on CISO Series
Is it possible to position your security team as a profit center instead of the traditional cost center reporting to the CIO?
Check o…
All links and images for this episode can be found on CISO Series
For years we've been referring to malware protection as a cat and mouse game. The crooks come up with a new malware attack, and then…
All links and images for this episode can be found on CISO Series
We all know and have experienced bad security awareness training. People can learn, and should learn about being cyber aware. How do…