1. EachPod

Defense in Depth - Podcast

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Tech News Technology News
Update frequency
every 7 days
Average duration
28 minutes
Episodes
326
Years Active
2019 - 2025
Share to:
Onboarding Cyber Professionals with No Experience

Onboarding Cyber Professionals with No Experience

All links and images for this episode can be found on CISO Series

You want to bring on entry level personal, But green employees, who are not well versed in security, IT, or your data introduce risk…

00:28:44  |   Thu 02 Jun 2022
Where's the Trust in Zero Trust?

Where's the Trust in Zero Trust?

All links and images for this episode can be found on CISO Series

Zero trust is a hollow buzzword. In any form of security, there exist critical points where we have to trust. What we need is a move…

00:28:15  |   Thu 26 May 2022
Who Investigates Cyber Solutions?

Who Investigates Cyber Solutions?

All links and images for this episode can be found on CISO Series

Cyber professionals, who is responsible on your team for investigating new solutions?

Check out this post and this post for the dis…

00:27:53  |   Thu 19 May 2022
Does the Cybersecurity Industry Suck?

Does the Cybersecurity Industry Suck?

All links and images for this episode can be found on CISO Series

In the cyber industry we pat each other on the back and give each other awards, all while the statistics for breaches appear to be w…

00:33:30  |   Thu 12 May 2022
Are We Taking Zero Trust Too Far?

Are We Taking Zero Trust Too Far?

All links and images for this episode can be found on CISO Series

For some, the definition of zero trust has expanded from how we grant access to networks, applications, and data to how we trust ind…

00:29:43  |   Thu 05 May 2022
Is Shift Left Working?

Is Shift Left Working?

All links and images for this episode can be found on CISO Series

Developers and security professionals have been heavily sold on the concept of "shift left" or deal with security issues early in dev…

00:32:51  |   Thu 28 Apr 2022
Technical vs. Compliance Professionals

Technical vs. Compliance Professionals

All links and images for this episode can be found on CISO Series

Do we have a Monitgue/Capulet rivalry between technical and compliance professionals? Why is this happening, and what can be done to…

00:28:43  |   Thu 21 Apr 2022
Why Do So Many Cybersecurity Products Suck?

Why Do So Many Cybersecurity Products Suck?

All links and images for this episode can be found on CISO Series

Why do we end up with so many bad security products? Who is to blame and how can we fight back an ecosystem that may be fostering su…

00:31:33  |   Thu 14 Apr 2022
Training for a Cyber Disaster

Training for a Cyber Disaster

All links and images for this episode can be found on CISO Series

What are you doing to prepare for the next cyber disaster? You must train for it, because when it happens, and it will happen, every…

00:27:47  |   Thu 07 Apr 2022
Virtual Patching

Virtual Patching

All links and images for this episode can be found on CISO Series

What if you didn't spend all your time patching vulnerabilities but instead created a security policy that prevented known vulnerabil…

00:29:30  |   Thu 31 Mar 2022
Start a Cybersecurity Department from Scratch

Start a Cybersecurity Department from Scratch

All links and images for this episode can be found on CISO Series

A 500+ person company doesn't have a security department. They need one and they need to convince the CEO they need one. How do you …

00:28:33  |   Thu 24 Mar 2022
How to Think Like a Cybercrook

How to Think Like a Cybercrook

All links and images for this episode can be found on CISO Series

"If you want to catch a cybercrook, you need to think like one." But how do you actually go about thinking like a cybercriminal? Wha…

00:31:20  |   Thu 17 Mar 2022
Building a Data-First Security Program

Building a Data-First Security Program

All links and images for this episode can be found on CISO Series

Could you build a data-first security program? What would you do if you focused your security program on just the asset?

Check out t…

00:32:50  |   Thu 10 Mar 2022
Offensive Security

Offensive Security

All links and images for this episode can be found on CISO Series

Offensive security or "hacking back" has always been seen as either unethical or illegal. But now, we're seeing a resurgence in offen…

00:31:43  |   Thu 03 Mar 2022
When Vendors Pounce on New CISOs

When Vendors Pounce on New CISOs

All links and images for this episode can be found on CISO Series

A security professional announces a new position as CISO. As a vendor you see this as good timing to try a cold outreach to sell you…

00:29:55  |   Thu 24 Feb 2022
Building a Cybersecurity Culture

Building a Cybersecurity Culture

All links and images for this episode can be found on CISO Series

How do you begin building a cyber security culture for the whole company? And more importantly, how do you maintain that?

Check out 

00:27:29  |   Thu 17 Feb 2022
How to Pitch to a Security Analyst

How to Pitch to a Security Analyst

All links and images for this episode can be found on CISO Series

You're a security vendor and you've got a short briefing with a security analyst from a research firm. What do you want to get across…

00:31:00  |   Thu 10 Feb 2022
Is Your Data Safer in the Cloud?

Is Your Data Safer in the Cloud?

All links and images for this episode can be found on CISO Series

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…

00:27:46  |   Thu 03 Feb 2022
What Should We Stop Doing in Cybersecurity?

What Should We Stop Doing in Cybersecurity?

All links and images for this episode can be found on CISO Series

Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing be…

00:24:57  |   Thu 27 Jan 2022
DDoS Solutions

DDoS Solutions

How seamless are Distributed Denial of Service or DDoS solutions today? If you get a denial of service attack, how quickly can these solutions snap into action with no manual response by the user?

Ch…

00:28:46  |   Thu 20 Jan 2022
Disclaimer: The podcast and artwork embedded on this page are the property of David Spark. This content is not affiliated with or endorsed by eachpod.com.