Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
All links and images for this episode can be found on CISO Series
You want to bring on entry level personal, But green employees, who are not well versed in security, IT, or your data introduce risk…
Zero trust is a hollow buzzword. In any form of security, there exist critical points where we have to trust. What we need is a move…
All links and images for this episode can be found on CISO Series
Cyber professionals, who is responsible on your team for investigating new solutions?
All links and images for this episode can be found on CISO Series
In the cyber industry we pat each other on the back and give each other awards, all while the statistics for breaches appear to be w…
All links and images for this episode can be found on CISO Series
For some, the definition of zero trust has expanded from how we grant access to networks, applications, and data to how we trust ind…
All links and images for this episode can be found on CISO Series
Developers and security professionals have been heavily sold on the concept of "shift left" or deal with security issues early in dev…
All links and images for this episode can be found on CISO Series
Do we have a Monitgue/Capulet rivalry between technical and compliance professionals? Why is this happening, and what can be done to…
All links and images for this episode can be found on CISO Series
Why do we end up with so many bad security products? Who is to blame and how can we fight back an ecosystem that may be fostering su…
All links and images for this episode can be found on CISO Series
What are you doing to prepare for the next cyber disaster? You must train for it, because when it happens, and it will happen, every…
All links and images for this episode can be found on CISO Series
What if you didn't spend all your time patching vulnerabilities but instead created a security policy that prevented known vulnerabil…
All links and images for this episode can be found on CISO Series
A 500+ person company doesn't have a security department. They need one and they need to convince the CEO they need one. How do you …
All links and images for this episode can be found on CISO Series
"If you want to catch a cybercrook, you need to think like one." But how do you actually go about thinking like a cybercriminal? Wha…
All links and images for this episode can be found on CISO Series
Could you build a data-first security program? What would you do if you focused your security program on just the asset?
Check out t…
All links and images for this episode can be found on CISO Series
Offensive security or "hacking back" has always been seen as either unethical or illegal. But now, we're seeing a resurgence in offen…
All links and images for this episode can be found on CISO Series
A security professional announces a new position as CISO. As a vendor you see this as good timing to try a cold outreach to sell you…
All links and images for this episode can be found on CISO Series
How do you begin building a cyber security culture for the whole company? And more importantly, how do you maintain that?
Check out …
All links and images for this episode can be found on CISO Series
You're a security vendor and you've got a short briefing with a security analyst from a research firm. What do you want to get across…
All links and images for this episode can be found on CISO Series
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@d…
All links and images for this episode can be found on CISO Series
Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing be…
How seamless are Distributed Denial of Service or DDoS solutions today? If you get a denial of service attack, how quickly can these solutions snap into action with no manual response by the user?
Ch…