Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays
Categories:
153 Episodes
-
Scaling Least Privilege for the Cloud
Published: 2/05/2024 -
Should CISOs Be More Empathetic Towards Salespeople?
Published: 25/04/2024 -
Managing Data Leaks Outside Your Perimeter
Published: 18/04/2024 -
What Are the Risks of Being a CISO?
Published: 11/04/2024 -
Onboarding Security Professionals
Published: 4/04/2024 -
How to Improve Your Relationship With Your Boss
Published: 28/03/2024 -
Improving the Responsiveness of Your SOC
Published: 21/03/2024 -
The Demand for Affordable Blue Team Training
Published: 14/03/2024 -
Why are CISOs Excluded from Executive Leadership?
Published: 7/03/2024 -
What Is Your SOC's Single Search of Truth?
Published: 29/02/2024 -
When Is Data an Asset and When Is It a Liability?
Published: 22/02/2024 -
Tracking Anomalous Behaviors of Legitimate Identities
Published: 15/02/2024 -
Why Do Cybersecurity Startups Fail?
Published: 8/02/2024 -
Is "Compliance Doesn't Equal Security" a Pointless Argument?
Published: 1/02/2024 -
CISOs Responsibilities Before and After an M&A
Published: 25/01/2024 -
Use Red Teaming To Build, Not Validate, Your Security Program
Published: 18/01/2024 -
The Do's and Don'ts of Approaching CISOs
Published: 11/01/2024 -
Doing Third Party Risk Management Right
Published: 4/01/2024 -
Warning Signs You're About To Be Attacked
Published: 14/12/2023 -
Do We Have to Fix ALL the Critical Vulnerabilities?
Published: 7/12/2023
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.