Defense in Depth

A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays

Thursdays

Categories:

163 Episodes

  1. When Is Data an Asset and When Is It a Liability?

    Published: 22/02/2024
  2. Tracking Anomalous Behaviors of Legitimate Identities

    Published: 15/02/2024
  3. Why Do Cybersecurity Startups Fail?

    Published: 8/02/2024
  4. Is "Compliance Doesn't Equal Security" a Pointless Argument?

    Published: 1/02/2024
  5. CISOs Responsibilities Before and After an M&A

    Published: 25/01/2024
  6. Use Red Teaming To Build, Not Validate, Your Security Program

    Published: 18/01/2024
  7. The Do's and Don'ts of Approaching CISOs

    Published: 11/01/2024
  8. Doing Third Party Risk Management Right

    Published: 4/01/2024
  9. Warning Signs You're About To Be Attacked

    Published: 14/12/2023
  10. Do We Have to Fix ALL the Critical Vulnerabilities?

    Published: 7/12/2023
  11. Mitigating Generative AI Risks

    Published: 30/11/2023
  12. Building a Cyber Strategy for Unknown Unknowns

    Published: 16/11/2023
  13. Responsibly Embracing Generative AI

    Published: 9/11/2023
  14. People Are the Top Attack Vector (Not the Weakest Link)

    Published: 2/11/2023
  15. What's Entry Level in Cybersecurity?

    Published: 26/10/2023
  16. New SEC Rules for Cyber Security

    Published: 19/10/2023
  17. The Value of RSA, Black Hat, and Mega Cyber Tradeshows

    Published: 12/10/2023
  18. Is Remote Work Helping or Hurting Cybersecurity?

    Published: 5/10/2023
  19. How to Manage Users' Desires for New Technology

    Published: 28/09/2023
  20. Cybersecurity Questions Heard Around the Kitchen Table

    Published: 21/09/2023

3 / 9

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Visit the podcast's native language site