Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays

Categories:
163 Episodes
-
How to Prime Your Data Lake
Published: 14/09/2023 -
Getting Ahead Of Your Threat Intelligence Program
Published: 7/09/2023 -
How Security Leaders Deal with Intense Stress
Published: 31/08/2023 -
How Do We Influence Secure Behavior?
Published: 24/08/2023 -
Security Concerns with ChatGPT
Published: 17/08/2023 -
Create A Pipeline of Cyber Talent
Published: 10/08/2023 -
Improving Adoption of Least Privileged Access
Published: 3/08/2023 -
Securing SaaS Applications
Published: 27/07/2023 -
How Do We Get Better Control of Cloud Data?
Published: 20/07/2023 -
Finding Your Security Community
Published: 13/07/2023 -
Let's Write Better Cybersecurity Job Descriptions
Published: 6/07/2023 -
How Should Security Better Engage with Application Owners?
Published: 29/06/2023 -
How To Get More People Into Cybersecurity
Published: 22/06/2023 -
How to Create a Positive Security Culture
Published: 15/06/2023 -
How Should We Trust Entry Level Employees?
Published: 8/06/2023 -
How Must Processes Change to Reduce Risk?
Published: 1/06/2023 -
Reputational Damage from Breaches
Published: 25/05/2023 -
Do RFPs Work?
Published: 18/05/2023 -
Successful Cloud Security
Published: 11/05/2023 -
How Should Security Vendors Engage With CISOs?
Published: 4/05/2023
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.