Defense in Depth

By David Spark

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

  1. 1.
    Convergence of SIEM and SOAR
    27:01
  2. 2.
    Cybersecurity Is Not Easy to Get Into
    31:07
  3. 3.
    Preventing Ransomware
    27:15
  4. 4.
    Managing Lateral Movement
    29:02
  5. 5.
    First Steps as a CISO
    30:20
  6. 6.
    How Does Ransomware Enter the Network?
    28:46
  7. 7.
    What's the Value of Certifications?
    30:13
  8. 8.
    Measuring the Success of Cloud Security
    27:16
  1. 9.
    How do I get my first cybersecurity job?
    28:31
  2. 10.
    Educating the Board About Cybersecurity
    25:57
  3. 11.
    CISO Recruiting Is Broken
    28:12
  4. 12.
    Retaining Cyber Talent
    34:06
  5. 13.
    Salesforce Security
    23:24
  6. 14.
    Cloud Configuration Fails
    24:34
  7. 15.
    Starting Pay for Cyber Staff
    30:10
  8. 16.
    Fear of Automation
    24:10
  9. 17.
    Hiring Talent with No Security Experience
    27:17
  10. 18.
    Security Hygiene for Software Development
    25:30
  11. 19.
    How Much Do You Know About Your Data?
    26:23
  12. 20.
    Do Startups Need a CISO?
    28:12
  13. 21.
    Insider Risk
    29:10
  14. 22.
    What’s the Obsession with Zero Trust?
    28:36
  15. 23.
    Mentoring
    27:26
  16. 24.
    Securing the Super Bowl and Other Huge Events
    30:19
  17. 25.
    Cybersecurity Isn’t That Difficult
    26:49
  18. 26.
    Cloud Security Myths
    28:32
  19. 27.
    What Is Security's Mission?
    25:58
  20. 28.
    Vendor CISOs
    27:08
  21. 29.
    How Much Log Data Is Enough?
    25:04
  22. 30.
    Should Finance or Legal Mentor Cyber?
    25:16
  23. 31.
    Data Destruction
    27:23
  24. 32.
    How to Make Cybersecurity More Efficient
    25:41
  25. 33.
    Does a CISO Need Tech Skills?
    27:07
  26. 34.
    How Do You Know if You're Good at Security?
    25:52
  27. 35.
    Building a Security Team
    31:57
  28. 36.
    Are our Data Protection Strategies Evolving?
    25:11
  29. 37.
    Should CISOs Be Licensed Professionals?
    26:46
  30. 38.
    Inherently Vulnerable By Design
    26:53
  31. 39.
    Imposter Syndrome
    28:45
  32. 40.
    Why Don't More Companies Take Cybersecurity Seriously?
    27:57
  33. 41.
    Data Protection and Visibility
    33:06
  34. 42.
    What's an Entry Level Cybersecurity Job?
    28:26
  35. 43.
    Securing Digital Transformations
    29:00
  36. 44.
    Leaked Secrets in Code Repositories
    28:40
  37. 45.
    Measuring the Success of Your Security Program
    27:18
  38. 46.
    Privacy Is An Uphill Battle
    28:42
  39. 47.
    Legal Protection for CISOs
    29:20
  40. 48.
    XDR: Extended Detection and Response
    25:02
  41. 49.
    Calling Users Stupid
    27:26
  42. 50.
    Is College Necessary for a Job in Cybersecurity?
    28:13

Listen to Defense in Depth now.

Listen to Defense in Depth in full in the Spotify app