This browser doesn't support Spotify Web Player. Switch browsers or download Spotify for your desktop.

Defense in Depth

By Allan Alford and David Spark

Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

  1. 1.
    XDR: Extended Detection and Response09/24/2020
    25:02
  2. 2.
    Calling Users Stupid09/17/2020
    27:26
  3. 3.
    Is College Necessary for a Job in Cybersecurity?09/10/2020
    28:13
  4. 4.
    When Red Teams Break Down09/03/2020
    25:16
  5. 5.
    What Cyber Pro Are You Trying to Hire?08/27/2020
    28:34
  6. 6.
    Junior Cyber People08/20/2020
    29:16
  7. 7.
    Trusting Security Vendor Claims08/13/2020
    27:54
  8. 8.
    How Vendors Should Approach CISOs08/06/2020
    30:11
  1. 9.
    Secure Access07/30/2020
    22:52
  2. 10.
    InfoSec Fatigue07/23/2020
    28:22
  3. 11.
    Securing a Cloud Migration07/16/2020
    25:53
  4. 12.
    API Security07/09/2020
    23:29
  5. 13.
    Shared Threat Intelligence07/02/2020
    27:08
  6. 14.
    Drudgery of Cybercrime06/25/2020
    26:06
  7. 15.
    Security Budgets06/18/2020
    25:44
  8. 16.
    Role of the BISO06/11/2020
    28:54
  9. 17.
    Shared Accounts06/04/2020
    26:22
  10. 18.
    Bug Bounties05/28/2020
    29:31
  11. 19.
    Data Classification05/21/2020
    24:43
  12. 20.
    Prevention vs. Detection and Containment05/14/2020
    26:41
  13. 21.
    Asset Valuation05/07/2020
    28:27
  14. 22.
    DevSecOps04/30/2020
    26:40
  15. 23.
    Fix Security Problems with What You've Got04/23/2020
    28:24
  16. 24.
    Should Risk Lead GRC?04/16/2020
    24:58
  17. 25.
    Responsible Disclosure04/09/2020
    25:11
  18. 26.
    Internet of Things04/02/2020
    29:14
  19. 27.
    Is Governance the Most Important Part of GRC?03/26/2020
    27:18
  20. 28.
    Who Should the CISO Report To?03/19/2020
    24:36
  21. 29.
    Hybrid Cloud03/12/2020
    27:46
  22. 30.
    CISO Tenure03/05/2020
    29:19
  23. 31.
    Toxic Security Teams02/27/2020
    25:36
  24. 32.
    Personality Tests in the Workplace02/20/2020
    23:27
  25. 33.
    Lack of Diversity in Cybersecurity02/13/2020
    27:53
  26. 34.
    When Are CISOs Responsible for Breaches?02/06/2020
    28:39
  27. 35.
    Post Breach Desperation and Salary Negotiations01/30/2020
    26:22
  28. 36.
    Presenting to the Board01/23/2020
    25:13
  29. 37.
    The Iran Cybersecurity Threat01/16/2020
    26:30
  30. 38.
    Building a Fully Remote Security Team01/09/2020
    25:35
  31. 39.
    Account Takeover12/19/2019
    25:40
  32. 40.
    UX in Cybersecurity12/12/2019
    26:34
  33. 41.
    InfoSec Trends for 202012/05/2019
    26:22
  34. 42.
    Cybersecurity Readiness as Hiring Criteria11/21/2019
    26:25
  35. 43.
    Cybersecurity and the Media11/14/2019
    29:51
  36. 44.
    The Cloud and Shared Security11/07/2019
    24:59
  37. 45.
    Is Product Security Improving?10/31/2019
    26:09
  38. 46.
    Best Starting Security Framework10/24/2019
    26:48
  39. 47.
    Cyber Defense Matrix10/17/2019
    27:48
  40. 48.
    User-Centric Security10/10/2019
    28:57
  41. 49.
    Securing the New Internet10/03/2019
    32:26
  42. 50.
    Resiliency09/26/2019
    26:27
  43. 51.
    Ransomware09/19/2019
    26:07
  44. 52.
    Top CISO Communication Issues09/12/2019
    27:43
  45. 53.
    Cybersecurity Excuses09/05/2019
    24:42
  46. 54.
    Employee Hacking08/29/2019
    25:42
  47. 55.
    100% Security08/22/2019
    24:58
  48. 56.
    Proactive Security08/15/2019
    28:38
  49. 57.
    ATT&CK Matrix08/08/2019
    25:02
  50. 58.
    Hacker Culture08/01/2019
    25:31
  51. 59.
    Bad Best Practices07/25/2019
    23:35
  52. 60.
    Cyber Harassment07/18/2019
    23:45
  53. 61.
    CISO Series One Year Review06/25/2019
    28:12
  54. 62.
    Economics of Data06/25/2019
    27:45
  55. 63.
    Tool Consolidation06/19/2019
    23:54
  56. 64.
    Camry Security06/12/2019
    22:23
  57. 65.
    Amplifying Your Security Posture06/04/2019
    26:54
  58. 66.
    ERP Security05/30/2019
    21:43
  59. 67.
    Managing Obsolete (Yet Business Critical) Systems05/22/2019
    28:24
  60. 68.
    Cybersecurity Hiring05/16/2019
    25:32
  61. 69.
    How CISOs Discover New Solutions05/09/2019
    29:31
  62. 70.
    Is the Cybersecurity Industry Solving Our Problems?05/01/2019
    29:54
  63. 71.
    Vulnerability Management04/25/2019
    21:30
  64. 72.
    Privileged Access Management04/17/2019
    25:20
  65. 73.
    Machine Learning Failures04/10/2019
    31:47
  66. 74.
    Software Fixing Hardware Problems04/04/2019
    22:57
  67. 75.
    Tools for Managing 3rd Party Risk03/28/2019
    25:06
  68. 76.
    CISO Burnout03/21/2019
    27:15
  69. 77.
    RSA 2019: Success or Failure?03/14/2019
    29:37
  70. 78.
    Security IS the Business03/07/2019
    26:00
  71. 79.
    Threat Intelligence02/27/2019
    21:00
  72. 80.
    Secure Controls Framework02/21/2019
    24:53
  73. 81.
    Insider Threats02/14/2019
    20:51
  74. 82.
    Building an Information Security Council02/07/2019
    24:13
  75. 83.
    Privacy01/31/2019
    28:59
  76. 84.
    Security Metrics01/23/2019
    24:12
  77. 85.
    Welcome to Defense in Depth01/21/2019
    0:33

Listen to Defense in Depth now.

Listen to Defense in Depth in full in the Spotify app