Defense in Depth
A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays
163 Episodes
-  When Is Data an Asset and When Is It a Liability?Published: 22/02/2024
-  Tracking Anomalous Behaviors of Legitimate IdentitiesPublished: 15/02/2024
-  Why Do Cybersecurity Startups Fail?Published: 08/02/2024
-  Is "Compliance Doesn't Equal Security" a Pointless Argument?Published: 01/02/2024
-  CISOs Responsibilities Before and After an M&APublished: 25/01/2024
-  Use Red Teaming To Build, Not Validate, Your Security ProgramPublished: 18/01/2024
-  The Do's and Don'ts of Approaching CISOsPublished: 11/01/2024
-  Doing Third Party Risk Management RightPublished: 04/01/2024
-  Warning Signs You're About To Be AttackedPublished: 14/12/2023
-  Do We Have to Fix ALL the Critical Vulnerabilities?Published: 07/12/2023
-  Mitigating Generative AI RisksPublished: 30/11/2023
-  Building a Cyber Strategy for Unknown UnknownsPublished: 16/11/2023
-  Responsibly Embracing Generative AIPublished: 09/11/2023
-  People Are the Top Attack Vector (Not the Weakest Link)Published: 02/11/2023
-  What's Entry Level in Cybersecurity?Published: 26/10/2023
-  New SEC Rules for Cyber SecurityPublished: 19/10/2023
-  The Value of RSA, Black Hat, and Mega Cyber TradeshowsPublished: 12/10/2023
-  Is Remote Work Helping or Hurting Cybersecurity?Published: 05/10/2023
-  How to Manage Users' Desires for New TechnologyPublished: 28/09/2023
-  Cybersecurity Questions Heard Around the Kitchen TablePublished: 21/09/2023
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
