Defense in Depth
A podcast by David Spark - Thursdays
Categories:
147 Episodes
-
Improving the Responsiveness of Your SOC
Published: 3/21/2024 -
The Demand for Affordable Blue Team Training
Published: 3/14/2024 -
Why are CISOs Excluded from Executive Leadership?
Published: 3/7/2024 -
What Is Your SOC's Single Search of Truth?
Published: 2/29/2024 -
When Is Data an Asset and When Is It a Liability?
Published: 2/22/2024 -
Tracking Anomalous Behaviors of Legitimate Identities
Published: 2/15/2024 -
Why Do Cybersecurity Startups Fail?
Published: 2/8/2024 -
Is "Compliance Doesn't Equal Security" a Pointless Argument?
Published: 2/1/2024 -
CISOs Responsibilities Before and After an M&A
Published: 1/25/2024 -
Use Red Teaming To Build, Not Validate, Your Security Program
Published: 1/18/2024 -
The Do's and Don'ts of Approaching CISOs
Published: 1/11/2024 -
Doing Third Party Risk Management Right
Published: 1/4/2024 -
Warning Signs You're About To Be Attacked
Published: 12/14/2023 -
Do We Have to Fix ALL the Critical Vulnerabilities?
Published: 12/7/2023 -
Mitigating Generative AI Risks
Published: 11/30/2023 -
Building a Cyber Strategy for Unknown Unknowns
Published: 11/16/2023 -
Responsibly Embracing Generative AI
Published: 11/9/2023 -
People Are the Top Attack Vector (Not the Weakest Link)
Published: 11/2/2023 -
What's Entry Level in Cybersecurity?
Published: 10/26/2023 -
New SEC Rules for Cyber Security
Published: 10/19/2023
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.