Defense in Depth

A podcast by David Spark, Steve Zalewski, Geoff Belknap - Thursdays

Thursdays

Categories:

163 Episodes

  1. When Is Data an Asset and When Is It a Liability?

    Published: 2/22/2024
  2. Tracking Anomalous Behaviors of Legitimate Identities

    Published: 2/15/2024
  3. Why Do Cybersecurity Startups Fail?

    Published: 2/8/2024
  4. Is "Compliance Doesn't Equal Security" a Pointless Argument?

    Published: 2/1/2024
  5. CISOs Responsibilities Before and After an M&A

    Published: 1/25/2024
  6. Use Red Teaming To Build, Not Validate, Your Security Program

    Published: 1/18/2024
  7. The Do's and Don'ts of Approaching CISOs

    Published: 1/11/2024
  8. Doing Third Party Risk Management Right

    Published: 1/4/2024
  9. Warning Signs You're About To Be Attacked

    Published: 12/14/2023
  10. Do We Have to Fix ALL the Critical Vulnerabilities?

    Published: 12/7/2023
  11. Mitigating Generative AI Risks

    Published: 11/30/2023
  12. Building a Cyber Strategy for Unknown Unknowns

    Published: 11/16/2023
  13. Responsibly Embracing Generative AI

    Published: 11/9/2023
  14. People Are the Top Attack Vector (Not the Weakest Link)

    Published: 11/2/2023
  15. What's Entry Level in Cybersecurity?

    Published: 10/26/2023
  16. New SEC Rules for Cyber Security

    Published: 10/19/2023
  17. The Value of RSA, Black Hat, and Mega Cyber Tradeshows

    Published: 10/12/2023
  18. Is Remote Work Helping or Hurting Cybersecurity?

    Published: 10/5/2023
  19. How to Manage Users' Desires for New Technology

    Published: 9/28/2023
  20. Cybersecurity Questions Heard Around the Kitchen Table

    Published: 9/21/2023

3 / 9

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.