Defense in Depth
A podcast by David Spark - Thursdays
Categories:
147 Episodes
-
Reputational Damage from Breaches
Published: 5/25/2023 -
Do RFPs Work?
Published: 5/18/2023 -
Successful Cloud Security
Published: 5/11/2023 -
How Should Security Vendors Engage With CISOs?
Published: 5/4/2023 -
Gartner Created Product Categories
Published: 4/27/2023 -
How to Always Make a Business Case for Security
Published: 4/20/2023 -
Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?
Published: 4/13/2023 -
What We Love About Working in Cybersecurity
Published: 4/6/2023 -
Security That Accounts for Human Fallibility
Published: 3/30/2023 -
Why You Should Be Your Company's Next CISO
Published: 3/23/2023 -
How to Become a CISO
Published: 3/16/2023 -
Can You Build a Security Program on Open Source?
Published: 3/9/2023 -
Third Party Risk vs. Third Party Trust
Published: 3/2/2023 -
How Can We Improve the Cyber Sales Cycle?
Published: 2/23/2023 -
What Leads a Security Program: Risk or Maturity?
Published: 2/16/2023 -
Limitations of Security Frameworks
Published: 2/9/2023 -
Why Is There a Cybersecurity Skills Gap?
Published: 2/2/2023 -
What Can the Cyber Haves Do for the Cyber Have Nots?
Published: 1/26/2023 -
Securing Unmanaged Assets
Published: 1/19/2023 -
Ambulance Chasing Security Vendors
Published: 1/12/2023
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.