Defense in Depth

A podcast by David Spark - Thursdays

Categories:

147 Episodes

  1. Reputational Damage from Breaches

    Published: 5/25/2023
  2. Do RFPs Work?

    Published: 5/18/2023
  3. Successful Cloud Security

    Published: 5/11/2023
  4. How Should Security Vendors Engage With CISOs?

    Published: 5/4/2023
  5. Gartner Created Product Categories

    Published: 4/27/2023
  6. How to Always Make a Business Case for Security

    Published: 4/20/2023
  7. Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

    Published: 4/13/2023
  8. What We Love About Working in Cybersecurity

    Published: 4/6/2023
  9. Security That Accounts for Human Fallibility

    Published: 3/30/2023
  10. Why You Should Be Your Company's Next CISO

    Published: 3/23/2023
  11. How to Become a CISO

    Published: 3/16/2023
  12. Can You Build a Security Program on Open Source?

    Published: 3/9/2023
  13. Third Party Risk vs. Third Party Trust

    Published: 3/2/2023
  14. How Can We Improve the Cyber Sales Cycle?

    Published: 2/23/2023
  15. What Leads a Security Program: Risk or Maturity?

    Published: 2/16/2023
  16. Limitations of Security Frameworks

    Published: 2/9/2023
  17. Why Is There a Cybersecurity Skills Gap?

    Published: 2/2/2023
  18. What Can the Cyber Haves Do for the Cyber Have Nots?

    Published: 1/26/2023
  19. Securing Unmanaged Assets

    Published: 1/19/2023
  20. Ambulance Chasing Security Vendors

    Published: 1/12/2023

4 / 8

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.