Defense in Depth show

Defense in Depth

Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: David Spark
  • Copyright: 2018-2024 Spark Media Solutions, LLC

Podcasts:

 The Demand for Affordable Blue Team Training | File Type: audio/mpeg | Duration: 29:22

The Demand for Affordable Blue Team Training

 Why are CISOs Excluded from Executive Leadership? | File Type: audio/mpeg | Duration: 33:04

Why are CISOs Excluded from Executive Leadership?

 What Is Your SOC's Single Search of Truth? | File Type: audio/mpeg | Duration: 30:44

What Is Your SOC's Single Search of Truth?

 When Is Data an Asset and When Is It a Liability? | File Type: audio/mpeg | Duration: 34:49

When Is Data an Asset and When Is It a Liability?

 Tracking Anomalous Behaviors of Legitimate Identities | File Type: audio/mpeg | Duration: 34:01

Tracking Anomalous Behaviors of Legitimate Identities

 Why Do Cybersecurity Startups Fail? | File Type: audio/mpeg | Duration: 31:43

Why Do Cybersecurity Startups Fail?

 Is "Compliance Doesn't Equal Security" a Pointless Argument? | File Type: audio/mpeg | Duration: 33:33

Is "Compliance Doesn't Equal Security" a Pointless Argument?

 CISOs Responsibilities Before and After an M&A | File Type: audio/mpeg | Duration: 30:33

CISOs Responsibilities Before and After an M&A

 Use Red Teaming To Build, Not Validate, Your Security Program | File Type: audio/mpeg | Duration: 31:34

Use Red Teaming To Build, Not Validate, Your Security Program

 The Do's and Don'ts of Approaching CISOs | File Type: audio/mpeg | Duration: 31:36

The Do's and Don'ts of Approaching CISOs

 Doing Third Party Risk Management Right | File Type: audio/mpeg | Duration: 30:30

Doing Third Party Risk Management Right

 Warning Signs You're About To Be Attacked | File Type: audio/mpeg | Duration: 33:07

Warning Signs You're About To Be Attacked

 Do We Have to Fix ALL the Critical Vulnerabilities? | File Type: audio/mpeg | Duration: 30:48

Do We Have to Fix ALL the Critical Vulnerabilities?

 Mitigating Generative AI Risks | File Type: audio/mpeg | Duration: 32:38

Mitigating Generative AI Risks

 Building a Cyber Strategy for Unknown Unknowns | File Type: audio/mpeg | Duration: 29:57

Building a Cyber Strategy for Unknown Unknowns

Comments

Login or signup comment.