Defense in Depth show

Defense in Depth

Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: David Spark
  • Copyright: 2018-2024 Spark Media Solutions, LLC

Podcasts:

 Shared Threat Intelligence | File Type: audio/mpeg | Duration: 27:07

Shared Threat Intelligence

 Drudgery of Cybercrime | File Type: audio/mpeg | Duration: 26:05

Drudgery of Cybercrime

 Security Budgets | File Type: audio/mpeg | Duration: 25:43
 Role of the BISO | File Type: audio/mpeg | Duration: 28:52
 Shared Accounts | File Type: audio/mpeg | Duration: 26:21
 Bug Bounties | File Type: audio/mpeg | Duration: 29:30
 Data Classification | File Type: audio/mpeg | Duration: 24:41
 Prevention vs. Detection and Containment | File Type: audio/mpeg | Duration: 26:40

Prevention vs. Detection and Containment

 Asset Valuation | File Type: audio/mpeg | Duration: 28:26
 DevSecOps | File Type: audio/mpeg | Duration: 26:39
 Fix Security Problems with What You've Got | File Type: audio/mpeg | Duration: 28:22

Fix Security Problems with What You've Got

 Should Risk Lead GRC? | File Type: audio/mpeg | Duration: 24:57
 Responsible Disclosure | File Type: audio/mpeg | Duration: 25:10

Responsible Disclosure

 Internet of Things | File Type: audio/mpeg | Duration: 29:13
 Is Governance the Most Important Part of GRC? | File Type: audio/mpeg | Duration: 27:16

Is Governance the Most Important Part of GRC?

Comments

Login or signup comment.