Defense in Depth
Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Join Now to Subscribe to this Podcast
- Visit Website
- RSS
- Artist: David Spark
- Copyright: 2018-2024 Spark Media Solutions, LLC
Podcasts:
Shared Threat Intelligence | File Type: audio/mpeg | Duration: 27:07
Shared Threat Intelligence
Drudgery of Cybercrime | File Type: audio/mpeg | Duration: 26:05
Drudgery of Cybercrime
Security Budgets | File Type: audio/mpeg | Duration: 25:43
Security Budgets
Role of the BISO | File Type: audio/mpeg | Duration: 28:52
Role of the BISO
Shared Accounts | File Type: audio/mpeg | Duration: 26:21
Shared Accounts
Bug Bounties | File Type: audio/mpeg | Duration: 29:30
Bug Bounties
Data Classification | File Type: audio/mpeg | Duration: 24:41
Data Classification
Prevention vs. Detection and Containment | File Type: audio/mpeg | Duration: 26:40
Prevention vs. Detection and Containment
Asset Valuation | File Type: audio/mpeg | Duration: 28:26
Asset Valuation
DevSecOps | File Type: audio/mpeg | Duration: 26:39
DevSecOps
Fix Security Problems with What You've Got | File Type: audio/mpeg | Duration: 28:22
Fix Security Problems with What You've Got
Should Risk Lead GRC? | File Type: audio/mpeg | Duration: 24:57
Should Risk Lead GRC?
Responsible Disclosure | File Type: audio/mpeg | Duration: 25:10
Responsible Disclosure
Internet of Things | File Type: audio/mpeg | Duration: 29:13
Internet of Things
Is Governance the Most Important Part of GRC? | File Type: audio/mpeg | Duration: 27:16
Is Governance the Most Important Part of GRC?