Defense in Depth show

Defense in Depth

Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: David Spark
  • Copyright: 2018-2024 Spark Media Solutions, LLC

Podcasts:

 Who Should the CISO Report To? | File Type: audio/mpeg | Duration: 24:35

Who Should the CISO Report To?

 Hybrid Cloud | File Type: audio/mpeg | Duration: 27:45
 CISO Tenure | File Type: audio/mpeg | Duration: 29:16
 Toxic Security Teams | File Type: audio/mpeg | Duration: 25:34
 Personality Tests in the Workplace | File Type: audio/mpeg | Duration: 23:26

Personality Tests in the Workplace

 Lack of Diversity in Cybersecurity | File Type: audio/mpeg | Duration: 27:50

Lack of Diversity in Cybersecurity

 When Are CISOs Responsible for Breaches? | File Type: audio/mpeg | Duration: 28:37

When Are CISOs Responsible for Breaches?

 Post Breach Desperation and Salary Negotiations | File Type: audio/mpeg | Duration: 26:20

Post Breach Desperation and Salary Negotiations

 Presenting to the Board | File Type: audio/mpeg | Duration: 25:11

Presenting to the Board

 The Iran Cybersecurity Threat | File Type: audio/mpeg | Duration: 26:28

The Iran Cybersecurity Threat

 Building a Fully Remote Security Team | File Type: audio/mpeg | Duration: 25:33

Building a Fully Remote Security Team

 Account Takeover | File Type: audio/mpeg | Duration: 25:38
 UX in Cybersecurity | File Type: audio/mpeg | Duration: 26:31
 InfoSec Trends for 2020 | File Type: audio/mpeg | Duration: 26:20

InfoSec Trends for 2020

 Cybersecurity Readiness as Hiring Criteria | File Type: audio/mpeg | Duration: 26:22

Cybersecurity Readiness as Hiring Criteria

Comments

Login or signup comment.