Defense in Depth
Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Join Now to Subscribe to this Podcast
- Visit Website
- RSS
- Artist: David Spark
- Copyright: 2018-2024 Spark Media Solutions, LLC
Podcasts:
Who Should the CISO Report To? | File Type: audio/mpeg | Duration: 24:35
Who Should the CISO Report To?
Hybrid Cloud | File Type: audio/mpeg | Duration: 27:45
Hybrid Cloud
CISO Tenure | File Type: audio/mpeg | Duration: 29:16
CISO Tenure
Toxic Security Teams | File Type: audio/mpeg | Duration: 25:34
Toxic Security Teams
Personality Tests in the Workplace | File Type: audio/mpeg | Duration: 23:26
Personality Tests in the Workplace
Lack of Diversity in Cybersecurity | File Type: audio/mpeg | Duration: 27:50
Lack of Diversity in Cybersecurity
When Are CISOs Responsible for Breaches? | File Type: audio/mpeg | Duration: 28:37
When Are CISOs Responsible for Breaches?
Post Breach Desperation and Salary Negotiations | File Type: audio/mpeg | Duration: 26:20
Post Breach Desperation and Salary Negotiations
Presenting to the Board | File Type: audio/mpeg | Duration: 25:11
Presenting to the Board
The Iran Cybersecurity Threat | File Type: audio/mpeg | Duration: 26:28
The Iran Cybersecurity Threat
Building a Fully Remote Security Team | File Type: audio/mpeg | Duration: 25:33
Building a Fully Remote Security Team
Account Takeover | File Type: audio/mpeg | Duration: 25:38
Account Takeover
UX in Cybersecurity | File Type: audio/mpeg | Duration: 26:31
UX in Cybersecurity
InfoSec Trends for 2020 | File Type: audio/mpeg | Duration: 26:20
InfoSec Trends for 2020
Cybersecurity Readiness as Hiring Criteria | File Type: audio/mpeg | Duration: 26:22
Cybersecurity Readiness as Hiring Criteria