Defense in Depth show

Defense in Depth

Summary: Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: David Spark
  • Copyright: 2018-2024 Spark Media Solutions, LLC

Podcasts:

 Can Technology Solve Phishing? | File Type: audio/mpeg | Duration: 30:33

Can Technology Solve Phishing?

 Convergence of SIEM and SOAR | File Type: audio/mpeg | Duration: 27:02

Convergence of SIEM and SOAR

 Cybersecurity Is Not Easy to Get Into | File Type: audio/mpeg | Duration: 31:08

Cybersecurity Is Not Easy to Get Into

 Preventing Ransomware | File Type: audio/mpeg | Duration: 27:16
 Managing Lateral Movement | File Type: audio/mpeg | Duration: 29:03

Managing Lateral Movement

 First Steps as a CISO | File Type: audio/mpeg | Duration: 30:21
 How Does Ransomware Enter the Network? | File Type: audio/mpeg | Duration: 28:47

How Does Ransomware Enter the Network?

 What's the Value of Certifications? | File Type: audio/mpeg | Duration: 30:14

What's the Value of Certifications?

 Measuring the Success of Cloud Security | File Type: audio/mpeg | Duration: 27:17

Measuring the Success of Cloud Security

 How do I get my first cybersecurity job? | File Type: audio/mpeg | Duration: 28:32

How do I get my first cybersecurity job?

 Educating the Board About Cybersecurity | File Type: audio/mpeg | Duration: 25:58

Educating the Board About Cybersecurity

 CISO Recruiting Is Broken | File Type: audio/mpeg | Duration: 28:13

CISO Recruiting Is Broken

 Retaining Cyber Talent | File Type: audio/mpeg | Duration: 34:07

Retaining Cyber Talent

 Salesforce Security | File Type: audio/mpeg | Duration: 23:25
 Cloud Configuration Fails | File Type: audio/mpeg | Duration: 24:35

Cloud Configuration Fails

Comments

Login or signup comment.