PodcastsNoticiasDefense in Depth

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth
Último episodio

349 episodios

  • Defense in Depth

    Are Your Security Tools Creating More Work for Your Team?

    12/03/2026 | 35 min
    All links and images can be found on CISO Series.
    Check out this post by Caleb Sima for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Evan McHenry, CISO, Robinhood.
    In this episode:
    The information paradox
    Setting realistic expectations
    Prioritization over noise
    The cart before the horse
    Huge thanks to our sponsor, Endor Labs

    Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces.
  • Defense in Depth

    Why Overpromising is a Dangerous Sales Tactic

    05/03/2026 | 28 min
    All links and images can be found on CISO Series.
    Check out this post, CISO, Upwind Security, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap, CISO, LinkedIn. Joining us is Octavia Howell, vp and CISO, Equifax Canada.
    In this episode:
    Beyond the quota
    The hard truth beats the polished bluff
    Paying for someone else's mistakes
    Reducing friction, increasing trust
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker takes a deny-by-default approach to endpoint security — controlling what applications can run, what can access data, and what can elevate privileges. Used by organizations that want to reduce attack surface without relying on detection alone. Learn more at threatlocker.com/ciso.
  • Defense in Depth

    Should You Phish Your Employees or Not?

    26/02/2026 | 27 min
    All links and images can be found on CISO Series.
    This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Mark Eggleston, CISO, CSC.
    In this episode:
    Breaking trust to test it
    Technical controls over testing
    The measurement imperative
    Fire drills, not gotchas
    Huge thanks to our sponsor, Scanner

    All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev.
  • Defense in Depth

    How Much Autonomy Should You Give AI Agents in Your SOC?

    19/02/2026 | 31 min
    All links and images can be found on CISO Series.
    This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Cliff Crosland, co-founder and CEO, Scanner.dev.
    In this episode:
    Earning autonomy gradually
    The blast radius question
    The reality check
    Today's value, tomorrow's evolution
    Huge thanks to our sponsor, Scanner

    All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev.
  • Defense in Depth

    Cybersecurity's Broken Hiring Process

    12/02/2026 | 32 min
    All links and images can be found on CISO Series.
    Check out this post by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Brett Conlon, CISO, American Century Investments.
    In this episode:
    The experience paradox
    Who benefits from the narrative
    Kitchen sink job postings
    The aggregation problem
    Huge thanks to our sponsor, Scanner

    All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev

Más podcasts de Noticias

Acerca de Defense in Depth

Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Sitio web del podcast

Escucha Defense in Depth, El hilo y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/14/2026 - 2:41:21 PM