Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
TV & Film
History
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts113/v4/8e/13/63/8e136368-ee01-abea-d780-976f33d799c8/mza_8428782477805015991.png/600x600bb.jpg
Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
339 episodes
2 days ago
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Show more...
Technology
News,
Tech News
RSS
All content for Defense in Depth is the property of David Spark, Steve Zalewski, Geoff Belknap and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Show more...
Technology
News,
Tech News
Episodes (20/339)
Defense in Depth
How Should CISOs Talk to the Business
2 weeks ago
29 minutes 38 seconds

Defense in Depth
How Much Cyber Risk Should a CISO Own?
3 weeks ago
32 minutes 45 seconds

Defense in Depth
How To Tell When a Vendor is Selling AI Snake Oil
4 weeks ago
33 minutes 51 seconds

Defense in Depth
In the Age of Identity, is Network Security Dead?
1 month ago
34 minutes 21 seconds

Defense in Depth
How to Manage Configuration Drift
1 month ago
28 minutes 47 seconds

Defense in Depth
Is Least Privilege Dead?
1 month ago
29 minutes 4 seconds

Defense in Depth
How Do We Measure Our Defenses Against Social Engineering Attacks?
2 months ago
32 minutes 55 seconds

Defense in Depth
Sales Follow Up Sequences: What Works Best in Cyber?
2 months ago
28 minutes 26 seconds

Defense in Depth
What Soft Skills Do You Need in Cyber?
2 months ago
24 minutes 42 seconds

Defense in Depth
What is the Visibility That Security Teams Need?
2 months ago
27 minutes 52 seconds

Defense in Depth
Data Governance in the Age of AI
3 months ago
26 minutes 1 second

Defense in Depth
How Can Security Vendors Better Stand Out?
3 months ago
37 minutes 33 seconds

Defense in Depth
What New Risks Does AI Introduce?
3 months ago
30 minutes 46 seconds

Defense in Depth
The Pattern of Early Adoption of Security Tools
3 months ago
29 minutes 28 seconds

Defense in Depth
How Are You Managing the Flow of AI Data
3 months ago
31 minutes 25 seconds

Defense in Depth
How to Deal with Last Minute Compliance Requirements
4 months ago
31 minutes 40 seconds

Defense in Depth
Do You Have a Functional Policy or Did You Just Write One?
4 months ago
32 minutes 20 seconds

Defense in Depth
Where are We Struggling with Zero Trust
4 months ago
33 minutes 54 seconds

Defense in Depth
Cybersecurity Has a Prioritization Problem
4 months ago
31 minutes 26 seconds

Defense in Depth
How Can AI Provide Useful Guidance from Fragmented Security Data?
5 months ago
29 minutes 42 seconds

Defense in Depth
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.