Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
undefined
Oct 16, 2025 • 25min

What Soft Skills Do You Need in Cyber?

Unlock the power of soft skills in cybersecurity! Discover how curiosity, resilience, and conflict resolution can turn technical sales into partnerships. Learn the importance of personalizing communication and anchoring security conversations to business goals. Delve into advocacy and empathy as vital collaborative skills. Find out how to effectively showcase these soft skills during interviews with impactful stories. Soft skills are not just nice to have; they are essential for team success and can be developed with practice.
undefined
Oct 9, 2025 • 28min

What is the Visibility That Security Teams Need?

James Bruce, Business Security Services Director at WPP, shares his expertise in security across diverse environments. He highlights the transformation of visibility into actionable intelligence, emphasizing its importance beyond just dashboards. Bruce discusses the critical need for risk-based prioritization, advocating for focusing on essential assets instead of chasing every vulnerability. The conversation navigates the complexities of identity management and the pitfalls of relying solely on dashboard metrics, exposing gaps that can jeopardize security.
undefined
8 snips
Oct 2, 2025 • 26min

Data Governance in the Age of AI

In this discussion, Ash Hunt, VP of Strategy at Cyera and a data security expert, tackles the fast-evolving landscape of data governance amid AI's rise. He highlights the critical issue of access creep and how traditional governance often feels inadequate. The conversation uncovers the shift toward adaptive, metadata-driven controls and data storytelling as essential tools for managing integrity challenges from AI-generated outputs. Business pressures surrounding data supply chains and the balance between centralized and decentralized governance models are also explored.
undefined
Sep 25, 2025 • 38min

How Can Security Vendors Better Stand Out?

Join Jason Tall, CISO at Luminis Health, as he unpacks the challenges security vendors face in a crowded market. He discusses the difference between 'best' and 'best fit' in vendor selection. Integration issues and legacy systems can stifle innovation, while trusted VAR relationships play a pivotal role in market traction. Jason emphasizes the importance of no-cost proofs of value and risk aversion among buyers, advocating for transparency and trust to foster better sales practices.
undefined
6 snips
Sep 18, 2025 • 31min

What New Risks Does AI Introduce?

Kara Sprague, CEO of HackerOne and an expert in AI security, delves into the complex world of AI risks. She emphasizes the need for new governance to manage the unique challenges posed by AI, such as shadow AI and identity issues. The discussion highlights the importance of red teaming for ongoing security testing and how the rapid adoption of AI necessitates clear guidelines for safe usage. Kara also advocates for defining risk appetites and establishing 'paved paths' to channel AI experimentation effectively.
undefined
10 snips
Sep 11, 2025 • 29min

The Pattern of Early Adoption of Security Tools

Edward Contreras, CISO at Frost Bank, and Hadas Cassorla, CISO and reporter for CISO Series, tackle the intricate world of cybersecurity adoption. They highlight how small to medium-sized businesses struggle with security tools while larger companies dominate the landscape. The duo discusses the 'security poverty line' and the challenges startups face in gaining market traction. Strategies for enhancing adoption through simplified solutions and the critical role of managed service providers are also explored, making for a compelling listen.
undefined
Sep 4, 2025 • 31min

How Are You Managing the Flow of AI Data

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest Mokhtar Bacha, founder and CEO, Formal. In this episode: Access management faces transformation  AI agents demand new authentication paradigms AI complexity demands simplified governance approaches Data-centric identity management replaces role-based approaches Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.
undefined
Aug 28, 2025 • 32min

How to Deal with Last Minute Compliance Requirements

Pukar Hamal, founder and CEO of SecurityPal, shares insights on navigating the fast-paced world of security compliance. He discusses the need for businesses to embrace compliance as a growth opportunity rather than an obstacle. The conversation highlights the importance of strategic planning, effective communication, and the balance between security and business priorities. Pukar also explores the role of innovative tools like SecurityPal AI in streamlining compliance processes and bridging gaps in security, all while training future cybersecurity talent.
undefined
10 snips
Aug 21, 2025 • 32min

Do You Have a Functional Policy or Did You Just Write One?

Pukar Hamal, founder and CEO of SecurityPal, shares insights on aligning security with business objectives. He discusses the challenges cybersecurity teams face with compliance and the importance of executive support. The conversation highlights how to navigate security policies amidst business needs while transforming barriers into growth opportunities. Listeners discover innovative strategies for enhancing compliance and fostering a proactive security culture. Hamal emphasizes simplifying security frameworks to focus on business expansion and bridge the cybersecurity talent gap.
undefined
5 snips
Aug 14, 2025 • 34min

Where are We Struggling with Zero Trust

Rob Allen, Chief Product Officer at ThreatLocker, discusses the challenges of implementing Zero Trust security. He highlights how legacy infrastructure hinders progress and the complexity of shifting to new security models. The conversation also touches on the human factors involved, underscoring the need for user-friendly security to address resistance. Allen emphasizes that Zero Trust isn't a one-time fix but a transformative mindset that balances protection with organizational needs.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app