Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
undefined
Sep 4, 2025 • 31min

How Are You Managing the Flow of AI Data

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest Mokhtar Bacha, founder and CEO, Formal. In this episode: Access management faces transformation  AI agents demand new authentication paradigms AI complexity demands simplified governance approaches Data-centric identity management replaces role-based approaches Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.
undefined
Aug 28, 2025 • 32min

How to Deal with Last Minute Compliance Requirements

Pukar Hamal, founder and CEO of SecurityPal, shares insights on navigating the fast-paced world of security compliance. He discusses the need for businesses to embrace compliance as a growth opportunity rather than an obstacle. The conversation highlights the importance of strategic planning, effective communication, and the balance between security and business priorities. Pukar also explores the role of innovative tools like SecurityPal AI in streamlining compliance processes and bridging gaps in security, all while training future cybersecurity talent.
undefined
10 snips
Aug 21, 2025 • 32min

Do You Have a Functional Policy or Did You Just Write One?

Pukar Hamal, founder and CEO of SecurityPal, shares insights on aligning security with business objectives. He discusses the challenges cybersecurity teams face with compliance and the importance of executive support. The conversation highlights how to navigate security policies amidst business needs while transforming barriers into growth opportunities. Listeners discover innovative strategies for enhancing compliance and fostering a proactive security culture. Hamal emphasizes simplifying security frameworks to focus on business expansion and bridge the cybersecurity talent gap.
undefined
5 snips
Aug 14, 2025 • 34min

Where are We Struggling with Zero Trust

Rob Allen, Chief Product Officer at ThreatLocker, discusses the challenges of implementing Zero Trust security. He highlights how legacy infrastructure hinders progress and the complexity of shifting to new security models. The conversation also touches on the human factors involved, underscoring the need for user-friendly security to address resistance. Allen emphasizes that Zero Trust isn't a one-time fix but a transformative mindset that balances protection with organizational needs.
undefined
4 snips
Aug 7, 2025 • 31min

Cybersecurity Has a Prioritization Problem

Terry O'Daniel, former CISO at Amplitude, shares insights on the crucial topic of cybersecurity prioritization. He emphasizes the need to align security strategies with actual business risks, advocating for better stakeholder engagement. O'Daniel discusses the difference between metrics and actionable measurements, stressing the importance of a proactive approach in security culture. He also highlights the need for effective communication and context in identifying critical assets, while encouraging the development of mature roles within security leadership.
undefined
Jul 31, 2025 • 30min

How Can AI Provide Useful Guidance from Fragmented Security Data?

Matt Eberhart, CEO of Query AI, leads a Federated Search and Analytics platform that optimizes security data management. He discusses the crucial importance of data quality over sheer volume in AI-driven decision-making. The conversation touches on the connectivity challenges faced by security teams and highlights how graph-based models can enhance AI applications. Eberhart emphasizes the transformative potential of AI in reducing burdensome workflows, enabling analysts to focus on strategic insights instead of repetitive tasks.
undefined
Jul 24, 2025 • 29min

Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem

Join Jason Thomas, Senior Director of Technology, Security, Governance, and Risk at the Cystic Fibrosis Foundation, as he dives into the crucial intersection of sales and cybersecurity. He discusses the 'trust deficit' in client relationships and the business accountability gap that plagues the industry. Jason emphasizes the need for sales professionals to enhance their technical knowledge and communication skills to build lasting trust. He critiques ineffective sales tactics and advocates for a more strategic approach to cybersecurity sales.
undefined
Jul 17, 2025 • 24min

What Are the Cybersecurity Trends We Need To Follow?

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital. In this episode: Shifting left, broadening out The insurance wake-up call Building trust into the system Security’s identity crisis A huge thanks to our sponsor, Doppel Doppel is the first social engineering defense platform built to dismantle deception at the source. It uses AI and infrastructure correlation to detect, link, and disrupt impersonation campaigns before they spread - protecting brands, executives, and employees while turning every threat into action that strengthens defenses across a shared intelligence network. Learn more at https://www.doppel.com/platform
undefined
Jul 10, 2025 • 27min

Is It Even Possible to Fast-Track Your Way Into Cybersecurity?

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian. In this episode: The experience prerequisite The bootcamp reality check The compensation conundrum The domain expertise imperative A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
undefined
Jul 3, 2025 • 28min

What's the Most Efficient Way to Rate Third Party Vendors?

Steve Knight, former CISO at Hyundai Capital America and a seasoned expert in third-party risk management, dives into the art of evaluating vendors. He emphasizes the importance of tailored assessments and moving past mere compliance metrics. The conversation highlights the balance needed between trust and rigorous vetting, and how interpersonal relationships can enhance vendor evaluations. Knight also champions the integration of Third Party Risk Management as a vital element of an organization's digital immune system, making it more than just a box-checking exercise.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app