

Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Episodes
Mentioned books

4 snips
Dec 18, 2025 • 30min
How Should CISOs Talk to the Business
In this conversation with Peter Gregory, a renowned cybersecurity author, the discussion dives into effective communication tactics for CISOs. Topics include translating technical risks into tangible business impacts and using storytelling to engage executives. Gregory emphasizes the importance of trust and timing in leadership interactions. The panelists highlight the need to frame security in terms of outcomes, revenue preservation, and strategic priorities to earn buy-in. They also tackle the concept of accepting business risks consciously.

Dec 11, 2025 • 33min
How Much Cyber Risk Should a CISO Own?
In this conversation, Erika Dean, former Chief Security Officer at Robinhood, dives into the complex responsibilities of CISOs. She discusses the critical gap between theory and the daily reality of risk management. Erika emphasizes the importance of asserting ownership over cyber risk and effectively communicating that to executives. She provides insights on the necessity of collaboration across departments to ensure security is a partnership rather than a policing action. They also explore how to engage boards with relevant metrics and elevate cybersecurity literacy.

9 snips
Dec 4, 2025 • 34min
How To Tell When a Vendor is Selling AI Snake Oil
Crystal Chatham, VP of cybersecurity at Speedcast with 18 years in IT experience, joins the conversation to dissect the prevalence of AI snake oil in the tech industry. She emphasizes the importance of hands-on experience and understanding customer needs when evaluating AI vendors. The panel examines the distinctions between predictive and generative AI and the potential risks of leaders promoting AI without adequate technical knowledge. They stress the necessity of frameworks to assess AI risks while encouraging safe experimentation and iteration in organizational environments.

10 snips
Nov 20, 2025 • 34min
In the Age of Identity, is Network Security Dead?
Davi Ottenheimer, VP of Trust and Digital Ethics at Inrupt and expert in decentralized identity, explores the evolving landscape of network security. He argues that network security isn't dying but rather transforming as identity takes center stage, especially in cloud environments. Davi also highlights the importance of observability, discussing why packet-level visibility remains critical. He emphasizes the need for scalable standards and accountability in a world where identity is pervasive, suggesting a renaissance in network security as identity practices evolve.

8 snips
Nov 13, 2025 • 29min
How to Manage Configuration Drift
Rob Allen, Chief Product Officer at ThreatLocker, dives deep into the challenges of configuration drift. He reveals how his team acts as 'configuration police' to combat frequent misconfigurations. The discussion highlights the need for cultural shifts in how organizations manage configurations, treating them as critical telemetry. Rob explains how common changes like temporary openings can signal potential compromises. With actionable insights and the importance of tracking configurations, this conversation sheds light on enhancing security maturity in today's landscape.

10 snips
Nov 6, 2025 • 29min
Is Least Privilege Dead?
Julie Tsai, CISO-in-Residence at Ballistic Ventures, joins the conversation to dissect the relevance of least privilege in modern security. She argues that concepts like dynamic access and just-in-time provisioning are still rooted in least privilege principles. The discussion highlights the importance of prioritizing critical assets and implementing controls tailored to industry needs. Julie also emphasizes how automation can ease access control challenges, ensuring more reliable processes and compliance in today's fast-paced tech landscape.

7 snips
Oct 30, 2025 • 33min
How Do We Measure Our Defenses Against Social Engineering Attacks?
Bobby Ford, Chief Strategy and Experience Officer at Doppel, dives deep into the world of social engineering defenses. He discusses why traditional phishing click rates are flawed metrics and shares insights on measuring risk effectively, especially for high-impact users. Bobby emphasizes the importance of a tailored social engineering susceptibility score while exposing how AI is changing the landscape of personalized attacks. The conversation highlights building a security culture through collaboration and timely reporting, ultimately enhancing digital integrity.

Oct 23, 2025 • 28min
Sales Follow Up Sequences: What Works Best in Cyber?
Alex Guilday, BISO at Royal Caribbean Group and a former cybersecurity salesperson, shares insights on effective sales strategies in cybersecurity. He discusses the importance of tailoring outreach to avoid saturating security professionals with generic messaging. With a dual perspective, Alex reflects on the necessity of building long-term relationships over transactional tactics. He highlights the value of trusted peer recommendations and emphasizes the significance of timing and touch frequency in sales sequences.

10 snips
Oct 16, 2025 • 25min
What Soft Skills Do You Need in Cyber?
Unlock the power of soft skills in cybersecurity! Discover how curiosity, resilience, and conflict resolution can turn technical sales into partnerships. Learn the importance of personalizing communication and anchoring security conversations to business goals. Delve into advocacy and empathy as vital collaborative skills. Find out how to effectively showcase these soft skills during interviews with impactful stories. Soft skills are not just nice to have; they are essential for team success and can be developed with practice.

Oct 9, 2025 • 28min
What is the Visibility That Security Teams Need?
James Bruce, Business Security Services Director at WPP, shares his expertise in security across diverse environments. He highlights the transformation of visibility into actionable intelligence, emphasizing its importance beyond just dashboards. Bruce discusses the critical need for risk-based prioritization, advocating for focusing on essential assets instead of chasing every vulnerability. The conversation navigates the complexities of identity management and the pitfalls of relying solely on dashboard metrics, exposing gaps that can jeopardize security.


