

Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Episodes
Mentioned books

Jul 24, 2025 • 29min
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
Join Jason Thomas, Senior Director of Technology, Security, Governance, and Risk at the Cystic Fibrosis Foundation, as he dives into the crucial intersection of sales and cybersecurity. He discusses the 'trust deficit' in client relationships and the business accountability gap that plagues the industry. Jason emphasizes the need for sales professionals to enhance their technical knowledge and communication skills to build lasting trust. He critiques ineffective sales tactics and advocates for a more strategic approach to cybersecurity sales.

Jul 17, 2025 • 24min
What Are the Cybersecurity Trends We Need To Follow?
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital. In this episode: Shifting left, broadening out The insurance wake-up call Building trust into the system Security’s identity crisis A huge thanks to our sponsor, Doppel Doppel is the first social engineering defense platform built to dismantle deception at the source. It uses AI and infrastructure correlation to detect, link, and disrupt impersonation campaigns before they spread - protecting brands, executives, and employees while turning every threat into action that strengthens defenses across a shared intelligence network. Learn more at https://www.doppel.com/platform

Jul 10, 2025 • 27min
Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian. In this episode: The experience prerequisite The bootcamp reality check The compensation conundrum The domain expertise imperative A huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Jul 3, 2025 • 28min
What's the Most Efficient Way to Rate Third Party Vendors?
Steve Knight, former CISO at Hyundai Capital America and a seasoned expert in third-party risk management, dives into the art of evaluating vendors. He emphasizes the importance of tailored assessments and moving past mere compliance metrics. The conversation highlights the balance needed between trust and rigorous vetting, and how interpersonal relationships can enhance vendor evaluations. Knight also champions the integration of Third Party Risk Management as a vital element of an organization's digital immune system, making it more than just a box-checking exercise.

Jun 26, 2025 • 28min
Don't Ask "Can" We Secure It, But "How" Can We Secure It
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology. In this episode Embracing growth An urgent need for creativity Get the business context Embrace your inner theater kid Huge thanks to our sponsor, Query.ai Query is a Federated Search and Analytics platform that builds a security data mesh, giving security teams real-time context from all connected sources. Analysts move faster and make better decisions with AI agents and copilots that handle the grunt work and guide each step. Learn more at query.ai

Jun 12, 2025 • 29min
Has the Shared Security Model for SaaS Shifted?
All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Jesse Webb, CISO and svp information systems, Avalon Healthcare Solutions. In this episode: Align the incentives The feature and enforcement disconnect Putting the right people in the right place A need for transparency Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

8 snips
Jun 5, 2025 • 27min
Improving the Efficiency of Your Threat Intelligence
In this discussion, Jason Steer, CISO at Recorded Future, dives into the intricacies of threat intelligence and cybersecurity. He highlights the overwhelming challenge security teams face in sifting through vast amounts of threat data. Key topics include the necessity of actionable data, the balance between efficiency and effectiveness in identifying threats, and the pivotal role of AI in providing contextual insights. Steer emphasizes the importance of aligning threat intelligence efforts with business needs to strengthen security posture.

May 29, 2025 • 32min
Why Cybersecurity Professionals Lie on Their Resumes
All images and links can be found on CISO Series. Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Krista Arndt, associate CISO, St. Luke’s University Health Network. In this episode: Verify then trust Dishonesty on all sides A lack of flexibility What about integrity? Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.

May 22, 2025 • 30min
What Should Be in a CISO Job Description?
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Stop siloing cybersecurity Leading the charge A culture of ownership Preparing for resilience A huge thanks to our sponsor, Recorded Future Every day, security teams face an impossible challenge: sorting through millions of threats, each potentially critical. But somewhere in that noise are the signals you can’t afford to miss. Recorded Future’s gives you the power to outpace AI-driven threats through intelligence tuned specifically to your needs, enabling you to act with precision. Their advanced AI detects patterns human eyes might miss, while their experts provide context that machines alone cannot. Visit recordedfuture.com to learn more about securing what matters to your business.

May 15, 2025 • 33min
The CISO's Job Is Impossible
Yaron Levi, CISO at Dolby, co-hosts alongside Joey Rachid, CISO at Xerox. They delve into the often impossible expectations placed on CISOs, discussing the need for a fresh perspective on cybersecurity challenges. Key themes include the importance of teamwork and leadership in navigating the complex security landscape. They advocate for effective negotiation between security and business leaders and emphasize resilience in the CISO role, all while sharing insights from their own experiences in attracting and retaining cybersecurity talent.