Defense in Depth cover image

Defense in Depth

Latest episodes

undefined
6 snips
Jun 5, 2025 • 27min

Improving the Efficiency of Your Threat Intelligence

In this discussion, Jason Steer, CISO at Recorded Future, dives into the intricacies of threat intelligence and cybersecurity. He highlights the overwhelming challenge security teams face in sifting through vast amounts of threat data. Key topics include the necessity of actionable data, the balance between efficiency and effectiveness in identifying threats, and the pivotal role of AI in providing contextual insights. Steer emphasizes the importance of aligning threat intelligence efforts with business needs to strengthen security posture.
undefined
May 29, 2025 • 32min

Why Cybersecurity Professionals Lie on Their Resumes

All images and links can be found on CISO Series. Check out this post by Gautam ‘Gotham’ Sharma of AccessCyber for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Krista Arndt, associate CISO, St. Luke’s University Health Network. In this episode: Verify then trust Dishonesty on all sides A lack of flexibility What about integrity? Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.
undefined
May 22, 2025 • 30min

What Should Be in a CISO Job Description?

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Dennis Pickett, vp, CISO, Westat. In this episode: Stop siloing cybersecurity Leading the charge A culture of ownership Preparing for resilience A huge thanks to our sponsor, Recorded Future Every day, security teams face an impossible challenge: sorting through millions of threats, each potentially critical. But somewhere in that noise are the signals you can’t afford to miss. Recorded Future’s gives you the power to outpace AI-driven threats through intelligence tuned specifically to your needs, enabling you to act with precision. Their advanced AI detects patterns human eyes might miss, while their experts provide context that machines alone cannot. Visit recordedfuture.com to learn more about securing what matters to your business.
undefined
May 15, 2025 • 33min

The CISO's Job Is Impossible

Yaron Levi, CISO at Dolby, co-hosts alongside Joey Rachid, CISO at Xerox. They delve into the often impossible expectations placed on CISOs, discussing the need for a fresh perspective on cybersecurity challenges. Key themes include the importance of teamwork and leadership in navigating the complex security landscape. They advocate for effective negotiation between security and business leaders and emphasize resilience in the CISO role, all while sharing insights from their own experiences in attracting and retaining cybersecurity talent.
undefined
May 8, 2025 • 29min

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Howard Holton, COO, Gigaom. Joining us is our sponsored guest, Rob Allen, chief product officer at ThreatLocker. In this episode:  Reinforcing zero trust Focus on effectiveness Understanding zero trust limitations What's next Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
undefined
May 1, 2025 • 27min

How Much Should Salespeople Know About Their Product?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet.  In this episode: Aligning incentives The realities of the job Delivering ROI Holistic cybersecurity Thanks to our sponsor, Backslash Security Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business process, filters “triggerable” vulnerabilities, and simulates the security impact of updates. Backslash dramatically improves AppSec efficiency, eliminating legacy SAST and SCA frustration. Learn more at www.backslash.security.
undefined
Apr 24, 2025 • 28min

Why Are We Still Struggling to Fix Application Security?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Eric Gold, chief evangelist, BackSlash. In this episode: Start with the culture Moving AppSec to a higher level A strategy for security Maturing the basics Thanks to our sponsor, Backslash Security Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business process, filters “triggerable” vulnerabilities, and simulates the security impact of updates. Backslash dramatically improves AppSec efficiency, eliminating legacy SAST and SCA frustration.  
undefined
Apr 17, 2025 • 26min

What Can Someone with No Experience Do in Cybersecurity?

All links and images for this episode can be found on CISO Series. Check out this post from Jerich Beason, CISO at WM, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining us is Rinki Sethi, vp and CISO, BILL. In this episode: You need a solid foundation A lot depends on the role Underappreciated skills Structures and frameworks Huge thanks to our sponsor, Recorded Future Every day, security teams face an impossible challenge: sorting through millions of threats, each potentially critical. But somewhere in that noise are the signals you can't afford to miss. Recorded Future's gives you the power to outpace AI-driven threats through intelligence tuned specifically to your needs, enabling you to act with precision. Their advanced AI detects patterns human eyes might miss, while their experts provide context that machines alone cannot. Visit recordedfuture.com to learn more about securing what matters to your business.
undefined
Apr 10, 2025 • 27min

Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry?

Alex Hutton, CISO at Atlantic Union Bank, shares his expertise as a security executive and startup founder. He discusses the confusion created by Gartner's cybersecurity acronyms and how they complicate choices for professionals. Highlights include the challenges startups face when differentiating themselves and the importance of clear communication in vendor relationships. The conversation also delves into leveraging frameworks like Wardley Maps to navigate technology trends, underscoring the need for trust between vendors and clients in the ever-evolving cybersecurity landscape.
undefined
Apr 3, 2025 • 29min

Can AI improve Third-Party Risk Management (TPRM)

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Jason Elrod, CISO, MultiCare Health System. Joining us is our sponsored guest, Nick Muy, CISO, Scrut Automation. In this episode: Supercharging teams Shifting to proactive A unique opportunity A human in the legal loop HUGE thanks to our sponsor, Scrut Automation Scrut Automation empowers compliance and risk teams of all sizes to build enterprise-grade security programs effortlessly. With powerful automation, AI-driven efficiencies, and seamless integrations, Scrut eliminates compliance debt and enables proactive risk management—helping your business stay secure as it scales. Visit www.scrut.io to learn more or schedule a demo.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app