

Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Episodes
Mentioned books

4 snips
Feb 8, 2024 • 32min
Why Do Cybersecurity Startups Fail?
Guest Mike Levin, deputy CISO, 3M, discusses the challenges faced by cybersecurity startups, including understanding the market and customer needs. The importance of integration and coexistence of cybersecurity products with existing ones is emphasized. Incorporating customer feedback and listening to the market are key to building a successful cybersecurity startup.

Feb 1, 2024 • 34min
Is "Compliance Doesn't Equal Security" a Pointless Argument?
Derek Fisher, Executive director of product security at JPMorgan, discusses the significance of compliance in a security program and the need to go beyond minimum standards. The podcast explores the difference between compliance and security, emphasizing compliance as the minimum viable security. It also highlights the importance of compliance in the banking industry and the collaboration within the security industry. The episode concludes with a mention of sponsor Reveal Security and a discussion about the benefits of LinkedIn.

Jan 25, 2024 • 31min
CISOs Responsibilities Before and After an M&A
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Alexandra Landegger, Executive Director and CISO, Collins Aerospace. In this episode: Why do mergers and acquisitions always present challenges to an organization? When it comes to cybersecurity, how involved should a CISO be before AND after an acquisition? Can cybersecurity considerations make or break a deal? What skills did you find yourself flexing with your first M&A experience? Thanks to our podcast sponsor, Aphinia! Join Aphinia, a professional tribe of superheroes fighting cybercriminals. If you are a CISO, VP or a Director of cybersecurity, get instant free access to thousands of your peers, career advice, networking opportunities, consulting gigs and more. Join the good guys’ team because the only way to succeed is together: https://aphinia.com/#signup_form

Jan 18, 2024 • 32min
Use Red Teaming To Build, Not Validate, Your Security Program
Guest Richard Ford, CTO of Praetorian, challenges the misconception of red teaming as mere validation, emphasizing its value in strengthening organizations. They discuss conducting red teaming early in the project lifecycle, explore different perspectives and value of red teaming, and redefine it as a proactive tool. The chapter also highlights the importance of aligning definitions and repositioning red teams under the SOC for better defense posture.

Jan 11, 2024 • 32min
The Do's and Don'ts of Approaching CISOs
Adam Glick, CISO, PSG, discusses successful vendor outreach to CISOs, the negative impact of spamming, building trust in vendor relationships, understanding the role of a CISO, and emphasizing the importance of forming connections and building trust in the cybersecurity industry.

7 snips
Jan 4, 2024 • 31min
Doing Third Party Risk Management Right
In this podcast, Erik Decker, CISO of Intermountain Health, joins the hosts to discuss the struggles faced in managing third-party risk. They explore the ineffectiveness of questionnaires and debate the right approach. They also touch on the future of supply chain risk, the benefits of a centralized platform for risk information, and the importance of communication and building relationships with vendors.

7 snips
Dec 14, 2023 • 33min
Warning Signs You're About To Be Attacked
Learn about indicators and signals of cyber attacks, prevalence of phishing attacks, understanding targeted attacks in the help desk, correlation between infostealers and ransomware, trust in cyberattacks, discussion on attack indicators and the need for innovation.

8 snips
Dec 7, 2023 • 31min
Do We Have to Fix ALL the Critical Vulnerabilities?
David Christensen, VP, CISO, PlanSource, joins the hosts to discuss the challenge of focusing patching efforts on the most critical vulnerabilities. They emphasize the need for prioritization based on business impact, discuss different types of vulnerabilities, and highlight the challenges faced by organizations. The importance of learning vulnerability management basics is also emphasized.

Nov 30, 2023 • 33min
Mitigating Generative AI Risks
Guest Jerich Beason, CISO, WM, discusses the risks of generative AI and the need for understanding, prioritizing safety, and adapting to its transformative nature. The chapter also explores building a trusted security framework and the challenges and evolution of AI.

Nov 16, 2023 • 30min
Building a Cyber Strategy for Unknown Unknowns
Guest Himaja Motheram from Censys discusses building a security program around unknown unknowns. The podcast explores strategies for anticipating, detecting, and responding to unknown unknowns. It emphasizes the importance of executive buy-in, resources, and individual involvement in creating a security culture. The distinction between known unknowns and unknown unknowns is explored, along with the role of technology and human creativity. The shift of security responsibility to the user is discussed, as well as the value of worst-case scenario simulations and relationship-building in cybersecurity.