Defense in Depth Podcast Por David Spark Steve Zalewski Geoff Belknap arte de portada

Defense in Depth

Defense in Depth

De: David Spark Steve Zalewski Geoff Belknap
Escúchala gratis

Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.2018-2024 Spark Media Solutions, LLC Política y Gobierno
Episodios
  • Why Overpromising is a Dangerous Sales Tactic
    Mar 5 2026

    All links and images can be found on CISO Series.

    Check out this post, CISO, Upwind Security, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap, CISO, LinkedIn. Joining us is Octavia Howell, vp and CISO, Equifax Canada.

    In this episode:

    • Beyond the quota
    • The hard truth beats the polished bluff
    • Paying for someone else's mistakes
    • Reducing friction, increasing trust

    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker takes a deny-by-default approach to endpoint security — controlling what applications can run, what can access data, and what can elevate privileges. Used by organizations that want to reduce attack surface without relying on detection alone. Learn more at threatlocker.com/ciso.

    Más Menos
    29 m
  • Should You Phish Your Employees or Not?
    Feb 26 2026

    All links and images can be found on CISO Series.

    This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Mark Eggleston, CISO, CSC.

    In this episode:

    • Breaking trust to test it
    • Technical controls over testing
    • The measurement imperative
    • Fire drills, not gotchas

    Huge thanks to our sponsor, Scanner

    All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev.

    Más Menos
    27 m
  • How Much Autonomy Should You Give AI Agents in Your SOC?
    Feb 19 2026

    All links and images can be found on CISO Series.

    This week's episode is co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Cliff Crosland, co-founder and CEO, Scanner.dev.

    In this episode:

    • Earning autonomy gradually
    • The blast radius question
    • The reality check
    • Today's value, tomorrow's evolution

    Huge thanks to our sponsor, Scanner

    All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev.

    Más Menos
    31 m
Todavía no hay opiniones