Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
undefined
Mar 26, 2026 • 32min

How to Engage With a CISO When They Express Interest

Adam Palmer, CISO at First Hawaiian Bank, shares concise trade-show wisdom from running security programs. He explains how to spark interest in 30 seconds, why strategy beats feature lists, and what concrete next steps win follow-up conversations. Practical tales show what works at booths and what repels busy security leaders.
undefined
Mar 19, 2026 • 33min

Who is Responsible for the Conflict Between Security and Developers?

Matt Brown, solutions architect at Endor Labs who specializes in software composition analysis and supply chain security. He explores why developers prioritize functionality over security. The conversation covers leadership and incentive problems, pragmatic prioritization of vulnerabilities, AI and open source risks, and making security faster and easier for developers.
undefined
Mar 12, 2026 • 36min

Are Your Security Tools Creating More Work for Your Team?

Evan McHenry, CISO at Robinhood known for running security like an engineering function, talks vendor selection, three-year total cost of ownership, and operational tradeoffs of security tools. He covers delivery models, capacity planning, and matching tool complexity to team skills. The conversation stresses mapping workflows first and prioritizing high-signal tooling to avoid extra operational burden.
undefined
Mar 5, 2026 • 29min

Why Overpromising is a Dangerous Sales Tactic

Octavia Howell, VP and CISO at Equifax Canada, a veteran leader in enterprise security. She discusses why vendors should stop overpromising. Conversations cover bluffing that damages trust, scare-tactic outreach, being upfront about limitations, and what true partnership looks like in complex sales.
undefined
Feb 26, 2026 • 27min

Should You Phish Your Employees or Not?

Mark Eggleston, Chief Information Security Officer at CSC, shares his take on phishing testing and security program design. He debates whether simulated phishing erodes trust while arguing for measurable testing. Discussion covers technical controls like MFA, measuring reporting not just clicks, and treating phishing drills as teachable fire drills rather than gotchas.
undefined
4 snips
Feb 19, 2026 • 31min

How Much Autonomy Should You Give AI Agents in Your SOC?

Cliff Crosland, co-founder and CEO of Scanner.dev, a security data lake startup. He discusses granting AI agents gradual autonomy with read-only first and human checkpoints. They focus on minimizing blast radius, using agents for triage and detection engineering, and the need for memory and learning before wider trust.
undefined
Feb 12, 2026 • 33min

Cybersecurity's Broken Hiring Process

All links and images can be found on CISO Series. Check out this post by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Brett Conlon, CISO, American Century Investments. In this episode: The experience paradox Who benefits from the narrative Kitchen sink job postings The aggregation problem Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built for AI agents. Learn more at scanner.dev
undefined
Feb 5, 2026 • 33min

Simple Security Solutions That Deliver a Big Impact

Rob Allen, Chief Product Officer at ThreatLocker, a product-driven security leader. He discusses getting permissions right and preferring groups over individual rights. They cover patching and secure baselines, the importance of knowing your assets, and automating configuration hygiene. Simple process controls and phone verification for high-risk requests get attention too.
undefined
Jan 29, 2026 • 31min

When Cybersecurity Marketing Fails to Reach the Buyer

Tom Doughty, CISO at Generate:Biomedicines with hands-on security architecture experience. The conversation covers why cybersecurity marketing often misses buyers, the 3Ms framework of moment/metric/motion, and the risks of AI and agentic claims. It looks at investor-driven buzzwords, practical use cases that help internal buy-in, and why clear, concrete messaging matters.
undefined
16 snips
Jan 22, 2026 • 27min

How Best to Prepare Your Data for Your Tools

Matt Goodrich, Director of Information Security at Alteryx, shares insights on AI data hygiene and governance. He highlights the challenges of relying on polished AI outputs, warning about their potential misleading nature. Goodrich emphasizes the importance of integrating human oversight in AI workflows and proposes using multiple AIs for cross-verification. He advocates for treating AI outputs as research rather than authoritative, pushing for a skeptical approach, and underscoring the need for governance to establish trust in AI-driven security systems.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app