

Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Episodes
Mentioned books

Mar 14, 2024 • 29min
The Demand for Affordable Blue Team Training
Exploring the high cost of blue team training compared to free red team education, discussing the impact on cybersecurity talent shortage. Highlighting the importance of self-learning and versatile tools in cybersecurity defense. Emphasizing the need for collaboration between red and blue teams, and the evolving threats in the cybersecurity landscape.

Mar 7, 2024 • 33min
Why are CISOs Excluded from Executive Leadership?
Exploring the absence of CISOs in executive leadership, challenges faced by CISOs in Fortune 100 companies, importance of clear guidelines and compliance, CISOs' role in disclosure decision-making post-security breaches, and contrasting perspectives on privacy and security prioritization.

Feb 29, 2024 • 31min
What Is Your SOC's Single Search of Truth?
Exploring the limitations of consolidating data from various sources with a single pane of glass concept. Discussing the challenges of centralized data analysis in cybersecurity operations. Introduction of Query Federated Search as a solution for managing security data sources. Emphasizing the importance of understanding and leveraging security data efficiently in SOC operations.

Feb 22, 2024 • 35min
When Is Data an Asset and When Is It a Liability?
The podcast discusses the balance between data being an asset and a liability for organizations, the risks of data collection, and the importance of data minimization. It explores privacy laws, lawsuits targeting tech companies, and ethical considerations surrounding data collection. The Electronic Frontier Foundation emphasizes the significance of minimizing data collection upfront for better privacy and security.

11 snips
Feb 15, 2024 • 34min
Tracking Anomalous Behaviors of Legitimate Identities
Adam Koblentz, field CTO at Reveal Security, discusses monitoring anomalous behavior of users, understanding threat actors in networks, and the role of AI-based tools. They highlight the importance of context in anomaly detection, tracking past activities, and strong multifactor authentication. The chapter emphasizes the significance of anomaly detection and user profiling, with a mention of sponsor Reveal Security as a helpful resource.

4 snips
Feb 8, 2024 • 32min
Why Do Cybersecurity Startups Fail?
Guest Mike Levin, deputy CISO, 3M, discusses the challenges faced by cybersecurity startups, including understanding the market and customer needs. The importance of integration and coexistence of cybersecurity products with existing ones is emphasized. Incorporating customer feedback and listening to the market are key to building a successful cybersecurity startup.

6 snips
Feb 1, 2024 • 34min
Is "Compliance Doesn't Equal Security" a Pointless Argument?
Derek Fisher, Executive director of product security at JPMorgan, discusses the significance of compliance in a security program and the need to go beyond minimum standards. The podcast explores the difference between compliance and security, emphasizing compliance as the minimum viable security. It also highlights the importance of compliance in the banking industry and the collaboration within the security industry. The episode concludes with a mention of sponsor Reveal Security and a discussion about the benefits of LinkedIn.

Jan 25, 2024 • 31min
CISOs Responsibilities Before and After an M&A
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Alexandra Landegger, Executive Director and CISO, Collins Aerospace. In this episode: Why do mergers and acquisitions always present challenges to an organization? When it comes to cybersecurity, how involved should a CISO be before AND after an acquisition? Can cybersecurity considerations make or break a deal? What skills did you find yourself flexing with your first M&A experience? Thanks to our podcast sponsor, Aphinia! Join Aphinia, a professional tribe of superheroes fighting cybercriminals. If you are a CISO, VP or a Director of cybersecurity, get instant free access to thousands of your peers, career advice, networking opportunities, consulting gigs and more. Join the good guys' team because the only way to succeed is together: https://aphinia.com/#signup_form

Jan 18, 2024 • 32min
Use Red Teaming To Build, Not Validate, Your Security Program
Guest Richard Ford, CTO of Praetorian, challenges the misconception of red teaming as mere validation, emphasizing its value in strengthening organizations. They discuss conducting red teaming early in the project lifecycle, explore different perspectives and value of red teaming, and redefine it as a proactive tool. The chapter also highlights the importance of aligning definitions and repositioning red teams under the SOC for better defense posture.

Jan 11, 2024 • 32min
The Do's and Don'ts of Approaching CISOs
Adam Glick, CISO, PSG, discusses successful vendor outreach to CISOs, the negative impact of spamming, building trust in vendor relationships, understanding the role of a CISO, and emphasizing the importance of forming connections and building trust in the cybersecurity industry.


