

Defense in Depth
David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Episodes
Mentioned books

Oct 17, 2024 • 33min
Will We Ever Go Back From Work From Home?
Joe Lewis, CISO for the CDC and an expert in managing a remote workforce, dives into the evolving landscape of work-from-home dynamics. He highlights the impressive quality of life benefits that remote work offers and the need for flexibility. The conversation explores how to foster corporate culture remotely through strong communication and personal connections, while also addressing the challenges of staff retention. Joe critiques traditional office strategies, advocating for dedicated spaces over flex desks to promote employee comfort and productivity.

Oct 10, 2024 • 32min
The Lurking Dangers of Neglected Security Tools
Adam Fletcher, CSO of Blackstone, shares his expertise on the critical dangers of neglected cybersecurity tools. He highlights how these tools can drain resources and emphasizes the need for regular updates and investment in cybersecurity. The conversation dives into the complications resulting from excessive alerts and the importance of a technology-agnostic approach. Adam also discusses the significance of strategic decision-making in selecting security tools and warns against cutting corners in foundational cybersecurity practices.

Oct 3, 2024 • 30min
When You Just Can't Take It Anymore in Cyber
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, VP, Deputy CISO - Gaming, Microsoft. Joining us is Patty Ryan, senior director, CISO, QuidelOrtho. In this episode: Recognizing humanity Death by a thousand meetings What are we looking for? Find your value Thanks to our podcast sponsor, GitGuardian GitGuardian is a Code Security Platform that caters to the needs of the DevOps generation. It provides a wide range of code security solutions, including Secrets Detection, Infra as Code Security, and Honeytoken, all in one place. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers in all industries. Try now gitguardian.com.

Sep 26, 2024 • 37min
Is It Possible to Inject Integrity Into AI?
Davi Ottenheimer, vp of trust and digital ethics at Inrupt, and Sir Tim Berners-Lee, co-founder of Inrupt and the World Wide Web, dive deep into the need for integrity in AI. They discuss the challenges of biases in large language models and the limitations of self-policing AI. The conversation highlights the importance of third-party validation to ensure data integrity, ethical considerations in tech innovation, and the significance of personal responsibility in using AI tools responsibly in society.

Sep 19, 2024 • 28min
Are Phishing Tests Helping or Hurting Our Security Program?
Dennis Pickett, VP and CISO at Westat, dives into the complexities of phishing tests in cybersecurity. He argues that not all education requires testing, emphasizing the need for building a culture of security awareness over punishment. Pickett champions empowering employees to report suspicious activities and discusses the significance of implementing supportive tools like phishing alert buttons. He advocates for a positive security culture that recognizes and incentivizes proactive engagement, rather than blaming victims.

Sep 12, 2024 • 35min
Who Is Responsible for Securing SaaS Tools?
Russell Spitler, CEO and co-founder of Nudge Security, delves into the complexities of securing SaaS tools in a rapidly evolving landscape. He highlights the shift from 'verify then trust' to 'trust and verify' models, emphasizing teamwork among IT, security, and users. The conversation also tackles shadow IT challenges and the importance of clarity in security responsibilities. Spitler advocates for innovative approaches to safeguard data and strong authentication measures to manage access, ensuring organizations can effectively handle post-employee departure security.

Sep 5, 2024 • 30min
Hiring Cyber Teenagers with Criminal Records
In this engaging discussion, Adam Arellano, VP of enterprise cybersecurity at PayPal, advocates for hiring teenagers with criminal records into cybersecurity roles. He emphasizes the importance of mindset, ethics, and the potential to harness unique talents from unconventional backgrounds. Arellano critiques traditional hiring criteria, encouraging a shift towards inclusivity and second chances. The conversation highlights the role of mentorship and social validation in motivating these individuals, showcasing how curiosity and moral integrity are vital in the cyber workforce.

Aug 29, 2024 • 31min
What's Working With Third-Party Risk Management?
Nick Muy, the Chief Information Security Officer at Scrut Automation, dives into the complexities of third-party risk management. He emphasizes the importance of measuring vendor risk while considering potential failures that could impact customer service. Nick advocates for a holistic approach to risk management, integrating governance and compliance for better resilience. He also discusses the significance of stakeholder collaboration and tailored risk assessments, ensuring businesses maintain operational integrity and trust with their vendors.

Aug 22, 2024 • 33min
What Triggers a CISO?
Sherron Burgess, CISO at BCD Travel, shares her insights on the evolving challenges CISOs face in the cybersecurity landscape. She candidly discusses the frustrations with vendor interactions and the pressure of disingenuous claims in sales. Sherron emphasizes the importance of culture shifts within organizations to recognize security as a shared responsibility. She also highlights the necessity for clear boundaries and effective communication in navigating the complex dynamics of risk and security while advocating for diversity in the workforce.

Aug 15, 2024 • 27min
Information Security vs. Cybersecurity
Mike Lockhart, Chief Information Security Officer at EagleView, delves into the nuances of information security versus cybersecurity. He explains how terminology shapes public perception and emphasizes the importance of effective communication in aligning security strategies with client understanding. The conversation also highlights the diverse career paths in the security field, including red teaming and penetration testing. Lockhart discusses the crucial role of security leadership in fostering collaboration and managing stakeholder expectations to enhance organizational security.


