Defense in Depth
Episodes
How Should CISOs Talk to the Business
18 Dec 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our con...
How Much Cyber Risk Should a CISO Own?
11 Dec 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conv...
How To Tell When a Vendor is Selling AI Snake Oil
04 Dec 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conver...
In the Age of Identity, is Network Security Dead?
20 Nov 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Ross Haleliuk of Venture in Security for the discussion that is the basis of...
How to Manage Configuration Drift
13 Nov 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of...
Is Least Privilege Dead?
06 Nov 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of ou...
How Do We Measure Our Defenses Against Social Engineering Attacks?
30 Oct 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Sales Follow Up Sequences: What Works Best in Cyber?
23 Oct 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on th...
What Soft Skills Do You Need in Cyber?
16 Oct 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Evgeniy Kharam for the discussion that is the basis of our conversation on t...
What is the Visibility That Security Teams Need?
09 Oct 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...
Data Governance in the Age of AI
02 Oct 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...
How Can Security Vendors Better Stand Out?
25 Sep 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversati...
What New Risks Does AI Introduce?
18 Sep 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...
The Pattern of Early Adoption of Security Tools
11 Sep 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...
How Are You Managing the Flow of AI Data
04 Sep 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...
How to Deal with Last Minute Compliance Requirements
28 Aug 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the b...
Do You Have a Functional Policy or Did You Just Write One?
21 Aug 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...
Where are We Struggling with Zero Trust
14 Aug 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...
Cybersecurity Has a Prioritization Problem
07 Aug 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...
How Can AI Provide Useful Guidance from Fragmented Security Data?
31 Jul 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
24 Jul 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...
What Are the Cybersecurity Trends We Need To Follow?
17 Jul 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
10 Jul 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
What's the Most Efficient Way to Rate Third Party Vendors?
03 Jul 2025
Contributed by Lukas
All posts and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Don't Ask "Can" We Secure It, But "How" Can We Secure It
26 Jun 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Has the Shared Security Model for SaaS Shifted?
12 Jun 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conve...
Improving the Efficiency of Your Threat Intelligence
05 Jun 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...
Why Cybersecurity Professionals Lie on Their Resumes
29 May 2025
Contributed by Lukas
All images and links can be found on CISO Series. Check out this post by Gautam 'Gotham' Sharma of AccessCyber for the discussion that is the b...
What Should Be in a CISO Job Description?
22 May 2025
Contributed by Lukas
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...
The CISO's Job Is Impossible
15 May 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...
Can You Have a Secure Software Environment Without Traditional Vulnerability Management?
08 May 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...
How Much Should Salespeople Know About Their Product?
01 May 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Why Are We Still Struggling to Fix Application Security?
24 Apr 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
What Can Someone with No Experience Do in Cybersecurity?
17 Apr 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post from Jerich Beason, CISO at WM, for the discussion that is the...
Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry?
10 Apr 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post from Caleb Sima of WhiteRabbit for the discussion that is the ...
Can AI improve Third-Party Risk Management (TPRM)
03 Apr 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Cybersecurity Is NOT an Entry-Level Position
27 Mar 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post by Tallis Jordan of the U.S. Army Cyber Command for the discus...
Hey Vendors, What Problem Is Your Product Solving?
20 Mar 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post from Yaron Levi for the discussion that is the basis of our co...
We've Been Fooled. There Is No Talent Shortage.
13 Mar 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post by Rachel Bicknell of Dell Technologies quoting Mic Merritt o...
Is There an Increasing Consolidation of Vendors in the SOC?
06 Mar 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...
Are CISOs Struggling to Get Respect?
27 Feb 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Is Platformization Vs Best-of-Breed a False Dichotomy?
20 Feb 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Protecting Your Backups from Ransomware
13 Feb 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Can a Security Program Ever Reach Maintenance Mode?
06 Feb 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
The Hardest Problems in Security Aren't "Security Problems"
29 Jan 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
If and When Should a CISO Have a Long Term Security Plan?
23 Jan 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Do We Want CISOs Dictating How Salespeople Should Engage?
16 Jan 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post by Marc Ashworth, CISO at First Bank for the discussion that i...
Is AI Benefiting Attackers or Defenders?
09 Jan 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
CISOs DO Own the Risk
02 Jan 2025
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
How Can We Fix Alert Fatigue?
12 Dec 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Vulnerability Management ≠ Vulnerability Discovery
05 Dec 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Are Security Awareness Training Platforms Effective?
21 Nov 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
The Argument For More Cybersecurity Startups
14 Nov 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on...
How Are New SEC Rules Impacting CISOs?
07 Nov 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on...
Managing the Risk of GenAI Tools
31 Oct 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Defending Against What Criminals Know About You
24 Oct 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Will We Ever Go Back From Work From Home?
17 Oct 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
The Lurking Dangers of Neglected Security Tools
10 Oct 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
When You Just Can't Take It Anymore in Cyber
03 Oct 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Is It Possible to Inject Integrity Into AI?
26 Sep 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Are Phishing Tests Helping or Hurting Our Security Program?
19 Sep 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Who Is Responsible for Securing SaaS Tools?
12 Sep 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Hiring Cyber Teenagers with Criminal Records
05 Sep 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
What's Working With Third-Party Risk Management?
29 Aug 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
What Triggers a CISO?
22 Aug 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Information Security vs. Cybersecurity
15 Aug 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Should Deny By Default Be the Cornerstone of Zero Trust?
08 Aug 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
What Is a Field CISO?
01 Aug 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Cybersecurity Is a Communications Problem
25 Jul 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?
18 Jul 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Telling Stories with Security Metrics
11 Jul 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Securing Identities in the Cloud
27 Jun 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on t...
How AI Is Making Data Security Possible
20 Jun 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
What Makes a Successful CISO?
13 Jun 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
We Want a Solution to Remediate, Not Just Detect Problems
06 Jun 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Recruiting from the Help Desk
30 May 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
How Do We Build a Security Program to Thwart Deepfakes?
23 May 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Where Are Secure Web Gateways Falling Short?
16 May 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Understanding the Zero-Trust Landscape
09 May 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Scaling Least Privilege for the Cloud
02 May 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Should CISOs Be More Empathetic Towards Salespeople?
25 Apr 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Managing Data Leaks Outside Your Perimeter
18 Apr 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
What Are the Risks of Being a CISO?
11 Apr 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Onboarding Security Professionals
04 Apr 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
How to Improve Your Relationship With Your Boss
28 Mar 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post Monte Pedersen of The CDA Group for the discussion that is the...
Improving the Responsiveness of Your SOC
21 Mar 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
The Demand for Affordable Blue Team Training
14 Mar 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Why are CISOs Excluded from Executive Leadership?
07 Mar 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
What Is Your SOC's Single Search of Truth?
29 Feb 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
When Is Data an Asset and When Is It a Liability?
22 Feb 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...
Tracking Anomalous Behaviors of Legitimate Identities
15 Feb 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. The Verizon DBIR found that about half of all breaches involved legitimate credenti...
Why Do Cybersecurity Startups Fail?
08 Feb 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Is "Compliance Doesn't Equal Security" a Pointless Argument?
01 Feb 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
CISOs Responsibilities Before and After an M&A
25 Jan 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Use Red Teaming To Build, Not Validate, Your Security Program
18 Jan 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
The Do's and Don'ts of Approaching CISOs
11 Jan 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Doing Third Party Risk Management Right
04 Jan 2024
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Warning Signs You're About To Be Attacked
14 Dec 2023
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Do We Have to Fix ALL the Critical Vulnerabilities?
07 Dec 2023
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...
Mitigating Generative AI Risks
30 Nov 2023
Contributed by Lukas
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...