Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Defense in Depth

Technology News

Episodes

Showing 1-100 of 339
Page 1 of 4 Next → »»

How Should CISOs Talk to the Business

18 Dec 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our con...

How Much Cyber Risk Should a CISO Own?

11 Dec 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conv...

How To Tell When a Vendor is Selling AI Snake Oil

04 Dec 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conver...

In the Age of Identity, is Network Security Dead?

20 Nov 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Ross Haleliuk of Venture in Security for the discussion that is the basis of...

How to Manage Configuration Drift

13 Nov 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of...

Is Least Privilege Dead?

06 Nov 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of ou...

How Do We Measure Our Defenses Against Social Engineering Attacks?

30 Oct 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Sales Follow Up Sequences: What Works Best in Cyber?

23 Oct 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Mike Gallardo for the discussion that is the basis of our conversation on th...

What Soft Skills Do You Need in Cyber?

16 Oct 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Evgeniy Kharam for the discussion that is the basis of our conversation on t...

What is the Visibility That Security Teams Need?

09 Oct 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...

Data Governance in the Age of AI

02 Oct 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...

How Can Security Vendors Better Stand Out?

25 Sep 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversati...

What New Risks Does AI Introduce?

18 Sep 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...

The Pattern of Early Adoption of Security Tools

11 Sep 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...

How Are You Managing the Flow of AI Data

04 Sep 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode ...

How to Deal with Last Minute Compliance Requirements

28 Aug 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the b...

Do You Have a Functional Policy or Did You Just Write One?

21 Aug 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...

Where are We Struggling with Zero Trust

14 Aug 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...

Cybersecurity Has a Prioritization Problem

07 Aug 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...

How Can AI Provide Useful Guidance from Fragmented Security Data?

31 Jul 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem

24 Jul 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episo...

What Are the Cybersecurity Trends We Need To Follow?

17 Jul 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Is It Even Possible to Fast-Track Your Way Into Cybersecurity?

10 Jul 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

What's the Most Efficient Way to Rate Third Party Vendors?

03 Jul 2025

Contributed by Lukas

All posts and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Don't Ask "Can" We Secure It, But "How" Can We Secure It

26 Jun 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Has the Shared Security Model for SaaS Shifted?

12 Jun 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conve...

Improving the Efficiency of Your Threat Intelligence

05 Jun 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode...

Why Cybersecurity Professionals Lie on Their Resumes

29 May 2025

Contributed by Lukas

All images and links can be found on CISO Series. Check out this post by Gautam 'Gotham' Sharma of AccessCyber for the discussion that is the b...

What Should Be in a CISO Job Description?

22 May 2025

Contributed by Lukas

All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episod...

The CISO's Job Is Impossible

15 May 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...

Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

08 May 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...

How Much Should Salespeople Know About Their Product?

01 May 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Why Are We Still Struggling to Fix Application Security?

24 Apr 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

What Can Someone with No Experience Do in Cybersecurity?

17 Apr 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post from Jerich Beason, CISO at WM, for the discussion that is the...

Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry?

10 Apr 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post from Caleb Sima of WhiteRabbit for the discussion that is the ...

Can AI improve Third-Party Risk Management (TPRM)

03 Apr 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Cybersecurity Is NOT an Entry-Level Position

27 Mar 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post by Tallis Jordan of the U.S. Army Cyber Command for the discus...

Hey Vendors, What Problem Is Your Product Solving?

20 Mar 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post from Yaron Levi for the discussion that is the basis of our co...

We've Been Fooled. There Is No Talent Shortage.

13 Mar 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post by Rachel Bicknell of Dell Technologies quoting Mic Merritt o...

Is There an Increasing Consolidation of Vendors in the SOC?

06 Mar 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on ...

Are CISOs Struggling to Get Respect?

27 Feb 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Is Platformization Vs Best-of-Breed a False Dichotomy?

20 Feb 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Protecting Your Backups from Ransomware

13 Feb 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Can a Security Program Ever Reach Maintenance Mode?

06 Feb 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

The Hardest Problems in Security Aren't "Security Problems"

29 Jan 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

If and When Should a CISO Have a Long Term Security Plan?

23 Jan 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Do We Want CISOs Dictating How Salespeople Should Engage?

16 Jan 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post by Marc Ashworth, CISO at First Bank for the discussion that i...

Is AI Benefiting Attackers or Defenders?

09 Jan 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

CISOs DO Own the Risk

02 Jan 2025

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

How Can We Fix Alert Fatigue?

12 Dec 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Vulnerability Management ≠ Vulnerability Discovery

05 Dec 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Are Security Awareness Training Platforms Effective?

21 Nov 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

The Argument For More Cybersecurity Startups

14 Nov 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on...

How Are New SEC Rules Impacting CISOs?

07 Nov 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on...

Managing the Risk of GenAI Tools

31 Oct 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Defending Against What Criminals Know About You

24 Oct 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Will We Ever Go Back From Work From Home?

17 Oct 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

The Lurking Dangers of Neglected Security Tools

10 Oct 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

When You Just Can't Take It Anymore in Cyber

03 Oct 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Is It Possible to Inject Integrity Into AI?

26 Sep 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Are Phishing Tests Helping or Hurting Our Security Program?

19 Sep 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

​​Who Is Responsible for Securing SaaS Tools?

12 Sep 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Hiring Cyber Teenagers with Criminal Records

05 Sep 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

What's Working With Third-Party Risk Management?

29 Aug 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

What Triggers a CISO?

22 Aug 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Information Security vs. Cybersecurity

15 Aug 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Should Deny By Default Be the Cornerstone of Zero Trust?

08 Aug 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

What Is a Field CISO?

01 Aug 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Cybersecurity Is a Communications Problem

25 Jul 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Do Companies Undergoing a Merger or Acquisition Get Targeted for Attacks?

18 Jul 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Telling Stories with Security Metrics

11 Jul 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Securing Identities in the Cloud

27 Jun 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on t...

How AI Is Making Data Security Possible

20 Jun 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

What Makes a Successful CISO?

13 Jun 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

We Want a Solution to Remediate, Not Just Detect Problems

06 Jun 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Recruiting from the Help Desk

30 May 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

How Do We Build a Security Program to Thwart Deepfakes?

23 May 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Where Are Secure Web Gateways Falling Short?

16 May 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Understanding the Zero-Trust Landscape

09 May 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Scaling Least Privilege for the Cloud

02 May 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Should CISOs Be More Empathetic Towards Salespeople?

25 Apr 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Managing Data Leaks Outside Your Perimeter

18 Apr 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

What Are the Risks of Being a CISO?

11 Apr 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Onboarding Security Professionals

04 Apr 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

How to Improve Your Relationship With Your Boss

28 Mar 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post Monte Pedersen of The CDA Group for the discussion that is the...

Improving the Responsiveness of Your SOC

21 Mar 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

The Demand for Affordable Blue Team Training

14 Mar 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Why are CISOs Excluded from Executive Leadership?

07 Mar 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

What Is Your SOC's Single Search of Truth?

29 Feb 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

When Is Data an Asset and When Is It a Liability?

22 Feb 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on thi...

Tracking Anomalous Behaviors of Legitimate Identities

15 Feb 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. The Verizon DBIR found that about half of all breaches involved legitimate credenti...

Why Do Cybersecurity Startups Fail?

08 Feb 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Is "Compliance Doesn't Equal Security" a Pointless Argument?

01 Feb 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

CISOs Responsibilities Before and After an M&A

25 Jan 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Use Red Teaming To Build, Not Validate, Your Security Program

18 Jan 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

The Do's and Don'ts of Approaching CISOs

11 Jan 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Doing Third Party Risk Management Right

04 Jan 2024

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Warning Signs You're About To Be Attacked

14 Dec 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Do We Have to Fix ALL the Critical Vulnerabilities?

07 Dec 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Mitigating Generative AI Risks

30 Nov 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Page 1 of 4 Next → »»