Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Defense in Depth

Technology News

Episodes

Showing 101-200 of 339
«« ← Prev Page 2 of 4 Next → »»

Building a Cyber Strategy for Unknown Unknowns

16 Nov 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

Responsibly Embracing Generative AI

09 Nov 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on th...

People Are the Top Attack Vector (Not the Weakest Link)

02 Nov 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. In increasingly complex technical defenses, threat actors frequently target the hum...

What's Entry Level in Cybersecurity?

26 Oct 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. We often talk about the contradiction of seemingly entry-level security jobs requir...

New SEC Rules for Cyber Security

19 Oct 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. The Securities and Exchange Commission issued new cyber rules. What do these new ru...

The Value of RSA, Black Hat, and Mega Cyber Tradeshows

12 Oct 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Are trade shows like RSA getting so big that there's not enough economic value for ...

Is Remote Work Helping or Hurting Cybersecurity?

05 Oct 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Work from home flourished during the pandemic. Many workers love it and don't want ...

How to Manage Users' Desires for New Technology

28 Sep 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Large language models and generative AI are today's disruptive technology. This is ...

Cybersecurity Questions Heard Around the Kitchen Table

21 Sep 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What do the people least in the know about cyber, want to know? What are they askin...

How to Prime Your Data Lake

14 Sep 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. A security data lake, a data repository of everything you need to analyze and get a...

Getting Ahead Of Your Threat Intelligence Program

07 Sep 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. A threat intelligence program sounds like a sound effort in any security program. B...

How Security Leaders Deal with Intense Stress

31 Aug 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. When you have an incident and you're engulfed by the stress that lasts more than a ...

How Do We Influence Secure Behavior?

24 Aug 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. We all know that our employees need to be more security aware, but what are the met...

Security Concerns with ChatGPT

17 Aug 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Users have tried to upload sensitive company information and PII, personally identi...

Create A Pipeline of Cyber Talent

10 Aug 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. The demand for cybertalent is sky high. It's very competitive to get those people w...

Improving Adoption of Least Privileged Access

03 Aug 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What are we doing to improve access management? Make it too loose and it's the numb...

Securing SaaS Applications

27 Jul 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. With the growth of business-led IT, does SaaS security need to be a specific focus...

How Do We Get Better Control of Cloud Data?

20 Jul 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. When it comes to data, compliance, and reducing risk, where are we gaining control...

Finding Your Security Community

13 Jul 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. If you're struggling to get your first job in security or you're trying to get bac...

Let's Write Better Cybersecurity Job Descriptions

06 Jul 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What should a cyber job description require, and what shouldn't it? What's reasona...

How Should Security Better Engage with Application Owners?

29 Jun 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Since so much technology today is not launched by the IT department, but by busines...

How To Get More People Into Cybersecurity

22 Jun 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. There are millions of cybersecurity jobs open. Over time, that number has just been...

How to Create a Positive Security Culture

15 Jun 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. How do you create a positive security culture? It's rarely the first concept anyone...

How Should We Trust Entry Level Employees?

08 Jun 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. All experienced security professionals were at one time very green. Entry level st...

How Must Processes Change to Reduce Risk?

01 Jun 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What do we need to do to fix our processes to truly reduce risk and vulnerabilities...

Reputational Damage from Breaches

25 May 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Security professionals talk a lot about the reputational damage from breaches. And ...

Do RFPs Work?

18 May 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Do RFPs or request for proposals work as intended? It seems they're loaded with fla...

Successful Cloud Security

11 May 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What are the moves we should be making in cloud to improve our security? What const...

How Should Security Vendors Engage With CISOs?

04 May 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. One CISO has had enough of the security vendor marketing emails and cold sales call...

Gartner Created Product Categories

27 Apr 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Do we really need more categories of security products? Every new Gartner magic qua...

How to Always Make a Business Case for Security

20 Apr 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. How can security leaders and how do they go about matching business case to every s...

Do Breaches Happen Because the Tool Fails, or the Tool Was Poorly Configured?

13 Apr 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Security tools are supposed to do a job. Either they need to alert you, protect you...

What We Love About Working in Cybersecurity

06 Apr 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. We talk a lot on this show about what makes cybersecurity such a hard job, yet ther...

Security That Accounts for Human Fallibility

30 Mar 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. We expect our users to be perfect security responders even when the adversaries are...

Why You Should Be Your Company's Next CISO

23 Mar 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. How do you make the argument that your company needs a CISO, and that YOU should be...

How to Become a CISO

16 Mar 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. How do you become a CISO? It doesn't follow a linear pattern as many other professi...

Can You Build a Security Program on Open Source?

09 Mar 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. What would it take to build your entire security program on open source software, t...

Third Party Risk vs. Third Party Trust

02 Mar 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Businesses grow based on trust, but they have to operate in a world of risk. Even c...

How Can We Improve the Cyber Sales Cycle?

23 Feb 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series The cybersecurity sales process is so terribly inefficient. And everyone, the target...

What Leads a Security Program: Risk or Maturity?

16 Feb 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. When you think about building a plan (and budget!) for your security program, do yo...

Limitations of Security Frameworks

09 Feb 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why do strongly supported security frameworks have such severe limitations when buil...

Why Is There a Cybersecurity Skills Gap?

02 Feb 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Why is there a cybersecurity skills gap? Practically everyone is looking to hire, a...

What Can the Cyber Haves Do for the Cyber Have Nots?

26 Jan 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. Given that your company's security is dependent on the security of your partners an...

Securing Unmanaged Assets

19 Jan 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series. "When the asset discovery market launched, every single company that offered a sol...

Ambulance Chasing Security Vendors

12 Jan 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series A good high profile security threat seems like a good time to alert potential custom...

Do CISOs Have More Stress than Other C-Suite Jobs

05 Jan 2023

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why do CISOs seem more stressed out than other C-level executives? Check out this p...

How Should We Discuss Cyber With the C-Suite?

15 Dec 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series How detailed do we get in our conversation with business leaders? Do we dumb it dow...

Can You Be a vCISO If You've Never Been a CISO?

08 Dec 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why are there so many vCISOs who have never been a CISO? Isn't it difficult to advi...

How Should We Gauge a Company's Cyber Health?

01 Dec 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series As an outside observer, how can you tell if a company is staying cyber healthy? Whi...

Reducing the Attack Surface

17 Nov 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series The cyber attack surface just keeps growing to the point that it seems endless. Prot...

Do We Need a Marketing Manager for the Security Team?

10 Nov 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Those reports on security procedures for the business are falling short. No one is ...

Cybersecurity Budgets

03 Nov 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Cybersecurity budgets are increasing, by a lot. What's fueling the increase and wher...

How Can We Make Sense of Cybersecurity Titles?

27 Oct 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series What's the difference between a head of security, a vp of security, and a CISO? Do ...

Walk a Mile in a Security Recruiter's Shoes

20 Oct 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Instead of complaining about the security hiring process, walk a mile in a recruite...

Moving Security from a Prevention to a Resilience Strategy

13 Oct 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Are security programs drifting from a prevention to a resilience strategy? If so, a...

How to Engage with Non-Technical Business Leaders

06 Oct 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series How do you talk to non-technical business leaders about cybersecurity? It's a conce...

Cybersecurity Burnout

29 Sep 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why are cybersecurity professionals burning out? What's the dynamic of the job, the ...

How to Build a Greenfield Security Program

22 Sep 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series You're starting a security program from scratch and you're trying to figure out whe...

Managing the Onslaught of Files

15 Sep 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Files are still the core of how people do business. How are you dealing with the on...

Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?

08 Sep 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Hiring managers speak about looking for culture fit and diversity, but never at the...

How to Follow Up With a CISO

01 Sep 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Cyber sales is hard. But don't let the difficulty of doing it get in way of your goo...

Roles to Prepare You to Be a CISO

25 Aug 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series One day you want to be a CISO. What area of security you begin your studies? Or mayb...

Minimizing Damage from a Breach

18 Aug 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series What can we do to reduce the damage of a breach and the duration of detection and r...

We're All Still Learning Cyber

11 Aug 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Learning cyber is not a question for those who are just starting out. It's for every...

Practical Cybersecurity for IT Professionals

04 Aug 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series You're a CISO, vCISO, or MSSP rolling into a company that has yet to launch a cyber...

Data Protection for Whatever Comes Next

28 Jul 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Cybersecurity boils down to securing your data or data protection. But that simple c...

What Is Attack Surface Profiling?

21 Jul 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Is attack surface profiling the same as a pen test? If it isn't what unique insight...

How Can You Tell If Your Security Program Is Improving?

14 Jul 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series What's your best indicator that your security program is actually improving? And be...

How Can We Improve Recruiting of CISOs and Security Leaders?

07 Jul 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Interviewing for leadership positions in cybersecurity is difficult for everyone in...

How Is Our Data Being Weaponized Against Us?

30 Jun 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series How are nefarious actors using our own data (and metadata) against us? And given th...

Can Security Be a Profit Center?

23 Jun 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Is it possible to position your security team as a profit center instead of the trad...

Getting Ahead of the Ongoing Malware Fight

16 Jun 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series For years we've been referring to malware protection as a cat and mouse game. The c...

Building a Security Awareness Training Program

09 Jun 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series We all know and have experienced bad security awareness training. People can learn,...

Onboarding Cyber Professionals with No Experience

02 Jun 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series You want to bring on entry level personal, But green employees, who are not well ve...

Where's the Trust in Zero Trust?

26 May 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Zero trust is a hollow buzzword. In any form of security, there exist critical poin...

Who Investigates Cyber Solutions?

19 May 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Cyber professionals, who is responsible on your team for investigating new solution...

Does the Cybersecurity Industry Suck?

12 May 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series In the cyber industry we pat each other on the back and give each other awards, all...

Are We Taking Zero Trust Too Far?

05 May 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series For some, the definition of zero trust has expanded from how we grant access to net...

Is Shift Left Working?

28 Apr 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Developers and security professionals have been heavily sold on the concept of "shif...

Technical vs. Compliance Professionals

21 Apr 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Do we have a Monitgue/Capulet rivalry between technical and compliance professional...

Why Do So Many Cybersecurity Products Suck?

14 Apr 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why do we end up with so many bad security products? Who is to blame and how can we...

Training for a Cyber Disaster

07 Apr 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series What are you doing to prepare for the next cyber disaster? You must train for it, b...

Virtual Patching

31 Mar 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series What if you didn't spend all your time patching vulnerabilities but instead created ...

Start a Cybersecurity Department from Scratch

24 Mar 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series A 500+ person company doesn't have a security department. They need one and they ne...

How to Think Like a Cybercrook

17 Mar 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series "If you want to catch a cybercrook, you need to think like one." But how do you act...

Building a Data-First Security Program

10 Mar 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Could you build a data-first security program? What would you do if you focused you...

Offensive Security

03 Mar 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Offensive security or "hacking back" has always been seen as either unethical or ill...

When Vendors Pounce on New CISOs

24 Feb 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series A security professional announces a new position as CISO. As a vendor you see this ...

Building a Cybersecurity Culture

17 Feb 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series How do you begin building a cyber security culture for the whole company? And more ...

How to Pitch to a Security Analyst

10 Feb 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series You're a security vendor and you've got a short briefing with a security analyst fro...

Is Your Data Safer in the Cloud?

03 Feb 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on t...

What Should We Stop Doing in Cybersecurity?

27 Jan 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Security professionals are drowning in activities. Not all of them can be valuable....

DDoS Solutions

20 Jan 2022

Contributed by Lukas

How seamless are Distributed Denial of Service or DDoS solutions today? If you get a denial of service attack, how quickly can these solutions snap in...

Making Cybersecurity Faster and More Responsive

13 Jan 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Knowing is only one-third the battle. Another third is responding. And the last thi...

Promises of Automation

06 Jan 2022

Contributed by Lukas

All links and images for this episode can be found on CISO Series Automation was supposed to make cybersecurity professionals' lives simpler. And it w...

When Social Engineering Bypasses Our Cyber Tools

16 Dec 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on t...

How Can We Simplify Security?

09 Dec 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why is cybersecurity becoming so complex? What is one thing we can do, even if it's...

Convergence of Physical and Digital Security

02 Dec 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Security convergence is the melding of all security functions from physical to digi...

How Do You Measure Cybersecurity Success?

18 Nov 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series In most jobs there's often a clear indicator if you're doing a good job. In securit...

How Do We Turn Tables Against Adversaries?

11 Nov 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series If we're going to turn the tables against our adversaries, everything from our atti...

«« ← Prev Page 2 of 4 Next → »»