Defense in Depth
Episodes
When Vendors Pounce on New CISOs
24 Feb 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series A security professional announces a new position as CISO. As a vendor you see this ...
Building a Cybersecurity Culture
17 Feb 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series How do you begin building a cyber security culture for the whole company? And more ...
How to Pitch to a Security Analyst
10 Feb 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series You're a security vendor and you've got a short briefing with a security analyst fro...
Is Your Data Safer in the Cloud?
03 Feb 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on t...
What Should We Stop Doing in Cybersecurity?
27 Jan 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series Security professionals are drowning in activities. Not all of them can be valuable....
DDoS Solutions
20 Jan 2022
Contributed by Lukas
How seamless are Distributed Denial of Service or DDoS solutions today? If you get a denial of service attack, how quickly can these solutions snap in...
Making Cybersecurity Faster and More Responsive
13 Jan 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series Knowing is only one-third the battle. Another third is responding. And the last thi...
Promises of Automation
06 Jan 2022
Contributed by Lukas
All links and images for this episode can be found on CISO Series Automation was supposed to make cybersecurity professionals' lives simpler. And it w...
When Social Engineering Bypasses Our Cyber Tools
16 Dec 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the discussion that is the basis of our conversation on t...
How Can We Simplify Security?
09 Dec 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Why is cybersecurity becoming so complex? What is one thing we can do, even if it's...
Convergence of Physical and Digital Security
02 Dec 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Security convergence is the melding of all security functions from physical to digi...
How Do You Measure Cybersecurity Success?
18 Nov 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series In most jobs there's often a clear indicator if you're doing a good job. In securit...
How Do We Turn Tables Against Adversaries?
11 Nov 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series If we're going to turn the tables against our adversaries, everything from our atti...
Ageism in Cybersecurity
04 Nov 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Is it too much experience? Is it that they're difficult to work with? Do they want t...
Proactive Vulnerability Management
28 Oct 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series How do we turn the tide from reactive to proactive patch management? Does anyone fe...
Why Is Security Recruiting So Broken?
21 Oct 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...
How to Be a Vendor that CISOs Love
14 Oct 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whic...
The "Are We Secure?" Question
07 Oct 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series When a senior person at your company asks you, "Are we secure?" how should you respo...
Ransomware Kill Chain
30 Sep 2021
Contributed by Lukas
What are the tell tale signs you've got ransomware before you receive the actual ransomware threat? Check out this post and this post for the basis...
Can Technology Solve Phishing?
23 Sep 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...
Convergence of SIEM and SOAR
16 Sep 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series SIEM tools that ingest and analyze data are ubiquitous in security operations cente...
Cybersecurity Is Not Easy to Get Into
09 Sep 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...
Preventing Ransomware
02 Sep 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series What is the most critical step to preventing ransomware? Security professionals may ...
Managing Lateral Movement
26 Aug 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series For four years in a row, Verizon's DBIR, has touted compromised credentials as the ...
First Steps as a CISO
19 Aug 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series You've just joined a company as CISO, what's the very first step you would take to i...
How Does Ransomware Enter the Network?
12 Aug 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series How is ransomware getting into your network? Is the path direct, like via email, or...
What's the Value of Certifications?
05 Aug 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Why should security professionals get certifications? Do they actually teach you wh...
Measuring the Success of Cloud Security
29 Jul 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series How are you measuring your progress and success with cloud security? How much visib...
How do I get my first cybersecurity job?
22 Jul 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series What does a young person, eager to get into cybersecurity, have to show or prove to...
Educating the Board About Cybersecurity
15 Jul 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series What do we want the Board and C-Suite to know about cybersecurity? If you could tea...
CISO Recruiting Is Broken
05 Jul 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series The demand for CISOs is growing due to increased regulations and cyber threats. Yet...
Retaining Cyber Talent
01 Jul 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whic...
Salesforce Security
24 Jun 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-salesforce-security/ Thanks to our podcast s...
Cloud Configuration Fails
17 Jun 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cloud-configuration-fails/ Why do we hear s...
Starting Pay for Cyber Staff
10 Jun 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/starting-pay-for-cyber-staff/ What should an entry level cy...
Fear of Automation
03 Jun 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series. https://cisoseries.com/fear-of-automation/ Why are security professionals so darn a...
Hiring Talent with No Security Experience
27 May 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-hiring-talent-with-no-security-experience/ ...
Security Hygiene for Software Development
20 May 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-security-hygiene-for-software-development/ ...
How Much Do You Know About Your Data?
13 May 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-do-you-know-about-your-data/ Do c...
Do Startups Need a CISO?
06 May 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-do-startups-need-a-ciso/ Startups are all...
Insider Risk
29 Apr 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-insider-risk/ By just doing their jobs, you...
What's the Obsession with Zero Trust?
22 Apr 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-whats-the-obsession-with-zero-trust/ Why ...
Mentoring
15 Apr 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-mentoring/ Companies want security people w...
Securing the Super Bowl and Other Huge Events
08 Apr 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-securing-the-super-bowl-and-other-huge-even...
Cybersecurity Isn't That Difficult
01 Apr 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cybersecurity-isnt-that-difficult/ What ar...
Cloud Security Myths
25 Mar 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cloud-security-myths/ The cloud is inherent...
What Is Security's Mission?
18 Mar 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-what-is-securitys-mission/ What's the missi...
Vendor CISOs
11 Mar 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-vendor-cisos/ It's hard to be a CISO. But, ...
How Much Log Data Is Enough?
04 Mar 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-log-data-do-you-need You're a CIS...
Should Finance or Legal Mentor Cyber?
25 Feb 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cyber...
Data Destruction
18 Feb 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-data-destruction How do you deal with data ...
How to Make Cybersecurity More Efficient
11 Feb 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-to-make-cybersecurity-more-efficient/ ...
Does a CISO Need Tech Skills?
04 Feb 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-does-a-ciso-need-tech-skills Does a CISO ne...
How Do You Know if You're Good at Security?
28 Jan 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-do-you-know-if-youre-good-at-security/ ...
Building a Security Team
21 Jan 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series You're a new CISO at a new org given a headcount of ten to build a cybersecurity t...
Are our Data Protection Strategies Evolving?
14 Jan 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-are-our-data-protection-strategies-evolving...
Should CISOs Be Licensed Professionals?
07 Jan 2021
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-cisos-be-licensed-professionals/) M...
Inherently Vulnerable By Design
17 Dec 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-inherently-vulnerable-by-design/) Much of ...
Imposter Syndrome
10 Dec 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-imposter-syndrome/) For CISOs and other se...
Why Don't More Companies Take Cybersecurity Seriously?
03 Dec 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-why-dont-more-companies-take-cybersecurity-...
Data Protection and Visibility
19 Nov 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-protection-and-visibility/) Where is ...
What's an Entry Level Cybersecurity Job?
12 Nov 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-whats-an-entry-level-cybersecurity-job/) N...
Securing Digital Transformations
29 Oct 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-digital-transformations/) Digital...
Leaked Secrets in Code Repositories
22 Oct 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-leaked-secrets-in-code-repositories/) Secr...
Measuring the Success of Your Security Program
15 Oct 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-measuring-the-success-of-your-security-pro...
Privacy Is An Uphill Battle
08 Oct 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-privacy-is-an-uphill-battle/) Privacy is a...
Legal Protection for CISOs
01 Oct 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-legal-protection-for-cisos/) What's the le...
XDR: Extended Detection and Response
24 Sep 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-xdr-extended-detection-and-response/) Is X...
Calling Users Stupid
17 Sep 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-calling-users-stupid/) Many cybersecurity ...
Is College Necessary for a Job in Cybersecurity?
10 Sep 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-college-necessary-for-a-job-in-cybersecu...
When Red Teams Break Down
03 Sep 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-when-red-teams-break-down/) What happens w...
What Cyber Pro Are You Trying to Hire?
27 Aug 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-what-cyber-pro-are-you-trying-to-hire/) Do ...
Junior Cyber People
20 Aug 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-junior-cyber-people/) There are so few jobs...
Trusting Security Vendor Claims
13 Aug 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-trusting-security-vendor-claims/) Do securi...
How Vendors Should Approach CISOs
06 Aug 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-how-vendors-should-approach-cisos/) "How do...
Secure Access
30 Jul 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-secure-access/) What is the Holy Grail of s...
InfoSec Fatigue
23 Jul 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-fatigue/) Have we reached peak Info...
Securing a Cloud Migration
16 Jul 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-a-cloud-migration/) You're migrati...
API Security
09 Jul 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-api-security/) APIs are gateways in and out...
Shared Threat Intelligence
02 Jul 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-threat-intelligence/) We all know th...
Drudgery of Cybercrime
25 Jun 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-drudgery-of-cybercrime/) Why does the press...
Security Budgets
18 Jun 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-security-budgets/) How do you calculate a s...
Role of the BISO
11 Jun 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-role-of-the-biso/) What is a business infor...
Shared Accounts
04 Jun 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-accounts/) As bad as all security pr...
Bug Bounties
28 May 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/) What is the successful formu...
Data Classification
21 May 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-classification/) The more data we hord...
Prevention vs. Detection and Containment
14 May 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-prevention-vs-detection-and-containment/) W...
Asset Valuation
07 May 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-asset-valuation/) What's the value of your ...
DevSecOps
30 Apr 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-devsecops/) We know that security plays a r...
Fix Security Problems with What You've Got
23 Apr 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-fix-security-problems-with-what-youve-got/)...
Should Risk Lead GRC?
16 Apr 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-risk-lead-grc/) Defining risk for th...
Responsible Disclosure
09 Apr 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-responsible-disclosure/) Security researche...
Internet of Things
02 Apr 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth:-internet-of-things/) When Internet of Thin...
Is Governance the Most Important Part of GRC?
26 Mar 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-governance-the-most-important-part-of-gr...
Who Should the CISO Report To?
19 Mar 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-who-should-the-ciso-report-to/) Who should ...
Hybrid Cloud
12 Mar 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hybrid-cloud/) The consistency of your secu...
CISO Tenure
05 Mar 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ciso-tenure/) The CISO has the shortest ten...
Toxic Security Teams
27 Feb 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-toxic-security-teams/) There's an endless n...
Personality Tests in the Workplace
20 Feb 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-personality-tests-in-the-workplace/) As a c...
Lack of Diversity in Cybersecurity
13 Feb 2020
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-lack-of-diversity-in-cybersecurity/) Cybers...