Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Defense in Depth

Technology News

Episodes

Showing 201-300 of 339
«« ← Prev Page 3 of 4 Next → »»

Ageism in Cybersecurity

04 Nov 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Is it too much experience? Is it that they're difficult to work with? Do they want t...

Proactive Vulnerability Management

28 Oct 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series How do we turn the tide from reactive to proactive patch management? Does anyone fe...

Why Is Security Recruiting So Broken?

21 Oct 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...

How to Be a Vendor that CISOs Love

14 Oct 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whic...

The "Are We Secure?" Question

07 Oct 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series When a senior person at your company asks you, "Are we secure?" how should you respo...

Ransomware Kill Chain

30 Sep 2021

Contributed by Lukas

What are the tell tale signs you've got ransomware before you receive the actual ransomware threat? Check out this post and this post for the basis...

Can Technology Solve Phishing?

23 Sep 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...

Convergence of SIEM and SOAR

16 Sep 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series SIEM tools that ingest and analyze data are ubiquitous in security operations cente...

Cybersecurity Is Not Easy to Get Into

09 Sep 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whi...

Preventing Ransomware

02 Sep 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series What is the most critical step to preventing ransomware? Security professionals may ...

Managing Lateral Movement

26 Aug 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series For four years in a row, Verizon's DBIR, has touted compromised credentials as the ...

First Steps as a CISO

19 Aug 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series You've just joined a company as CISO, what's the very first step you would take to i...

How Does Ransomware Enter the Network?

12 Aug 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series How is ransomware getting into your network? Is the path direct, like via email, or...

What's the Value of Certifications?

05 Aug 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Why should security professionals get certifications? Do they actually teach you wh...

Measuring the Success of Cloud Security

29 Jul 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series How are you measuring your progress and success with cloud security? How much visib...

How do I get my first cybersecurity job?

22 Jul 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series What does a young person, eager to get into cybersecurity, have to show or prove to...

Educating the Board About Cybersecurity

15 Jul 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series What do we want the Board and C-Suite to know about cybersecurity? If you could tea...

CISO Recruiting Is Broken

05 Jul 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series The demand for CISOs is growing due to increased regulations and cyber threats. Yet...

Retaining Cyber Talent

01 Jul 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series Check out this post for the basis for our conversation on this week's episode whic...

Salesforce Security

24 Jun 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-salesforce-security/ Thanks to our podcast s...

Cloud Configuration Fails

17 Jun 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cloud-configuration-fails/ Why do we hear s...

Starting Pay for Cyber Staff

10 Jun 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/starting-pay-for-cyber-staff/  What should an entry level cy...

Fear of Automation

03 Jun 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series. https://cisoseries.com/fear-of-automation/ Why are security professionals so darn a...

Hiring Talent with No Security Experience

27 May 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-hiring-talent-with-no-security-experience/ ...

Security Hygiene for Software Development

20 May 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-security-hygiene-for-software-development/ ...

How Much Do You Know About Your Data?

13 May 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-do-you-know-about-your-data/ Do c...

Do Startups Need a CISO?

06 May 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-do-startups-need-a-ciso/  Startups are all...

Insider Risk

29 Apr 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-insider-risk/ By just doing their jobs, you...

What's the Obsession with Zero Trust?

22 Apr 2021

Contributed by Lukas

 All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-whats-the-obsession-with-zero-trust/ Why ...

Mentoring

15 Apr 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-mentoring/ Companies want security people w...

Securing the Super Bowl and Other Huge Events

08 Apr 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-securing-the-super-bowl-and-other-huge-even...

Cybersecurity Isn't That Difficult

01 Apr 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cybersecurity-isnt-that-difficult/ What ar...

Cloud Security Myths

25 Mar 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cloud-security-myths/ The cloud is inherent...

What Is Security's Mission?

18 Mar 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-what-is-securitys-mission/ What's the missi...

Vendor CISOs

11 Mar 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-vendor-cisos/ It's hard to be a CISO. But, ...

How Much Log Data Is Enough?

04 Mar 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-much-log-data-do-you-need You're a CIS...

Should Finance or Legal Mentor Cyber?

25 Feb 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-should-finance-or-legal-mentor-cyber Cyber...

Data Destruction

18 Feb 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-data-destruction How do you deal with data ...

How to Make Cybersecurity More Efficient

11 Feb 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-to-make-cybersecurity-more-efficient/ ...

Does a CISO Need Tech Skills?

04 Feb 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-does-a-ciso-need-tech-skills Does a CISO ne...

How Do You Know if You're Good at Security?

28 Jan 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-how-do-you-know-if-youre-good-at-security/ ...

Building a Security Team

21 Jan 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series You're a new CISO at a new org given a headcount of ten to build a cybersecurity t...

Are our Data Protection Strategies Evolving?

14 Jan 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-are-our-data-protection-strategies-evolving...

Should CISOs Be Licensed Professionals?

07 Jan 2021

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-cisos-be-licensed-professionals/) M...

Inherently Vulnerable By Design

17 Dec 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-inherently-vulnerable-by-design/) Much of ...

Imposter Syndrome

10 Dec 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-imposter-syndrome/) For CISOs and other se...

Why Don't More Companies Take Cybersecurity Seriously?

03 Dec 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-why-dont-more-companies-take-cybersecurity-...

Data Protection and Visibility

19 Nov 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-protection-and-visibility/) Where is ...

What's an Entry Level Cybersecurity Job?

12 Nov 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-whats-an-entry-level-cybersecurity-job/) N...

Securing Digital Transformations

29 Oct 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-digital-transformations/) Digital...

Leaked Secrets in Code Repositories

22 Oct 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-leaked-secrets-in-code-repositories/) Secr...

Measuring the Success of Your Security Program

15 Oct 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-measuring-the-success-of-your-security-pro...

Privacy Is An Uphill Battle

08 Oct 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-privacy-is-an-uphill-battle/) Privacy is a...

Legal Protection for CISOs

01 Oct 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-legal-protection-for-cisos/) What's the le...

XDR: Extended Detection and Response

24 Sep 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-xdr-extended-detection-and-response/) Is X...

Calling Users Stupid

17 Sep 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-calling-users-stupid/) Many cybersecurity ...

Is College Necessary for a Job in Cybersecurity?

10 Sep 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-college-necessary-for-a-job-in-cybersecu...

When Red Teams Break Down

03 Sep 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-when-red-teams-break-down/) What happens w...

What Cyber Pro Are You Trying to Hire?

27 Aug 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-what-cyber-pro-are-you-trying-to-hire/) Do ...

Junior Cyber People

20 Aug 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-junior-cyber-people/) There are so few jobs...

Trusting Security Vendor Claims

13 Aug 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-trusting-security-vendor-claims/) Do securi...

How Vendors Should Approach CISOs

06 Aug 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-how-vendors-should-approach-cisos/) "How do...

Secure Access

30 Jul 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-secure-access/) What is the Holy Grail of s...

InfoSec Fatigue

23 Jul 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-fatigue/) Have we reached peak Info...

Securing a Cloud Migration

16 Jul 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-a-cloud-migration/) You're migrati...

API Security

09 Jul 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-api-security/) APIs are gateways in and out...

Shared Threat Intelligence

02 Jul 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-threat-intelligence/) We all know th...

Drudgery of Cybercrime

25 Jun 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-drudgery-of-cybercrime/) Why does the press...

Security Budgets

18 Jun 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-security-budgets/) How do you calculate a s...

Role of the BISO

11 Jun 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-role-of-the-biso/) What is a business infor...

Shared Accounts

04 Jun 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-shared-accounts/) As bad as all security pr...

Bug Bounties

28 May 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/) What is the successful formu...

Data Classification

21 May 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-classification/) The more data we hord...

Prevention vs. Detection and Containment

14 May 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-prevention-vs-detection-and-containment/) W...

Asset Valuation

07 May 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-asset-valuation/) What's the value of your ...

DevSecOps

30 Apr 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-devsecops/) We know that security plays a r...

Fix Security Problems with What You've Got

23 Apr 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-fix-security-problems-with-what-youve-got/)...

Should Risk Lead GRC?

16 Apr 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-should-risk-lead-grc/) Defining risk for th...

Responsible Disclosure

09 Apr 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-responsible-disclosure/) Security researche...

Internet of Things

02 Apr 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth:-internet-of-things/) When Internet of Thin...

Is Governance the Most Important Part of GRC?

26 Mar 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-governance-the-most-important-part-of-gr...

Who Should the CISO Report To?

19 Mar 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-who-should-the-ciso-report-to/) Who should ...

Hybrid Cloud

12 Mar 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hybrid-cloud/) The consistency of your secu...

CISO Tenure

05 Mar 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ciso-tenure/) The CISO has the shortest ten...

Toxic Security Teams

27 Feb 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-toxic-security-teams/) There's an endless n...

Personality Tests in the Workplace

20 Feb 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-personality-tests-in-the-workplace/) As a c...

Lack of Diversity in Cybersecurity

13 Feb 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-lack-of-diversity-in-cybersecurity/) Cybers...

When Are CISOs Responsible for Breaches?

06 Feb 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-when-are-cisos-responsible-for-breaches/) W...

Post Breach Desperation and Salary Negotiations

30 Jan 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-post-breach-desperation-and-salary-negotiat...

Presenting to the Board

23 Jan 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-presenting-to-the-board/) What metrics, rep...

The Iran Cybersecurity Threat

16 Jan 2020

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-iran-cybersecurity-threat/) The Iran co...

Building a Fully Remote Security Team

09 Jan 2020

Contributed by Lukas

Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-building-a-fully-remote-security-team/) Could y...

Account Takeover

19 Dec 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-account-takeover/) An account takeover trad...

UX in Cybersecurity

12 Dec 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ux-in-cybersecurity/) Security products and...

InfoSec Trends for 2020

05 Dec 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-infosec-trends-for-2020/) We're coming to t...

Cybersecurity Readiness as Hiring Criteria

21 Nov 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-readiness-as-hiring-criteria/...

Cybersecurity and the Media

14 Nov 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-and-the-media/) Cybersecurity...

The Cloud and Shared Security

07 Nov 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-the-cloud-and-shared-security/) When your b...

Is Product Security Improving?

31 Oct 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-is-product-security-improving/) We've been ...

Best Starting Security Framework

24 Oct 2019

Contributed by Lukas

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-best-starting-security-framework/) If you w...

«« ← Prev Page 3 of 4 Next → »»