Defense in Depth
Episodes
Cyber Defense Matrix
17 Oct 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/) A simple way to visu...
User-Centric Security
10 Oct 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-user-centric-security/) How can software an...
Securing the New Internet
03 Oct 2019
Contributed by Lukas
All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-securing-the-new-internet/) If you could r...
Resiliency
26 Sep 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-resiliency/) How fortified is the business ...
Ransomware
19 Sep 2019
Contributed by Lukas
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ransomware/) Why is Ransomware so prevalent...
Top CISO Communication Issues
12 Sep 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-top-ciso-communication-issues/) Understandi...
Cybersecurity Excuses
05 Sep 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-excuses/) "I've got all the ...
Employee Hacking
29 Aug 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-employee-hacking/) A cyber professional nee...
100% Security
22 Aug 2019
Contributed by Lukas
100% Security. A great idea that's impossible to achieve. Regardless, CEOs are still asking for it. How should security people respond and we'll discu...
Proactive Security
15 Aug 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-proactive-security/) How proactive should w...
ATT&CK Matrix
08 Aug 2019
Contributed by Lukas
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-attck-matrix/) Is the ATT&CK Matrix the bes...
Hacker Culture
01 Aug 2019
Contributed by Lukas
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-hacker-culture/) The hacker community needs...
Bad Best Practices
25 Jul 2019
Contributed by Lukas
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bad-best-practices/) All professionals like...
Cyber Harassment
18 Jul 2019
Contributed by Lukas
All images and links are available on CISO Series (https://cisoseries.com/defense-in-depth-cyber-harassment/) Whether a jilted lover or someone trying...
CISO Series One Year Review
25 Jun 2019
Contributed by Lukas
Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-ciso-series-one-year-review/) The CISO/Securi...
Economics of Data
25 Jun 2019
Contributed by Lukas
All images and links for this episode available at CISO Series (https://cisoseries.com/defense-in-depth-economics-of-data/) Do we understand the val...
Tool Consolidation
19 Jun 2019
Contributed by Lukas
All links and images can be found on CISO Series (https://cisoseries.com/defense-in-depth-tool-consolidation/) While cybersecurity professionals alway...
Camry Security
12 Jun 2019
Contributed by Lukas
Links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-camry-security/) The Camry is not the fastest c...
Amplifying Your Security Posture
04 Jun 2019
Contributed by Lukas
All links and images can be found on CISO Series (https://cisoseries.com/defense-in-depth-amplifying-your-security-posture/) In security, you never ha...
ERP Security
30 May 2019
Contributed by Lukas
All images and links for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-erp-security/) For most organizations, thei...
Managing Obsolete (Yet Business Critical) Systems
22 May 2019
Contributed by Lukas
All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-managing-obsolete-yet-business-critical-sy...
Cybersecurity Hiring
16 May 2019
Contributed by Lukas
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-hiring/) Everyone needs more ...
How CISOs Discover New Solutions
09 May 2019
Contributed by Lukas
Find images and links for this episode on CISO Series (https://cisoseries.com/defense-in-depth-how-cisos-discover-new-solutions/) Are security profess...
Is the Cybersecurity Industry Solving Our Problems?
01 May 2019
Contributed by Lukas
Find all links and images from this episode on CISO Series (https://cisoseries.com/defense-in-depth-is-the-cybersecurity-industry-solving-our-problems...
Vulnerability Management
25 Apr 2019
Contributed by Lukas
This is a special episode of Defense in Depth being shared on this feed. Find the full post with links and images on the CISO Series site here (https:...
Privileged Access Management
17 Apr 2019
Contributed by Lukas
If you can't see all the show notes (with images and links) head here: https://cisoseries.com/defense-in-depth-privileged-access-management-pam/ Wher...
Machine Learning Failures
10 Apr 2019
Contributed by Lukas
Full post for this episode (https://cisoseries.com/defense-in-depth-machine-learning-failures/) Is garbage in, garbage out the reason for machine lear...
Software Fixing Hardware Problems
04 Apr 2019
Contributed by Lukas
The full post (if you're not seeing links and images) can be found here (https://cisoseries.com/defense-in-depth-software-fixing-hardware-problems/) A...
Tools for Managing 3rd Party Risk
28 Mar 2019
Contributed by Lukas
To see all the notes and links for this episode, go here (https://cisoseries.com/defense-in-depth-tools-for-managing-3rd-party-risk/) Are there any go...
CISO Burnout
21 Mar 2019
Contributed by Lukas
Are CISOs the most stressed individuals on a security team, or do mental health issues affect everyone in security? Check out this post and discussio...
RSA 2019: Success or Failure?
14 Mar 2019
Contributed by Lukas
Is the RSA Conference a must attend for security professionals? Or is it enough to "just be in San Francisco that week"? Check out this post and disc...
Security IS the Business
07 Mar 2019
Contributed by Lukas
If a company's brand and value is built on trust, then your security department is critical to building the value of the company. Check out this post...
Threat Intelligence
27 Feb 2019
Contributed by Lukas
Do companies who deliver "threat intelligence" deliver on that promise, or is there more the customer needs to bring to the table to be able to take a...
Secure Controls Framework
21 Feb 2019
Contributed by Lukas
Defense in Depth is available at CISOSeries.com. Is the "free to use" Secure Controls Framework the one meta-framework to rule them all? Check out ...
Insider Threats
14 Feb 2019
Contributed by Lukas
Defense in Depth is available at CISOSeries.com. Is your own staff the greatest threat to the security of your company? On this episode of Defense ...
Building an Information Security Council
07 Feb 2019
Contributed by Lukas
Defense in Depth is part of the CISO Series network, which can be found at CISOseries.com. Security for the business affects everyone and all departme...
Privacy
31 Jan 2019
Contributed by Lukas
Will the privacy outcry and new regulations limit companies' abilities to do business, or will it span a whole new industry? We discuss building a bus...
Security Metrics
23 Jan 2019
Contributed by Lukas
Defense in Depth is part of the CISO Series network which can be found at CISOSeries.com. What are the most important metrics to measure when building...
Welcome to Defense in Depth
21 Jan 2019
Contributed by Lukas
Just a quick welcome message to this weekly show covering controversial and confusing topics in cybersecurity.