Defense in Depth - podcast cover

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknapcisoseries.com
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Episodes

Proactive Security

All links and images for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-proactive-security/ ) How proactive should we be about security? What's the value of threat intelligence vs. just having security programs in place with no knowledge of what attackers are trying to do? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @A...

Aug 15, 201929 min

ATT&CK Matrix

All images and links for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-attck-matrix/ ) Is the ATT&CK Matrix the best model to build resiliency in your security team? What is the best way to take advantage of the ATT&CK framework and how do you square away conflicting data coming in from your tools. What can you trust and not trust? And is the disparity of results the fault of the tool, the user, or neither? Check out this post and this post for the discussion...

Aug 08, 201925 min

Hacker Culture

All images and links for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-hacker-culture/ ) The hacker community needs a new PR campaign. Far too many people equate hacker with criminal. But hacker is a mindset of how one approaches security. What is that approach and why are CISOs so attracted to hiring hackers? Check out this post for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and A...

Aug 01, 201925 min

Bad Best Practices

All images and links for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-bad-best-practices/ ) All professionals like to glom onto "best practices." But in security, "best" practices may be bad out of the gate, become useless over time, or they're not necessarily appropriate for all situations. Stay tuned, we're about to expose some of the worst "best" practices. Check out this post for the discussion that is the basis of our conversation on this week’s episode...

Jul 25, 201924 min

Cyber Harassment

All images and links are available on CISO Series ( https://cisoseries.com/defense-in-depth-cyber-harassment/ ) Whether a jilted lover or someone trying to wield their power over another, cyber harassment takes many forms and it doesn't stay in the digital world. It comes into our real world and gets very dangerous. What is it and how can it be thwarted? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creat...

Jul 18, 201924 min

CISO Series One Year Review

Links and images for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-ciso-series-one-year-review/) The CISO/Security Vendor Relationship Podcast is now more than a year old. On this episode, the hosts of both podcasts, reflect on the series and we respond to listeners critiques, raves, and opinions. Check out this post and this post for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and ...

Jun 25, 201928 min

Economics of Data

All images and links for this episode available at CISO Series ( https://cisoseries.com/defense-in-depth-economics-of-data/) Do we understand the value of our data? Do our adversaries? And is the way we're protecting it making it too expensive for them to steal? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ). Our sponsored guest for this episode ...

Jun 25, 201928 min

Tool Consolidation

All links and images can be found on CISO Series ( https://cisoseries.com/defense-in-depth-tool-consolidation/ ) While cybersecurity professionals always want more tools, more often than not they're dealing with too many tools delivering identical services. The redundancy is causing confusion and more importantly, cost. Why should you pay for it? How does it happen and how do InfoSec leaders consolidate tools? Check out this post and discussion for the basis of our conversation on this week’s ep...

Jun 19, 201924 min

Camry Security

Links and images for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-camry-security/ ) The Camry is not the fastest car, nor is it the sexiest. But, it is one of the most popular cars because it delivers the best value. When CISOs are looking for security products, are they also shopping for Camry's instead of "best of breed" Cadillacs? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @ds...

Jun 12, 201922 min

Amplifying Your Security Posture

All links and images can be found on CISO Series ( https://cisoseries.com/defense-in-depth-amplifying-your-security-posture/) In security, you never have enough of anything. But the scarecest resource are dedicated security people. When you're running lean, what are some creative ways and techniques to improve overall security? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan...

Jun 04, 201927 min

ERP Security

All images and links for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-erp-security/ ) For most organizations, their ERP solution holds its crown jewels. Should custom and complex applications that trade such vital customer and corporate data be secured any differently? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlford...

May 30, 201922 min

Managing Obsolete (Yet Business Critical) Systems

All links and images from this episode can be found at CISO Series ( https://cisoseries.com/defense-in-depth-managing-obsolete-yet-business-critical-systems/ ) Obsolete systems that are critical to your business. They're abandoned, unpatchable and unmanaged. We've all got them, and often upgrading is not an option. What do you do? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Al...

May 22, 201928 min

Cybersecurity Hiring

All links and images for this episode can be found on CISO Series ( https://cisoseries.com/defense-in-depth-cybersecurity-hiring/ ) Everyone needs more security talent, but what kind of talent, how specialized, and what kind of pressure is hiring requirements putting on security professionals? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ). Our g...

May 16, 201926 min

How CISOs Discover New Solutions

Find images and links for this episode on CISO Series ( https://cisoseries.com/defense-in-depth-how-cisos-discover-new-solutions/ ) Are security professionals so burned out by aggressive cybersecurity marketing that they're giving up on discovering new and innovative solutions? What are the best ways for cyber professionals to discover new solutions? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator o...

May 09, 201929 min

Is the Cybersecurity Industry Solving Our Problems?

Find all links and images from this episode on CISO Series ( https://cisoseries.com/defense-in-depth-is-the-cybersecurity-industry-solving-our-problems/ ) Is the cybersecurity industry solving our problems? We've got lots of new entrants. Are they doing anything new, or just doing the same thing slightly better? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @Allan...

May 01, 201930 min

Vulnerability Management

This is a special episode of Defense in Depth being shared on this feed. Find the full post with links and images on the CISO Series site here ( https://cisoseries.com/defense-in-depth-vulnerability-management/ ) So many breaches happen through ports of known vulnerabilities. What is the organizational vulnerability in vulnerability management? Check out this post and discussion and this one for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the cr...

Apr 25, 201921 min

Privileged Access Management

If you can't see all the show notes (with images and links) head here: https://cisoseries.com/defense-in-depth-privileged-access-management-pam/ Where does privileged access management (PAM) fit in the order of operations? Check out this post and discussion and this one for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our sponsored guest for this episode is Tim Keel...

Apr 17, 201925 min

Machine Learning Failures

Full post for this episode ( https://cisoseries.com/defense-in-depth-machine-learning-failures/ ) Is garbage in, garbage out the reason for machine learning failures? Or is there more to the equation? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest for this episode is Davi Ottenheimer ( @daviottenheimer ), product securi...

Apr 10, 201932 min

Software Fixing Hardware Problems

The full post (if you're not seeing links and images) can be found here ( https://cisoseries.com/defense-in-depth-software-fixing-hardware-problems/ ) As we have seen with the Boeing 737 MAX crashes, when software tries to fix hardware flaws, it can turn deadly. What are the security implications? Thanks to this week’s podcast sponsor, Unbound Tech Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of ...

Apr 04, 201923 min

Tools for Managing 3rd Party Risk

To see all the notes and links for this episode, go here ( https://cisoseries.com/ defense-in-depth-tools-for-managing-3rd-party-risk / ) Are there any good tools that really help to manage third-party risk? Can tools alone solve this problem? What else is required? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest for thi...

Mar 28, 201925 min

CISO Burnout

Are CISOs the most stressed individuals on a security team, or do mental health issues affect everyone in security? Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest for this episode is Gary Hayslip ( @ghayslip ), CISO, Webroot . Thanks to this week’s podcast sponsor, Praetorian As a professional services company, Praetori...

Mar 21, 201927 min

RSA 2019: Success or Failure?

Is the RSA Conference a must attend for security professionals? Or is it enough to "just be in San Francisco that week"? Check out this post and discussion for the basis of our conversation on this week's episode co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest for this episode is Tyson Martin , CISO for Lumber Liquidators . David Spark, producer of CISO Series, Tyson Martin, CISO, Lumber Liquidators, and Allan ...

Mar 14, 201930 min

Security IS the Business

If a company's brand and value is built on trust, then your security department is critical to building the value of the company. Check out this post and discussion for the basis of our conversation on this week's episode which is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest for this episode is Scott McCool ( @McCoolScott ), former CIO of Polycomm. Thanks to this week’s podcast sponsor, SpyCloud Learn more a...

Mar 07, 201926 min

Threat Intelligence

Do companies who deliver "threat intelligence" deliver on that promise, or is there more the customer needs to bring to the table to be able to take action? Check out this post and discussion for the basis of our conversation on this week's episode which is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our sponsored guest for this episode is Eric Murphy ( @_EricMurphy ), VP, security research, SpyCloud . Thanks to this...

Feb 27, 201921 min

Secure Controls Framework

Defense in Depth is available at CISOSeries.com . Is the "free to use" Secure Controls Framework the one meta-framework to rule them all? Check out this post and discussion for the basis of our conversation on this week's episode which is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest is Tom Cornelius , founder and contributor of the Secure Controls Framework (SCF) ( @scf_support ). Thanks to this week’s podca...

Feb 21, 201925 min

Insider Threats

Defense in Depth is available at CISOSeries.com . Is your own staff the greatest threat to the security of your company? On this episode of Defense in Depth we discuss protecting your business from itself. Check out this post and discussion for the basis of our conversation on this week's episode which is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest is Vijay Bolina ( @_jamesbaud_ ), CISO, Blackhawk Network ....

Feb 14, 201921 min

Building an Information Security Council

Defense in Depth is part of the CISO Series network, which can be found at CISOseries.com . Security for the business affects everyone and all departments. On this episode of Defense in Depth we discuss the values and difficulties of building an information security council. Check out this post and discussion for the basis of our conversation on this week's episode which is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel ....

Feb 07, 201924 min

Privacy

Will the privacy outcry and new regulations limit companies’ abilities to do business, or will it span a whole new industry? We discuss building a business in the new age of privacy regulations on this week’s Defense in Depth . Chris Jordan, CEO, Fluency Security This episode of Defense in Depth is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our sponsored guest is Chris Jordan , CEO of Fluency Security . Thanks to th...

Jan 31, 201929 min

Security Metrics

Defense in Depth is part of the CISO Series network which can be found at CISOSeries.com . What are the most important metrics to measure when building out your security program? One thing we learned on this episode is those metrics change, as your security program matures. This episode of Defense in Depth is co-hosted by me, David Spark ( @dspark ), the creator of CISO Series and Allan Alford ( @AllanAlfordinTX ), CISO at Mitel . Our guest is my co-host of the other show, Mike Johnson , CISO of...

Jan 23, 201924 min

Welcome to Defense in Depth

Just a quick welcome message to this weekly show covering controversial and confusing topics in cybersecurity.

Jan 21, 201934 sec