『Defense in Depth』のカバーアート

Defense in Depth

Defense in Depth

著者: David Spark Steve Zalewski Geoff Belknap
無料で聴く

このコンテンツについて

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.2018-2024 Spark Media Solutions, LLC 政治・政府
エピソード
  • Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
    2025/07/10

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is David Cross, CISO, Atlassian.

    In this episode:

    • The experience prerequisite
    • The bootcamp reality check
    • The compensation conundrum
    • The domain expertise imperative

    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
    続きを読む 一部表示
    27 分
  • What's the Most Efficient Way to Rate Third Party Vendors?
    2025/07/03

    All posts and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Steve Knight, former CISO, Hyundai Capital America.

    In this episode:

    • Streamlining vendor evaluations
    • Moving beyond compliance theater
    • The scorecard skeptics
    • Finding the right balance

    Thanks to our sponsor, Formal

    Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.

    続きを読む 一部表示
    28 分
  • Don't Ask "Can" We Secure It, But "How" Can We Secure It
    2025/06/26

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology.

    In this episode

    • Embracing growth
    • An urgent need for creativity
    • Get the business context
    • Embrace your inner theater kid

    Huge thanks to our sponsor, Query.ai

    Query is a Federated Search and Analytics platform that builds a security data mesh, giving
    security teams real-time context from all connected sources. Analysts move faster and make
    better decisions with AI agents and copilots that handle the grunt work and guide each step.
    Learn more at query.ai

    続きを読む 一部表示
    28 分

Defense in Depthに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。