Defense in Depth – Details, episodes & analysis

Podcast details

Technical and general information from the podcast's RSS feed.

Defense in Depth

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Technology
News

Frequency: 1 episode/7d. Total Eps: 319

Libsyn
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Site
RSS
Apple

Recent rankings

Latest chart positions across Apple Podcasts and Spotify rankings.

Apple Podcasts
  • 🇺🇸 USA - technology

    26/07/2025
    #100
  • 🇺🇸 USA - technology

    25/07/2025
    #100
  • 🇫🇷 France - technology

    23/07/2025
    #100
  • 🇨🇦 Canada - technology

    13/07/2025
    #98
  • 🇨🇦 Canada - technology

    12/07/2025
    #97
  • 🇬🇧 Great Britain - technology

    23/06/2025
    #76
  • 🇬🇧 Great Britain - technology

    22/06/2025
    #83
  • 🇬🇧 Great Britain - technology

    21/06/2025
    #75
  • 🇩🇪 Germany - technology

    11/06/2025
    #97
  • 🇨🇦 Canada - technology

    10/06/2025
    #91
Spotify

    No recent rankings available



RSS feed quality and score

Technical evaluation of the podcast's RSS feed quality and structure.

See all
RSS feed quality
To improve

Score global : 53%


Publication history

Monthly episode publishing history over the past years.

Episodes published by month in

Latest published episodes

Recent episodes with titles, durations, and descriptions.

See all

What's Working With Third-Party Risk Management?

jeudi 29 août 2024Duration 31:02

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Nick Muy, CISO, Scrut Automation.

In this episode:

  • Segment and test
  • Focus on you

  • Embrace the risk lifecycle

  • Not all vendors are the same

Thanks to our podcast sponsor, Scrut Automation

Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Our best-in-class features like process automation, AI, and 75+ native integrations reverse compliance debt and help manage risk proactively as your business grows. Visit www.scrut.io to learn more or schedule a demo.

What Triggers a CISO?

jeudi 22 août 2024Duration 33:27

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Sherron Burgess, CISO, BCD Travel.

In this episode:

  • Disingenuous claims rub everyone the wrong way. 
  • Don’t put the CISO behind the 8-ball

  • The sales hustle

  • They didn’t understand the assignment

Thanks to our podcast sponsor, Scrut Automation

Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Our best-in-class features like process automation, AI, and 75+ native integrations reverse compliance debt and help manage risk proactively as your business grows. Visit www.scrut.io to learn more or schedule a demo.

What Makes a Successful CISO?

jeudi 13 juin 2024Duration 33:40

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Christina Shannon, CIO, KIK Consumer Products. Joining us is our guest, Tomer Gershoni, CSO, Zoominfo.

In this episode:

  • Moving beyond technology

  • The art of a CISO

  • CISOs always operate in context

  • Elevating the CISO conversation

Thanks to our podcast sponsor, SeeMetrics

SeeMetrics automates cybersecurity metrics programs, continuously measuring and helping prioritize risks based on context. SeeMetrics unifies siloed data from your security stack and offers hundreds of ready-to-use metrics. Once connected with SeeMetrics, security teams reduce risk, minimize exposure and optimize performance while eliminating tedious repetitive manual work.

Ready to automate your security programs? start connecting your environment at seemetrics.co

We're All Still Learning Cyber

jeudi 11 août 2022Duration 28:21

All links and images for this episode can be found on CISO Series

Learning cyber is not a question for those who are just starting out. It's for everybody. Where and how do we learn at every stage of our professional careers?

Check out this post for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our guest is Jerich Beason, CISO, Commercial, Capital One.

Thanks to our podcast sponsor, SlashNext

SlashNext protects the modern workforce from phishing and human hacking across all digital channels. SlashNext Complete™ utilizes our patented AI SEER™ technology to detect zero-hour phishing threats by performing dynamic run-time analysis on billions of URLs a day through virtual browsers and machine learning. Take advantage of SlashNext's phishing defense services for email, browser, mobile, and API.

In this episode:

  • Where do we go to learn at every stage of our professional careers?
  • We discuss how the learning process never really stops, but is on-going with cyber professionals continuing to learn throughout their careers.
  • Why is the “know-it-all” leader a red flag to avoid?

Practical Cybersecurity for IT Professionals

jeudi 4 août 2022Duration 28:26

All links and images for this episode can be found on CISO Series

You’re a CISO, vCISO, or MSSP rolling into a company that has yet to launch a cybersecurity department. How do you communicate about cyber with the IT department? They’re not completely new to cyber. What’s the approach to engagement that helps, but doesn’t insult? How do you offer practical cybersecurity advice?

Check out this post for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is sponsored guest Scott McCrady (@scottsman3), CEO, SolCyber.

Thanks to our podcast sponsor, SolCyber

At SolCyber we're hell-bent on delivering Fortune 500 level cyber security for small and medium-sized enterprises. When you're being targeted by the same bad guys, nothing else will do. We bring to the table a curated stack of leading technologies and around-the-clock SOC support, all simply priced per user. Let us do the heavy lifting.

In this episode:

  • How do you communicate about cyber with the IT department?
  • What’s the approach to engagement that helps, but doesn’t insult?
  • How do you offer practical cybersecurity advice?

Data Protection for Whatever Comes Next

jeudi 28 juillet 2022Duration 25:46

All links and images for this episode can be found on CISO Series

Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is only exacerbated every time we move our data to a new platform. How do we secure data today, to be ready for whatever comes next in computing?

Check out this post and this post for the discussion that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and guest co-host Gary Hayslip (@ghayslip), global CISO, SoftBank Investment Advisers. Our sponsored guest is Elliot Lewis (@ElliotDLewis), CEO, Keyavi.

Thanks to our podcast sponsor, Keyavi

Myth: Data can’t protect itself. Fact: Now it does! You control where your data goes in the world, who can access it and when. On any device. Anytime. Anywhere. FOREVER. Learn more at Keyavi.com.

In this episode:

  • How do we secure data today, to be ready for whatever comes next in computing?
  • How do we go about building a data transformation program that's platform agnostic?
  • Why has this simple concept turned into a monumental task?

What Is Attack Surface Profiling?

jeudi 21 juillet 2022Duration 31:36

All links and images for this episode can be found on CISO Series

Is attack surface profiling the same as a pen test? If it isn't what unique insight can attack surface profiling deliver?

Check out this post for the discussion that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Nick Shevelyov, former CSO, Silicon Valley Bank.

Thanks to our podcast sponsor, Keyavi

Myth: Data can’t protect itself. Fact: Now it does! You control where your data goes in the world, who can access it and when. On any device. Anytime. Anywhere. FOREVER. Learn more at Keyavi.com.

In this episode:

  • Is attack surface profiling the same as a pen test?
  • What unique insight can attack surface profiling deliver?
  • Is “Attack Surface Profiling” more like a natural evolution from traditional vulnerability management?

How Can You Tell If Your Security Program Is Improving?

jeudi 14 juillet 2022Duration 31:17

All links and images for this episode can be found on CISO Series

What’s your best indicator that your security program is actually improving? And besides you and your team, is anyone impressed?

Check out this post for the discussion that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Our guest is Simon Goldsmith (@cybergoldsmith), director of information security, OVO Energy.

Thanks to our podcast sponsor, Votiro

Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes evasive and unknown malware from content in milliseconds, without impacting file fidelity or usability. It even works on password-protected and zipped files. Plus, it’s an API, so it integrates with everything – including Microsoft 365. Learn more at Votiro.com.

In this episode:

  • What's the best indicator that your security program is actually improving?
  • Does anyone care that you're actually improving your security posture?
  • What should we be measuring to prove a security program is working and getting better?

How Can We Improve Recruiting of CISOs and Security Leaders?

jeudi 7 juillet 2022Duration 29:50

All links and images for this episode can be found on CISO Series

Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gatekeepers. What can be done to improve recruiting of CISOs?

Check out this post and this post for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn with our guest Ty Sbano (@tysbano), CISO, Vercel.

Thanks to our podcast sponsor, Thinkst

Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this.
Deploy Canaries in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.

In this episode:

  • What can be done to improve CISO recruiting?
  • Is there a disconnect between HR and what the company actually needs regarding a position?
  • How long should the interview process take?

How Is Our Data Being Weaponized Against Us?

jeudi 30 juin 2022Duration 28:06

All links and images for this episode can be found on CISO Series

How are nefarious actors using our own data (and metadata) against us? And given that, in what way have we lost our way protecting data that needs to be course corrected?

Check out this post for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our sponsored guest is John Ayers (@cyberjohn1747), vp of advanced detection and response office of the CTO, Optiv.

Thanks to our podcast sponsor, Optiv

The modern enterprise needs a solution as unique as its business.
 
Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutter and find the ideal security solutions for your business. ADR delivers tailored detection and response backed by technology, real-time intel and deep expertise applied at touch. Bottom line: ADR finds and neutralizes threats fast, so you can focus on what matters.

In this episode:

  • How are nefarious actors using our own data (and metadata) against us?
  • In what way have we lost our way protecting data that needs to be corrected?
  • We examine how our interconnectedness is both a blessing and a curse.
  • Is there already far too much sensitive data in essentially open source intelligence?

Related Shows Based on Content Similarities

Discover shows related to Defense in Depth, based on actual content similarities. Explore podcasts with similar topics, themes, and formats, backed by real data.
Génération Do It Yourself
The Informed Life
UI Breakfast: UI/UX Design and Product Strategy
The Long View
REWORK
Design Thinking 101
Did I Do That?
The Podcast Profits Unleashed Podcast
Marketing Against The Grain
Research in Action | A podcast for faculty & higher education professionals on research design, methods, productivity & more
© My Podcast Data