Defense in Depth

David Spark

About

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Available on

Community

255 episodes

How to Improve Your Relationship With Your Boss

All links and images for this episode can be found on CISO Series. Check out this post Monte Pedersen of The CDA Group for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/.  Joining us is our guest, Jerry Davis, division director for cyber defense at Truist Bank. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, OFFSEC img http://offsec.com/trial

29m
Mar 28
Improving the Responsiveness of Your SOC

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our sponsored guest, Spencer Thompson, CEO, Prelude. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, PRELUDE img

27m
Mar 21
The Demand for Affordable Blue Team Training

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Ron Gula, president and co-founder, Gula Tech Adventures https://www.gula.tech/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img

29m
Mar 14
Why are CISOs Excluded from Executive Leadership?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Ben Sapiro, head of global cyber security services, Manulife. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img

33m
Mar 07
What Is Your SOC's Single Search of Truth?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Matt Eberhart, CEO, Query https://query.ai. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, QUERY img

30m
Feb 29
When Is Data an Asset and When Is It a Liability?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is my guest, Mario Trujillo, staff attorney, Electronic Frontier Foundation. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, MATERIAL SECURITY img Material Security is purpose-built to stop attacks and reduce risk across Microsoft 365 and Google Workspace with unified cloud email security, data loss prevention, and posture management. Learn more at material.security.

34m
Feb 22
Tracking Anomalous Behaviors of Legitimate Identities

All links and images for this episode can be found on CISO Series. The Verizon DBIR found that about half of all breaches involved legitimate credentials. It’s a huge attack surface that we’re only starting to get a handle of. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Adam Koblentz, field CTO, Reveal Security http://reveal.security/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, REVEAL SECURITY img

34m
Feb 15
Why Do Cybersecurity Startups Fail?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Mike Levin, deputy CISO, 3M. IN THIS EPISODE: __ __ Thanks to our podcast sponsor, RevealSecurity! img https://hubs.li/Q02hJcXj0

31m
Feb 08
Is "Compliance Doesn't Equal Security" a Pointless Argument?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Derek Fisher, Executive director of product security, JPMorgan. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, REVEALSECURITY! img

33m
Feb 01
CISOs Responsibilities Before and After an M&A

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Alexandra Landegger, Executive Director and CISO, Collins Aerospace. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, APHINIA! img https://aphinia.com/#signup_form

30m
Jan 25
Use Red Teaming To Build, Not Validate, Your Security Program

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Richard Ford, CTO, Praetorian https://www.praetorian.com/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/

31m
Jan 18
The Do's and Don'ts of Approaching CISOs

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Adam Glick, CISO, PSG https://www.psgequity.com/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/

31m
Jan 11
Doing Third Party Risk Management Right

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, Erik Decker, CISO, Intermountain Health https://intermountainhealthcare.org/. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, PRAETORIAN img https://www.praetorian.com/

30m
Jan 04
Warning Signs You're About To Be Attacked

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our sponsored guest, Trevor Hilligoss, senior director of security research, SpyCloud. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img https://spycloud.com/ciso/

33m
Dec 14, 2023
Do We Have to Fix ALL the Critical Vulnerabilities?

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining me is our guest, David Christensen https://www.linkedin.com/in/jdchrist/, VP, CISO, PlanSource. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img

30m
Dec 07, 2023
Mitigating Generative AI Risks

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our guest, Jerich Beason, CISO, WM. IN THIS EPISODE: __ __ THANKS TO OUR PODCAST SPONSOR, SPYCLOUD img

32m
Nov 30, 2023
Building a Cyber Strategy for Unknown Unknowns

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our sponsored guest, Himaja Motheram, Censys https://censys.com/contact/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, CENSYS img

29m
Nov 16, 2023
Responsibly Embracing Generative AI

All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Russell Spitler, CEO and co-founder, Nudge Security https://www.nudgesecurity.com/. In this episode: __ __ THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img

33m
Nov 09, 2023
People Are the Top Attack Vector (Not the Weakest Link)

All links and images for this episode can be found on CISO Series. In increasingly complex technical defenses, threat actors frequently target the human element. This makes them a top attack vectors, but are they actually the weak leak in your defenses? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our guest, Christina Shannon, CIO, KIK Consumer Products https://www.kikcorp.com/. THANKS TO OUR PODCAST SPONSOR, SPHERE img In this episode: __ __

30m
Nov 02, 2023
What's Entry Level in Cybersecurity?

All links and images for this episode can be found on CISO Series. We often talk about the contradiction of seemingly entry-level security jobs requiring years of experience. But maybe that's because entry-level jobs don't actually exist. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us this week is our guest Jay Wilson, CISO, Insurity https://insurity.com/. THANKS TO OUR PODCAST SPONSOR, SLASHNEXT img https://slashnext.com/request-a-demo/ In this episode: __ __

31m
Oct 26, 2023
New SEC Rules for Cyber Security

All links and images for this episode can be found on CISO Series. The Securities and Exchange Commission issued new cyber rules. What do these new rules mean for CISOs and will they ultimately improve our cybersecurity posture? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our guest, Jamil Farshchi, CISO, Equifax https://www.equifax.com/. THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img In this episode: __ __

35m
Oct 19, 2023
The Value of RSA, Black Hat, and Mega Cyber Tradeshows

All links and images for this episode can be found on CISO Series. Are trade shows like RSA getting so big that there's not enough economic value for a CISO to attend? Or do these events have enough industry gravity to justify the spend? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest Lee Parrish, CISO, Newell Brands https://www.newellbrands.com/. THANKS TO OUR PODCAST SPONSOR, CENSYS img In this episode: __ __

29m
Oct 12, 2023
Is Remote Work Helping or Hurting Cybersecurity?

All links and images for this episode can be found on CISO Series. Work from home flourished during the pandemic. Many workers love it and don't want to go back. Some organizations are pushing for a return to the office. Is in-office work necessary to improve productivity and cybersecurity posture? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us for the episode is our guest, Shawn Bowen, CISO, World Kinect Corporation https://www.wfscorp.com/. THANKS TO OUR PODCAST SPONSOR, NUDGE SECURITY img In this episode: __ __

31m
Oct 05, 2023
How to Manage Users' Desires for New Technology

All links and images for this episode can be found on CISO Series. Large language models and generative AI are today's disruptive technology. This is not the first time companies just want to ban a new technology that everyone loves. Yet, we're doing it all over again. Whether its ChatGPT or BYOD, people are going to use desirable new tech. So if our job isn't to stop it, how do we secure it? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Carla Sweeney, SVP, InfoSec, Red Ventures. https://www.redventures.com/careers THANKS TO OUR PODCAST SPONSOR, CENSYS img In this episode: __ __

23m
Sep 28, 2023
Cybersecurity Questions Heard Around the Kitchen Table

All links and images for this episode can be found on CISO Series. What do the people least in the know about cyber, want to know? What are they asking? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Caitlin Sarian, AKA cybersecuritygirl on TikTok. THANKS TO OUR PODCAST SPONSOR, DATABEE FROM COMCAST TECHNOLOGY SOLUTIONS img In this episode: __ __

30m
Sep 21, 2023
How to Prime Your Data Lake

All links and images for this episode can be found on CISO Series. A security data lake, a data repository of everything you need to analyze and get analyzed sounds wonderful. But priming that lake, and stocking it with the data you want to get the insights you need is a more difficult task than it seems. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our sponsored guest, Matt Tharp, Head of Field Engineering, Comcast DataBee. THANKS TO OUR PODCAST SPONSOR, COMCAST TECHNOLOGY SOLUTIONS img In this episode: __ __

27m
Sep 14, 2023
Getting Ahead Of Your Threat Intelligence Program

All links and images for this episode can be found on CISO Series. A threat intelligence program sounds like a sound effort in any security program. But, can you pull it off? There are so many phases to execute properly. Blow it with any one of them and your threat intelligence effort is moot. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us today is our special guest Jon Oltsik, distinguished analyst and fellow, Enterprise Strategy Group. THANKS TO OUR PODCAST SPONSOR, COMCAST img In this episode: __ __

33m
Sep 07, 2023
How Security Leaders Deal with Intense Stress

All links and images for this episode can be found on CISO Series. When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with it? And not only how do you manage your stress, but how do you manage everyone else's? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest, Tim Brown, CISO, Solarwinds https://www.solarwinds.com/. THANKS TO OUR PODCAST SPONSOR, PUSH SECURITY img . In this episode: __ __

40m
Aug 31, 2023
How Do We Influence Secure Behavior?

All links and images for this episode can be found on CISO Series. We all know that our employees need to be more security aware, but what are the methods to get them there? How can we make our employees more security conscious? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Jack Chapman, vp, threat intelligence, Egress. THANKS TO OUR PODCAST SPONSOR, EGRESS img In this episode: __ __

31m
Aug 24, 2023
Security Concerns with ChatGPT

All links and images for this episode can be found on CISO Series. Users have tried to upload sensitive company information and PII, personally identifiable information, into ChatGPT. Those who are successful getting the data in, have now made that data free to all. Will people's misuse of these generative AI programs be our greatest downfall to security and privacy? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap http://twitter.com/geoffbelknap), CISO, LinkedIn http://linkedin.com/. Joining us is our special guest Suha Can, CISO, Grammarly. THANKS TO OUR PODCAST SPONSOR, OPAL img In this episode: __ __

28m
Aug 17, 2023