HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Moving Security from a Prevention to a Resilience Strategy

Are security programs drifting from a prevention to a resilience strategy? If so, are you truly operating in a resilient environment? Or are you...

How to Engage with Non-Technical Business Leaders

How do you talk to non-technical business leaders about cybersecurity? It's a concern, it's a risk, they want to know so they can make...

Cybersecurity Burnout

Why are cybersecurity professionals burning out? What's the dynamic of the job, the pressures being put on them, that causes the best to leave?...

How to Build a Greenfield Security Program

You're starting a security program from scratch and you're trying to figure out where to start, what to prioritize, and how to architect it...

Managing the Onslaught of Files

Files are still the core of how people do business. How are you dealing with the onslaught of files coming into your network? People...

Can You Have Culture Fit and Diversity, or Are They Mutually Exclusive?

Hiring managers speak about looking for culture fit and diversity, but never at the same time. Can they coexist? Are they mutually exclusive? Check out...

How to Follow Up With a CISO

Cyber sales is hard. But don't let the difficulty of doing it get in way of your good judgement. So what is the right...

Roles to Prepare You to Be a CISO

One day you want to be a CISO. What area of security you begin your studies? Or maybe you shouldn't be studying security. Check out...

Minimizing Damage from a Breach

What can we do to reduce the damage of a breach and the duration of detection and remediation? Check out this post for the discussions...

We’re All Still Learning Cyber

Learning cyber is not a question for those who are just starting out. It's for everybody. Where and how do we learn at every...

Practical Cybersecurity for IT Professionals

You’re a CISO, vCISO, or MSSP rolling into a company that has yet to launch a cybersecurity department. How do you communicate about cyber...

Data Protection for Whatever Comes Next

Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is only exacerbated...

What Is Attack Surface Profiling?

Is attack surface profiling the same as a pen test? If it isn't what unique insight can attack surface profiling deliver? Check out this post for the...

How Can You Tell If Your Security Program Is Improving?

What’s your best indicator that your security program is actually improving? And besides you and your team, is anyone impressed? Check out this post for the discussion...

How Can We Improve Recruiting of CISOs and Security Leaders?

Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gatekeepers. What can be done...