HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

Defense in Depth: Personality Tests in the Workplace

As a cybersecurity leader, should you use personality tests for hiring and managing a team? Does it create diversity, understanding of communication styles, or...

Defense in Depth: Lack of Diversity in Cybersecurity

Cybersecurity teams are notoriously not diverse. At the same time we keep hearing and talking about the need for diversity. Is it critical? Can...

Defense in Depth: When Are CISOs Responsible for Breaches?

When is a CISO responsible for a breach or cyber incident? Should they be disciplined, fired, or let go with an attractive payout? Check...

Defense in Depth: Post Breach Desperation and Salary Negotiations

A data breach usually spells financial and reputational disaster. But such an event can also be an opportunity for a security professional to capitalize....

Defense in Depth: Presenting to the Board

What metrics, reports, or strategies should a security professional utilize to communicate the value to the board? Or is the mode of "presenting to...

Defense in Depth: The Iran Cybersecurity Threat

The Iran conflict has threatened new retaliations and we don't know where they're going to come from. Cyber retaliation is a real possibility. Who's...

Defense in Depth: Building a Fully Remote Security Team

Could you be successful with a fully virtual InfoSec team? Many say it can't be done, while some have actually done it and been...

Defense in Depth: Account Takeover

An account takeover traditionally follows a methodical path that takes considerable time before anything bad happens. Is it worth a company's time and effort...

Defense in Depth: UX in Cybersecurity

Security products and programs may be functional and work correctly, but are they usable in the sense that it fits into the work patterns...

Defense in Depth: InfoSec Trends for 2020

We're coming to the end of the year and that means it's time to make our predictions for 2020. Mark this episode and check...

Hacking Humans: Security Has to Be Friendly

If you want security to work at your organization, it needs to be accessible or friendly to your users. If they have to side...

Defense in Depth: Cybersecurity Readiness as Hiring Criteria

What if every candidate interviewed was tested on their cybersecurity competency? How would that affect hiring and how would that affect your company's security?...

Defense in Depth: Cybersecurity and the Media

Cybersecurity and the media. It rides the line between providing valuable information and feeding the FUD cycle. What's the media's role? Check out this post for...

Defense in Depth: The Cloud and Shared Security

When your business enters the cloud, you are transferring risk, but also adding new risk. How do you deal with sharing your security obligations...

Defense in Depth: Is Product Security Improving?

We've been at this cybersecurity thing for a long time. Are products improving their security? A recent study says they aren't. Check out this tweet...