HomePodcastDefense in Depth

Defense in Depth

Defense In Depth

How to Prime Your Data Lake

A security data lake, a data repository of everything you need to analyze and get analyzed sounds wonderful. But priming that lake, and stocking...

Getting Ahead Of Your Threat Intelligence Program

A threat intelligence program sounds like a worthy effort in any security program. But, can you pull it off? There are so many phases...

How Security Leaders Deal with Intense Stress

When you have an incident and you're engulfed by the stress that lasts more than a day, how do you manage and deal with...

How Do We Influence Secure Behavior?

We all know that our employees need to be more security aware, but what are the methods to get them there? How can we...

Security Concerns with ChatGPT

Users have tried to upload sensitive company information and PII, personally identifiable information, into ChatGPT. Those who are successful getting the data in, have...

Create A Pipeline of Cyber Talent

The demand for cybertalent is sky high. It's very competitive to get those people with key skills. What if you were to train your...

Improving Adoption of Least Privileged Access

What are we doing to improve access management? Make it too loose and it's the number one way organizations get breached. Put on too...

Securing SaaS Applications

With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy? Check out this post for...

How Do We Get Better Control of Cloud Data?

When it comes to data, compliance, and reducing risk, where are we gaining control? Where are we losing control? And what are we doing...

Finding Your Security Community

If you're struggling to get your first job in security or you're trying to get back into the industry after being laid off, you...

Let’s Write Better Cybersecurity Job Descriptions

What should a cyber job description require, and what shouldn't it? What's reasonable and not reasonable? Check out this post for the discussion that is...

How Should Security Better Engage with Application Owners?

Since so much technology today is not launched by the IT department, but by business units themselves. How do security professionals engage with business...

How To Get More People Into Cybersecurity

There are millions of cybersecurity jobs open. Over time, that number has just been growing. What we're doing now does not seem to be...

How to Create a Positive Security Culture

How do you create a positive security culture? It's rarely the first concept anyone wants to embrace, yet it's important everyone understands their responsibility....

How Should We Trust Entry Level Employees?

All experienced security professionals were at one time very green. Entry level status means risk to your organization. That's if you give them too...