Defense in Depth
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Latest Episode
How to Manage Configuration Drift (13.11.2025)
Previous Episodes
- Is Least Privilege Dead?
- How Do We Measure Our Defenses Against Social Engineering Attacks?
- Sales Follow Up Sequences: What Works Best in Cyber?
- What Soft Skills Do You Need in Cyber?
- What is the Visibility That Security Teams Need?
- Data Governance in the Age of AI
- How Can Security Vendors Better Stand Out?
- What New Risks Does AI Introduce?
- The Pattern of Early Adoption of Security Tools
- How Are You Managing the Flow of AI Data
- How to Deal with Last Minute Compliance Requirements
- Do You Have a Functional Policy or Did You Just Write One?
- Where are We Struggling with Zero Trust
- Cybersecurity Has a Prioritization Problem
- How Can AI Provide Useful Guidance from Fragmented Security Data?
- Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
- What Are the Cybersecurity Trends We Need To Follow?
- Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
- What's the Most Efficient Way to Rate Third Party Vendors?
- Don't Ask "Can" We Secure It, But "How" Can We Secure It
Other podcasts
-
The Dinner Plan
-
Steal This Beer
-
Grace to You: Radio Podcast
-
Happy Healthy Whole & Rich
-
Things You Can't Un-Hear
-
Regulation Podcast
-
PBD Podcast
-
Something About the Beatles
-
20/20
-
The Real Fishwives of Paris
-
Milwaukee Uncut
-
土井善晴とクリス智子が料理を哲学するポッドキャスト supported by ZOJIRUSHI
-
The Unnamed Show
-
The Daily Motivation
-
A Dana Perino Podcast: Everything Will Be Okay
-
The LA Food Podcast
-
Gates McFadden Investigates: Who do you think you are?
-
Gloss Angeles
