Defense in Depth

Defense in Depth

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Latest Episode

Do You Have a Functional Policy or Did You Just Write One? (21.08.2025)

Previous Episodes

  • Where are We Struggling with Zero Trust 14.08.2025
  • Cybersecurity Has a Prioritization Problem 07.08.2025
  • How Can AI Provide Useful Guidance from Fragmented Security Data? 31.07.2025
  • Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem 24.07.2025
  • What Are the Cybersecurity Trends We Need To Follow? 17.07.2025
  • Is It Even Possible to Fast-Track Your Way Into Cybersecurity? 10.07.2025
  • What's the Most Efficient Way to Rate Third Party Vendors? 03.07.2025
  • Don't Ask "Can" We Secure It, But "How" Can We Secure It 26.06.2025
  • Has the Shared Security Model for SaaS Shifted? 12.06.2025
  • Improving the Efficiency of Your Threat Intelligence 05.06.2025
  • Why Cybersecurity Professionals Lie on Their Resumes 29.05.2025
  • What Should Be in a CISO Job Description? 22.05.2025
  • The CISO's Job Is Impossible 15.05.2025
  • Can You Have a Secure Software Environment Without Traditional Vulnerability Management? 08.05.2025
  • How Much Should Salespeople Know About Their Product? 01.05.2025
  • Why Are We Still Struggling to Fix Application Security? 24.04.2025
  • What Can Someone with No Experience Do in Cybersecurity? 17.04.2025
  • Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry? 10.04.2025
  • Can AI improve Third-Party Risk Management (TPRM) 03.04.2025
  • Cybersecurity Is NOT an Entry-Level Position 27.03.2025

Other podcasts

Radio USA App

Radio USA App

Install Radio USA for free on your smartphone and listen to your favorite radio stations online.
Radio US in the app