PodcastsNewsDefense in Depth

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth
Latest episode

341 episodes

  • Defense in Depth

    Don't Try to Win with Technical Expertise. Win by Partnering.

    15/01/2026 | 28 mins.
    All links and images can be found on CISO Series.
    Check out this post for the discussion that is the basis of our conversation on this week's episode, co-hosted by me, David Spark, the producer of CISO Series, and Jerich Beason, CISO, WM. Their guest is Pam Lindemoen, CSO and vp of strategy, RH-ISAC.
    In this episode:
    From loudest to most trusted
    Letting go of the win
    Listening over proving
    Beyond right and wrong
    Huge thanks to our sponsor, Alteryx

    Alteryx is a leading AI and data analytics company that powers actionable insights that help organizations drive smarter, faster decisions. Alteryx One helps security, risk, and operations leaders cut hours of manual work to minutes, generate trusted insights at scale, and turn raw data into action faster than ever. Learn more at www.alteryx.com.
  • Defense in Depth

    What Makes a Successful CISO?

    08/01/2026 | 25 mins.
    All links and images can be found on CISO Series.
    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Ejona Preci, group CISO, LINDAL Group.
    In this episode: 
    Consequence, not controls
    The credibility gap
    Defining the undefined
    Expanding the mandate
    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.
  • Defense in Depth

    How Should CISOs Talk to the Business

    18/12/2025 | 29 mins.
    All links and images can be found on CISO Series.
    Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter Gregory. His upcoming study guide on AI governance can be pre-ordered here.
    In this episode:
    Speaking the language of leadership
    Beyond translation: the trust factor
    Making risk tangible
    When translation isn't enough
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.
  • Defense in Depth

    How Much Cyber Risk Should a CISO Own?

    11/12/2025 | 32 mins.
    All links and images can be found on CISO Series.
    Check out this post by Nick Nolen of Redpoint Cyber for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Erika Dean, former CSO, Robinhood.
    In this episode:
    Delegation requires accountability
    The reality of daily decision-making
    The gap between theory and practice
    Beyond the advisory role
    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO
  • Defense in Depth

    How To Tell When a Vendor is Selling AI Snake Oil

    04/12/2025 | 33 mins.
    All links and images can be found on CISO Series.
    Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast.
    In this episode:
    Understanding the fundamentals
    The grift of superficial expertise
    Hands-on experience matters 
    A vulnerability at the leadership level
    Huge thanks to our sponsor, Stellar Cyber

    By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to fight them, and act decisively – protecting what matters most. Stellar Cyber's award-winning open security operations platform includes AI-driven SIEM, NDR, ITDR, Open XDR, and Multi-Layer AI™ under one unified platform with a single license. With ⅓ of the global top 250 MSSPs and over 14,000 customers worldwide, Stellar Cyber is one of the most trusted leaders in security operations. Learn more at https://stellarcyber.ai/.

More News podcasts

About Defense in Depth

Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Podcast website

Listen to Defense in Depth, Politics Now and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/20/2026 - 11:22:19 AM