by David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Language
🇺🇲
Publishing Since
1/21/2019
Email Addresses
1 available
Phone Numbers
0 available
April 17, 2025
David Spark and Dan Walsh interview Rinki Sethi, VP and CISO of BILL, about building a cybersecurity career from scratch
April 10, 2025
David Spark and Geoff Belknap interview Alex Hutton, CISO of Atlantic Union Bank, about the impact of new Gartner categories on the cybersecurity industry.
April 3, 2025
David Spark and Jason Elrod, CISO of MultiCare Health System, interview Nick Muy, CISO of Scrut Automation, about how AI can enhance third-party risk management.
David Spark, Mike Johnson, and Andy Ellis
CISO Series
Jim Love
Johannes B. Ullrich
N2K Networks
N2K Networks
Jerry Bell and Andrew Kalat
Graham Cluley & Carole Theriault
Patrick Gray
Hacked
Malicious Life
Recorded Future News
risky.biz
Jack Rhysider
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.