Defense in Depth cover art

Defense in Depth

Defense in Depth

By: David Spark Steve Zalewski Geoff Belknap
Listen for free

About this listen

Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.2018-2024 Spark Media Solutions, LLC Politics & Government
Episodes
  • How to Engage With a CISO When They Express Interest
    Mar 26 2026

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week's episode, co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Adam Palmer, CISO, First Hawaiian Bank. Be sure to check out David's book, Three Feet from Seven Figures: One-on-One Engagement Techniques to Qualify More Leads at Trade Shows.

    In this episode:

    • Lead with insight, not persuasion
    • Recognize the opportunity when it arrives
    • Strategy over features
    • Keep it efficient

    A huge thanks to our sponsor, Endor Labs

    Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces. Learn more at endorlabs.com.

    Show More Show Less
    32 mins
  • Who is Responsible for the Conflict Between Security and Developers?
    Mar 19 2026

    All links and images can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week's episode, co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining is their sponsored guest, Matt Brown, solutions architect, Endor Labs.

    In this episode:

    • The development disconnect
    • Functionality first, security second
    • The incentive problem
    • Speed as the common ground

    A huge thanks to our sponsor, Endor Labs

    Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces. Learn more at www.endorlabs.com.

    Show More Show Less
    33 mins
  • Are Your Security Tools Creating More Work for Your Team?
    Mar 12 2026

    All links and images can be found on CISO Series.

    Check out this post by Caleb Sima for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Evan McHenry, CISO, Robinhood.

    In this episode:

    • The information paradox
    • Setting realistic expectations
    • Prioritization over noise
    • The cart before the horse

    Huge thanks to our sponsor, Endor Labs

    Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces.

    Show More Show Less
    36 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.