Defense in Depth

By: David Spark Steve Zalewski Geoff Belknap
  • Summary

  • Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
    2018-2024 Spark Media Solutions, LLC
    Show More Show Less
activate_mytile_page_redirect_t1
Episodes
  • Can You Have a Secure Software Environment Without Traditional Vulnerability Management?
    May 8 2025

    All links and images for this episode can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Howard Holton, COO, Gigaom. Joining us is our sponsored guest, Rob Allen, chief product officer at ThreatLocker.

    In this episode:

    • Reinforcing zero trust
    • Focus on effectiveness
    • Understanding zero trust limitations
    • What's next

    Huge thanks to our sponsor, ThreatLocker

    ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

    Show More Show Less
    29 mins
  • How Much Should Salespeople Know About Their Product?
    May 1 2025

    All links and images for this episode can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet.

    In this episode:

    • Aligning incentives
    • The realities of the job
    • Delivering ROI
    • Holistic cybersecurity

    Thanks to our sponsor, Backslash Security

    Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business process, filters “triggerable” vulnerabilities, and simulates the security impact of updates. Backslash dramatically improves AppSec efficiency, eliminating legacy SAST and SCA frustration. Learn more at www.backslash.security.

    Show More Show Less
    27 mins
  • Why Are We Still Struggling to Fix Application Security?
    Apr 24 2025

    All links and images for this episode can be found on CISO Series.

    Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Eric Gold, chief evangelist, BackSlash.

    In this episode:

    • Start with the culture
    • Moving AppSec to a higher level
    • A strategy for security
    • Maturing the basics

    Thanks to our sponsor, Backslash Security

    Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business process, filters “triggerable” vulnerabilities, and simulates the security impact of updates. Backslash dramatically improves AppSec efficiency, eliminating legacy SAST and SCA frustration.

    Show More Show Less
    28 mins

What listeners say about Defense in Depth

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.