Defense in Depth
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Latest Episode
In the Age of Identity, is Network Security Dead? (20.11.2025)
Previous Episodes
- How to Manage Configuration Drift
- Is Least Privilege Dead?
- How Do We Measure Our Defenses Against Social Engineering Attacks?
- Sales Follow Up Sequences: What Works Best in Cyber?
- What Soft Skills Do You Need in Cyber?
- What is the Visibility That Security Teams Need?
- Data Governance in the Age of AI
- How Can Security Vendors Better Stand Out?
- What New Risks Does AI Introduce?
- The Pattern of Early Adoption of Security Tools
- How Are You Managing the Flow of AI Data
- How to Deal with Last Minute Compliance Requirements
- Do You Have a Functional Policy or Did You Just Write One?
- Where are We Struggling with Zero Trust
- Cybersecurity Has a Prioritization Problem
- How Can AI Provide Useful Guidance from Fragmented Security Data?
- Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem
- What Are the Cybersecurity Trends We Need To Follow?
- Is It Even Possible to Fast-Track Your Way Into Cybersecurity?
- What's the Most Efficient Way to Rate Third Party Vendors?
Radio Stations
Other podcasts
-
Radio HITS Radio -GUEST ARCHIVE-
-
Money For Couples with Ramit Sethi
-
All Songs Considered
-
All Things Considered
-
Pilot TV
-
The History of England
-
Naval
-
Bookmarked by Reese's Book Club
-
Question Time
-
Opera For Everyone
-
Joyce Meyer Enjoying Everyday Life® TV Podcast
-
BondCast: James Bond 007
-
The Bookshelf with Ryan Tubridy
-
The Real Story
-
Today with tonies
-
Tales for Wales: A Welsh History Podcast
-
Kill James Bond!
-
Your Morning Boost
