PodcastsNewsDefense in Depth

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap
Defense in Depth
Latest episode

356 episodes

  • Defense in Depth

    How Do You Know If Your Backups Will Survive a Ransomware Attack?

    30/04/2026 | 38 mins.
    All links and images can be found on CISO Series
    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Heath Renfrow, co-founder, Fenix24.
    In this episode:
    Knowing which systems to save first
    Recovery is a business conversation, not an IT ticket
    Not all systems are created equal
    Recovery knowledge as a governed asset
    A huge thanks to our sponsor, Fenix24
     
    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.
  • Defense in Depth

    What Makes a Successful Security Vendor Demo?

    23/04/2026 | 26 mins.
    What Makes a Successful Security Vendor Demo?
    All links and images can be found on CISO Series.
    Check out this post from Adam Palmer for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining is Ken Beasley, BISO, Kaiser Permanente.
    In this episode:
    Show me the problem, not the product
    Walking in blind
    Discovery is the demo
    Define the use case, set the clock
    A huge thanks to our sponsor, Fenix24

    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.
  • Defense in Depth

    Should You Use Native or 3rd Party Cloud Management Tools?

    16/04/2026 | 28 mins.
    Should You Use Native or 3rd Party Cloud Management Tools?
    All links and images can be found on CISO Series.
    Check out this post from Steve Zalewski for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is their sponsored guest, Gal Ordo, co-founder and CPO, Native.
    In this episode:
    More tools, more problems
    A gap in design
    Catching what slips through
    Competence over complexity
    A huge thanks to our sponsor, Native Security

    Native makes secure-by-design inherent to how the cloud operates. It's the control plane for built-in cloud security, unifying and governing native controls, so security intent is defined once and applied consistently across providers. Learn more at native.security.
  • Defense in Depth

    How Should We Measure the Performance of a CISO?

    09/04/2026 | 29 mins.
    How Should We Measure the Performance of a CISO?
    All links and images can be found on CISO Series.
    Check out this post from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Richards, vp, information security, CHG Healthcare.
    In this episode:
    Likability as a career strategy
    The storytelling gap
    How the math actually gets done
    The unofficial scorecard
    A huge thanks to our sponsor, ThreatLocker

    ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.
  • Defense in Depth

    How to Be Less Busy and More Effective in Cyber

    02/04/2026 | 26 mins.
    All links and images can be found on CISO Series.
    Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Ross Young, co-host, CISO Tradecraft. Joining them is Dan Walsh, CISO, Datavant. Be sure to check out Ross's book Cybersecurity's Dirty Secret: Why Most Budgets Go to Waste.
    In this episode:
    Patterns hiding in plain sight
    Activity vs. advancement
    The human cost
    Frameworks about frameworks
    A huge thanks to our sponsor, Fenix24

    Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.

More News podcasts

About Defense in Depth

Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
Podcast website

Listen to Defense in Depth, Inside Politics with Hugh Linehan and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features