Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Player FM - Internet Radio Done Right
207 subscribers
Checked 7h ago
Lagt till six år sedan
Innehåll tillhandahållet av David Spark, Steve Zalewski, and Geoff Belknap. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av David Spark, Steve Zalewski, and Geoff Belknap eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !
Gå offline med appen Player FM !
Defense in Depth
Markera alla som (o)spelade ...
Manage series 2478315
Innehåll tillhandahållet av David Spark, Steve Zalewski, and Geoff Belknap. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av David Spark, Steve Zalewski, and Geoff Belknap eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
298 episoder
Markera alla som (o)spelade ...
Manage series 2478315
Innehåll tillhandahållet av David Spark, Steve Zalewski, and Geoff Belknap. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av David Spark, Steve Zalewski, and Geoff Belknap eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
298 episoder
Alla avsnitt
×D
Defense in Depth


1 Is Platformization Vs Best-of-Breed a False Dichotomy? 29:00
29:00
Spela Senare
Spela Senare
Listor
Gilla
Gillad29:00
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Geoff Belknap ( @geoffbelknap ). Joining us is Elad Koren , vp, product management, Cortex Cloud, Palo Alto Networks . In this episode: Context drives the decision A full-spectrum understanding Think practical The long play Thanks to our podcast sponsor, Palo Alto Networks Cortex Cloud, the next generation of Prisma Cloud, merges best-in-class CDR with industry-leading CNAPP for real-time cloud security. Harness the power of AI and automation to prioritize risks with runtime context, enable remediation at scale, and stop attacks as they occur. Bring together your cloud and SOC on the unified Cortex platform to transform end-to-end operations. Experience the future of real-time cloud security at https://www.paloaltonetworks.com/cortex/cloud .…
D
Defense in Depth


1 Protecting Your Backups from Ransomware 29:43
29:43
Spela Senare
Spela Senare
Listor
Gilla
Gillad29:43
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and DJ Schleen , former distinguished security architect, Yahoo. Joining us is our sponsored guest Heath Renfrow , co-founder, Fenix24. In this episode: Get creative Shift the focus of backups Failing the test Moving beyond false hope Thanks to our podcast sponsor, Fenix24 You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works .…
D
Defense in Depth


1 Can a Security Program Ever Reach Maintenance Mode? 25:12
25:12
Spela Senare
Spela Senare
Listor
Gilla
Gillad25:12
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Geoff Belknap ( @geoffbelknap ). Joining us is Andrew Wilder , CISO, Vetcor . In this episode: It comes down to growth Maintenance mode is anything but simple An asymmetric arrangement Integrating with the business Thanks to our podcast sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com .…
D
Defense in Depth


1 The Hardest Problems in Security Aren't "Security Problems" 25:52
25:52
Spela Senare
Spela Senare
Listor
Gilla
Gillad25:52
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Geoff Belknap ( @geoffbelknap ). Joining us Sneha Parmar , information security officer, Lufthansa Group Digital Hangar . In this episode: Build the foundation Building at scale Excelling at boring Knowing what you’ve got is half the battle Thanks to our podcast sponsor, Fenix24 You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works .…
D
Defense in Depth


1 If and When Should a CISO Have a Long Term Security Plan? 29:20
29:20
Spela Senare
Spela Senare
Listor
Gilla
Gillad29:20
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Mike Johnson , CISO, Rivian . Joining us is Gaurav Kapil , CISO, Bread Financial . In this episode: It helps to have a vision The benefit of planning It’s never too early to start Don’t make rash decisions Thanks to our podcast sponsor, ThreatLocker ThreatLocker ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com .…
D
Defense in Depth


1 Do We Want CISOs Dictating How Salespeople Should Engage? 33:45
33:45
Spela Senare
Spela Senare
Listor
Gilla
Gillad33:45
All links and images for this episode can be found on CISO Series . Check out this post by Marc Ashworth , CISO at First Bank for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Shawn Bowen , vp, deputy CISO - Gaming, Microsoft . Joining us is Ken Athanasiou , CISO, VF Corporation . In this episode: Frustration is a two-way street Sales is data driven Give customers the tools they need Start a conversation Thanks to our podcast sponsor, Noma Security Secure your entire Data & AI Lifecycle—from development to production and classic data engineering to GenAI. Noma’s full-lifecycle platform delivers seamless protection against risks like misconfigured data pipelines, malicious models, and adversarial AI attacks, empowering AppSec teams with complete visibility, security, and compliance—without disrupting data and AI teams’ workflows.…
D
Defense in Depth


1 Is AI Benefiting Attackers or Defenders? 29:51
29:51
Spela Senare
Spela Senare
Listor
Gilla
Gillad29:51
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Geoff Belknap ( @geoffbelknap ). Joining us is our sponsored guest, Rob Allen , chief product officer, ThreatLocker . In this episode: The promise and perils of LLMs A boon for defenders Raising the bar Muddying the waters Thanks to our podcast sponsor, ThreatLocker ThreatLocker ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com .…
D
Defense in Depth


All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Ross Young , CISO-in-residence, Team8 , and Jeroen Schipper , CISO, Gemeente Den Haag . In this episode: Creating authority Don’t reinvent the wheel Accountable for quality Make the distinction clear Thanks to our podcast sponsor, Fenix24 You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works .…
D
Defense in Depth


All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Steve Zalewski . Joining us is our sponsored guest, Itai Tevet , CEO, Intezer . In this episode: Build for what you can handle Rethinking alerts Building trust into your system Seeing the bigger picture Thanks to our podcast sponsor, Intezer Intezer’s AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it escalates only 4% of alerts for fast remediation, helping SOC teams focus on what matters. Learn more at intezer.com today!…
D
Defense in Depth


1 Vulnerability Management ≠ Vulnerability Discovery 28:39
28:39
Spela Senare
Spela Senare
Listor
Gilla
Gillad28:39
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Mike Johnson , CISO, Rivian . Joining us is Yaron Levi , CISO, Dolby . In this episode: You can’t manage what you don’t know you have Vulnerability management doesn’t have an endpoint This is about tradeoffs A unique approach Thanks to our podcast sponsor, Intezer Intezer’s AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it escalates only 4% of alerts for fast remediation, helping SOC teams focus on what matters. Learn more at intezer.com today!…
D
Defense in Depth


1 Are Security Awareness Training Platforms Effective? 26:50
26:50
Spela Senare
Spela Senare
Listor
Gilla
Gillad26:50
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Dan Walsh , CISO, Paxos . Joining us is Sharon Milz , CISO, Time . In this episode: A vicious cycle Not all training is created equal Don’t forget the human factor We can still define success Thanks to our podcast sponsor, Intezer Intezer’s AI-driven solution automates alert triage and investigations, cutting through the noise to highlight serious threats. By integrating with your security tools, it escalates only 4% of alerts for fast remediation, helping SOC teams focus on what matters. Learn more at intezer.com today!…
D
Defense in Depth


1 The Argument For More Cybersecurity Startups 32:07
32:07
Spela Senare
Spela Senare
Listor
Gilla
Gillad32:07
All links and images for this episode can be found on CISO Series . Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Ross Haleliuk , author, Venture in Security . Be sure to check out Ross's podcast, Inside the Network , and his book Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup . In this episode: A market response to industry failure Is this a business or a feature? The economics of startups Practicality over novelty Thanks to our podcast sponsor, Nudge Security Manage SaaS security and governance at scale with Nudge Security . Discover all SaaS accounts ever created by anyone in your org on Day One, including genAI tools. Surface identity security risks and resolve them with automated playbooks. Start your free 14-day trial today.…
D
Defense in Depth


1 How Are New SEC Rules Impacting CISOs? 34:32
34:32
Spela Senare
Spela Senare
Listor
Gilla
Gillad34:32
All links and images for this episode can be found on CISO Series . Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Steve Zalewski . Joining us is Allan Cockriel , group CISO, Shell . In this episode: Striking a balance Will we see a talent exodus? Playing by the same rules This is an organizational responsibility Thanks to our podcast sponsor, SpyCloud Cybercrime doesn’t take breaks. Protect your organization from ransomware, account takeover, and online fraud with SpyCloud. SpyCloud recaptures stolen identity data from breaches, infostealer malware, and phishing attacks that put your business at risk. Teams use SpyCloud’s advanced analytics and powerful automation to stay ahead of attackers. Visit spycloud.com for your free risk report and start disrupting cybercrime today.…
D
Defense in Depth


All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Steve Zalewski . Joining us is our sponsored guest Karthik Krishnan , founder and CEO, Concentric AI . In this episode: Meet the new risk, same as the old risk Understanding where your risks are coming from Identifying best practices Know what you’re getting into Thanks to our podcast sponsor, Concentric AI Concentric AI’s DSPM solution automates data security, protecting sensitive data in real-time. Our AI-driven solution identifies, classifies, and secures on-premises and cloud data to reduce risk across your enterprise. Seamlessly integrated with tools like Microsoft Copilot, Concentric AI empowers your team to innovate securely and maintain compliance all while eliminating manual data protection tasks. Ready to put RegEx and trainable classifiers in the rear view mirror? Contact Concentric AI today!…
D
Defense in Depth


1 Defending Against What Criminals Know About You 31:35
31:35
Spela Senare
Spela Senare
Listor
Gilla
Gillad31:35
All links and images for this episode can be found on CISO Series . Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark ( @dspark ), the producer of CISO Series , and Steve Zalewski . Joining us is our sponsored guest, Damon Fleury , chief product officer, SpyCloud . In this episode: A holistic view Adding sophistication to identity Your employees can help Cracking the code Thanks to our podcast sponsor, SpyCloud Cybercrime doesn’t take breaks. Protect your organization from ransomware, account takeover, and online fraud with SpyCloud . SpyCloud recaptures stolen identity data from breaches, infostealer malware, and phishing attacks that put your business at risk. Teams use SpyCloud’s advanced analytics and powerful automation to stay ahead of attackers. Visit spycloud.com for your free risk report and start disrupting cybercrime today.…
Välkommen till Player FM
Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.