loader from loading.io

Is Platformization Vs Best-of-Breed a False Dichotomy?

Defense in Depth

Release Date: 02/20/2025

What New Risks Does AI Introduce? show art What New Risks Does AI Introduce?

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , CEO, . In this episode: Shadow AI as a control problem Rethinking identity for autonomous agents When process meets momentum Beyond blocking: channeling AI usage Huge thanks to our sponsor, HackerOne  Discover how AI innovators like Adobe, Anthropic, and Snap are using AI to find and fix vulnerabilities across the software development lifecycle. HackerOne, the global leader in...

info_outline
The Pattern of Early Adoption of Security Tools show art The Pattern of Early Adoption of Security Tools

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is CISO Series reporter and CISO herself, . In this episode: Security poverty line excludes SMBs  Skills gap and channel dynamics slow SMB security adoption The startup disadvantage cycle Technology adoption flows from enterprise complexity to market simplification Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering...

info_outline
How Are You Managing the Flow of AI Data show art How Are You Managing the Flow of AI Data

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining us is our sponsored guest , founder and CEO, . In this episode: Access management faces transformation  AI agents demand new authentication paradigms AI complexity demands simplified governance approaches Data-centric identity management replaces role-based approaches Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and...

info_outline
How to Deal with Last Minute Compliance Requirements show art How to Deal with Last Minute Compliance Requirements

Defense in Depth

All links and images can be found on Check out by , co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , CISO, . Joining us is our sponsored guest, , founder and CEO at . In this episode:  When business moves faster than security Turning obstacles into opportunities The art of saying "not like that" Know your regulatory landscape Huge thanks to our sponsor, SecurityPal AI is the leader in Customer Assurance, helping companies accelerate security assurance without compromising...

info_outline
Do You Have a Functional Policy or Did You Just Write One? show art Do You Have a Functional Policy or Did You Just Write One?

Defense in Depth

All links and images can be found on Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , formerly vp of platform engineering and CISO at Thirty Madison Health. In this episode:  Maps without transportation The untouchable employee problem Attestation theater The lightbulb moment Huge thanks to our sponsor, SecurityPal SecurityPal is the leader in Customer Assurance, helping companies accelerate security assurance without...

info_outline
Where are We Struggling with Zero Trust show art Where are We Struggling with Zero Trust

Defense in Depth

All links and images can be found on Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , chief product officer, . In this episode:  Legacy infrastructure creates the biggest hurdles More marketing than methodology Implementation complexity makes zero trust a Sisyphean task Don't ignore human factors Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls...

info_outline
Cybersecurity Has a Prioritization Problem show art Cybersecurity Has a Prioritization Problem

Defense in Depth

All links and images can be found on  Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining them is , former CISO at Amplitude. In this episode:  Beyond prioritization: aligning risk with reality From signals to strategy The Case for Maturity Models Security Starts With Culture Huge thanks to our sponsor, SecurityPal SecurityPal is the leader in Customer Assurance, helping companies accelerate security assurance without compromising accuracy. Their AI + human...

info_outline
How Can AI Provide Useful Guidance from Fragmented Security Data? show art How Can AI Provide Useful Guidance from Fragmented Security Data?

Defense in Depth

All links and images can be found on  Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of , and . Joining them is their sponsored guest, , CEO, . In this episode:  Quality over quantity in AI decision-making Process before technology The connectivity challenge The context complexity paradox Huge thanks to our sponsor, Query Query is a Federated Search and Analytics platform that builds a security data mesh, giving security teams real-time context from all connected sources. Analysts move faster and make better...

info_outline
Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem show art Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem

Defense in Depth

All links and images can be found on Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is , senior director, technology security, governance, and risk, . In this episode:  The trust deficit Defending the non-technical roles The business accountability gap The communication imperative Huge thanks to our sponsor, Query.ai  is a Federated Search and Analytics platform that builds a security data mesh, giving security teams real-time context from all...

info_outline
What Are the Cybersecurity Trends We Need To Follow? show art What Are the Cybersecurity Trends We Need To Follow?

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, , the producer of , and , CISO, . Joining them is , former information security officer, Lufthansa Group Digital. In this episode: Shifting left, broadening out The insurance wake-up call Building trust into the system Security’s identity crisis A huge thanks to our sponsor, Doppel Doppel is the first social engineering defense platform built to dismantle deception at the source. It uses AI and infrastructure correlation to detect, link, and...

info_outline
 
More Episodes

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Elad Koren, vp, product management, Cortex Cloud, Palo Alto Networks.

In this episode:

  • Context drives the decision
  • A full-spectrum understanding
  • Think practical
  • The long play

Thanks to our podcast sponsor, Palo Alto Networks

Palo Alto Networks

Cortex Cloud, the next generation of Prisma Cloud, merges best-in-class CDR with industry-leading CNAPP for real-time cloud security. Harness the power of AI and automation to prioritize risks with runtime context, enable remediation at scale, and stop attacks as they occur. Bring together your cloud and SOC on the unified Cortex platform to transform end-to-end operations. Experience the future of real-time cloud security at https://www.paloaltonetworks.com/cortex/cloud.