loader from loading.io

What's the Most Efficient Way to Rate Third Party Vendors?

Defense in Depth

Release Date: 07/03/2025

What's the Most Efficient Way to Rate Third Party Vendors? show art What's the Most Efficient Way to Rate Third Party Vendors?

Defense in Depth

All posts and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is , former CISO, Hyundai Capital America. In this episode: Streamlining vendor evaluations  Moving beyond compliance theater The scorecard skeptics Finding the right balance Thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces...

info_outline
Don't Ask Don't Ask "Can" We Secure It, But "How" Can We Secure It

Defense in Depth

All links and images can be found on  Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining is Hanan Szwarcbord, vp, CSO and head of infrastructure, Micron Technology. In this episode Embracing growth An urgent need for creativity Get the business context Embrace your inner theater kid Huge thanks to our sponsor,  Query is a Federated Search and Analytics platform that builds a security data mesh, giving security teams real-time context from all...

info_outline
Has the Shared Security Model for SaaS Shifted? show art Has the Shared Security Model for SaaS Shifted?

Defense in Depth

All links and images can be found on Check out  by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is , CISO and svp information systems, . In this episode: Align the incentives The feature and enforcement disconnect Putting the right people in the right place A need for transparency   Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect...

info_outline
Improving the Efficiency of Your Threat Intelligence show art Improving the Efficiency of Your Threat Intelligence

Defense in Depth

All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, (), the producer of , and . Joining us is our sponsored guest , CISO, . In this episode We don't need more indicators Creating more work Generating actionable intelligence Design for what you can do Huge thanks to our sponsor, Recorded Future Every day, security teams face an impossible challenge: sorting through millions of threats, each potentially critical. But somewhere in that noise are the signals you can't afford to miss. Recorded...

info_outline
Why Cybersecurity Professionals Lie on Their Resumes show art Why Cybersecurity Professionals Lie on Their Resumes

Defense in Depth

All images and links can be found on Check out  by  of  for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me,  (), the producer of , and . Joining us is , associate CISO, . In this episode: Verify then trust Dishonesty on all sides A lack of flexibility What about integrity? Huge thanks to our sponsor, Formal Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse...

info_outline
What Should Be in a CISO Job Description? show art What Should Be in a CISO Job Description?

Defense in Depth

All links and images can be found on . Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me,  (), the producer of , and  (). Joining us is , vp, CISO, . In this episode: Stop siloing cybersecurity Leading the charge A culture of ownership Preparing for resilience A huge thanks to our sponsor, Recorded Future Every day, security teams face an impossible challenge: sorting through millions of threats, each potentially critical. But somewhere in that noise are the signals you can’t afford to...

info_outline
The CISO's Job Is Impossible show art The CISO's Job Is Impossible

Defense in Depth

All links and images for this episode can be found on . Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me,  (), the producer of , and Yaron Levi, CISO, Dolby. Joining us is , CISO, . In this episode: It's a balancing act Choose to leave the kids' table Your team is essential Don't change CISOs midstream Huge thanks to our sponsor, Blackslash Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes...

info_outline
Can You Have a Secure Software Environment Without Traditional Vulnerability Management? show art Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

Defense in Depth

All links and images for this episode can be found on . Check out  for the discussion that is the basis of our conversation on this week’s episode co-hosted by me,  (), the producer of , and , COO, . Joining us is our sponsored guest, , chief product officer at . In this episode:  Reinforcing zero trust Focus on effectiveness Understanding zero trust limitations What's next Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses...

info_outline
How Much Should Salespeople Know About Their Product? show art How Much Should Salespeople Know About Their Product?

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by , the producer of CISO Series, and . Joining us is , vp of cyber security operations, .  In this episode: Aligning incentives The realities of the job Delivering ROI Holistic cybersecurity Thanks to our sponsor, Backslash Security Backslash offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by business...

info_outline
Why Are We Still Struggling to Fix Application Security? show art Why Are We Still Struggling to Fix Application Security?

Defense in Depth

All links and images for this episode can be found on . Check out for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of CISO Series, and . Joining us is our sponsored guest, , chief evangelist, . In this episode: Start with the culture Moving AppSec to a higher level A strategy for security Maturing the basics Thanks to our sponsor, Backslash Security offers a new approach to application security by creating a digital twin of your application, modeled into an AI-enabled App Graph. It categorizes security findings by...

info_outline
 
More Episodes

All posts and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Steve Knight, former CISO, Hyundai Capital America.

In this episode:

  • Streamlining vendor evaluations 
  • Moving beyond compliance theater
  • The scorecard skeptics
  • Finding the right balance

Thanks to our sponsor, Formal

Formal secures humans, AI agent’s access to MCP servers, infrastructure, and data stores by monitoring and controlling data flows in real time. Using a protocol-aware reverse proxy, Formal enforces least-privilege access to sensitive data and APIs, ensuring AI behavior stays predictable and secure. Visit joinformal.com to learn more or schedule a demo.