loader from loading.io

Is Least Privilege Dead?

Defense in Depth

Release Date: 11/06/2025

How Should We Measure the Performance of a CISO? show art How Should We Measure the Performance of a CISO?

Defense in Depth

How Should We Measure the Performance of a CISO? All links and images can be found on . Check out from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining them is , vp, information security, . In this episode: Likability as a career strategy The storytelling gap How the math actually gets done The unofficial scorecard A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control,...

info_outline
How to Be Less Busy and More Effective in Cyber show art How to Be Less Busy and More Effective in Cyber

Defense in Depth

All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and , co-host, . Joining them is , CISO, . Be sure to check out Ross's book In this episode: Patterns hiding in plain sight Activity vs. advancement The human cost Frameworks about frameworks A huge thanks to our sponsor, Fenix24 Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24...

info_outline
How to Engage With a CISO When They Express Interest show art How to Engage With a CISO When They Express Interest

Defense in Depth

All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining them is , CISO, . Be sure to check out David's book, In this episode: Lead with insight, not persuasion Recognize the opportunity when it arrives Strategy over features Keep it efficient A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have...

info_outline
Who is Responsible for the Conflict Between Security and Developers? show art Who is Responsible for the Conflict Between Security and Developers?

Defense in Depth

All links and images can be found on . Check out  for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining is their sponsored guest, , solutions architect, . In this episode: The development disconnect Functionality first, security second The incentive problem Speed as the common ground A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known...

info_outline
Are Your Security Tools Creating More Work for Your Team? show art Are Your Security Tools Creating More Work for Your Team?

Defense in Depth

All links and images can be found on . Check out by Caleb Sima for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , CISO, . In this episode: The information paradox Setting realistic expectations Prioritization over noise The cart before the horse Huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known...

info_outline
Why Overpromising is a Dangerous Sales Tactic show art Why Overpromising is a Dangerous Sales Tactic

Defense in Depth

All links and images can be found on . Check out , CISO, Upwind Security, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , CISO, . Joining us is , vp and CISO, . In this episode: Beyond the quota The hard truth beats the polished bluff Paying for someone else's mistakes Reducing friction, increasing trust Huge thanks to our sponsor, ThreatLocker ThreatLocker takes a deny-by-default approach to endpoint security — controlling what applications can run, what can access data, and what can elevate privileges. Used...

info_outline
Should You Phish Your Employees or Not? show art Should You Phish Your Employees or Not?

Defense in Depth

All links and images can be found on . This week's episode is co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , CISO, . In this episode: Breaking trust to test it Technical controls over testing The measurement imperative Fire drills, not gotchas Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built...

info_outline
How Much Autonomy Should You Give AI Agents in Your SOC? show art How Much Autonomy Should You Give AI Agents in Your SOC?

Defense in Depth

All links and images can be found on . This week's episode is co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , co-founder and CEO, . In this episode: Earning autonomy gradually The blast radius question The reality check Today's value, tomorrow's evolution Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by...

info_outline
Cybersecurity's Broken Hiring Process show art Cybersecurity's Broken Hiring Process

Defense in Depth

All links and images can be found on CISO Series. Check out by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is Brett Conlon, CISO, . In this episode: The experience paradox Who benefits from the narrative Kitchen sink job postings The aggregation problem Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no...

info_outline
Simple Security Solutions That Deliver a Big Impact show art Simple Security Solutions That Deliver a Big Impact

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by , the producer of , and , senior evp and CISO, . Joining them is their sponsored guest, , chief product officer, . In this episode: Getting permissions right The fundamentals that still fail Know what you have Simple controls, outsized impact Huge thanks to our sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real...

info_outline
 
More Episodes

All links and images can be found on CISO Series.

Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Julie Tsai, CISO-in-Residence, Ballistic Ventures.

In this episode:

  • Is least privilege dead?
  • Modern tactics, timeless principle
  • Implementation over ideology
  • Pragmatism over purity

Huge thanks to our sponsor, Cyera

AI is moving fast - can your security keep up? Join the leaders shaping the future of data and AI security at DataSecAI Conference 2025, hosted by Cyera, Nov 12–13 in Dallas. Register now at https://datasecai2025.com/did.