loader from loading.io

Simple Security Solutions That Deliver a Big Impact

Defense in Depth

Release Date: 02/05/2026

The Dangers of Picking the Wrong Vendor show art The Dangers of Picking the Wrong Vendor

Defense in Depth

All links and images can be found on . Check out  for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and . Joining us is our guest, Paul Guerra. In this episode: Read the contract How vendors win before the evaluation ends The fallout The real cost A huge thanks to our sponsor, Native Security Native makes secure-by-design inherent to how the cloud operates. It's the control plane for built-in cloud security, unifying and governing native controls, so security intent is defined once and applied consistently across...

info_outline
Why Cyber Startups Need CISO Advisors show art Why Cyber Startups Need CISO Advisors

Defense in Depth

All links and images can be found on  All security startups will tell you they talk to potential customers. The problem is that you limit your development when you only talk to CISOs who might buy. It's not the same guidance you'll get from a CISO who advises. Check out by Val Tsanev of the Cyber Risk Alliance for the discussion that is the basis of our conversation. This week's episode is co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , CISO, . In this episode: Building for whom? The only feedback loop that matters Valid, but for whom? Rethink...

info_outline
Breaking the Reactive Cycle of Cybersecurity show art Breaking the Reactive Cycle of Cybersecurity

Defense in Depth

All links and images can be found on  Check out  for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and . Joining us is our sponsored guest, Rob Allen. In this episode: The vulnerable stack Changing the structural economics Change the terrain The cost-benefit equation A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce...

info_outline
How Do You Know If Your Backups Will Survive a Ransomware Attack? show art How Do You Know If Your Backups Will Survive a Ransomware Attack?

Defense in Depth

All links and images can be found on Check out for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and . Joining us is our sponsored guest, , co-founder, . In this episode: Knowing which systems to save first Recovery is a business conversation, not an IT ticket Not all systems are created equal Recovery knowledge as a governed asset A huge thanks to our sponsor, Fenix24   Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening....

info_outline
What Makes a Successful Security Vendor Demo? show art What Makes a Successful Security Vendor Demo?

Defense in Depth

What Makes a Successful Security Vendor Demo? All links and images can be found on . Check out from Adam Palmer for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and . Joining is , BISO, . In this episode: Show me the problem, not the product Walking in blind Discovery is the demo Define the use case, set the clock A huge thanks to our sponsor, Fenix24 Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery...

info_outline
Should You Use Native or 3rd Party Cloud Management Tools? show art Should You Use Native or 3rd Party Cloud Management Tools?

Defense in Depth

Should You Use Native or 3rd Party Cloud Management Tools? All links and images can be found on . Check out from for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and , senior evp and CISO, . Joining us is their sponsored guest, , co-founder and CPO, . In this episode: More tools, more problems A gap in design Catching what slips through Competence over complexity A huge thanks to our sponsor, Native Security Native makes secure-by-design inherent to how the cloud operates. It's the control plane for built-in cloud...

info_outline
How Should We Measure the Performance of a CISO? show art How Should We Measure the Performance of a CISO?

Defense in Depth

How Should We Measure the Performance of a CISO? All links and images can be found on . Check out from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining them is , vp, information security, . In this episode: Likability as a career strategy The storytelling gap How the math actually gets done The unofficial scorecard A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control,...

info_outline
How to Be Less Busy and More Effective in Cyber show art How to Be Less Busy and More Effective in Cyber

Defense in Depth

All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and , co-host, . Joining them is , CISO, . Be sure to check out Ross's book In this episode: Patterns hiding in plain sight Activity vs. advancement The human cost Frameworks about frameworks A huge thanks to our sponsor, Fenix24 Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24...

info_outline
How to Engage With a CISO When They Express Interest show art How to Engage With a CISO When They Express Interest

Defense in Depth

All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining them is , CISO, . Be sure to check out David's book, In this episode: Lead with insight, not persuasion Recognize the opportunity when it arrives Strategy over features Keep it efficient A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have...

info_outline
Who is Responsible for the Conflict Between Security and Developers? show art Who is Responsible for the Conflict Between Security and Developers?

Defense in Depth

All links and images can be found on . Check out  for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining is their sponsored guest, , solutions architect, . In this episode: The development disconnect Functionality first, security second The incentive problem Speed as the common ground A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known...

info_outline
 
More Episodes

All links and images can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is their sponsored guest, Rob Allen, chief product officer, ThreatLocker.

In this episode:

  • Getting permissions right
  • The fundamentals that still fail
  • Know what you have
  • Simple controls, outsized impact

Huge thanks to our sponsor, ThreatLocker

Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and
workshops that show CISOs exactly how to implement and maintain Zero Trust in real
environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March
6. Get $200 off with ZTWCISO26 at ztw.com.