Defense in Depth
How Should We Measure the Performance of a CISO? All links and images can be found on . Check out from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining them is , vp, information security, . In this episode: Likability as a career strategy The storytelling gap How the math actually gets done The unofficial scorecard A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control,...
info_outlineDefense in Depth
All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode co-hosted by , the producer of , and , co-host, . Joining them is , CISO, . Be sure to check out Ross's book In this episode: Patterns hiding in plain sight Activity vs. advancement The human cost Frameworks about frameworks A huge thanks to our sponsor, Fenix24 Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24...
info_outlineDefense in Depth
All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining them is , CISO, . Be sure to check out David's book, In this episode: Lead with insight, not persuasion Recognize the opportunity when it arrives Strategy over features Keep it efficient A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have...
info_outlineDefense in Depth
All links and images can be found on . Check out for the discussion that is the basis of our conversation on this week's episode, co-hosted by , the producer of , and . Joining is their sponsored guest, , solutions architect, . In this episode: The development disconnect Functionality first, security second The incentive problem Speed as the common ground A huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known...
info_outlineDefense in Depth
All links and images can be found on . Check out by Caleb Sima for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , CISO, . In this episode: The information paradox Setting realistic expectations Prioritization over noise The cart before the horse Huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known...
info_outlineDefense in Depth
All links and images can be found on . Check out , CISO, Upwind Security, for the discussion that is the basis of our conversation on this week's episode co-hosted by me, , the producer of , and , CISO, . Joining us is , vp and CISO, . In this episode: Beyond the quota The hard truth beats the polished bluff Paying for someone else's mistakes Reducing friction, increasing trust Huge thanks to our sponsor, ThreatLocker ThreatLocker takes a deny-by-default approach to endpoint security — controlling what applications can run, what can access data, and what can elevate privileges. Used...
info_outlineDefense in Depth
All links and images can be found on . This week's episode is co-hosted by me, , the producer of , and , senior evp and CISO, . Joining us is , CISO, . In this episode: Breaking trust to test it Technical controls over testing The measurement imperative Fire drills, not gotchas Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by analysts. Built...
info_outlineDefense in Depth
All links and images can be found on . This week's episode is co-hosted by me, , the producer of , and . Joining us is our sponsored guest, , co-founder and CEO, . In this episode: Earning autonomy gradually The blast radius question The reality check Today's value, tomorrow's evolution Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no re-ingestion. 100x faster than traditional data lakes, 10x cheaper than SIEMs. Loved by...
info_outlineDefense in Depth
All links and images can be found on CISO Series. Check out by Dr. Chase Cunningham, CSO at Demo-Force, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, , the producer of , and . Joining us is Brett Conlon, CISO, . In this episode: The experience paradox Who benefits from the narrative Kitchen sink job postings The aggregation problem Huge thanks to our sponsor, Scanner All your security logs end up in cloud storage like AWS S3. Scanner makes them searchable in seconds and runs real-time detections directly on that data. No pipelines, no...
info_outlineDefense in Depth
All links and images can be found on Check out for the discussion that is the basis of our conversation on this week’s episode, co-hosted by , the producer of , and , senior evp and CISO, . Joining them is their sponsored guest, , chief product officer, . In this episode: Getting permissions right The fundamentals that still fail Know what you have Simple controls, outsized impact Huge thanks to our sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real...
info_outlineAll links and images can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Ross Young, co-host, CISO Tradecraft. Joining them is Dan Walsh, CISO, Datavant. Be sure to check out Ross's book Cybersecurity's Dirty Secret: Why Most Budgets Go to Waste.
In this episode:
- Patterns hiding in plain sight
- Activity vs. advancement
- The human cost
- Frameworks about frameworks
A huge thanks to our sponsor, Fenix24
Fenix24 is the world's leading breach recovery firm, providing rapid ransomware restoration, full asset visibility, and threat informed hardening. Alongside expert recovery services, Fenix24 delivers ongoing managed protection that secures backups, infrastructure, and critical controls, helping organizations stay resilient, recoverable, and prepared for modern cyber threats. Learn more at fenix24.com.
