Preview Mode Links will not work in preview mode

Defense in Depth

May 28, 2020

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-bug-bounties/)

What is the successful formula for a bug bounty program? Should it be run internally, by a third party, or should you open it up to the public? Or, maybe a mixture of everything?

Check out this post...


May 21, 2020

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-data-classification/)

The more data we horde, the less useful any of it becomes, and the more risk we carry. If we got rid of data, we could reduce risk.

Check out this post for the basis for our conversation on...


May 14, 2020

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-prevention-vs-detection-and-containment/)

We agree that preventing a cyber attack is better than detection and containment. Then why is the overwhelming majority of us doing detection and containment?

Check out


May 7, 2020

All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-asset-valuation/)

What's the value of your assets? Do you even understand what they are to you or to a criminal looking to steal them? Do those assets become more valuable once you understand the damage they...