Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Defense in Depth - Can a Security Program Ever Reach Maintenance Mode?

Can a Security Program Ever Reach Maintenance Mode?

02/06/25 • 25 min

1 Listener

Defense in Depth

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Andrew Wilder, CISO, Vetcor.

In this episode:

  • It comes down to growth
  • Maintenance mode is anything but simple
  • An asymmetric arrangement
  • Integrating with the business

Thanks to our podcast sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

plus icon
bookmark

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Andrew Wilder, CISO, Vetcor.

In this episode:

  • It comes down to growth
  • Maintenance mode is anything but simple
  • An asymmetric arrangement
  • Integrating with the business

Thanks to our podcast sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Previous Episode

undefined - The Hardest Problems in Security Aren't "Security Problems"

The Hardest Problems in Security Aren't "Security Problems"

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us Sneha Parmar, information security officer, Lufthansa Group Digital Hangar.

In this episode:

  • Build the foundation
  • Building at scale
  • Excelling at boring
  • Knowing what you’ve got is half the battle

Thanks to our podcast sponsor, Fenix24

You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works.

Next Episode

undefined - Protecting Your Backups from Ransomware

Protecting Your Backups from Ransomware

All links and images for this episode can be found on CISO Series.

Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and DJ Schleen, former distinguished security architect, Yahoo. Joining us is our sponsored guest Heath Renfrow, co-founder, Fenix24.

In this episode:

  • Get creative
  • Shift the focus of backups
  • Failing the test
  • Moving beyond false hope

Thanks to our podcast sponsor, Fenix24

You’ve invested in cybersecurity, but can your business recover when it counts? The Securitas Summa program from the Conversant Group combines resistance, managed protection, and rapid recovery to minimize downtime and restore operations faster than anyone else. Resilience isn’t optional. Click to see how it works.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/defense-in-depth-132982/can-a-security-program-ever-reach-maintenance-mode-83698763"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to can a security program ever reach maintenance mode? on goodpods" style="width: 225px" /> </a>

Copy