
Sign up to save your podcasts
Or


All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-readiness-as-hiring-criteria/)
What if every candidate interviewed was tested on their cybersecurity competency? How would that affect hiring and how would that affect your company's security?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode is Greg van der Gaast, head of information security, University of Salford.
Thanks to this week's podcast sponsor, Enzoic.
Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection. Organizations can use Enzoic solutions to screen customer and employee accounts for exposed username and password combinations to identity accounts at risk and mitigate unauthorized access. Learn more about Enzoic.
On this episode of Defense in Depth, you'll learn:
By David Spark, Steve Zalewski, Geoff Belknap4.8
7373 ratings
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cybersecurity-readiness-as-hiring-criteria/)
What if every candidate interviewed was tested on their cybersecurity competency? How would that affect hiring and how would that affect your company's security?
Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode is Greg van der Gaast, head of information security, University of Salford.
Thanks to this week's podcast sponsor, Enzoic.
Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection. Organizations can use Enzoic solutions to screen customer and employee accounts for exposed username and password combinations to identity accounts at risk and mitigate unauthorized access. Learn more about Enzoic.
On this episode of Defense in Depth, you'll learn:

187 Listeners

2,008 Listeners

372 Listeners

371 Listeners

651 Listeners

1,021 Listeners

319 Listeners

415 Listeners

8,061 Listeners

179 Listeners

315 Listeners

188 Listeners

139 Listeners

44 Listeners

168 Listeners