Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
|
Apr 24, 2025 |
Scaling Container Security Without Slowing Developers
|
Apr 17, 2025 |
How Attackers Stay Hidden Inside Your Azure Cloud
|
Apr 10, 2025 |
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
|
Apr 02, 2025 |
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
|
Mar 26, 2025 |
Detection Engineering with Google Cloud
|
Mar 20, 2025 |
CNAPPs & CSPMs don’t tell the full cloud security story
|
Mar 13, 2025 |
Securing AI Applications in the Cloud
|
Mar 06, 2025 |
Realities of Cloud Networking in AWS
|
Feb 28, 2025 |
Cloud Incident Response in Microsoft Azure
|
Feb 20, 2025 |
AWS Multi-Account Security: What Netflix Learned
|
Feb 13, 2025 |
Cloud Security Detection & Response Strategies That Actually Work
|
Feb 04, 2025 |
CISO Challenges Across Industries
|
Jan 28, 2025 |
Why Solving the Data Problem is Key to Cloud Security?
|
Jan 24, 2025 |
The economics of cybersecurity and trends
|
Jan 21, 2025 |
The Truth About CNAPP and Kubernetes Security
|
Jan 14, 2025 |
Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem
|
Jan 10, 2025 |
Centralized VPC Endpoints - Why It Works for AWS Networking
|
Dec 17, 2024 |
What is CADR?
|
Dec 05, 2024 |
Building Platforms in Regulated Industries
|
Nov 21, 2024 |
Dynamic Permission Boundaries: A New Approach to Cloud Security
|
Nov 12, 2024 |
Building a Resilient Cloud Security Program after Merger and Acquisition
|
Nov 09, 2024 |
Building Data Perimeter in Cloud in 2024
|
Oct 31, 2024 |
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
|
Oct 22, 2024 |
Building a SOC Team in 2024 - Automation & AI
|
Oct 15, 2024 |
Cloud Identity Lifecycle Management Explained!
|
Oct 08, 2024 |
Traditional PAM vs Cloud CPAM for a cloud first world
|
Oct 04, 2024 |
The Role of Cloud Security Research in 2024
|
Oct 02, 2024 |
Edge Security is the Key to Cloud Protection
|
Sep 20, 2024 |
Is your CI/CD Pipeline your Biggest Security Risk?
|
Sep 13, 2024 |
State of Cloud Security - Practitioner Edition
|
Sep 04, 2024 |
BlackHat USA 2024 Highlights and Recap
|
Aug 28, 2024 |
Building an Incident Response Team for High-Growth Companies
|
Aug 22, 2024 |
State of Cloud Security 2024 - Leadership Edition
|
Aug 06, 2024 |
Cloud Native Strategies from a FinTech CISO
|
Jul 30, 2024 |
Fixing Cloud Security with AWS Lambda
|
Jul 23, 2024 |
What is confidential computing? Explained for 2024
|
Jul 16, 2024 |
The Evolution of Infrastructure as Code so far - 2024 Edition
|
Jul 09, 2024 |
What is AI-SPM?
|
Jul 04, 2024 |
Creating Effective Sigma Rules with AI
|
Jun 25, 2024 |
What is the future of security operations with AI in 2024?
|
Jun 14, 2024 |
Cloud Native Security Strategies for 2024
|
May 31, 2024 |
Real-World Cloud Security Challenges and Solutions Explained for 2024
|
May 21, 2024 |
Why Least Privilege Matters in Cloud Security?
|
May 14, 2024 |
How is Kubernetes Network Security Evolving?
|
Apr 30, 2024 |
The Future of Software Development with AI
|
Apr 23, 2024 |
The role of Real Time Defense in Cloud Security
|
Apr 16, 2024 |
CISO's guide to embracing risk in business
|
Apr 09, 2024 |
Why Email Breaches Still Happen?
|
Apr 05, 2024 |
Essential Strategies to master Incident Response in Cloud
|
Apr 02, 2024 |
From Code Suggestions to Security
|
Mar 12, 2024 |
Cloud Security Operations for Modern Threats
|
Mar 08, 2024 |
Understanding Threat Modeling in Cloud
|
Mar 01, 2024 |
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
|
Feb 23, 2024 |
Sidecar Container Vulnerability in Kubernetes explained
|
Feb 16, 2024 |
Role of application security posture management in cybersecurity
|
Feb 02, 2024 |
Cybersecurity Best Practices and Password Security in Cloud and AI
|
Jan 26, 2024 |
Multicloud strategy for AWS and GCP
|
Jan 19, 2024 |
AI's Role in Security Efficiency - Kubernetes Edition
|
Jan 12, 2024 |
Build an Effective AWS Cloud Security Program in 2024
|
Jan 05, 2024 |
Offensive Cloud Security Program for 2024
|
Dec 19, 2023 |
Understand Your Cloud Security Landscape to cut through the noise!
|
Dec 15, 2023 |
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
|
Dec 14, 2023 |
Kubernetes Network Security for Multi Tenancy
|
Dec 12, 2023 |
AWS reInvent 2023 - Security highlights and announcements
|
Dec 05, 2023 |
eBPF - Kubernetes Network Security without the Blind Sides!
|
Nov 30, 2023 |
Attack Path Analysis for Better Kubernetes Security
|
Nov 22, 2023 |
Secure your SaaS applications like this!
|
Nov 21, 2023 |
Threat Detection for not so Common Cloud Services
|
Nov 11, 2023 |
How to Escape Clusters in a Managed Kubernetes Cluster?
|
Nov 07, 2023 |
Have I lost my Secrets?
|
Nov 06, 2023 |
How to become a Senior Cloud Security Engineer?
|
Nov 01, 2023 |
5 Skills to Level Up Your Cloud Hacking
|
Oct 07, 2023 |
Become a Cloud Native CISO in 2023
|
Oct 02, 2023 |
Software Supply Chain Controls for Terraform
|
Sep 21, 2023 |
Data Security RoadMap in 2023
|
Sep 18, 2023 |
The Cloud to Code Dilemma - Let's Talk
|
Sep 09, 2023 |
CISO Perspective: Josh Lemos, CISO of Gitlab
|
Sep 06, 2023 |
The Azure Cloud Security Pentesting Skills You NEED!
|
Aug 28, 2023 |
How to detect software supply chain attacks with Honeytokens?
|
Aug 25, 2023 |
Google Cloud Security Pentesting Methodology
|
Aug 24, 2023 |
Network Pentest 2.0 : The Cloud Pentest Revolution
|
Aug 22, 2023 |
Google Cloud Hacking Red Team Perspective!
|
Aug 02, 2023 |
Cloud Security in the BoardRoom - CISO Perspective with Phil Venables
|
Jul 30, 2023 |
Google Cloud IAP - A Pentester Viewpoint
|
Jul 26, 2023 |
Doing Google Cloud Security RIGHT!
|
Jul 25, 2023 |
An AWS Centric View of Google Cloud Identity
|
Jul 22, 2023 |
So You WANT TO DO Google Cloud Threat Detection - Start here!
|
Jul 10, 2023 |
Using Data Perimeters in AWS To Scale Guardrails
|
Jul 06, 2023 |
AWS INCIDENT RESPONSE - Automate Containment
|
Jul 05, 2023 |
Cloud Security Baseline For Scale
|
Jul 01, 2023 |
AWS ReInforce 2023 Recap & Highlights
|
Jun 23, 2023 |
Will Application Security Eat Cloud Security for Lunch!
|
Jun 02, 2023 |
AI Security - Can LLM be Attacked?
|
May 30, 2023 |
What is DevSecOps? DevSecOps with Cloud & AI explained for 2023
|
May 23, 2023 |
Evolution of Kubernetes Security | KubeCon EU 2023
|
May 14, 2023 |
A DEV FRIENDLY CLOUD NATIVE SECURITY PIPELINE!
|
May 11, 2023 |
THEY SCANNED ENTIRE GITHUB FOR SECRETS AND FOUND THIS!
|
May 09, 2023 |
Kubernetes Cluster Security Audit Explained
|
May 03, 2023 |
Network Security for Kubernetes
|
Apr 16, 2023 |
CONTINUOUS KUBERNETES SECURITY IN 2023
|
Apr 14, 2023 |
2023 What Kubernetes Security Looks Like Today Series- DevSecOps
|
Apr 13, 2023 |
IS THERE DEVSECOPS IN CLOUD? 🤔
|
Mar 27, 2023 |
How to Build a Modern Cyber Security Program in 2023
|
Mar 11, 2023 |
HOW TO BUILD A CLOUD SECURITY PROGRAM - MEDIA INDUSTRY
|
Mar 04, 2023 |
How to Accelerate your AWS Security Maturity in 2023
|
Feb 25, 2023 |
How to Build AWS Multi-Account Infrastructure with Security and Speed
|
Feb 21, 2023 |
HOW TO GET FEDRAMP CERTIFIED IN AWS CLOUD
|
Feb 14, 2023 |
HOW TO BUILD A CLOUD SECURITY PROGRAM WITH CONTAINERS
|
Feb 05, 2023 |
AWS Cloud Penetration Testing Explained with Example
|
Jan 30, 2023 |
AWS Goat - Cloud Penetration Testing
|
Jan 24, 2023 |
Getting Started with Hacking AWS ECS
|
Jan 12, 2023 |
GETTING STARTED WITH HACKING AWS CLOUD
|
Jan 08, 2023 |
AWS Reinvent 2022 - RECAP for Cloud Security Professionals!
|
Dec 14, 2022 |
AWS EKS EXPLAINED!
|
Dec 10, 2022 |
Story of a Cloud Architect & Blurry Lines of Control with AWS
|
Nov 25, 2022 |
BECOME A CLOUD SECURITY ARCHITECT IN 2023
|
Nov 13, 2022 |
AWS Threat Detection for NOT SO COMMON AWS Services Explained
|
Nov 10, 2022 |
Ransomware attacks in AWS
|
Nov 06, 2022 |
How to become a Cloud Native Security Architect?
|
Oct 30, 2022 |
Compliance as Code in Kubernetes
|
Oct 24, 2022 |
Software Signing for Kubernetes Supply Chain & Everybody Else
|
Oct 16, 2022 |
KUBERNETES BEST PRACTICES 2022
|
Oct 10, 2022 |
Building Blocks of a Modern Cloud Security Program
|
Sep 29, 2022 |
THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2
|
Sep 25, 2022 |
SecDataOps Explained - Modern Security Stack
|
Sep 16, 2022 |
THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 1
|
Sep 12, 2022 |
Cloud Security Monitoring in a Modern Security Stack
|
Sep 08, 2022 |
API SECURITY BEST PRACTICES 2022
|
Sep 05, 2022 |
BlackHat Defcon 2022 - The Cloud Security Edition
|
Aug 28, 2022 |
HOW TO Threat Model Digital Applications in Cloud
|
Aug 21, 2022 |
HOW TO SECURE CONTAINER ENVIRONMENT FOR FINANCIAL SERVICES
|
Aug 07, 2022 |
AWS ReInforce 2022 Recap & Highlights
|
Aug 02, 2022 |
Fundamentals of AWS Cloud Security Assessment
|
Jul 30, 2022 |
So Now You Know!
|
Jul 28, 2022 |
HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
|
Jul 20, 2022 |
Zero Trust and the Triple Paradox
|
Jul 09, 2022 |
Building AWS Security Guardrails
|
Jul 04, 2022 |
Fix the Broken Digital Supply Chain
|
Jul 03, 2022 |
3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN
|
Jun 26, 2022 |
Digital Transformation - ARE WE THERE YET!
|
Jun 20, 2022 |
CISO Perspective: Sean Catlett, CISO of Slack
|
Jun 14, 2022 |
CAASM - CyberSecurity Asset Management for the Modern Security Stack
|
Jun 04, 2022 |
Azure Security Fundamentals - Level 200
|
May 29, 2022 |
Confidential Computing in Azure Explained
|
May 28, 2022 |
Azure Cloud Security Architecture
|
May 25, 2022 |
Azure Security Fundamentals Level 1
|
May 19, 2022 |
Finding Security Holes in Azure Services
|
May 15, 2022 |
Azure Kubernetes Service (AKS) Security Explained
|
May 08, 2022 |
Azure Security Fundamentals - Zero Trust with Azure AD
|
May 01, 2022 |
How to Secure Cloud Managed Kubernetes
|
Apr 26, 2022 |
Kubernetes Security Best Practices in 2022
|
Apr 25, 2022 |
Manage Privileged Access for Kubernetes & Cloud
|
Apr 22, 2022 |
How to become a Cloud Native Security Engineer
|
Apr 10, 2022 |
Service Mesh Security EXPLAINED!
|
Apr 03, 2022 |
Scaling a Practical AWS Asset Management Program
|
Mar 27, 2022 |
Threat Hunting in AWS
|
Mar 20, 2022 |
What is SBOM, iBOM?
|
Mar 13, 2022 |
Security for AI/ML Models in AWS
|
Mar 06, 2022 |
Building Google Cloud Security Products
|
Mar 03, 2022 |
Google Cloud Security Fundamentals - Level 2
|
Feb 27, 2022 |
Google Cloud Security Fundamentals
|
Feb 20, 2022 |
Red Team in Google Cloud
|
Feb 13, 2022 |
How to Automate Security in Google Cloud?
|
Feb 06, 2022 |
Authorization Control for Enterprise in Cloud
|
Jan 30, 2022 |
McFee and FireEye join forces for XDR
|
Jan 26, 2022 |
AWS IAM Getting Started
|
Jan 23, 2022 |
Remote Access Trojans target Public Cloud Infrastructure
|
Jan 19, 2022 |
Secret Management for Modern Apps Explained
|
Jan 16, 2022 |
CISO in a Cloud World in 2022 - Stu Hirst
|
Jan 12, 2022 |
UK Financial Regulators monitoring Cloud Providers Closely
|
Jan 12, 2022 |
Building Modern Identity (IAM) Roadmap for Cloud
|
Jan 09, 2022 |
Google invests in Security + Microsoft's Log4Shell Update
|
Jan 05, 2022 |
Building Scalable Authorization in Cloud Native Apps
|
Jan 02, 2022 |
The Latest with Log4J
|
Dec 22, 2021 |
Log4j - How the Cloud Providers responded!
|
Dec 15, 2021 |
AWS Outage - What is impacted?
|
Dec 08, 2021 |
AWS re:Invent 2021 - All the Cloud Security Updates so far
|
Dec 02, 2021 |
Palo Alto Investors told: "18- 24 months ahead" of competition
|
Nov 24, 2021 |
Breaking and Building Serverless Application Security
|
Nov 21, 2021 |
Feds go "Cloud Smart"+ Alibaba Cloud targeted by Hackers
|
Nov 17, 2021 |
Challenges with Building Serverless Applications at Scale
|
Nov 14, 2021 |
Microsoft releases CSPM for AWS & More Linux Security Support on Azure
|
Nov 10, 2021 |
Security Governance and Compliance in Serverless Applications
|
Nov 07, 2021 |
AWS Earns over 16billion this quarter + SEGA on Microsoft Azure - Cloud Security News
|
Nov 03, 2021 |
How to Build Applications with Zero Trust Principles
|
Oct 31, 2021 |
What is SaaS Security Posture Management (SSPM)?
|
Oct 28, 2021 |
AWS Lands UK Spy Services Contact + Google Cloud + Azure release Q3 results - Cloud Security News
|
Oct 27, 2021 |
Threat Detection and Incident Response in Cloud - Nathan Case
|
Oct 24, 2021 |
HashiConf Global 2021 - Our Cloud Security Picks - Cloud Security News
|
Oct 22, 2021 |
Talks not to be missed at Kubecon North America 2021 - Cloud Security News
|
Oct 21, 2021 |
All the Security Updates - Google Cloud Next 21 - Cloud Security News
|
Oct 20, 2021 |
What is Cloud Native Application Protection Platform - CNAPP Explained!
|
Oct 17, 2021 |
Google Cloud Next 21, Kubecon and VMworld - Cloud Security News
|
Oct 13, 2021 |
Implementing Cloud Security Tools the Right way - Stay Alert Not Fatigue!
|
Oct 10, 2021 |
AWS Launches Cloud Control API - Cloud Security News
|
Oct 06, 2021 |
Data Security in Cloud with David McCaw, Dasera
|
Oct 03, 2021 |
Cloud Security ranks in 2021 OWASP Top 10 - Cloud Security News
|
Sep 29, 2021 |
Cloud Security Careers: Application Security Engineer Skills with Tanya Janca
|
Sep 26, 2021 |
Cloud Security Careers: Threat Analyst Skills
|
Sep 24, 2021 |
Vulnerabilities in AWS, GCP and Azure - Cloud Security News
|
Sep 22, 2021 |
Cloud Security Careers: From University to Security Engineer at Atlassian
|
Sep 19, 2021 |
Cloud Security Careers: Getting an Entry Level GRC Role
|
Sep 15, 2021 |
fwd:cloudsec conference this week, Vulnerabilities discovered in AWS - Cloud Security News
|
Sep 15, 2021 |
Cloud Security Careers: From Executive Assistant to Head of Security
|
Sep 12, 2021 |
IBM Launches Servers for Hybrid Cloud, Microsoft and Verizon bring 5G Edge Cloud Computing - Cloud Security News
|
Sep 08, 2021 |
Cloud Security Careers: Skills Required for an Associate Cloud Security Engineer
|
Sep 05, 2021 |
Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News
|
Sep 01, 2021 |
Cloud Hacking eSports | Ultimate Hacking Championship
|
Aug 29, 2021 |
Network Security in a Cloud Native World
|
Aug 26, 2021 |
AWS Re:inforce goes Virtual - Cloud Security News
|
Aug 25, 2021 |
THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?
|
Aug 22, 2021 |
DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian
|
Aug 15, 2021 |
What is a SECURITY DATA LAKE?
|
Aug 08, 2021 |
Security Logging is Changing | Observability & Tracing Explained
|
Aug 01, 2021 |
WHAT IS CYBER RESILIENCY IN CLOUD?
|
Jul 25, 2021 |
AWS Security - Managing Threat Detection and Response
|
Jul 21, 2021 |
Cloud Security RoadMap - Scott Piper
|
Jul 18, 2021 |
Comparing Cloud Security Tools - CWPP, CSPM, CASB & CNAPP
|
Jul 11, 2021 |
Cloud Infrastructure Security at Scale - Netflix
|
Jul 04, 2021 |
Hacker Valley Studio - ExIST Framework to reach Peak Performance in CyberSecurity
|
Jun 27, 2021 |
Finding Security Bugs in Google Cloud - Kat Traxler
|
Jun 20, 2021 |
Hacker stories from the Internet - Darknet Diaries
|
Jun 13, 2021 |
CSO Hall of Fame - 21 yrs in Cybersecurity: Challenges THEN & NOW
|
Jun 10, 2021 |
Finding and Fixing SECURITY BUGS IN GOOGLE CLOUD - Dylan Ayrey
|
Jun 06, 2021 |
Attacking and Defending Managed Kubernetes Clusters - Brad Geesaman
|
May 30, 2021 |
Kubernetes Runtime Threat Detection and Response - Falco, Sysdig
|
May 23, 2021 |
Study Hall - Attacking K8S Cluster Defaults!
|
May 20, 2021 |
Start here for Kubernetes Security - Magno Logan
|
May 16, 2021 |
Study Hall - Kubernetes Concepts and Architecture Explained!
|
May 12, 2021 |
Risk Analysis of Kubernetes Security - Mark Manning, Snowflake
|
May 09, 2021 |
Study Hall - What is Kubernetes & Why do you NEED TO know about it?
|
May 05, 2021 |
Kubernetes (Goat) Vulnerable by Design - Madhu Akula
|
May 02, 2021 |
CISO PERSPECTIVE SERIES: LINKEDIN CISO - Geoff Belknap
|
Apr 27, 2021 |
Study Hall: Honest truth behind learning Kubernetes
|
Apr 27, 2021 |
Building Threat Detection for your Cloud Environment
|
Apr 18, 2021 |
Cloud Governance using Infrastructure as Code (IaC)
|
Apr 11, 2021 |
Kubernetes Security Explained for those starting today! - Kelsey Hightower
|
Apr 04, 2021 |
Getting Infrastructure as Code (IaC) Security Culture right! - Yoni Leitersdorf
|
Mar 28, 2021 |
Azure Security Best Practices for Cloud Architects - John Savill
|
Mar 21, 2021 |
WHAT IS INFRASTRUCTURE AS CODE SECURITY? - Barak Schoster
|
Mar 14, 2021 |
INCIDENT RESPONSE IN AWS CLOUD
|
Mar 07, 2021 |
How to become a CLOUD SECURITY ENGINEER IN 2021?
|
Feb 28, 2021 |
Kubernetes Security at Scale in A CI/CD Pipeline - Michael Fraser
|
Feb 21, 2021 |
Container Security in AWS at Scale - Ben Tomhave
|
Feb 14, 2021 |
CISO Challenges in 2021 - Zane Lackey Signal Sciences, Fastly
|
Feb 10, 2021 |
Cloud Security in $25 Billion dollar Company - Siemens USA
|
Feb 07, 2021 |
Security Chaos Engineering Experiments for Beginners
|
Jan 31, 2021 |
RED TEAM IN CLOUD - Brianna Malcolmson, Atlassian
|
Jan 24, 2021 |
INFRASTRUCTURE AS CODE SECURITY
|
Jan 17, 2021 |
Cloud Security Testing in AWS
|
Jan 10, 2021 |
HOW TO BECOME A CLOUD SECURITY ARCHITECT in 2021 ? - Sriya Potham
|
Jan 03, 2021 |
STARTING A SUCCESSFUL CYBERSECURITY PODCAST IN 2021
|
Dec 20, 2020 |
RISK MANAGEMENT IN CLOUD SECURITY - MONICA VERMA
|
Nov 29, 2020 |
WHAT IS DIGITAL RISK PROTECTION & WHY IS IT IMPORTANT? - Sam Small, Zerofox
|
Nov 22, 2020 |
OPEN SOURCE AWS SECURITY - MATTHEW FULLER, co-Founder CloudSploit, Aqua
|
Nov 15, 2020 |
WHAT THE HECK IS CI/CD | Continuous Integration | Delivery | Deployment - Melissa Benua
|
Nov 08, 2020 |
HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT- Naomi Buckwalter
|
Nov 01, 2020 |
HOW TO START in BUG BOUNTY IN 2020 with Casey Ellis, BugCrowd
|
Oct 25, 2020 |
CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES - DANIEL MIESSLER
|
Oct 18, 2020 |
AWS SECURITY IN A LARGE REGULATED ENTERPRISE! - HOUSTON HOPKINS, CAPITAL ONE
|
Oct 11, 2020 |
CISO Challenges in Cloud Security - Caleb Sima, VP - Security at Databricks
|
Oct 04, 2020 |
WHAT IS SECURITY CHAOS ENGINEERING? - JEROME WALTER, SECURITY MODERNISATION
|
Sep 27, 2020 |
Security and Compliance in AWS Cloud
|
Sep 20, 2020 |
Identity & Cross Account Access Management in AWS | CLOUD SECURITY - Alexandre Sieira
|
Sep 13, 2020 |
WHAT IS AZURE IDENTITY MANAGEMENT | CLOUD SECURITY
|
Sep 06, 2020 |
CLOUD SECURITY POSTURE MANAGEMENT - CSPM - GAURAV KUMAR
|
Aug 30, 2020 |
HOW TO BUILD SECURE ENVIRONMENTS IN Google Cloud - DARPAN SHAH
|
Aug 23, 2020 |
HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE - NICHOLAS HUGHES
|
Aug 16, 2020 |
HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM - CLINT GIBLER
|
Aug 09, 2020 |
Application Security AppSec 101 - Tanya Janca
|
Aug 02, 2020 |
Getting Started with Chaos Engineering - What is it and how can it be used to build Application resiliency? - Aaron Rinehart, Verica
|
Aug 02, 2020 |
Cloud Security in Operational Technology vs Information Technology world - Parul Kharub, CISSP
|
Jul 19, 2020 |
HOW TO BECOME A SUCCESSFUL CISO IN 2020 - Abbas Kudrati, Microsoft
|
Jul 12, 2020 |
How to do Google Cloud Security Well - The 2020 Edition - Darpan Shah
|
Jul 05, 2020 |
HOW TO BECOME A CLOUD SECURITY ENGINEER in 2020 | Including Top Certifications
|
Jun 28, 2020 |
Building an Engineering Security Culture - Failure stories included - Edwin Kwan, Tyro Payments
|
Jun 21, 2020 |
TIPS FOR WOMEN IN INFORMATION SECURITY TO GET A JOB IN CYBER SECURITY - Alannah Goh, 0xCC
|
Jun 14, 2020 |
Google Cloud Security - How does Google Cloud work?
|
Jun 07, 2020 |
What is GOOD COMPANY CULTURE (WITH EXAMPLE ) during COVID19 with remote employees!
|
May 31, 2020 |
What is a Connected Car | How to secure api in connected cars? - Virtual Coffee with Ashish - Alissa Knight
|
May 24, 2020 |
What is SRE? When should i have SRE? - Virtual Coffee with Ashish - Tim Heckman
|
May 17, 2020 |
NIST CyberSecurity Metrics for the Board - Taylor Hersom
|
May 10, 2020 |
Virtual Coffee with Ashish - Cloud Security Podcast & Hacker Valley Studio
|
May 03, 2020 |
Scaling a DevSecOps model | SERVERLESS SECURITY BEST PRACTICES with Abhay Bhargav , CTO , we45
|
Apr 26, 2020 |
CORONAVIRUS & CYBERSECURITY | ISOLATION LIFE
|
Apr 19, 2020 |
How to secure and improve cloud environment - Merritt Baer, Principal Security Architect, AWS
|
Apr 11, 2020 |
Cloud Center of Excellence in AWS | How Atlassian manages Risk and Compliance - Atlassian 2020
|
Apr 05, 2020 |
A TECHNICAL WOMEN DELIVERING NON-TECHNICAL TRAINING IN CYBERSECURITY | HOW TO BUILD CYBERSECURITY TRAINING PROGRAM- Fareedah Shaheed, Online Safety and Security Strategist, Sekuva
|
Mar 29, 2020 |
How HASHICORP works with 90 percent Staff works Remotely | Incident Response | AWS Cloud Native! - Will Bengtson
|
Mar 22, 2020 |
Multi Cloud Strategy | Multi Cloud Management for companies of all size - David Linthicum , Chief Cloud Strategy Officer for Delloite
|
Mar 15, 2020 |
CCPA COMPLIANCE | CALIFORNIA CONSUMER PRIVACY ACT | DATA GOVERNANCE BEST PRACTICES - TAYLOR HERSOM, VCISO, AUSTIN,TEXAS
|
Mar 08, 2020 |
Docker Security Best practice | Container Security 101 in AWS - Michael Hausenblas, Product Developer Advocate, AWS
|
Mar 01, 2020 |
Threat Intelligence platform for cyber security in Azure | Incident Response in Azure - Ashwin Patil, Threat Intelligence Center, Microsoft
|
Mar 01, 2020 |
MICROSOFT IGNITE 2020 SYDNEY | Getting started with securing Microsoft Azure Workload- David O'Brien, Microsoft MVP for Azure
|
Feb 16, 2020 |
Is public cloud secure? - Francesco Cipollone, Cloud Security Alliance
|
Feb 09, 2020 |
Just Eat UK security - cloud security across Scotland uk canada in a world of multi public cloud
|
Feb 02, 2020 |
Cloud Security in Japan - Cloud Security Podcast the Tokyo edition
|
Jan 26, 2020 |
AZURE vs AWS , Azure Security and Can AZURE be DevOps friendly? - Tanya Janca
|
Jan 19, 2020 |
CLOUD SECURITY JOURNEY OF DOW JONES POST THE AWS CLOUD BREACH , WITH JAY KELATH, PRODUCT SECURITY
|
Jan 12, 2020 |
Networking , recruiting and retaining female engineers, cyber security influencer, personal branding, mentoring for introvert men and women in cyber Security with Jane Frankland
|
Jan 05, 2020 |
Cloud Security and Infosec girls with Vandana Verma
|
Dec 23, 2019 |
AWS Re-invent 2019 Security Announcements - The DevSecOps in AWS edition
|
Dec 22, 2019 |
Cloud Security Podcast - Trailer
|
Nov 28, 2019 |