- 837
- 1 180 679
Cloud Security Podcast
United Kingdom
Приєднався 20 сер 2019
Cloud Security Podcast is a community first WEEKLY VIDEO PODCAST, where each week we interview CyberSecurity Leaders and Cloud Security Practitioners from around the world to help you learn How to and What's HOT in Cloud Security.
Video Host:
Ashish is a Chief Information Security Officer (CISO) who is passionate about helping people get Cloud Security jobs and help CyberSecurity professionals do their job better in Public Cloud. Before being a CISO, Ashish has been a Security Architect, SOC Manager, Cloud Security Engineer, Identity and Access Management Consultant, Pentester(for 1 month).
Cloud Security Meetup
We also hold global meetup events and conferences for Cloud Security enthusiast & practitioners.
Cloud Security BootCamp
Academy to learn unbiased multi-cloud disciplinary Cloud Security practices to help you succeed as a Cloud Security Practitioner. www.cloudsecuritybootcamp.com
All the information is on www.cloudsecuritypodcast.tv
Video Host:
Ashish is a Chief Information Security Officer (CISO) who is passionate about helping people get Cloud Security jobs and help CyberSecurity professionals do their job better in Public Cloud. Before being a CISO, Ashish has been a Security Architect, SOC Manager, Cloud Security Engineer, Identity and Access Management Consultant, Pentester(for 1 month).
Cloud Security Meetup
We also hold global meetup events and conferences for Cloud Security enthusiast & practitioners.
Cloud Security BootCamp
Academy to learn unbiased multi-cloud disciplinary Cloud Security practices to help you succeed as a Cloud Security Practitioner. www.cloudsecuritybootcamp.com
All the information is on www.cloudsecuritypodcast.tv
Cloud Security Detection & Response Strategies That Actually Work
We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives deep into:
- Why cloud security is NOT like on-prem - and how that affects incident response
- How attackers exploit APIs in seconds (yes, seconds-not hours!)
- The secret to building a cloud detection program that actually works
- The biggest detection blind spots in AWS, Azure, and multi-cloud environments
- What most SOC teams get WRONG about cloud security
Questions asked:
00:00 Introduction
00:38 A bit about Will Bengtson
05:41 Is there more awareness of Incident Response in Cloud
07:05 Native Solutions for Incident Response in Cloud
08:40 Incident Response and Threat Detection in the Cloud
11:53 Getting started with Incident Response in Cloud
20:45 Maturity in Incident Response in Cloud
24:38 When to start doing Threat Hunting?
27:44 Threat hunting and detection in MultiCloud
31:09 Will talk about his BlackHat training with Rich Mogull
39:19 Secret Detection for Detection Capability
43:13 Building a career in Cloud Detection and Response
51:27 The Fun Section
#cloudsecuritypodcast #cloudsecurity #cybersecuritypodcast
--------------------------------------------------------------------------------
📱Cloud Security Podcast Social Media📱
_____________________________________
🛜 Website: cloudsecuritypodcast.tv/
🧑🏾💻 Cloud Security Bootcamp - www.cloudsecuritybootcamp.com/
✉️ Cloud Security Newsletter - www.cloudsecuritynewsletter.com/
Twitter: CloudSecPod
LinkedIn: www.linkedin.com/company/Cloud-security-podcast
#cloudsecurity #cybersecuritypodcast #cloudsecuritypodcast
- Why cloud security is NOT like on-prem - and how that affects incident response
- How attackers exploit APIs in seconds (yes, seconds-not hours!)
- The secret to building a cloud detection program that actually works
- The biggest detection blind spots in AWS, Azure, and multi-cloud environments
- What most SOC teams get WRONG about cloud security
Questions asked:
00:00 Introduction
00:38 A bit about Will Bengtson
05:41 Is there more awareness of Incident Response in Cloud
07:05 Native Solutions for Incident Response in Cloud
08:40 Incident Response and Threat Detection in the Cloud
11:53 Getting started with Incident Response in Cloud
20:45 Maturity in Incident Response in Cloud
24:38 When to start doing Threat Hunting?
27:44 Threat hunting and detection in MultiCloud
31:09 Will talk about his BlackHat training with Rich Mogull
39:19 Secret Detection for Detection Capability
43:13 Building a career in Cloud Detection and Response
51:27 The Fun Section
#cloudsecuritypodcast #cloudsecurity #cybersecuritypodcast
--------------------------------------------------------------------------------
📱Cloud Security Podcast Social Media📱
_____________________________________
🛜 Website: cloudsecuritypodcast.tv/
🧑🏾💻 Cloud Security Bootcamp - www.cloudsecuritybootcamp.com/
✉️ Cloud Security Newsletter - www.cloudsecuritynewsletter.com/
Twitter: CloudSecPod
LinkedIn: www.linkedin.com/company/Cloud-security-podcast
#cloudsecurity #cybersecuritypodcast #cloudsecuritypodcast
Переглядів: 330
Відео
Proactive vs. Reactive Security in Microsoft Azure
Переглядів 14016 годин тому
In this episode, we sit down with Sam Kirkman, Director of Services at NetSPI, who has helped enterprises uncover critical vulnerabilities in Microsoft Azure and implement stronger security strategies. We spoke about the most overlooked risks in Azure security that organizations keep missing, how a simple permission mistake can escalate to full admin access, why many businesses are still stuck ...
CISO Challenges Across Industries
Переглядів 107День тому
In this episode, we sit down with Sunil Rane, an experienced cybersecurity leader with over 20 years in cybersecurity across industries like healthcare, education, media, and consulting. Sunil shares unique insights into the diverse challenges faced by CISOs, from managing data sensitivity in healthcare to the lack of standardized frameworks in media, how to balance data availability and securi...
Why Solving the Data Problem is Key to Cloud Security?
Переглядів 28614 днів тому
In this episode we’re joined by Francis Odum, founder and lead research analyst at Software Analyst Cyber Research. Drawing from his extensive research and conversations with CISOs, security operators, and vendors, Francis shares his insights on the state of identity security and the rise of non-human identities (NHI) in the cloud, why solving the data problem is critical to reducing false posi...
The economics of cybersecurity and trends
Переглядів 21114 днів тому
In this episode, host Ashish Rajan 🤴🏾🧔🏾♂️ spoke to Mike Privette, founder of Return on Security, to explore the landscape of cybersecurity as we look toward 2025. Mike shared his unique insights on the economics of cybersecurity, breaking down industry trends, and discussing how AI is revolutionizing areas like governance, risk, compliance (GRC), and data loss prevention (DLP). They dive into ...
The Truth About CNAPP and Kubernetes Security
Переглядів 38421 день тому
The Truth About CNAPP and Kubernetes Security
Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem
Переглядів 40428 днів тому
Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem
Centralized VPC Endpoints - Why It Works for AWS Networking
Переглядів 419Місяць тому
Centralized VPC Endpoints - Why It Works for AWS Networking
Payment Security with Cryptography, AWS Nitro, and Lambda
Переглядів 207Місяць тому
Payment Security with Cryptography, AWS Nitro, and Lambda
Building Platforms in Highly Regulated Industries Explained
Переглядів 3712 місяці тому
Building Platforms in Highly Regulated Industries Explained
The Role of Platform Engineers in Scaling Enterprise Security
Переглядів 6012 місяці тому
The Role of Platform Engineers in Scaling Enterprise Security
Building AI-Powered Legal Tools with SageMaker & Bedrock
Переглядів 1672 місяці тому
Building AI-Powered Legal Tools with SageMaker & Bedrock
Building Platforms in Regulated Industries
Переглядів 1722 місяці тому
Building Platforms in Regulated Industries
Dynamic Permission Boundaries: A New Approach to Cloud Security
Переглядів 4172 місяці тому
Dynamic Permission Boundaries: A New Approach to Cloud Security
Building a Resilient Cloud Security Program after Merger and Acquisition
Переглядів 4963 місяці тому
Building a Resilient Cloud Security Program after Merger and Acquisition
Building Data Perimeter in Cloud in 2024
Переглядів 3533 місяці тому
Building Data Perimeter in Cloud in 2024
Real-World Cloud Threats and Multi-Cloud Defense in 2024
Переглядів 5623 місяці тому
Real-World Cloud Threats and Multi-Cloud Defense in 2024
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
Переглядів 9213 місяці тому
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
Building a SOC Team in 2024 - Automation & AI
Переглядів 1,8 тис.3 місяці тому
Building a SOC Team in 2024 - Automation & AI
Cloud Identity Lifecycle Management Explained!
Переглядів 4273 місяці тому
Cloud Identity Lifecycle Management Explained!
Is Your Cloud Strategy Ready for 2024 Security Challenges?
Переглядів 924 місяці тому
Is Your Cloud Strategy Ready for 2024 Security Challenges?
Traditional PAM vs Cloud CPAM for a cloud first world
Переглядів 2644 місяці тому
Traditional PAM vs Cloud CPAM for a cloud first world
The Role of Cloud Security Research in 2024
Переглядів 4984 місяці тому
The Role of Cloud Security Research in 2024
How MDR and AI are Shaping Cybersecurity in 2024?
Переглядів 1,3 тис.4 місяці тому
How MDR and AI are Shaping Cybersecurity in 2024?
Why Identity Management Experts NEED to Know About Cloud Security
Переглядів 2404 місяці тому
Why Identity Management Experts NEED to Know About Cloud Security
Edge Security is the Key to Cloud Protection
Переглядів 1,2 тис.4 місяці тому
Edge Security is the Key to Cloud Protection
Is your CI/CD Pipeline your Biggest Security Risk?
Переглядів 1 тис.4 місяці тому
Is your CI/CD Pipeline your Biggest Security Risk?
Hot Takes with Cybersecurity Leaders - Yasmin Abdi
Переглядів 6284 місяці тому
Hot Takes with Cybersecurity Leaders - Yasmin Abdi
I need help on transitioning from a soc analyst to cloud security, currently just pursuing certifications that are teaching me a lot
thans for the advice, really helpfull
A link to the repository mentioned by you would be helpful
Which episode is this?
I love the style of your video - so informal and friendly - especially the opening scene of you and your dog, opening up the laptop to get started. I actually made me want to stick around and watch. Well done!
What's the name of this lady please
Ganpati baapa morya 🙏🏼
Would
How can i connect with you Sir ?
Can you name the best tools for each type?
From my experience in IT field, to get a job in Cyber Security you will need a good undertanding of programming language such as C/ C++, Shell script, Python. You should have a decent understanding of Linux or unix based operating system. Fundamemtal knowledge of mathematics ( more is good). Knowledge of firewalls, access level frameworks such as SELINUX, and AppArmour etc will be good. This part comes under securing different directories. Hardening. Plus there are various cyber security roles. E. G. pen testing an application is done by Pen testers. Basically they will scan a codebase through tools and also try to break the system offcially. Other type is cyber forensics field where you maybe asked to recover a broken hard disk. Recover data from a deleted database such as sqlite. You are not taught these things in a cyber security school but mostly you will learn through work. There are other things also like OWASP rules etc. Some of the companies you can check are Blackduck, Secureworks etc.
Hi, I have a doubt, I’m an international student with F-1 visa, can I apply for jobs related to cloud security? Because I hear lot of rejections from companies asking for students visa status as they need to go through certain security clearances . Candidates with either H1 or GC can only apply for cyber security or cloud security related roles is that true? Your reply will be very much helpful for me.
I have 1year experience desktop Support Engineer...now confusing what i next choose?? Cybersecurity or automation testing??
HI, should I do AWS Solutions Architect certification before attempting AWS Certified Data Engineer? btw I'm a student with no work experience
i started yesterday and im very nervous. i really want to pass. i will need to study even harder cuz i dont have experience with it. but thx for the video. it give me hope. and i need to study everything
Why do a CSPM generate false positives? I can understand CSPM generating lot of valid alerts and customers not knowing which ones to fix and vendors like Wiz provide context in a graph to show them why an alert is important or not Also AI findings should be taken with a pinch of salt, can you trust an AI generated remediation ?
It would be great if we have more sessions on Azure architecture, similar to this one, I see you have a lot for AWS
It's all technical, it's more like the part where you are fundamentally understanding how they bugged everything would require understanding the code not just for scripting.
Sir i am a non it person, and want to start my career. Would you please guide me if i go with cloud computing or with cyber security, where i can build my career and make handsome Money
Thank you for sharing your experience! It's always inspiring to hear from someone who has been there and achieved it. Congratulations on earning your certification!
Great content, would really like to see more on this
Thanks ❤ for short explanation
This was an extremely helpful video! I’ve asked many cybersecurity specialists, and most couldn’t tell me much about this specific role. Thank you!🙏🏾
I hope to attend one day
Hi Shauli! Long time no speak :)
Is CDR (Cloud Detection and Response) and CADR the same?
Great info on cloud computing and cybersecurity
Terraform? I’m looking at a IAM job and it mentions iac but not which language
issue- big service provider vendors (eg. aws) will not practice security by-design and thus create a breeding ground for vulnerabilities . Status- from poketmon 'get-them-all' mind set of fixing all vulns to the mindset of what can we skip due to ever increasing amount of vulns popping up every year. Moving forward- we need a way to not just manage but to 'live with ' those threat. Biologically, this is where the 'immune system' evolve out. Can we learn anything from biology instead of just mindlessly integrating and automating existing tools? The later can only 'help' so much until the entire system collapse. Think of a body where immune system failed. A big direction is an holistic approach on life cycle management (from assumed compromised, to clean up, to recovery, to getting health and then rinse and repeat). From there, we might have a chance to come out with a system that can monitor digital health of organization.
Ooh Google cloud platform is also in it
Winning 🥇
How?
great show helping me to grasp a number of cloud terms like cnapp, ciem and how people, process and tech moving forward might be focusing on. thumb up.
Really good episode
Loved AJ’s insight on this ever developing field !
are you from tamilnadu ?
Im a completely self-taught IT guy, never went to college for IT, only got my associates in BA, never attended bootcamps, taught myself networking, moved to an MSP, networked and collaborated within my network, went out of my way to introduce my self to mamagers of the CSP desks and actively requested to be put into cloud related clients, learned them inside and out, and got certified in azure, specifically AZ-900 and AZ-104. Just recently got promoted to an associate cloud engineer role. Just a country boy from mississippi who put the work in and made it happen. America is the land of opportunity and you need to seize the opportunities as you run into them, if you dont someone will.
We need better CloudDefense #clouddefense
soc will get automated when we moving into 'consolidation' mode. Right now, we are in 'expansion mode' where we get more and more device to gain telemetry info from when moving toward 6G. But it is not sustainable and will reach a point that management consolidation is the only way to go. If you think the development of technology is CONSTANT VELOCITY, yes, it will take a very long time. But i feel that we are onto an near exponentially acceleration which mean the next 12 months things are going to change alot more than the past 12 months. Right now, it is super costly to train an 'attacker behaiour model' as an alternative to natural language based large language model. But once the AGI is reached the cost will drop quickly. At this rate, SoC may not completely vaish in 5 years but very likely will merge with other major functionality due to consolidation .
Been listening to this for more than 10years. Personally I have worked in multiple larger organisations which are struggling to have even proper asset management forget SOC
Hi boss , what about doing a roadmap in 2025 for cloud security for someone with a little knowledge of cloud to cloud security professional that can apply for the job and get that offer, Thank you a lot and keep going