Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Introduction
00:00 • 2min
Cloud Security Architecture - What Is Your Background?
02:17 • 3min
Cloud Native Is Container Eco System?
04:53 • 2min
A Simple and Easy to Understand Security Framework
06:34 • 3min
How to Assess Sor Securt Journey?
09:08 • 2min
Cloud Security Architectures - Isn't It?
10:39 • 3min
Identify, Protect, Dedect, Respond and Recover
13:22 • 4min
Is There a Process in Place to Identify People?
17:47 • 2min
How to Deploy a Cloud Application?
19:49 • 4min
Container Application Security
24:15 • 2min
A. Micro Service or Micro Service?
26:04 • 3min
Container vs a Traditional Operating System
29:13 • 2min
Do You Have a Shared Responsibility Model?
31:18 • 2min
Dedectioniss Wer. Is the Fun Beginning?
33:15 • 5min
Confidential Computing
38:08 • 4min
How to Deploy a Container Uster in a Cluster?
41:54 • 3min
Detection, Deployment, and Security
45:11 • 3min
Do You Have a Security Assessment?
48:23 • 2min
Container Security - Where Do You Start?
50:05 • 3min
I've Got a Couple of Technical Questions for You, Dulaand Dulan.
52:41 • 3min