

Cloud Security Podcast
Cloud Security Podcast Team
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.
Episodes
Mentioned books

Oct 31, 2024 • 56min
Building Data Perimeter in Cloud in 2024
In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the importance of securing your data through trusted networks and identities has never been more crucial.
Tyler shares his insights on the challenges and strategies involved in building effective data perimeters, emphasizing the need for a holistic security approach that includes both preventative and detective controls. We explore how concepts like trusted resources, networks, and identities play a pivotal role in safeguarding your cloud infrastructure and why these elements should be at the core of your security strategy. Join us as we discuss practical steps for implementing and managing data perimeters, the significance of understanding your zones of trust, and how to scale your security measures as your cloud footprint grows.
Guest Socials: Tyler's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:28) A bit about Tyler
(04:22) Data Perimeter in Cloud Security
(08:18) Why was there a need to look into data perimeter?
(09:39) Should people look at data perimeter from the beginning?
(12:16) Starting point for data perimeter
(15:42) Defining boundaries of Zone of Trust
(21:25) Data perimeter in hybrid environments
(24:47) Challenges in setting up data perimeter
(31:31) Should you start in dev, test or prod?
(34:55) How often should you review your SCPs?
(36:05) What Skillsets does the team need?
(37:26) Are Data Perimeters Developer Friendly?
(40:06) Technical challenges with detective and preventative controls
(42:14) Getting stakeholders onboard
(46:56) Levels of maturity for data perimeter strategy
(49:30) The Fun Section
Resources spoken about during the interview:
AWS Data Perimeter at USAA: Things we knew, things we thought we knew and things you should know!

Oct 22, 2024 • 36min
Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance, and broader security programs in industries like retail and advertising.
Throughout the conversation, we dive into the specific challenges of transitioning from a purely cloud-based tech company to a bricks-and-mortar retail operation, highlighting how the threat models differ dramatically between these environments. Lukasz shares his unique perspective on cybersecurity frameworks like NIST CSF 2.0, essential for building resilient programs, and offers practical advice for selecting the right framework based on your organization's needs.
Guest Socials: Lukasz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(03:00) A bit about Lukasz
(04:32) Security Challenges for Tech First advertising company
(05:16) Security Challenges for Retail Industry
(06:00) Difference between the two industries
(07:01) Best way to build Cybersecurity Program
(09:44) NIST CSF 2.0
(13:02) Why go with a framework?
(16:26) Which framework to start with for your cybersecurity program?
(18:33) Technical CISO vs Non Technical CISO
(25:37) The Fun Section
Resources spoken about during the interview:
NIST CSF 2.0
CIS Benchmark
ASD Essential Eight
Mapping between the frameworks
https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-nist-csf-2-0
https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-asds-essential-eight
Verizon Data Breach Investigations Report (DBIR)
Lukasz Woodwork Channel
BSides Melbourne

12 snips
Oct 15, 2024 • 56min
Building a SOC Team in 2024 - Automation & AI
Allie Mellen, a Principal Analyst at Forrester Research, dives into the future of Security Operations Centers (SOCs) and the role of AI in cybersecurity. She argues that Cloud Detection Response may be fading and critiques the current hype around generative AI, stressing that automation will never fully replace human analysts. The discussion highlights the burnout among security teams, the necessity of adopting detection engineering, and the importance of continuous learning and mentorship to empower SOC analysts.

Oct 8, 2024 • 33min
Cloud Identity Lifecycle Management Explained!
Shashwat Sehgal, co-founder and CEO of P0 Security, dives into the intricate world of cloud identity lifecycle management. He discusses why traditional solutions like SAML fail in modern cloud settings. Shashwat emphasizes the necessity for a holistic strategy encompassing IAM roles and visibility of cloud identities. The conversation highlights the complexities of managing human and non-human identities while advocating for a shift to cloud-native governance. He also touches on personal interests, including a fondness for Mediterranean cuisine.

Oct 4, 2024 • 34min
Traditional PAM vs Cloud CPAM for a cloud first world
Art Poghosyan, CEO and co-founder of Britive, shares his extensive expertise in identity and access management. He discusses the significant shifts from traditional Privileged Access Management (PAM) to cloud-native solutions. Art emphasizes that 'Identity is the new perimeter,' detailing the critical importance of Just-in-Time access. He also explores the complexities of cloud infrastructure entitlements, the evolving role of non-human identities, and the necessity for modern organizations to adapt their security strategies to the cloud era.

Oct 2, 2024 • 35min
The Role of Cloud Security Research in 2024
Scott Piper is a leading cloud security researcher at Wiz, known for his insights into vulnerabilities within cloud environments. He discusses the crucial role of cloud security research as distinct from traditional security testing. Scott explains how his team enhances detection tools and safeguards data while navigating multi-tenant challenges. Additionally, he shares about request collapsing and the evolving collaboration between developers and security teams, highlighting proactive measures that are shaping the future of cloud security.

Sep 20, 2024 • 27min
Edge Security is the Key to Cloud Protection
Brian McHenry, the Global Head of Cloud Security Engineering at Check Point, delves into the future of cloud protection and the critical role of edge security. He discusses how automation reshapes security management and the dangers of misconfigurations. Brian emphasizes the limitations of traditional Cloud Security Posture Management (CSPM) and the need for proactive measures. He also highlights the challenges of securing multi-cloud environments and how AI can help address rising concerns in cloud security. Tune in for expert insights!

Sep 13, 2024 • 30min
Is your CI/CD Pipeline your Biggest Security Risk?
Mike Ruth, a Senior Staff Security Engineer at Rippling, discusses the hidden vulnerabilities in CI/CD pipelines during a live segment from BlackHat 2024. He reveals how tools like GitHub Actions and Terraform can pose serious security risks, such as bypassing code reviews and unauthorized command execution. Mike emphasizes the importance of granular access control and offers actionable strategies to mitigate these vulnerabilities, enhancing security in cloud environments and safeguarding against insider and external threats.

Sep 4, 2024 • 56min
State of Cloud Security - Practitioner Edition
In this episode of the Cloud Security Podcast, we bring together an incredible panel of experts to explore the evolving landscape of cloud security in 2024. Hosted by Ashish Rajan, the discussion dives deep into the challenges and realities of today’s multi-cloud environments. With perspectives ranging from seasoned veterans to emerging voices this episode offers a broad spectrum of insights from cloud security practitioners who are living and breathing cloud security everyday. We are very grateful to our panelist who took part in 1st of its kind edition for the State of Cloud Security - Meg Ashby, Damien Burks, Chris Farris, Rich Mogull, Patrick Sanders, Ammar Alim and Abdie Mohamed.
The conversation covers essential topics such as the pitfalls of multi-cloud adoption, the persistent security issues that remain even as cloud technologies advance, and the importance of specializing in one cloud platform while maintaining surface-level knowledge of others. The panelists also share their thoughts on the future of cloud security, including the increasing relevance of Kubernetes and edge security.
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:22) How much has Cloud Security Changed?
(07:05) Is the expectation to be MultiCloud?
(19:07) What’s top of mind in Cloud Security in 2024?
(27:17) The current Cloud Service Provider Landscape
(39:26) Where to start in Cloud Security ?
(52:10) The Fun Section
Resources discussed during the episode:
fwd:cloudsec conference
Cloud Security Bootcamp
DevSecBlueprint YouTube Channel - Damien Burks
Rich Mogull’s Cloud Security Lab of the Week

Aug 28, 2024 • 40min
BlackHat USA 2024 Highlights and Recap
Explore cutting-edge themes from BlackHat USA 2024, including the vital push for resiliency in cybersecurity. The conversation dives into the growing complexities of cloud security and the evolving nature of identity-centric security. Learn about the increasing importance of data protection and the potential game-changing role of AI in security practices. The notion of shared responsibility is illuminated, alongside a provocative discussion on whether Cloud Security Posture Management has lost its relevance amid emerging threats.