Scale to Zero - No Security Questions Left Unanswered

Scale To Zero
undefined
Sep 4, 2024 • 50min

Identity and Access Management | IAM | Cloud Governance | Ft. John Giglio | S2 Ep.41 | Cloudanix

In this episode of ScaletoZero, Join us for an in-depth exploration of IAM, a critical component of cloud security. Discover key considerations for setting up IAM, common vulnerabilities, and best practices for securing remote access and sensitive data. Learn how to balance compliance with effective security, evaluate the right solutions, and promote a security-conscious culture within your organization. Transcript: https://www.scaletozero.com/episodes/demistifying-identity-and-access-management-with-john-giglio/ What is IAM: https://www.cloudanix.com/learn/what-is-iam 00:00 Teaser and Introduction 05:00 Defining Identity and Access Management. 07:31 Key things to consider before setting your IAM. 09:30 Different ways access permissions may get compromised. 13:30 Other recommendations where security can be enforced. 15:20 Providing access in a remote-first environment. 19:10 Ensuring data security in a remote-first environment. 21:27 Approaching the secure management of secrets and keys in the cloud, considering the shared responsibility model. 25:52 Right time to use custom keys and cloud provider-provided keys. 27:36 Balancing between checkbox compliance and deep security program. 30:35 Evaluating the right security solution. 32:32 Using security baselines to promote security culture within the organization. 35:58 Using threat intelligence to improve the security baselines. 37:56 How can security leaders handle burnout and stress? 45:00 Summary 45:55 Rating Security Practices
undefined
Aug 28, 2024 • 56min

Intersection of Security and Human Behavior | Ft. Cassie Clark | S2 Ep.40 | Cloudanix

Join us for a thought-provoking discussion on the intersection of security and human behavior. In this episode of the ScaletoZero podcast, we have discovered how psychological factors contribute to cybersecurity risks, and learn effective strategies to mitigate them. From understanding security fatigue to leveraging user behavioral analytics, this episode offers valuable insights for building a more resilient security posture. 00:00 Teaser, Introduction, and more. 07:20 Biggest human behavioral factors contributing to cybersecurity risks. 09:35 Leveraging human psychology to understand employee behavior for security incidents. 12:45 Understanding the concept of security fatigue. 15:40 Spreading awareness of the shared responsibility model in other business units. 19:00 Tactics to develop effective security awareness programs. 24:40 Developing security architecture keeping human behavior in mind. 27:15 Leveraging User Behavioral Analytics to identify potential security incidents. 30:15 Concept of user-friendly security, its importance, and more. 36:40 Getting prepared for phishing attacks or social engineering attacks. 39:19 How to react in case of attacks? 43:05 How can security professionals handle burnout? 46:05 Future plans of our guest (Cassie Clark) 48:05 Summary 48:57 Rating Security Practices section
undefined
Aug 21, 2024 • 50min

Building Security Foundation and Security Boundaries with Kushagra Sharma | S2 Ep.39 | Cloudanix

In this episode of ScaletoZero, join us as our host delves deep into the world of cloud security with a senior security engineer - Kushagra Sharma from Booking.com. Discover how to define security boundaries, leverage threat intelligence, and foster a security-conscious culture. Learn practical strategies for implementing permissions boundaries and balancing security with business agility. Tune in to build a rock-solid cloud security foundation! Watch on YouTube: https://youtu.be/-01jHIMRR2I 00:00 Teaser, Introduction, and Setting the stage 05:20 Defining security boundaries and baselines in a cloud environment. 08:15 Utilising concepts of security boundaries for creating a strong security foundation. 10:45 Leveraging threat intelligence for building and improving security baselines. 14:55 Promoting security culture beyond technical boundaries. 17:50 Balancing between security baselines and updated cloud service or feature. 23:19 Security teams unblocking core business areas. 27:00 Strategies to implement permissions boundaries when migrating from on-prem to cloud. 31:25 Is building one-size-fits-all security boundaries possible? 35:25 Keeping the right balance between security requirements and standardization 37:45 Designing common and specific security architecture across a multi-cloud setup 41:30 Summary 42:32 Rating Security Practices Section
undefined
Aug 14, 2024 • 50min

Trust & Security: The Cornerstones of a Resilient Organization | Cloud Expert | S2 Ep38 | Cloudanix

In this episode of the ScaletoZero podcast, join us for an insightful conversation with cloud security and compliance expert Sandeep Agarwal as we explore the critical role of trust in building a secure environment. Discover practical tips to enhance security awareness, define security boundaries, and balance automation and manual controls. 00:00 Teaser, Introduction, and more 09:36 Importance of trust between organization 13:30 Challenges of organizations to build trust within teams 17:00 Tactics to improve trust within teams20:25 Effective ways to build security awareness 25:35 Tips to promote security awareness within the organization 29:50 Strategies to define security boundaries 33:20 Challenges of keeping the balance between security automation and auditing the enforcement of security baselines 36:00 Right time to invest in security 38:30 Are certifications helpful? 42:20 Summary 43:13 Rating Security Practices Section 48:30 Sandeep's recommendations for learning more about security
undefined
Aug 7, 2024 • 55min

Continuous Security | Compliance | Incident Response landscape | Jan Hertsens | S2 Ep.37 | Cloudanix

Join us as we dive deep into the world of cloud security with a seasoned AWS expert - Jan Hertsens, Senior Security Consultant at AWS. Discover how to strike the perfect balance between continuous security and compliance, leverage GenAI for enhanced protection, and build a robust incident response plan for the age of AI. Don't miss this insightful episode! 00:00 Teaser and Introduction 06:30 Continuous security and security compliance requirements 10:25 How to find the right balance between continuous security and compliance 14:20 Compliance Requirements vs Practical Security Implementations 20:55 Balancing the growth of GenAI and security compliance 25:00 How do organizations leverage GenAI for cloud security? 30:22 Defining Incident Response 39:20 Types of new age GenAI attacks that need an incident response plan 48:52 Summary 49:30 Rating Security Practices 53:30 Recommendation by Jan
undefined
Jul 24, 2024 • 60min

Network Segmentation | Inserting Security Appliance | AWS | Ft. Tom Adamski | Ep.36 S2 | Cloudanix

Network Security Fortress: Master Network Segmentation! This episode dives deep into network segmentation - your secret weapon for building a secure and scalable network. We'll discuss best practices, tackle implementation challenges, and explore how to integrate segmentation with Zero Trust. Learn how to segment for containers, cloud environments, and more! Tune in and fortify your network defenses! 00:00 Teaser + Introduction 08:00 What is Network Segmentation? 10:10 At what stage of company should I think about Network Segmentation? 11:30 Benefits of Network Segmentation? 17:00 Best practices for implementing Network Segmentation 19:10 Ensuring proper enforcement and zero misconfiguration 21:50 Key factors when designing a Network Segmentation strategy 26:30 Deciding segmentation methods based on a specific scenario 35:20 Network segmentation in case users are using ECS or Kubernetes containers 38:15 Integrating Network Segmentation principles with Zero Trust architectures 42:10 Examples of common security appliances came across45:30 Factors to decide between cloud-native or third-party security appliances 48:30 Types of remote access solutions used today 52:50 Summary 53:45 Rating Security Practices
undefined
Jul 10, 2024 • 50min

Understanding the role of logging and monitoring in detective controls | Ep.35 S2 | Cloudanix

Struggling to keep your cloud environment secure? This episode with Kailash Havildar dives deep into logging and monitoring, your secret weapons for prevention, detection, and remediation. We'll uncover best practices, tackle common challenges, and show you how organizations can leverage threat intelligence and user behavior to stay ahead of cyberattacks. Tune in and learn how to measure your security investments and ensure your cloud fortress is impenetrable! 00:00 Teaser and Introduction 08:30 Tools and tricks for prevention, detection, and remediation in cloud environments 14:30 Role of logging and monitoring while implementing detective controls 16:50 Types of data or events to prioritize while logging and monitoring for security purposes 19:00 Challenges faced while implementing logging and monitoring, and how to tackle them 25:05 Capabilities to look for in sim solutions while creating detecting or monitoring 28:50 Use of automation for better log analysis and incident response process 31:00 How can startups secure their logging and monitoring systems 33:35 Factors that startups should consider for log retention and securing the storage 36:05 Logging and monitoring standards that different industries can follow 39:30 Key metrics to showcase the importance of logging and monitoring for stakeholders 42:30 Summary 43:23 Rating Security Practices
undefined
Jun 26, 2024 • 48min

Building Security Teams | Importance of Continuous Learning | Mathew Marji | Ep.34 S2 | Cloudanix

Worried about cyberattacks but can't find the right security people? This episode of ScaletoZero with Matthew Marji is your one-stop shop! Matthew has cracked the code on building a dream cybersecurity team, from must-have skills to attracting top talent. Startups, learn about prioritizing security programs for your first hire. We'll also reveal how to create a security-focused culture that engineers will love, avoid common integration pitfalls, and explore the soft skills that make a security pro truly shine. Don't let cyber threats hold you back - listen in and build your dream cybersecurity team today! 00:00 Teaser and Introduction 05:13 Key skills organizations should look for hiring security professionals 09:20 Strategies for attracting and retaining top security talents 12:50 Security programs startups should prioritize when hiring their first security leader 15:00 Skills, Experience, or Anything else? What should startups prioritize? 17:40 How to ensure security culture remains at the forefront? 21:40 Common pitfalls to avoid when integrating cybersecurity into broader business processes 24:40 Recommendations to foster security culture in organizations 28:30 Practical strategies to bring security awareness to your organization 34:20 Technical learning needs for security leaders when hiring 40:10 Summary 40:47 Rating Security Practices
undefined
Jun 12, 2024 • 53min

Understanding Threat Modeling and Secure by Design Concept with Adam Shostack | Ep.33 | ScaletoZero podcast | Cloudanix

Get ready for a paradigm shift in how you build software. In this episode of the Scale to Zero podcast with Adam Shostack, we crash-landed with a powerful concept called Secure by Design! It's not just a mantra for the Rebel Alliance, it's the key to building unbreachable software from the very first line of code. 00:00 Teaser and Introduction of guest 05:44 What is the Secure by Design concept? And why is it crucial? 09:30 Difference between Secure by Design and Secure by Default 12:50 Key steps to integrate Secure by Design principles in SDLCs 18:45 Area of focus for integrating threat modeling in SDLCs 21:18 Validating the threat modeling design 25:50 Thin line between Star Wars and Secure by Design concept 31:00 Examples from Star Wars that resonate Secure by Design concept 33:20 Role of communication and collaboration in the Secure by Design concept across various teams 36:40 How to raise awareness about the importance of Secure by Design within workplaces 40:00 Concept of Cyber Public Health and its connection to threat modeling 44:29 Summary 45: 20 Rating Security Practices section
undefined
May 29, 2024 • 43min

Conquering Enterprise Risk Management with Amit Subhanje | Ep. 32 | Cloudanix

Feeling overwhelmed by cyber risk? We've got you covered! In this episode of ScaletoZero, Our guest Amit Subhanje dives deep into everything risk management, from understanding its importance to conquering cybersecurity and cloud security challenges. Remember security awareness is the key, get ready to become a risk management master! Hit play and join now! 00:00 Teaser + Introduction 04:35 Day in Amit's life 06:20 What is risk management and it's importance? 08:22 Risk management and cybersecurity or cloud security 11:00 Challenges organizations face managing cyber risks 13:55 How to address cyber risk challenges? 16:30 Thin line between enterprise risk management and risk management 17:00 How can startups build comprehensive risk mitigation plan? 22:45 Building security awareness in an organization 29:20 How can teams lead and be accountable for security incidents? 33:10 Summary 34:10 Rating security practices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app