
Cloud Security Today
The Cloud Security Today podcast features expert commentary and personal stories on the “how” side of cybersecurity. This is not a news program but rather a podcast that focuses on the practical side of launching a cloud security program, implementing DevSecOps, cyber leadership, and understanding the threats most impacting organizations today.
Latest episodes

Nov 20, 2023 • 46min
The New SEC Rule
Send us a textEpisode SummaryIn this episode, Special Advisor for Cyber Risk at the NACD, Christopher Hetner, returns to the show to discuss the new SEC cybersecurity rules. Chris has over 25 years of experience in cybersecurity, helping protect industries, infrastructures, and economies, serving in roles including as SVP of Information Security at Citi, Senior Cybersecurity Advisor to the Chairman of the US SEC, Executive Member of IANS, the National Board Director of the Society of Hispanic Professional Engineers, Senior Advisor for the Chertoff Group, Senior Advisor to the CEO of Stuart Levine & Associates, and Co-Chair of Nasdaq Cybersecurity and Privacy.Today, Chris talks about the developments since January 2023, the timeframe requirements in practice, and normalizing cybersecurity incidents as business-as-usual. What is Inline XBRL? Learn how startups could prepare themselves for these changes, the scope of disclosure, and how risk management strategies might evolve to address Cloud-specific threats. Timestamp Segments· [02:36] What has changed since January?· [06:49] Why things changed.· [08:51] Was it a good move?· [12:27] Determining the materiality of cybersecurity incidents “without unreasonable delay.”· [17:49] Is 4 days enough?· [22:19] The scope of disclosure.· [24:09] Normalizing cybersecurity incidents.· [26:24] Moving toward real-time monitoring.· [28:52] Is insurance becoming a forcing function?· [32:18] Evolving risk management strategies.· [36:05] Third-party disclosure requirements· [39:51] How do startups prepare?· [41:52] What is Inline XBRL?· [42:54] Inline XBRL to 8-k.· [43:30] How the tagging requirement impact the disclosure process. Notable Quotes· “The magnitude of these events is the percentage of the event relative to revenue.”· “We’re going to see market forces drive these safety standards within our enterprises.” Relevant LinksLinkedIn: Christopher Hetner Resources:https://www.sec.gov/news/press-release/2023-139.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Oct 21, 2023 • 42min
The AI Episode
Send us a textEpisode SummaryIn today’s episode, AI Safety Initiative Chair at Cloud Security Alliance, Caleb Sima, joins Matt to talk about some of the myths surrounding the quickly evolving world of AI. With two decades of experience in the cybersecurity industry, Caleb has held many high-level roles, including VP of Information Security at Databricks, CSO at Robinhood, Managing VP at CapitalOne, and Founder of both SPI Dynamics and Bluebox Security.Today, Caleb talks about his inspiring career after dropping out of high school, dealing with imposter syndrome, and becoming the Chair of the CSA’s AI Safety Initiative. Is AI and Machine Learning the threat that we think it is? Hear about the different kinds of LLMs, the poisoning of LLMs, and how AI can be used to improve security. Timestamp Segments· [01:31] Why Caleb dropped out high school· [06:16] Dealing with imposter syndrome.· [11:43] The hype around AI and Machine Learning.· [14:55] AI 101 terminology.· [17:42] Open source LLMs.· [20:31] Where to start as a security practitioner.· [24:46] What risks should people be thinking about?· [28:24] Taking advantage of AI in cybersecurity.· [32:32] How AI will affect different SOC functions.· [35:00] Is it too late to get involved?· [36:29] CSA’s AI Safety Initiative.· [38:52] What’s next? Notable Quotes· “There is no way this thing is not going to change the world.”· “The benefit that you're going to get out of LLMs internally is going to be phenomenal.”· “It doesn't matter whether you get in now or in six months.” Relevant LinksLinkedIn: Caleb Sima Resources:Skipping College Pays Off For Few Teen Techiesllm-attacks.orgThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

4 snips
Sep 21, 2023 • 50min
SBOMs: Good but less than a silver bullet
Send us a textEpisode SummaryOn today’s episode, Senior Advisor and Strategist at the Cybersecurity and Infrastructure Security Agency, Allan Friedman, joins Matt to discuss SBOMs. As Senior Advisor and Strategist at CISA, Allan coordinates the global cross-sector community efforts around software bill of materials (SBOM). He was previously the Director of Cybersecurity Initiatives at NTIA, leading pioneering work on vulnerability disclosure, SBOM, and other security topics.Before joining the Federal government, Friedman spent over a decade as a noted information security and technology policy scholar at Harvard’s Computer Science Department, the Brookings Institution, and George Washington University’s Engineering School.He is the co-author of the popular text Cybersecurity and Cyberwar: What Everyone Needs to Know, has a C.S. degree from Swarthmore College, and a Ph.D. from Harvard University.Today, Allan talks about SBOMs and their adoption in non-security industries, Secure by design and secure by default tactics, and how to make software security second nature. What, exactly, is the SBOM? Hear about how SBOMs could’ve helped against significant attacks, the concept of antifragility, and why vulnerability disclosure programs are so important. Timestamp Segments· [02:27] Allan’s career path.· [05:10] Allan’s day-to-day.· [06:15] What has been most rewarding?· [08:00] SBOMs in non-security startups.· [10:50] Real-world examples of Secure by Design tactics.· [17:30] Will software security ever seem obvious to us?· [19:30] What is the SBOM, and will it solve all our problems?· [23:41] Could an SBOM have helped against the SolarWinds attack?· [27:52] Memory-safe programming languages.· [30:16] Misconceptions around Secure by Design, Secure by Default.· [32:00] The importance of vulnerability disclosure programs.· [35:37] Antifragility in cybersecurity.· [41:47] VEX.· [44:29] How to get involved with CISA.· [48:00] How does Allan stay sharp? Notable Quotes· “Sometimes, organizations need a good excuse to do the right thing.”· “It is bananas that software that we use, and pay for, still delivers with it not just the occasional vulnerability, but very real risks that require massive investments from customers.”· “When tech vendors make important logging information available for free, everyone wins.”· “The SB in SBOM doesn’t stand for Silver Bullet.” Relevant LinksEmail: sbom@cisa.dhs.govWebsite: www.cisa.govLinkedIn: Allan Friedman Resources:Open Source Security PodcastRisky Business PodcastThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Aug 21, 2023 • 50min
AppSec: Engineering, Attackers, and Defense
Send us a textEpisode SummaryIn today’s episode, AppSec CTO at Palo Alto Networks, Daniel Krivelevich, joins Matt to talk about AppSec for the modern engineering ecosystem. Daniel is a Cybersecurity expert and problem solver with a proven track record from working with numerous enterprises across several different industries, with a focus on Application and Cloud Security. He has served in the Intelligence Corps of the IDF, 8200, as a Security Specialist at LivePerson, and as the Cloud & Application Security Lead at Sygnia. He is also the Co-Founder of Cider Security, which was acquired by Palo Alto Networks in December 2022.Today, Daniel talks about how his views have been shaped by his experience on both sides of the equation, the rapid pace of software development, and the role of codification. Why is visibility such a vital part of mitigating threats? Hear about the changing role of security, the struggle with maintaining cybersecurity 101, and Daniel’s recommended sources to stay up to date. Timestamp Segments· [02:43] How Daniel’s experiences have shaped his AppSec views.· [09:27] The software engineering paradigm shift.· [12:24] The role of security.· [16:42] Is it realistic for security to keep up with software development?· [20:27] How the engineers’ freedom of choice impacts security.· [26:14] The role of codification to reduce the attack surface.· [30:21] Tools as targets.· [34:47] How to mitigate threats of the increasingly complex ecosystems.· [39:21] What’s next?· [44:40] The struggle with cybersecurity 101.· [47:03] How Daniel stays sharp. Notable Quotes· “The attacks that abuse the engineering ecosystem, they’re not theory anymore.”· “The challenge is helping defenders focus on what matters.”· “Attackers always choose the path of least resistance.”· “Once you have that visibility, you are usually capable of significantly reducing your attack surface.”· “It’s not the zero days that are what’s leading.” Relevant LinksWebsite: www.paloaltonetworks.com.LinkedIn: Daniel Krivelevich. Resources:AppSec for the Modern Engineering Ecosystem.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Jul 21, 2023 • 53min
Securing Democracy: DNC's Cyber Cop
Send us a textOn today’s episode, CSO at the Democratic National Committee, Steve Tran, joins Matt to talk about magic, AI, and cybersecurity. As the CSO for the DNC, Steve leads their IT, physical, and cybersecurity strategy. When not defending against dedicated adversaries, Steve can be found doing “off the cuffs” performances at the World-Famous Magic Castle in Hollywood.Today, Steve talks about how he incorporates magic into cybersecurity, his transition from law enforcement to cybersecurity, and how to mitigate risk in a fast-moving environment. What are the potential risks of using generative AI? Hear about our susceptibility to mental malware, thinking strategically versus tactically to solve problems, and how Steve manages to stay sharp day-to-day. Timestamp Segments· [01:21] Steve, the magician.· [05:14] Parallels between magic and cybersecurity.· [07:21] Transitioning from law enforcement to cybersecurity.· [16:26] Using magic to manage mental health.· [21:25] The DNC.· [22:19] Decentralization and security.· [24:59] Getting buy-in.· [27:42] Thinking strategically.· [29:09] Mitigating risk in a fast-moving environment.· [36:00] AI and cyberattacks.· [43:25] Potential issues with AI.· [50:46] How Steve stays sharp. Notable Quotes· “Mental health can really affect cybersecurity professionals.”· “Business isn’t meant to be just transactional.”· “One of the biggest barriers to why people don’t buy into it at first is because they don’t understand it.”· “Security issues don’t care if you don’t have a budget or don’t have a team.”· “Once you get people to feel a certain way, you can’t undo that.”· “There’s no better way to learn than to have to teach material yourself.”The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Jun 21, 2023 • 35min
Open Source Security: A Deep Dive
Send us a textEpisode SummaryOn this episode, the Co-Founder and CEO of Endor Labs, Varun Badhwar, joins Matt to talk about software supply chain security. Varun has a proven track record of building and leading enterprise security companies across Product Strategy, Marketing, Technical Sales, and Customer Success functions. He serves as a Member of the Forbes Technology Council, a Board Member of Cowbell, a Board Advisor of ArmorCode, and the former Founder and CEO of RedLock.Today, Varun talks about open source risks, how to identify and mitigate risks, and how to incentivize the use of security tools. Where can organizations start? Hear about SBOMs, security in the Cloud, and software security best practices. Timestamp Segments· [01:42] A bit about Varun.· [04:48] Identifying and mitigating risk.· [10:32] Where should organizations start?· [14:42] The SBOM.· [19:51] Industry standards and best practices.· [22:26] Cloud security.· [25:50] Endor Labs.· [29:52] Incentivizing using security tools. Notable Quotes· “Select, secure, maintain, comply.”· “The first thing that drives a lot of security shifts is compliance.” Relevant LinksWebsite: www.endorlabs.comLinkedIn: Varun BadhwarThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

May 21, 2023 • 47min
Accelerating security maturity
Send us a textEpisode SummaryOn this episode, AWS Security Practice Manager, Chad Lorenc, joins Matt to talk about Cloud Security. Chad has spent over 20 years building and implementing security programs for numerous organizations, ranging from global Fortune 500 infrastructure teams to billion-dollar financial institutions. He has previously served as Senior Infrastructure Security Architect at Keysight Technologies, President of Montana Chapter, and Information Security and Risk Management Infrastructure Architect at Agilent Technologies.Today, Chad talks about the roadmap to security maturity, security best practices, and benchmarking assessments. Why doesn’t AWS necessarily hire people with Cloud skills? Hear about The Five Pillars, when Cloud security goes wrong, CISO reporting Cloud security, and Chad’s formula for personal growth. Timestamp Segments· [01:24] A bit about Chad.· [03:13] Chad’s role at AWS.· [04:03] Transitioning to AWS.· [08:30] AWS doesn’t hire for Cloud skills.· [10:41] Where to start.· [13:54] Assessment benchmarking.· [15:09] Getting to security maturity.· [19:17] The Five Pillars.· [24:21] Cloud security gone wrong.· [32:14] The Cloud Center of Excellence.· [35:15] Reporting Cloud security maturity.· [40:54] Chad’s formula for personal growth.· [44:50] Chad’s words of wisdom. Notable Quotes· “There’s no algorithm for compressing security experience.”· “Figuring out how to integrate Cloud into your operational processes and technology is key.”· “The key to growing fast is to prioritize ruthlessly.” Relevant LinksWebsite: aws.amazon.com Resources:awsfundamentals.comThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Apr 21, 2023 • 44min
Cloud Native Security: A Year in Review
Send us a textOn this episode, the Chief Security Officer of Cloud at Palo Alto Networks, Bob West, joins Matt to discuss Palo Alto Network's latest State of Cloud Native Security Report. Bob joined Palo Alto Networks after more than 20 years in leadership roles with banks, product companies, and professional services organizations. Before joining Palo Alto Networks, Bob served as managing partner at West Strategy Group, managing director in Deloitte’s cyber risk services practice, managing director for CISO for York Risk Services, Chief Trust Officer at CipherCloud, CEO at Echelon One, Chief Information Security Officer (CISO) at Fifth Third Bank, and Information Security Officer at Bank One.Today, Bob talks about the latest installment of the State of Cloud Native Security Report, the severe shortcomings in Cloud Security, and the elevated cost of Cloud Security. Why is it essential to think about security upfront? Hear about the daily mindset shift required to deploy quality code, minimizing complexity to maximize efficiency, and the significant delay in threat management.Timestamp Segments· [01:46] Bob’s career-changing experiences.· [04:17] Bob’s advice.· [11:10] The 10,000-ft view.· [16:23] The elevated costs of Cloud security.· [22:36] Increased deployment frequency.· [24:54] How do security teams keep up?· [30:44] Security tooling in the Cloud.· [35:46] Holistic Cloud security.· [41:18] There will always be issues. Notable Quotes· “Be nice to your vendors.” - Bob· “You never know who’s going to be able to help you out at any point.” - Bob· “You’ve got to build bridges before you need them.” - Matt· “Common sense isn’t necessarily common practice.” - BobRelevant LinksWebsite: www.paloaltonetworks.comLinkedIn: Bob WestResources:Out of the CrisisThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Mar 21, 2023 • 43min
Book review: CISO Evolution
Send us a textOn this episode, the Founder of CISO Evolution LLC, Matthew Sharp, joins Matt to talk about his book, CISO Evolution. Prior to founding CISO Evolution LLC, Matt served as a strategic advisor to CISOs of Fortune 500 and global institutions. He holds a Bachelor of Science (BS) in Electrical and Computer Engineering from the University of Colorado and a Master of Business Administration (MBA) from Colorado State University. Matt is a co-author of "The CISO Evolution: Business Knowledge for Cybersecurity Executives."Today, Matthew talks about his 2012 sabbatical, walking the Camino de Santiago, and the CISO Evolution book. Why does process matter more than analysis? Hear about value creation, business negotiations, and Matthew’s formula for personal growth.Timestamp Segments· [02:06] A bit about Matthew.· [04:30] Matthew’s sabbatical & the Camino de Santiago.· [09:21] What prompted the book?· [12:23] Why does process matter more than analysis?· [19:08] Did Matthew’s MBA lead him down this path?· [24:22] Value creation.· [27:40] Standard metrics.· [31:23] Why is it important for a CISO to know terms?· [33:32] Negotiations and decision-making.· [37:19] What’s Matthew’s formula for personal growth?· [41:12] Matthew’s words of wisdom. Notable Quotes· “If you want to be in the room where it happens, then you have to be equipped to participate in the conversation.”· “Ask the questions that go unasked.”· “Don’t be afraid to go and look like an idiot in front of another business stakeholder.”The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

Feb 21, 2023 • 39min
Unraveling unmanageable apps
Send us a textOn this episode, co-founder and CEO of Cerby, Belsasar Lepe, joins Matt to talk about unmanageable applications (apps that don't support critical security standards like SSO and SCIM). Belsasar was previously the Head of Product at Impira, where he led the company's product life cycle, helping drive a 4x increase in revenue. Before his role at Impira, Bel was co-founder and CTO at Ooyala, where he led a global product, design, and engineering team of 300+ Ooyalans spanning five countries and seven offices. Ooyala achieved two successful exits totaling over $440M.Belsasar talks about unmanageable applications, Shadow IT, and why password managers should be considered legacy tech. Timestamp Segments· [02:14] A bit about Belsasar.· [04:57] Unmanageable Applications.· [07:07] Shadow IT.· [11:04] Quantifying the risk.· [14:50] How to identify Unmanageable Apps.· [17:46] Using different tools.· [21:03] Where do password managers fall in?· [22:53] Is passwordless the future?· [25:29] How Cerby solves the problem.· [27:11] A Cerby success story.· [30:48] The future of the market.· [32:35] Migration to Cloud.· [35:03] How Belsasar stays fresh. Notable Quotes· “The first task is understanding the size of the problem.”· “The initial point of entry is often an unmanageable application.”· “More businesses will rely on end users for their security.”Cerby's websiteThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.