Artwork

Content provided by Dani Woolf. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dani Woolf or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How Security Practitioners Should Think About and Approach Double Layered Cloud Security

47:32
 
Share
 

Manage episode 428385044 series 3413708
Content provided by Dani Woolf. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dani Woolf or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode of Audience 1st Podcast, Avishai Wool, CTO of AlgoSec and Joshua Copeland, Director of Managed Security Services at Quadrant Information Security and professor at Tulane University, join host, Dani Woolf, to discuss the complexities of cloud security and the challenges practitioners face when migrating to the cloud.

They delve into the shift towards cloud-based infrastructure and the unique security human-centric, business, and technical considerations that come with it.

Avishai and Josh highlight the significance of understanding the interconnected nature of cloud and on-premise environments and provide practical steps to approaching a comprehensive, double layered approach to cloud security.

Key Takeaways:
  • The shift to the cloud brings about challenges in understanding what needs to be protected and how to address security risks effectively.
  • A successful cloud security strategy involves starting with visibility to identify misconfigurations and then focusing on network security to ensure connectivity between cloud and on-premise environments is secure.
  • To achieve good cloud security, organizations must align their security measures with business requirements and identify key stakeholders to make informed decisions.
  • The importance of having the right tooling in place for cloud security cannot be emphasized enough, as it helps in making informed decisions and managing thousands of security groups efficiently.
  • Assessing a brownfield cloud environment involves onboarding all accounts into a Cloud Security Posture Management solution to identify critical findings and assess the need for public IP addresses.
  • Understanding the nuances of cloud security requires a combination of knowledge, tools, and a thoughtful approach to addressing risks effectively in both greenfield and brownfield environments.

Join Audience 1st Newsletter Today

Join 1700+ cybersecurity marketers and sellers mastering security buyer research to better understand their audience and turn them into loyal customers: https://www.audience1st.fm/newsletter

  continue reading

72 episodes

Artwork
iconShare
 
Manage episode 428385044 series 3413708
Content provided by Dani Woolf. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Dani Woolf or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode of Audience 1st Podcast, Avishai Wool, CTO of AlgoSec and Joshua Copeland, Director of Managed Security Services at Quadrant Information Security and professor at Tulane University, join host, Dani Woolf, to discuss the complexities of cloud security and the challenges practitioners face when migrating to the cloud.

They delve into the shift towards cloud-based infrastructure and the unique security human-centric, business, and technical considerations that come with it.

Avishai and Josh highlight the significance of understanding the interconnected nature of cloud and on-premise environments and provide practical steps to approaching a comprehensive, double layered approach to cloud security.

Key Takeaways:
  • The shift to the cloud brings about challenges in understanding what needs to be protected and how to address security risks effectively.
  • A successful cloud security strategy involves starting with visibility to identify misconfigurations and then focusing on network security to ensure connectivity between cloud and on-premise environments is secure.
  • To achieve good cloud security, organizations must align their security measures with business requirements and identify key stakeholders to make informed decisions.
  • The importance of having the right tooling in place for cloud security cannot be emphasized enough, as it helps in making informed decisions and managing thousands of security groups efficiently.
  • Assessing a brownfield cloud environment involves onboarding all accounts into a Cloud Security Posture Management solution to identify critical findings and assess the need for public IP addresses.
  • Understanding the nuances of cloud security requires a combination of knowledge, tools, and a thoughtful approach to addressing risks effectively in both greenfield and brownfield environments.

Join Audience 1st Newsletter Today

Join 1700+ cybersecurity marketers and sellers mastering security buyer research to better understand their audience and turn them into loyal customers: https://www.audience1st.fm/newsletter

  continue reading

72 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide