![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64c78b888334d986d587bcf5_channel%20cover.jpeg)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b3f391823bb6aa21e491ab_S01EP50%20-%20%20%20Monica%20Verma.png)
Risk Management in Cloud Security
Nov 29, 2020
•
Cloud Security Alliance
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b39f1050d2715b620a6_S01EP49_-___Dr__Sam_Small.png)
WHAT IS DIGITAL RISK PROTECTION & WHY IS IT IMPORTANT?
Nov 22, 2020
•
Zerofox
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b4031dc2962b52d4e7f_S01EP48_-___Matthew_Fuller.png)
AWS SECURITY USING OPEN SOURCE
Nov 15, 2020
•
CloudSploit
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b41fd3614a327a464cf_S01EP47_-___Melissa_Benua.png)
WHAT THE HECK IS CI/CD?
Nov 8, 2020
•
mParticle
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b44532016333c2e26d4_S01EP46_-__Naomi_Buckwalter.png)
HOW TO PREPARE FOR GDPR IN AZURE CLOUD ENVIRONMENT
Nov 1, 2020
•
energage
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b328883c0cbf9dbb22a_S01EP45_-__Casey_Ellis.png)
HOW TO START IN BUG BOUNTY IN 2020
Oct 25, 2020
•
bugcrowd
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b354ae97984b4ead4f3_S01EP44_-__Daniel_Miessler.png)
CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES
Oct 18, 2020
•
Unsupervised Learning
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3f2fdf5ab722688c3f_S01EP43_-__Houston_Hopkins.png)
AWS SECURITY FOR LARGE REGULATED ENTERPRISE!
Oct 11, 2020
•
CapitalOne
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b312fdf5ab722687d52_S01EP42_-__Caleb_Sima.png)
CISO Challenges in Cloud Security
Oct 4, 2020
•
databricks
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b40a4d2d6ba0d88d897_S01EP41_-__Jerome_Walter.png)
WHAT IS SECURITY CHAOS ENGINEERING?
Sep 27, 2020
•
Vmware
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2c9102618ca54dace4_S01EP40_-__AJ_Yawn.png)
Security And Compliance in AWS Cloud
Sep 20, 2020
•
ByteChek
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2ce275e1570557e1f6_S01EP39_-__Alexandre_Sieira.png)
Identity & Cross Account Access Management in AWS Cloud
Sep 13, 2020
•
Tenchi Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b394ae97984b4ead7b1_S01EP38_-__David_Obrien.png)
WHAT IS AZURE IDENTITY MANAGEMENT?
Sep 6, 2020
•
Argos
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3c9bd69e8f6cfe9709_S01EP37_-__Gaurav_Kumar.png)
DO YOU NEED A CLOUD SECURITY POSTURE MANAGEMENT (CSPM) ?
Aug 30, 2020
•
Redlock
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b364c270b78df9c89c6_S01EP36_-__Darpan_Shah.png)
HOW TO BUILD SECURE ENVIRONMENTS IN GOOGLE CLOUD
Aug 23, 2020
•
Google Cloud
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b45823bb6aa212a0364_S01EP35_-_Nicholas_Hughes.png)
HOW TO BUILD SECURE ENVIRONMENTS IN MICROSOFT AZURE?
Aug 16, 2020
•
EITR Technologies
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3430ae58c2d40994cd_S01EP34_-_Clint_Gibler.png)
HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM?
Aug 9, 2020
•
r2c
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b48fbd059d22adba5d8_S01EP33_-_Tanya_Janca.png)
APPLICATION SECURITY APPSEC 101
Aug 2, 2020
•
Purple
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2d492cef83cce3f759_S01EP32_-_Aaron_Rinehart.png)
Getting Started with Chaos Engineering
Jul 26, 2020
•
Verica
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b462fdf5ab72268931b_S01EP31_-_Parul_Kharub.png)
CLOUD SECURITY IN A OPERATIONAL TECHNOLOGY VS INFORMATION TECHNOLOGY
Jul 19, 2020
•
Teck
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2eb9a22c555615e829_S01EP30_-_Abbas_Kudrati.png)
HOW TO BECOME A SUCCESSFUL CISO IN 2020
Jul 12, 2020
•
Microsoft
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b362fdf5ab72268841f_S01EP29_-_Darpan_Shah.png)
HOW TO DO GOOGLE CLOUD SECURITY ? – THE 2020 EDITION
Jul 5, 2020
•
Google Cloud
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b341508753b7ec8d8a6_S01EP28_-_Chris_Hughes.png)
HOW TO BECOME A CLOUD SECURITY ENGINEER in 2020
Jun 28, 2020
•
OTEEMO
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3a32dbf85fa5bc23fd_S01EP27-Edwin_Kwan.png)
BUILDING AN ENGINEERING SECURITY CULTURE
Jun 21, 2020
•
tyro
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2c77901d548f5e80c8_S01EP26-Alannah_Guo.png)
Women in Cybersecurity
Jun 14, 2020
•
Airglow Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3b31dc2962b52d49e8_S01EP25-Francesco_Cipollone.png)
Google Cloud Security – how does google cloud work?
Jun 7, 2020
•
Cloud Security Alliance
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3d9102618ca54dbc89_S01EP24-_Graeme_Cantu-Park.png)
What is GOOD COMPANY CULTURE?
May 31, 2020
•
Matillion
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b2f917f2bbe2778b00d_S01EP23-_Alissa_Knight.png)
What is a Connected Car? & How to secure it’s API?
May 24, 2020
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b499102618ca54dc893_S01EP22-_Tim_Heckman.png)
What is SRE & when do you need it?
May 17, 2020
•
Netflix
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b49676a8a5eb6673a0b_S01EP21-_Taylor_Hersom.png)
NIST CyberSecurity Metrics for the Board
May 10, 2020
•
EdenData
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b33b9a22c555615ee72_S01EP20-_Hacker_Valley_Studio.png)
Talking Cloud Security with Hacker Valley Studio
May 3, 2020
•
Hacker Valley Studio
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b8fa4d2d6ba0d891d04_S01EP19-_Abhay_Bhargav.png)
SERVERLESS SECURITY BEST PRACTICES
Apr 26, 2020
•
we45
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b42e275e1570557fca0_S01EP17_-_Merritt_Baer.png)
HOW TO SECURE AND IMPROVE YOUR CLOUD ENVIRONMENT
Apr 12, 2020
•
AWS
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b43e275e1570557fdf2_S01EP16_-__Michael_Fuller.png)
How Atlassian manages Risk and Compliance
Apr 5, 2020
•
Atlassian
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3a676a8a5eb6671ffb_S01EP15_-__Fareedah_Shaheed.png)
HOW TO BUILD CYBERSECURITY TRAINING PROGRAM
Mar 29, 2020
•
Cyber Fareedah
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b4ce275e1570558044d_S01EP14_-__William_Bengtson.png)
Cloud Native Security
Mar 22, 2020
•
Hashicorp
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3731dc2962b52d45b0_S01EP13_-__David_Linthicum.png)
Multi Cloud Strategy
Mar 15, 2020
•
Delloite
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b4a9102618ca54dc933_S01EP12_-_Taylor_Hersom.png)
Data governance best practices
Mar 8, 2020
•
EdenData
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b428dda973fdb57a14f_S01EP11_-_Michael_Hausenblas.png)
Container Security 101 in AWS
Mar 1, 2020
•
AWS
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b31628788be45deb78d_S01EP10_-_Ashwin_Patil.png)
Threat Intelligence in Azure
Feb 23, 2020
•
Microsoft
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b38ba81bdeeb5455916_S01EP9_-_David_Obrien.png)
Microsoft Ignite 2020 Sydney – Security Releases
Feb 16, 2020
•
Argos Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3d492cef83cce408c3_S01EP8_-_Francesco_Cipollone.png)
Is public cloud secure?
Feb 9, 2020
•
Cloud Security Alliance
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b4730ae58c2d409a74e_S01EP7_-_Stu_Hirst.png)
Cloud Security in a world of multi public cloud
Feb 2, 2020
•
JustEat
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b309bd69e8f6cfe8f0b_S01EP6_-_Ashish_Rajan.png)
CLOUD SECURITY IN JAPAN 2020
Jan 26, 2020
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b47a4d2d6ba0d88deb2_S01EP5_-_Tanya_Janca.png)
AZURE vs AWS from a cybersecurity lens
Jan 19, 2020
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3f823bb6aa2129fd8a_S01EP4_-_Jay_Kelath.png)
Cloud Security journey of Dow Jones post the AWS Cloud Breach
Jan 12, 2020
•
Product Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b3d30ae58c2d4099b1c_S01EP3_-_Jane_Frankland.png)
How to attract and retain more women engineers?
Jan 5, 2020
•
KnewStart
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b43b4a628788be45decc67_S01EP2-Vandana_Verma.png)
Cloud Security and Infosec girls
Dec 25, 2019
•
OWASP