![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64c78b888334d986d587bcf5_channel%20cover.jpeg)
![](https://assets-global.website-files.com/649af53c3a8569829264eed4/64be437dd906a158084a7918_csp-podcast-layer.png)
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b2179f122a4437e8c1_S03E54-AWSReinvent_2022_Recap.png)
AWS Reinvent 2022 – RECAP for Cloud Security Professionals!
Dec 14, 2022
•
AWS
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b1b35ad704e5f7425b_S03E53-Justin_Garrison.png)
AWS EKS EXPLAINED!
Dec 10, 2022
•
Amazon Web Services
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b7e72d81d5878b64df_S03E50-Rodrigo_Montoro_(2).png)
BECOME A CLOUD SECURITY ARCHITECT IN 2023
Nov 13, 2022
•
Vectra
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b33c5ad1cbcff9f346_S03E50-Rodrigo_Montoro.png)
AWS Threat Detection for NOT SO COMMON AWS Services Explained
Nov 10, 2022
•
Clavis Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c85688adf367af1f60_S03E49-Nandesh_Guru.png)
RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS
Nov 6, 2022
•
VMWare
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c23c5ad1cbcffa04ea_S03E48-Christophe_Parisel.png)
HOW TO BECOME A CLOUD NATIVE SECURITY ARCHITECT
Oct 30, 2022
•
Cloud Native Security Architect
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530bbca52f1ecc2e949a1_S03E47-Jim_Bugwadia.png)
Compliance as Code in Kubernetes
Oct 24, 2022
•
Nirmata
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530ca9df1d60461841495_S03E46-Luke_Hinds.png)
Software Signing for Kubernetes Supply Chain & Everybody Else
Oct 16, 2022
•
Red Hat
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c71cb45fc4a1f20569_S03E43-Travis_McPeak_(2).png)
KUBERNETES BEST PRACTICES 2022
Oct 10, 2022
•
KSOC
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b7a296921df4fb61a9_S03E43-Travis_McPeak.png)
Building Blocks of Cloud Security Program
Sep 29, 2022
•
Resourcely
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530beca52f1ecc2e94d67_S03E42-Jack_Nagilieri.png)
Cloud Security Monitoring in Modern Security Security Stack
Sep 8, 2022
•
panther.com
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b12062d4657dea3d3a_S03E41-Corey_Ball.png)
API Security Best Practice 2022
Sep 5, 2022
•
Mossadams
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c12b7076a952cee16c_S03E37-AWS_Reinforce_2022_Recap.png)
Hacker Summer Camp 2022 : The Cloud Security Edition
Aug 28, 2022
•
Cloud Security
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c5d97c954b4a03de18_S03E39-Jeevan_Singh.png)
How to Threat Model the Digital Supply Chain in Cloud
Aug 21, 2022
•
Twilio
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c3ca52f1ecc2e95790_S03E38-Karthik_Ramamoorthy.png)
HOW TO SECURE Container environment FOR FINANCIAL SERVICES
Aug 7, 2022
•
Goldman Sachs
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c044d1b41a215518a6_S03E36-Cassandra_Young.png)
Fundamentals of AWS Cloud Security Assessment
Jul 30, 2022
•
Security Risk Advisors
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c46860bad63f43809f_S03E35-Kyler_Middleton.png)
HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE
Jul 20, 2022
•
AllScripts
Zero Trust the Triple Paradox
Jul 9, 2022
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b844d1b41a21551073_S03E32-Kinnaird_McQuade.png)
Building & Scaling AWS Security Guardrails
Jul 4, 2022
•
Square
FIXING THAT BROKEN DIGITAL SUPPLY CHAIN
Jul 2, 2022
•
3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN
Jun 26, 2022
•
Digital Transformation – Are we there yet?
Jun 21, 2022
•
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530bb2062d4657dea44a4_S03E29-Sean_Catlett.png)
CISO Perspective: Sean Catlett, Slack CISO
Jun 15, 2022
•
Slack
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530bcee38479c5afe17db_S03E28-Akash_Ganapathi.png)
CyberSecurity Asset Management for the Modern Security Stack
Jun 4, 2022
•
JupiterOne
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b3097020ec3bc94fd1_S03E27-Tanya_Janca.png)
Azure Security Fundamentals – Level 200
May 29, 2022
•
Purple
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530bc869754706ce07e1a_S03E26-_Steve_Orrin.png)
Confidential Computing in Azure Explained
May 28, 2022
•
Intel Corporation
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b3a6cd5b44c2415d21_S03E25-_Sai_Gunaranjan.png)
Azure Cloud Security Architecture
May 25, 2022
•
AllScripts
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b51cb45fc4a1f1f53c_S03E24-Andrew_Brown.png)
Azure Security Fundamentals – Level 1
May 19, 2022
•
ExamPro
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530bd5688adf367af15d8_S03E23-Yoav_Alon.png)
Finding Security Holes in Azure Services
May 15, 2022
•
Orca
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b461cb1b1dd345ee62_S03E22-Jimmy_Mesta.png)
Azure Kubernetes Service (AKS) Security Explained
May 7, 2022
•
KSOC
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b7291e2933bf204753_S03E21-Paul_Schwarzenberger.png)
Azure Security Fundamentals – Zero Trust with Azure AD
May 1, 2022
•
Celidor
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c4052ede2f51e56ef8_S03E20-Or_Azarzar.png)
How to Secure Cloud Managed Kubernetes
Apr 26, 2022
•
LightSpin
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c64140dd12f38fda90_S03E19-Ian_Lewis.png)
Kubernetes Security Best Practices in 2022
Apr 25, 2022
•
Google Cloud
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c77cecc42ec58933b8_S03E18-Sakshyam_Shah.png)
Manage Privileged Access for Kubernetes & Cloud
Apr 22, 2022
•
Teleport
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c38e854df3a49b5a71_S03E17-Pushkar_Jogelkar.png)
How to become a Cloud Native Security Engineer
Apr 10, 2022
•
VMWare Tanzu
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530cb2062d4657dea5cb3_S03E16-William_Morgen.png)
Service Mesh Security Explained!
Apr 3, 2022
•
Buoyant
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c9097020ec3bc96516_S03E15-Jasmine_George.png)
Scaling a Practical AWS Asset Management Program
Mar 27, 2022
•
JupiterOne
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530cb3d0bfebf09a513da_S03E14-Eliav_Livneh.png)
Threat Hunting in AWS
Mar 20, 2022
•
Hunters
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530cc8bf9fbe2a9748285_S03E13-Barak_Schoster_Goihman.png)
What is SBOM, iBOM?
Mar 13, 2022
•
Bridgecrew
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530ca052ede2f51e574e7_S03E12-Mike_Chambers.png)
Security for AI/ML Models in AWS
Mar 6, 2022
•
AWS
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b7179f122a4437f5a2_S03E11-Sunil_Potti.png)
Building Google Cloud Security Products
Mar 3, 2022
•
Google Cloud
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c06860bad63f437d17_S03E10-Jonathan_Brodie.png)
Google Cloud Security Fundamentals – Level 2
Feb 27, 2022
•
ITV
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c0a296921df4fb6bd6_S03E09-Antoni_Tzavelas.png)
Google Cloud Security Fundamentals
Feb 20, 2022
•
Antoni Training
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c7869754706ce086c9_S03E08-Brad_Richardson.png)
Red Team in Google Cloud
Feb 13, 2022
•
Red Team
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530c1cdc21789da05250e_S03E07-Jason_Dyke.png)
How to Automate Security in Google Cloud?
Feb 6, 2022
•
Blocks
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b053f53e9be881de3f_S03E06-Gal_Helemski.png)
Authorization Control for Enterprise in Cloud
Jan 30, 2022
•
PlainID
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b13d0bfebf09a50061_S03E05-Ian_Mckay.png)
AWS IAM Getting Started
Jan 23, 2022
•
AWS
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530ca7cecc42ec5893a42_S03E04-Dylan_Ayrey.png)
Secret Management for Modern Apps Explained
Jan 16, 2022
•
TruffleSecurity
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530ba99d75d5f75c79b71_S03E03-Stu_Hurst.png)
CISO in a Cloud World in 2022
Jan 12, 2022
•
Trustpilot
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b9baa2b7e02b8970e1_S03E02-Fred_Wilmont.png)
Building Modern Identity (IAM) Roadmap for Cloud
Jan 9, 2022
•
JumpCloud
![](https://assets-global.website-files.com/64a539b3f0a3977d2093e43b/64b530b9a6cd5b44c2416469_S03E01-Or_Weis.png)
Building Scalable Authorization in Cloud Native Apps
Jan 2, 2022
•
Permit.io