HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM - CLINT GIBLER

HOW TO CREATE AN EFFECTIVE CYBER SECURITY TEAM - CLINT GIBLER

In this episode of the Virtual Coffee with Ashish edition, we spoke with Clint Gibler

In this episode, Clint & Ashish spoke about

  • Your path into CyberSecurity
  • What does Cloud Security mean for you?
  • What does application security mean for you?
  • What makes a good metrics for an effective security team?
  • Principles, mindsets, and methodologies of highly effective security teams
  • What is SAST, DAST
  • Any open source tools that can be integrated into CI/CD pipeline?
  • Is there pentesting knowledge required to move to use DAST tools?
  • How to effectively setup DAST Tool in an organisation? (19:30)
  • What is Software Composition Analysis
  • How does one bring cohesion between security teams?
  • How does security prove to be valuable to teams like Sales & Marketing
  • How does one reduce the noise to signal ratio from the AppSec team
  • What has been your best or worst security team experience?

ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv

Twitter - @kaizenteq @hashishrajan

If you want to watch videos of this and previous episodes:

- Twitch Channel: https://lnkd.in/gxhFrqw

- Youtube Channel: https://lnkd.in/gUHqSai

Jaksot(345)

Kubernetes Network Security for Multi Tenancy

Kubernetes Network Security for Multi Tenancy

Kubernetes security explained : We spoke to Cailyn Edwards, CNCF Ambassador and Senior Security Engineer at Shopify. Interview was recorded at Kubecon NA 2023. We asked her about the complexities of K...

12 Joulu 202326min

AWS reInvent 2023 - Security highlights and announcements

AWS reInvent 2023 - Security highlights and announcements

Cloud Security Podcast just got back from AWS re:invent 2023, there was a lot of chat around, you guessed it - GenAI but along with that there were plenty of security updates and announcement. Shilpi ...

5 Joulu 202356min

eBPF - Kubernetes Network Security without the Blind Sides!

eBPF - Kubernetes Network Security without the Blind Sides!

eBPF is recent graduate in the CNCF family and this means that the world of Cloud and Kubernetes, networking looks very different with more security capabilities. Cilium the project from Isovalent has...

30 Marras 202323min

Attack Path Analysis for Better Kubernetes Security

Attack Path Analysis for Better Kubernetes Security

Kubernetes security cannot just be Kubernetes but it is like security of a datacenter within another datacenter. In this episode with Tim Miller we spoke about CNAPP, how to approach kubernetes securi...

22 Marras 202321min

Secure your SaaS applications like this!

Secure your SaaS applications like this!

SaaS Applications support large companies, small startups. We inevitably accumulate SAAS applications to manage our employees, payroll, communication with things like Workday, Slack, Salesforce and no...

21 Marras 202342min

Threat Detection for not so Common Cloud Services

Threat Detection for not so Common Cloud Services

Threat detection is often limited to popular cloud services, so whats happening to all the "not so popular or commonly known" cloud services in your environment? We are speaking to Suresh Vasudevan, C...

11 Marras 202334min

How to Escape Clusters in a Managed Kubernetes Cluster?

How to Escape Clusters in a Managed Kubernetes Cluster?

Not Escaping Containers but escaping Clusters - Managed Kubernetes distributions such as Amazon EKS, Google Kubernetes Engine (GKE) and Azure Kubernetes Service (AKS) attack vectors can allow you to r...

7 Marras 202359min

Have I lost my Secrets?

Have I lost my Secrets?

You know that feeling when you are unsure if you AWS secret that leaked is still available for use. There is no easy way to check this apart from looking in AWS to see if anyone used it. Turns out the...

6 Marras 202329min