CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES - DANIEL MIESSLER

CONTINUOUS MONITORING FOR CONTROLS & VULNERABILITIES - DANIEL MIESSLER

In this episode of the Virtual Coffee with Ashish edition, we spoke with Daniel Miessler

In this episode, Daniel & Ashish spoke about

  • What was your path into CyberSecurity
  • Continuous Monitoring(CM) or Continuous Auditing - is that the same thing for you?
  • CI/CD, one would assume CM is obvious, or is CM more of a mature organisation thing?
  • At what point, should an organisation consider Continuous Monitoring? Do smaller organisations need to think about it as well?
  • What is BugBounty?
  • How do we find more about BugBounty resources for continuous monitoring?
  • Are you using Python for automation?
  • How to manage risk around Bounty program?
  • What suggestions do you have for continuous monitoring in a multi cloud environment?
  • Have you added any machine learning algorithms to your methodology or KO moves?
  • How can one start with automation when looking for vulnerability Continuously
  • How do you scale inventory for resources?
  • Can you use it to find fake phishing websites?
  • Custom code vs product for continuous monitoring?
  • Is there alert fatigue in continuous monitoring?
  • Why is it important to do continuous monitoring?
  • Does everyone in tech or in general need to have a personal brand? Tips for Personal Branding for audience that enjoys blogging or podcasting?

ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv

Twitter - @kaizenteq @hashishrajan

If you want to watch videos of this and previous episodes:

- Twitch Channel: https://lnkd.in/gxhFrqw

- Youtube Channel: https://lnkd.in/gUHqSai

Jaksot(344)

Realities of Cloud Networking in AWS

Realities of Cloud Networking in AWS

AWS networking isn’t as simple as it seems and when you’re dealing with regulated industries like healthcare, the stakes are even higher.In this episode we sit down with Kyler Middleton and Jack W. Ha...

28 Helmi 202553min

Cloud Incident Response in Microsoft Azure

Cloud Incident Response in Microsoft Azure

In this episode, we dive deep into Azure security, incident response, and the evolving cloud threat landscape with Katie Knowles, Security Researcher and former Azure Incident Responder. We spoke abou...

20 Helmi 202554min

AWS Multi-Account Security: What Netflix Learned

AWS Multi-Account Security: What Netflix Learned

🚀 How do you secure thousands of AWS accounts without slowing down developers? Netflix’s cloud security experts Patrick Sanders & Joseph Kjar join us to break down their identity-first security model...

13 Helmi 202550min

Cloud Security Detection & Response Strategies That Actually Work

Cloud Security Detection & Response Strategies That Actually Work

We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives de...

4 Helmi 202557min

CISO Challenges Across Industries

CISO Challenges Across Industries

In this episode, we sit down with Sunil Rane, an experienced cybersecurity leader with over 20 years in cybersecurity across industries like healthcare, education, media, and consulting. Sunil shares ...

28 Tammi 202531min

Why Solving the Data Problem is Key to Cloud Security?

Why Solving the Data Problem is Key to Cloud Security?

In this episode we’re joined by Francis Odum, founder and lead research analyst at Software Analyst Cyber Research. Drawing from his extensive research and conversations with CISOs, security operators...

24 Tammi 202550min

The economics of cybersecurity and trends

The economics of cybersecurity and trends

In this episode, host Ashish Rajan spoke to Mike Privette, founder of Return on Security, to explore the landscape of cybersecurity as we look toward 2025. Mike shared his unique insights on the econo...

21 Tammi 202526min

The Truth About CNAPP and Kubernetes Security

The Truth About CNAPP and Kubernetes Security

In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episo...

14 Tammi 202540min