Build an Effective AWS Cloud Security Program in 2024

Build an Effective AWS Cloud Security Program in 2024

How can you build a robust cloud security program in AWS, particularly as a startup and small to medium-sized businesses navigating AWS in 2024? We spoke to Chris Farris, who is the event chair for fwd:cloudsec, a known cloud security expert and one of the first AWS Heroes for security.

Chris shared his insights on how to build a security strategy that is both practical and effective in today's dynamic cloud environment. From discussing the importance of AWS organizations and Identity Centre to breaking down the complexities of cloud security posture management. You will hear actionable advice and best practices.


Guest Socials: Chris's Linkedin ⁠(⁠⁠⁠@chrisfarris⁠)

Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp


Questions Asked:

(00:00) Introduction

(02:59) A bit about Chris Farris

(03:30) fwd:cloudsec Conference

(04:19) AWS Hero program for Cloud Security

(05:23) Building Effective Cloud Security Programs

(11:39) Top Recommendations for AWS Cloud Security

(13:34) What is AWS IAM Identity Center?

(18:02) How to Set Up AWS IAM Identity Center?

(20:13) Cloud Security in different industries

(29:31) The role of a Cloud Security Engineer

(34:30) Cloud Security Breaches

(38:02) Educational Resources in Cloud Security

(42:41) The Fun Section


Resources spoken about in this episode: fwd:cloudsec AWS IAM Identity Center Leveraging AWS SSO (aka Identity Center) with Google Workspaces breaches.cloud

Jaksot(345)

CISO's guide to embracing risk in business

CISO's guide to embracing risk in business

What is it like to build a successful business based on risk? In this episode Ashish spoke to Fredrick Lee, CISO at Reddit. FLee shared his deep insights into the essential role of risk in driving bus...

9 Huhti 202448min

Why Email Breaches Still Happen?

Why Email Breaches Still Happen?

Lets talk about the Evolution of Email Security. We have been speaking about Email Security for years but why has it not been solved? We spoke to Abhishek Agrawal, Co-founder of Material Security abou...

5 Huhti 202430min

Essential Strategies to master Incident Response in Cloud

Essential Strategies to master Incident Response in Cloud

How do you build a Robust Detection Framework? Ashish spoke to Andrew Tabona, SVP of Cyber Threat Management and Incident Response at a Fortune 500 company about challenging the conventional wisdom of...

2 Huhti 202445min

From Code Suggestions to Security

From Code Suggestions to Security

What is GitHub Copilot? Its a AI-powered coding assistant that's redefining how developers write code. We spoke to Joseph Katsioloudes, a security specialist from the GitHub Security Lab. We spoke abo...

12 Maalis 202421min

Cloud Security Operations for Modern Threats

Cloud Security Operations for Modern Threats

How is your Cloud Incident Preparedness? Is your CSPM enough? Ashish spoke to Ariel Parnes, Co-Founder and COO at Mitiga about the concept of "Assume Breach" and its importance in developing a proacti...

8 Maalis 202435min

Understanding Threat Modeling in Cloud

Understanding Threat Modeling in Cloud

Do you need an essential guide for Threat Modeling your Cloud Environment, then this episode is definitely for you. Ashish sat down with Tyson Garrett from TrustOnCloud. We explore why and how organiz...

1 Maalis 202450min

Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis

Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis

What is the role of AI in Legal Research and Data Security? We spoke to Matt McKeever, CISO and Head of Cloud Engineering at LexisNexis, a company that uses GenAI and Custom LLM models to help its cus...

23 Helmi 202417min

Sidecar Container Vulnerability in Kubernetes explained

Sidecar Container Vulnerability in Kubernetes explained

Are you familiar with Sidecars in Kubernetes? We spoke to Magno Logan about the complex world of Kubernetes security and the silent but deadly vulnerabilities associated with sidecar containers. Magno...

16 Helmi 202415min