Real-World Cloud Security Challenges and Solutions Explained for 2024

Real-World Cloud Security Challenges and Solutions Explained for 2024

What are the practical steps for orienting yourself in a new cloud environment? Ashish sat down with Rich Mogull and Chris Farris to explore the intricacies of effective cloud security strategies. Drawing on their extensive experience, Rich and Chris speak about critical importance of moving beyond just addressing vulnerabilities and embracing a more comprehensive approach to cloud security.Rich and Chris share their professional experiences and practical advice for anyone who finds themselves "airdropped" into an organization's cloud environment. They also discuss the development of the Universal Threat Actor Model and how it can help prioritize security efforts in a chaotic landscape of constant alerts and threats.


Guest Socials: Rich's Linkedin + Chris's Linkedin

Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp


Questions asked:

(00:00) Introduction

(02:26) A bit about Chris Farris

(03:10) A bit about Rich Mogull

(03:45) First Cloud Service they worked on!

(06:27) Where to start in an AWS environment?

(10:50) Cloud Security Threat Landscape

(15:25) Navigating through the CSPM findings

(18:14) Using the Universal Cloud Threat Model

(23:16) How is Cloud Ransomware different?

(25:44) Surprising attacks or compromises in Cloud

(29:43) Where are the CSPM Alerts going?

(36:30) Cloud Security Landscape in 2024

(45:37) The need for Cloud Security training in 2024

(46:58) Good starting point to learn Cloud Security

(52:13) The Fun Section


Resources spoken about during the episode:

The Universal Cloud Threat Model

AWS Customer Security Incidents by Rami McCarthy

Breaches.cloud

CloudSLAW


Jaksot(344)

AI Agents for SOC: Hype Curve vs. Measurable ROI

AI Agents for SOC: Hype Curve vs. Measurable ROI

Is the AI SOC analyst just hype, or is there measurable ROI? We spoke to Edward Wu, founder of Dropzone AI about this and he shared insights from a recent Cloud Security Alliance (CSA) benchmark repor...

28 Loka 202536min

Can You Build an AI SOC with Claude Code? The Reality vs. Hype

Can You Build an AI SOC with Claude Code? The Reality vs. Hype

Can you just use Claude Code or another LLM to "vibe code" your way into building an AI SOC? In this episode, Ariful Huq, Co-Founder and Head of Product at Exaforce spoke about the reality being far m...

21 Loka 202547min

Incident Response of Kubernetes and how to Automate Containment

Incident Response of Kubernetes and how to Automate Containment

How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of con...

10 Loka 202552min

The Truth About AI in the SOC: From Alert Fatigue to Detection Engineering

The Truth About AI in the SOC: From Alert Fatigue to Detection Engineering

"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is trans...

3 Loka 202545min

The Security Gaps in AWS Bedrock & Azure AI You Need to Know

The Security Gaps in AWS Bedrock & Azure AI You Need to Know

The race to deploy AI is on, but are the cloud platforms we rely on secure by default? This episode features a practical, in-the-weeds discussion with Kyler Middleton, Principal Developer, Internal AI...

23 Syys 202555min

The Evolution of Email Security: From Pre-Breach to Post-Breach Protection

The Evolution of Email Security: From Pre-Breach to Post-Breach Protection

For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Sec...

16 Syys 202530min

Using AI to Fix Your Cloud Security Backlog beyond Visibility

Using AI to Fix Your Cloud Security Backlog beyond Visibility

You have the visibility, you see the alerts, but your security backlog is still growing faster than your team can fix it. So, are you actually getting more secure? In this episode, Snir Ben Shimol, CE...

9 Syys 202548min

Your SecOps Team Can't Save Your Cloud: A New Blueprint for Security.

Your SecOps Team Can't Save Your Cloud: A New Blueprint for Security.

The conversation around cloud security is maturing beyond simple threat detection. As the industry grapples with alert fatigue, we explore the necessary shift from a reactive to a proactive security p...

27 Elo 202547min