Tricia Howard on Security as a Culture not a Toolset
cloud203016 Maalis 2019

Tricia Howard on Security as a Culture not a Toolset

Joining us this week is Tricia Howard, Client Manager, Optiv for a special RANTCAST on Security. About Optiv Optiv Security is a security solutions integrator that enables clients to reduce risk by taking a strategic approach to cybersecurity. Align your security program to achieve specific business outcomes with our full suite of service capabilities, from strategy to technology—and everything in between. Highlights: • Security Rant • Data Privacy and Rights / Data Security • Companies and Storage/Security of Personal Data • Data is a Currency • Securing Systems and Data Leakage • Password Re-Use and Lack of Re-Use Impact on Vendors / SIM Hacking • Monopoly Power of Big Tech Companies & Gov’t Regulation • Dark Web – What is it? • Identity on Internet • Perimeter Security

Jaksot(500)

Domains And Access For Metadata

Domains And Access For Metadata

What actually is used to describe the provenance and information that comes with our data? Today we discuss metadata and the governance, security, hint, domains, date that accompany data in ways that ...

17 Kesä 202359min

The Kubernetes Alternate Universe

The Kubernetes Alternate Universe

What would our systems look like if we didn't have Kubernetes? We started this discussion with platform engineering and its associated challenges. In talking about platforms, we covered ways in whic...

17 Kesä 202355min

Strengthening Security's Weakest Link

Strengthening Security's Weakest Link

How do you deal with the weakest link in security? Today we talk through how we can secure systems, all the way from what technical processes put in place to the people involved to legal enforcement...

10 Kesä 202352min

Data Cartels Book Discussion

Data Cartels Book Discussion

The book Data Cartels by Sarah Lambda serves as a starting point for our discussion today. https://www.amazon.com/Data-Cartels-Companies-Monopolize-Information/dp/1503633713 A dense and thoughtful ...

10 Kesä 202356min

What is Zero Trust?

What is Zero Trust?

How can you execute on a zero trust strategy and what do you need to keep in mind while building it? Today covers the 101 and 201 levels on zero trust. We had a really good conversation about how it...

26 Touko 202357min

Making SBOM A Reality

Making SBOM A Reality

Software bills of materials are one of the most critical, modern software development practices that people should be doing but don't. They have significant impacts in improving security, provenance, ...

26 Touko 202356min

AI And Technical Debt

AI And Technical Debt

We dig into a topic written about by Eric Norlin or SK ventures about technical debt and AI. In this episode, we discuss the consequences of generative AI could be radically transforming the way in wh...

13 Touko 202348min

Life Without Kubernetes

Life Without Kubernetes

We continue our discussion of what would the environment look like without Kubernetes? We started with the idea of what if Kubernetes went away, what if there was a copyright or a trademark or an API ...

13 Touko 202347min