
Cloud Security Podcast
By Cloud Security Podcast Team
We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security.
We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Facebook and Twitter with over 150 people watching and asking questions and interacting with the Guest.


Securing AI: Threat Modeling & Detection
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security.
Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts:
- Jackie Bow (Anthropic): Championing the "How to Train Your Dragon" approach, Jackie reveals how we can leverage AI, and even its 'hallucinations,' for advanced threat detection, response, and creative security solutions.
- Kane Narraway (Canva): Taking the "Knight/Wizard" stance, Kane illuminates the critical challenges in securing AI systems, understanding the new layers of risk, and the complexities of AI threat modeling.
🔥 In this episode, we tackle the tough questions:
- Is the hype around past 'AI-powered' security justified, or was it "hot garbage"?
- How can you build effective threat models when AI introduces new, complex failure points?
- What are the real risks and challenges when implementing AI in production?
- Can AI tools like 'vibe coding' democratize security, or do they risk deskilling professionals?
- How can defenders possibly keep pace with AI-driven attacks without fully embracing AI themselves?
- Exploring the future of AI in both offensive and defensive cybersecurity.
Guest Socials - Jackie's Linkedin + Kane's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Intro: Slaying or Training the AI Dragon at BSidesSF?
(03:15) Meet Jackie Bow (Anthropic): Training AI for Security Defense
(03:41) Meet Kane Narraway (Canva): Securing AI Systems & Facing Risks
(04:51) Was Traditional Security Ops "Hot Garbage"? Setting the Scene
(06:32) The Real Risks: What AI Brings to Your Organisation
(07:27) AI in Action: Leveraging AI for Threat Detection & Response
(08:37) AI Hallucinations: Bug, Feature, or Security Blind Spot?
(09:54) Threat Modeling AI: The Core Challenges & Learnings
(13:29) Getting Started: Practical AI Threat Detection First Steps
(17:56) AI & Cloud: Integrating AI into Your Existing Environments
(25:38) AI vs. Traditional: Is Threat Modeling Different Now?
(29:52) Your First Step: Where to Begin with AI Threat Modeling?
(33:17) Fun Questions & Final Thoughts on the Future of AI Security

CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It?
As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier.
In this episode, we unpack the complexities of securing AI, from the fundamental shifts in application architecture to the emerging attack vectors. Discover why Ankur believes "you can only secure AI with AI" and how organizations can prepare for a future where "your imagination is the new limit," but so too are the potential vulnerabilities.
Guest Socials - Ankur's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(00:30) Meet Ankur Shah (CEO, Straiker)
(01:54) Current AI Deployments in Organizations (Copilots & Agents)
(04:48) AI vs. Traditional Security: Why Old Methods Fail for AI Apps
(07:07) AI Application Types: Native, Immigrant & Explorer Explained
(10:49) AI's Impact on the Evolving Cyber Threat Landscape
(17:34) Ankur Shah on Core AI Security Principles (Visibility, Governance, Guardrails)
(22:26) The AI Security Vendor Landscape (Acquisitions & Startups)
(24:20) Current AI Security Practices in Organizations: What's Working?
(25:42) AI Security & Hyperscalers (AWS, Azure, Google Cloud): Pros & Cons
(26:56) What is AI Inference? Explained for Cybersecurity Pros
(33:51) Overlooked AI Attack Surfaces: Hidden Risks in AI Security
(35:12) How to Uplift Your Security Program for AI
(37:47) Rapid Fire: Fun Questions with Ankur Shah
Thank you to this episode's sponsor - Straiker.ai

Cloud Security Evolved: From CNAPP to AI Threats
The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security.
Elad shares his insights on how the landscape has shifted, moving beyond the era of CSPM and CNAPP as standalone solutions. We delve into why a cloud-aware Security Operations Center (SOC) is no longer a luxury but a necessity, and what "runtime security" truly means in today's complex, multi-cloud environments.
The conversation also tackles the double-edged sword of Artificial Intelligence, how it’s empowering both attackers with new capabilities and defenders with advanced tools. Elad discusses the critical considerations for organizations undergoing digital transformation, the importance of AI governance, and provides actionable advice for companies at all stages of their cloud adoption journey, from securing code from day one to building holistic visibility across their entire infrastructure.
Guest Socials - Elad's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:38) How has Cloud Security Evolved?
(04:21) Why CNAPP is not enough anymore?
(07:13) What is runtime security?
(07:54) Impact of AI on Cloud Security
(11:41) What to include in your cybersecurity program in 2025?
(16:47) The Fun Section
Thank you to this episode's sponsor - PaloAlto Networks
Resources discussed during the episode:

RSA Conference 2025 Recap: Top Themes, Actionable Insights & Future Trends
Dive deep into the key takeaways from RSA Conference 2025 with our expert panel! Join Ashish Rajan, James Berthoty, Chris Hughes, Tanya Janca, and Francis Odum as they dissect the biggest trends, surprises, and "hot takes" from one of the world's largest cybersecurity events.
In this episode, we cover:
- Initial reactions and the sheer scale of RSA Conference 2025.
- Major themes: AI's impact on cybersecurity, especially AppSec, vendor consolidation, the evolution of runtime security, and more.
- The rise of AI-native applications and how they're reshaping the landscape.
- Deep dives into Application Security (AppSec), secure coding with AI, and the future of vulnerability management.
- Understanding runtime security beyond DAST and its critical role.
- Unexpected insights and surprising takeaways from the conference floor.
Guests include:
- Chris Hughes – CEO at Aquia & host of Resilient Cyber
- James Berthoty – Cloud and AppSec engineer, known for sharp vendor analysis and engineering-first content and Latio Tech
- Tanya Janca – Founder of She Hacks Purple
- Francis Odum – Founder of Software Analyst Cyber Research
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction: Unpacking the RSA Conference 2025
(02:20) Meet the Experts: Panelist Introductions
(03:39) RSAC First Impressions: Scale, Excitement & Attendee Numbers
(07:52) Top Themes from RSA Conference 2025
(16:01) AI's Evolution: Native Applications & AppSec's Transformation
(33:30) Demystifying Runtime Security (Beyond DAST)
(40:23) RSA Surprises & Unexpected Takeaways

Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig.
Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains. Sergej explains the critical shift from basic posture management (CSPM/CNAPP) towards runtime security, emphasizing the need for an "assume breach" mindset.
Learn about the staggering reality that over 60% of containers now live for less than a minute and the immense challenges this poses for detection, incident response, and forensics.
This episode covers:
- The evolution from traditional security to cloud-native and runtime security.
- Why CNAPP/CSPM is like a map, but runtime security is the essential radar.
- The complexities of modern incident response with ephemeral workloads.
- Key strategies for Security Operations Centers (SOC) adapting to the cloud.
- The importance of visibility, data collection, and tools for hybrid and even air-gapped environments.
- How AI is starting to aid security operations and forensics.
Guest Socials: Sergej Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction: Cloud Security & The One-Minute Container Problem
(01:31) Meet Sergej Epp: 20+ Years in Cybersecurity (Deutsche Bank, Palo Alto, Sysdig)
(02:44) What is Cloud Native Today? From Train Stations to Airports with Drones
(05:34) Runtime Security Explained: Why It's Crucial Now
(11:05) The Evolution of Cloud Security: Beyond Basic Posture Management
(13:49) Incident Response Evolution: Tackling One-Minute Containers
(18:34) Who Needs Runtime Security? Platform Engineers, SOC Teams & More
(21:01) Runtime Security as a Platform: Beyond Detection to Prevention & Insights
(24:45) Cloud Security Program Maturity: From On-Prem to Cloud Native SOC
(29:20) AI in SOC Operations: Speeding Up Forensics & Context

Scaling Container Security Without Slowing Developers
Are you struggling to implement robust container security at scale without creating friction with your development teams? In this episode, host Ashish Rajan sits down with Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer, for a masterclass in practical container security. This episode was recorded LIVE at KubeCon EU, London 2025.
In this episode, you'll learn about:
- Automating Security Effectively: Moving beyond basic vulnerability scanning to implement comprehensive automation
- Bridging the Security-Developer Gap: Strategies for educating developers, building trust, fostering collaboration, and understanding developer use cases instead of just imposing rules.
- The "Shift Down" Philosophy: Why simply "Shifting Left" isn't enough, and how security teams can proactively provide secure foundations, essentially "Shifting Down."
- Leveraging Open Source Tools: Practical discussion around tools like Trivy, Kubeaudit, Dependabot, RenovateBot, TruffleHog, Kube-bench, OPA, and more.
- The Power of Immutable Infrastructure: Exploring the benefits of using minimal, immutable images to drastically reduce patching efforts and enhance security posture.
- Understanding Real Risks: Discussing the dangers lurking in default configurations and easily exposed APIs/ports in container environments.
- Getting Leadership Buy-In: The importance of aligning security initiatives with business goals and securing support from leadership.
Guest Socials: Cailyn's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Intro: Container Security at Scale
(01:56) Meet Cailyn Edwards: Kubernetes SIG Security Co-Chair
(03:34) Why Container Security Matters: Risks & Exposures Explained
(06:21) Automating Container Security: From Scans to Admission Controls
(12:19) Essential Container Security Tools (Trivy, OPA, Chainguard & More)
(19:35) Overcoming DevSecOps Challenges: Working with Developers
(21:31) Proactive Security: Shifting Down, Not Just Left
(25:24) Fun Questions with Cailyn
Resources spoken about during the interview:

How Attackers Stay Hidden Inside Your Azure Cloud
In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected.
Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders.
- The 3 common ways attackers stay stealthy in Azure
- Why read-only enumeration activity often isn’t logged
- What detection is possible and how to improve it
- How conditional access and logging configuration can help defenders
- Why understanding Microsoft Graph matters for security ops
Guest Socials: Christian's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:09) A bit about Christian
(02:39) What is considered stealthy in Azure?
(04:39) Which services are stealthy in Azure?
(06:25) PIM and Ibiza API
(12:53) The role of Defender for Cloud
(18:04) Does the Stealthy API approach scale?
(19:26) Preventing Stealthy API attacks
(21:49) Best Practices for Prevention in Azure
(25:47) Behaviour Analysis in Azure
(29:31) The Fun Section
Resources spoken about during the interview:
Christian's fwd:cloudsec talk - Staying Sneaky in Microsoft Azure

How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team.
Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Google GKE. You’ll hear:
- How Confluent manages Kubernetes clusters across cloud providers.
- Real-world issues encountered during DNS security migration.
- Deep dives into cloud-specific quirks with Azure’s overlay mode, GKE’s Cilium integration, and AWS’s IP routing limitations.
- Race conditions, IP tables, reverse path filters, and practical workarounds.
- Lessons they’d share for any platform team planning a similar move.
Guest Socials: Alvaro's Linkedin + Nimisha's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:55) A bit about Alvaro
(02:41) A bit about Nimisha
(03:11) About their Kubecon NA talk
(03:51) The Cilium use case
(05:16) Using Kubernetes Native tools in all 3 cloud providers
(011:41) Lessons learnt from the project
Resources spoken about during the interview
Confluent's Multi-Cloud Journey to Cilium: Pitfalls and Lessons Lea... Nimisha Mehta & Alvaro Aleman

The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
The cloud security landscape may have just shifted — and we're here to break it down.
In this special panel episode, host Ashish Rajan is joined by an all-star group of cloud and cybersecurity experts to discuss one of the most important conversations in cloud security today: the changing nature of security architecture, SOC readiness, and how teams must evolve in a multi-cloud world.
Guests include:
- Chris Hughes – CEO at Acqui & host of Resilient Cyber
- James Berthoty – Cloud and AppSec engineer, known for sharp vendor analysis and engineering-first content and Latio Tech
- Mike Privette – Founder of Return on Security, expert in cybersecurity economics
- Francis Odum – Founder of Software Analyst Cyber Research
We Cover:
- Why cloud security is now beyond CSPM and CNAPP
- The impact of major market moves on enterprise cloud strategy
- What vendor lock-in really means in a multi-cloud era
- How runtime and real-time security are taking center stage
- The rise of AI-SPM and AI-powered SOCs
- What CISOs and practitioners should actually be doing now
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:05) A bit about our panelists
(04:24) Current Cloud Security Landscape
(09:36) Challenges with Multi-Cloud Security
(18:06) Runtime Security for Cloud
(23:34) Can SOC deal with CNAPP Alerts
(26:23) CISO planning their cybersecurity program
(32:38) Regulatory requirements in public sector
(36:27) Success Metrics for Modern Cloud Security Program

Detection Engineering with Google Cloud
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.
- Why prevention isn’t enough—and how detection fills the gap
- The biggest mistakes in detection rules that could blow up your SOC
- How to scale detections across hundreds (or thousands) of cloud accounts
- The ROI of Detection as Code—why security leaders should care
- Common low-hanging fruit detections every cloud security team should implement
David has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.
Guest Socials: David's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(03:06) What is Detection as Code?
(03:41) What was before Detection as Code?
(05:36) Business ROI for doing Detection as Code?
(07:49) Building Security Operations in Google Cloud
(12:41) Threat Detection for different type of workload
(14:54) What is Google SecOps?
(20:36) Different kinds of Detection people can create
(24:46) Scaling Detection across many Google Cloud accounts
(28:47) The role of Data Pipeline in Detection
(31:44) Detections people can start with
(34:14) Stages of maturity for detection
(36:43) Skillsets for Detection Engineering
(39:32) The Fun Section

CNAPPs & CSPMs don’t tell the full cloud security story
In this episode we speak to Nick Jones, an expert in offensive cloud security and Head of Research at WithSecure to expose the biggest security gaps in cloud environments and why CNAPPs and CSPMs alone are not enough often.
- How cloud pentesting differs from traditional pentesting
- Why CSPMs & CNAPPs don’t tell the full cloud security story
- The biggest cloud attack paths—identity, IAM users, and CI/CD
- Why “misconfigurations vs vulnerabilities” is the wrong debate
- How organizations should prepare for a cloud pentest
With real-world examples from red team engagements and cloud security research, Nick shares insider knowledge on how attackers target AWS, Azure, and Kubernetes environments—and what security teams can do to stop them.
Guest Socials: Nick's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:40) A bit about Nick Jones
(03:56) How has Cloud Security Evolved?
(05:52) Why do we need pentesting in Cloud Security?
(08:09) Misconfiguration vs Vulnerabilities
(11:04) Cloud Pentesting in Different Environments
(17:05) Impact of Kubernetes Adoption on Offensive Cloud Security
(20:19) Planning for a Cloud Pentest
(29:04) Common Attacks Paths in Cloud
(33:05) Mitigating Common Risk in Cloud
(35:14) What is Detection as Code?
(41:17) Skills for Cloud Pentesting
(45:28) Fun Sections

Securing AI Applications in the Cloud
What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape.
- What is an AIBOM and why it matters
- The stages of AI adoption: experimentation to optimization
- Shadow AI: A factor of 10 more than you think
- Practical strategies for pre- and post-deployment security
- The future of AI security with agent swarms and beyond
Guest Socials: Bar-El's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:24) A bit about Bar-el
(03:32) What is AIBOM?
(12:58) What is an embedding model?
(16:12) What should Leaders have in their AI Security Strategy?
(19:00) Whats different about the AI Security Landscape?
(23:50) Challenges with integrating security into AI based Applications
(25:33) Has AI solved the disconnect between Security and Developers
(28:39) Risk framework for AI Security
(32:26) Dealing with threats for current AI Applications in production
(36:51) Future of AI Security
(41:24) The Fun Section

Realities of Cloud Networking in AWS
AWS networking isn’t as simple as it seems and when you’re dealing with regulated industries like healthcare, the stakes are even higher.
In this episode we sit down with Kyler Middleton and Jack W. Harter from Veradigm — who have navigated complex AWS networking challenges while migrating from on-prem data centers to the cloud.
We speak about:
- The real struggles of moving from data centers to AWS
- Why networking can feel like a black box
- The anti-pattern that surprisingly worked best
- How to build secure cloud networks—without losing your sanity
- The hidden security & compliance challenges in healthcare cloud migration
Guest Socials: Kyler's Linkedin + Jack's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:55) A bit about Kyler and Jack
(03:18) Security Challenges in Medical Industry
(06:01) Where to start when migrating from data centres to AWS?
(07:42) Networking Challenges for Regulated Industries
(11:26) Networking in On-Prem vs Cloud
(19:24) Security by Design considerations
(29:31) The Terraform pieces
(34:34) Network Firewall in Cloud
(39:46) Lessons learnt from the project
(46:21) The Fun Section
Resources:
Let's Do DevOps - Kyler's Website

Cloud Incident Response in Microsoft Azure
In this episode, we dive deep into Azure security, incident response, and the evolving cloud threat landscape with Katie Knowles, Security Researcher and former Azure Incident Responder. We spoke about common Azure incident response scenarios you need to prepare for, how identity and privilege escalation work in Azure, how Active Directory and Entra ID expose new risks and what security teams need to know about Azure networking and logging.
Guest Socials: Katie's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:27) A bit about Katie
(03:17) Domain Admin in Azure
(07:03) Common causes of incidents in Azure
(08:53) Identities in Azure
(11:44) Third Party Identities in Azure
(17:34) Azure Networking and Incident Response
(22:35) Common Incidents in Azure
(26:53) AI specific incidents in Azure
(28:45) Privilege escalation in Azure
(39:37) Where to start with Azure Research?
(48:20) The Fun Questions

AWS Multi-Account Security: What Netflix Learned
🚀 How do you secure thousands of AWS accounts without slowing down developers? Netflix’s cloud security experts Patrick Sanders & Joseph Kjar join us to break down their identity-first security model and share lessons from scaling security across a massive AWS multi-account environment.
In this episode, we cover:
- Why identity, not network, is the best security boundary
- The challenges of least privilege and right-sized access
- How Netflix migrates IAM roles while minimizing disruptions
- The impact of multi-account AWS security strategies
Guest Socials: Patrick's Linkedin +Joseph's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:05) A bit about Joseph
(02:32) A bit about Patrick
(02:38) Scaling security across multiple accounts
(03:29) Least Privilege is hard
(06:44) Why go down the identity path?
(08:49) Identity based approach for least privilege
(15:43) Security at scale for Multi Account in AWS
(23:54) Lessons from the project
(27:02) What would be classified as an easy migration?
(30:55) How the project has progressed?
(35:01) Automation Pieces that enabled the project
(37:54) Where to start with scaling security across Multi Accounts?
(39:21) Resource Access Manager and how it fits into migration
Resources discussed in this interview:
Accelerate insights using AWS SDK instrumentation Talk
Patrick and Joseph’s Talk - Netflix's massive multi-account journey: Year two
Joseph and Patrick's previous interview on Cloud Security Podcast

Cloud Security Detection & Response Strategies That Actually Work
We spoke to Will Bengtson (VP of Security Operations at HashiCorp) bout the realities of cloud incident response and detection. From root credentials to event-based threats, this conversation dives deep into:
- Why cloud security is NOT like on-prem – and how that affects incident response
- How attackers exploit APIs in seconds (yes, seconds—not hours!)
- The secret to building a cloud detection program that actually works
- The biggest detection blind spots in AWS, Azure, and multi-cloud environments
- What most SOC teams get WRONG about cloud security
Guest Socials: Will's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(00:38) A bit about Will Bengtson
(05:41) Is there more awareness of Incident Response in Cloud
(07:05) Native Solutions for Incident Response in Cloud
(08:40) Incident Response and Threat Detection in the Cloud
(11:53) Getting started with Incident Response in Cloud
(20:45) Maturity in Incident Response in Cloud
(24:38) When to start doing Threat Hunting?
(27:44) Threat hunting and detection in MultiCloud
(31:09) Will talk about his BlackHat training with Rich Mogull
(39:19) Secret Detection for Detection Capability
(43:13) Building a career in Cloud Detection and Response
(51:27) The Fun Section

CISO Challenges Across Industries
In this episode, we sit down with Sunil Rane, an experienced cybersecurity leader with over 20 years in cybersecurity across industries like healthcare, education, media, and consulting. Sunil shares unique insights into the diverse challenges faced by CISOs, from managing data sensitivity in healthcare to the lack of standardized frameworks in media, how to balance data availability and security without compromising operational efficiency, the complexities of being a custodian of data in consulting and how to manage cross-industry compliance and why communication and collaboration are critical for CISOs, from internal stakeholders to public sector regulators.
Guest Socials: Sunil's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:13) A bit about Sunil Rane
(03:25) Cybersecurity in education and healthcare
(09:12) Cybersecurity and consulting
(15:49) Cybersecurity challenges in public and private sector
(18:35) Cybersecurity in the media industry
(25:48) Skillset for becoming a CISO
(29:36) The Fun Section

Why Solving the Data Problem is Key to Cloud Security?
In this episode we’re joined by Francis Odum, founder and lead research analyst at Software Analyst Cyber Research. Drawing from his extensive research and conversations with CISOs, security operators, and vendors, Francis shares his insights on the state of identity security and the rise of non-human identities (NHI) in the cloud, why solving the data problem is critical to reducing false positives, improving SOC efficiency, and cutting costs, the early but growing landscape of AI and LLM security and its intersection with DSPM and data governance and predictions for 2025 trends, including what should be ditched and what the cybersecurity industry should prioritize.
Guest Socials: Francis's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:56) A bit about Francis
(03:45) What is CNAPP in 2025?
(06:55) The Identity space in 2025
(10:34) The state of SOC in 2025
(19:23) The AI Security Ecosystem
(24:44) DSPM vs DLP
(29:48) What should we ditch in 2025?
(33:01) What should we see a lot more in 2025?
(41:39) A bit about Cloud Security Bootcamp
(42:58) The Fun Section
Resources spoken about during the episode:

The economics of cybersecurity and trends
In this episode, host Ashish Rajan spoke to Mike Privette, founder of Return on Security, to explore the landscape of cybersecurity as we look toward 2025. Mike shared his unique insights on the economics of cybersecurity, breaking down industry trends, and discussing how AI is revolutionizing areas like governance, risk, compliance (GRC), and data loss prevention (DLP). They dive into the convergence of cloud security and application security, the rise of startups, and the ever-present "cat-and-mouse game" of adapting to investor and buyer needs.
Guest Socials: Mike's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(00:27) A bit about Mike
(00:49) The story behind Return On Security
(01:40) How big is the cybersecurity landscape?
(04:36) Cybersecurity Trends from 2024
(07:03) AI Security in 2024
(08:10) Cybersecurity Trends in 2025
(13:16) Trends to look at when starting a company
(16:18) Trends for Startups
(17:37) Do new vendors enter the cybersecurity market?
(18:53) Whats a healthy cybersecurity industry?
(20:12) The world of startup acquisitions
(22:29) The Fun Section

The Truth About CNAPP and Kubernetes Security
In this episode of the Cloud Security Podcast, host Ashish Rajan speaks to James Berthoty, founder of Latio.Tech and an engineer-driven analyst, for a discussion on cloud security tools. In this episode James breaks down CNAPP and what it really means for engineers, if kubernetes secuity is the new baseline for cloud security and runtime security vs vulnerability management.
Guest Socials: James's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:26) A bit about James
(03:20) What in Cloud Security in 2025?
(04:51) What is CNAPP?
(07:01) Differentiating a vulnerability from misconfiguration
(11:51) Vulnerability Management in Cloud
(15:38) Is Kubernetes becoming the default?
(21:50) Is there a good way to do platformization?
(24:16) Should CNAPP include Kubernetes?
(28:07) What is AI Security in 2025?
(35:06) Tool Acronyms for 2025
(37:27) Fun Questions

Cybersecurity Isn’t Crowded: Security Engineering and the 5,000 Vendor Problem
In this episode our host Ashish Rajan sat down with Ross Haleliuk, author of Cybersecurity for Builders and creator of the Venture in Security blog, to explore the current state and future of the cybersecurity industry. From understanding the challenges of building a cybersecurity startup to the dynamics of security engineering and market trends for 2025. Ross and Ashish explore why the cybersecurity industry isn’t as crowded as it seems and the divide between companies that build in-house security and those that rely on vendors.
Ross also unpacks why sales and marketing aren’t “dirty words” in cybersecurity, why security engineering is “the present,” and how practitioners can balance business needs with technical aspirations.
Guest Socials: Ross's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(05:33) How Venture in Security started?
(09:33) Security Engineering in Cybersecurity
(18:18) Cybersecurity markets that will be top of mind in 2025
(24:15) GTM for Defender Tools
(30:09) Vulnerabilities vs Misconfiguration Tools
(37:56) How should product companies think about GTM?
(44:27) How to decide between different security tools?
(56:36) Cybersecurity for Builders book
(01:05:00) The Fun Section
Resources shared during the episode:
Challenges in Security Engineering Programs - Rami McCarthy
Cybersecurity is not a market for lemons. It is a market for silver bullets

Centralized VPC Endpoints - Why It Works for AWS Networking
In this episode, Meg Ashby, a senior cloud security engineer shares how her team tackled AWS’s centralized VPC interface endpoints, a design often seen as an anti-pattern. She explains how they turned this unconventional approach into a cost-efficient and scalable solution, all while maintaining granular controls and network visibility. She shares why centralized VPC endpoints are considered an AWS anti-pattern, how to implement granular IAM controls in a centralized model and the challenges of monitoring and detecting VPC endpoint traffic.
Guest Socials: Meg's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:48) A bit about Meg Ashby
(03:44) What is VPC interface endpoints?
(05:26) Egress and Ingress for Private Networks
(08:21) Reason for using VPC endpoints
(14:22) Limitations when using centralised endpoint VPCs
(19:01) Marrying VPC endpoint and IAM policy
(21:34) VPC endpoint specific conditions
(27:52) Is this solution for everyone?
(38:16) Does VPC endpoint have logging?
(41:24) Improvements for the next phase
Thank you to our episode sponsor Wiz. Cloud Security Podcast listeners can also get a free cloud security health scan by going to wiz.io/csp

What is CADR?
In this episode, recorded at Kubecon NA in Salt Lake City, we spoke about about Kubernetes security with Shauli Rozen, co-founder and CEO of ARMO Security. From the challenges of runtime protection to the potential of CADR (Cloud Application Detection and Response), Shauli breaks down the gaps in traditional CSPM tools and how Kubernetes plays a central role in cloud security strategy. The episode gets into the "Four C's" of cloud security: Cloud, Cluster, Container, Code, why runtime data, powered by eBPF, is critical for modern security solutions, the rise of CADR and how Kubernetes is reshaping the landscape of DevOps and security collaboration.
Guest Socials: Shauli's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:46) A bit about Shauli and ARMO
(02:26) Bit about open source project Kubescape
(03:59) What is Runtime Security in Kubernetes?
(06:50) CDR and Application Security
(08:57) What is ADR and CADR?
(09:55) How is CADR different to ASPM + DAST?
(12:18) Kubernetes Usage and eBPF
(15:35) Does your CSPM do coverage for Kubernetes?
(16:24) What to include in 2025 Cybersecurity Roadmap?
(19:09) Does everyone need CADR?
(21:35) Who is looking at the Kubernetes Security Logs?
(23:17) The future of Kubernetes Security
(25:26) The Fun Section

Building Platforms in Regulated Industries
At HashiConf 2024 in Boston, our host Ashish Rajan had a great chat over some cannolis and a game of Jenga with AJ Oller, AVP of Engineering at The Hartford about how automation, mainframes, and compliance intersect to drive innovation in regulated industries like insurance. They spoke about why regulations aren't barriers but frameworks to prevent failure, the human side of engineering and how to manage change fatigue during transformations and how automation enhances security, disaster recovery, and operational efficiency.
Guest Socials: AJ' s Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:53) A bit about AJ Oller
(02:17) The Cannoli taste test
(04:38) Technology in the Insurance industry
(10:19)What is a platform?
(11:46) What skillsets do you need in platform team?
(14:19) Maturity for building platform teams
(19:5)8 Business case for investing in Automation
(24:49) Does Automation help with security regulations?
(28:10) Leaders communicating automation value to business
(30:37) Cheerleading for digital transformation
(32:32) The Fun Section

Dynamic Permission Boundaries: A New Approach to Cloud Security
In this episode, Ashish spoke with Kushagra Sharma, Staff Cloud Security Engineer, to delve into the complexities of managing Identity Access Management (IAM) at scale. Drawing on his experiences from Booking.com and other high-scale environments, Kushagra shares insights into scaling IAM across thousands of AWS accounts, creating secure and developer-friendly permission boundaries, and navigating the blurred lines of the shared responsibility model.
They discuss why traditional IAM models often fail at scale and the necessity of implementing dynamic permission boundaries, baseline strategies, and Terraform-based solutions to keep up with ever-evolving cloud services. Kushagra also explains how to approach IAM in multi-cloud setups, the challenges of securing managed services, and the importance of finding a balance between security enforcement and developer autonomy.
Guest Socials: Kushagra's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:31) A bit about Kushagra
(03:29) How large can the scale of AWS accounts be?
(03:49) IAM Challenges at scale
(06:50) What is a permission boundary?
(07:53) Permission Boundary at Scale
(13:07) Creating dynamic permission boundaries
(18:34) Cultural challenges of building dev friendly security
(23:05) How has the shared responsibility model changed?
(25:22) Different levels of customer shared responsibility
(29:28) Shared Responsibility for MultiCloud
(34:05) Making service enablement work at scale
(43:07) The Fun Section

Building a Resilient Cloud Security Program after Merger and Acquisition
In this episode, host Ashish Rajan sits down with Prahathess Rengasamy, a cloud security expert with extensive experience at companies like Credit Karma, Block, and Apple. Together, they explore the challenges and best practices for scaling cloud security, especially in the complex scenarios of mergers and acquisitions.
Starting with foundational elements like CSPMs and security policies, Prahathess breaks down the evolution of cloud security strategies. He explains why cloud security cannot succeed in isolation and emphasizes the need for collaboration with platform and infrastructure engineering teams. The conversation delves into real-world examples, including managing AWS and GCP security post-acquisition and navigating the cultural and technical challenges that come with multi-cloud environments.
Guest Socials: Prahathess's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:02) A bit about Prahathess
(02:36) How does Cloud Security Scale?
(07:51) Where do we see just in time provisioning?
(10:05) Cloud Security for Mergers and Acquisitions
(14:31) Should people become MultiCloud Experts?
(15:28) The need for data insights
(16:54) Data sources to have as part of data insights
(21:06) Benefits of Data insights for Cloud Security Teams
(21:30) How to bring the new team along the cloud security journey?
(24:29) How to learn about data insights?
(26:35) How to maximize security efforts with data?
(36:21) The Fun Section

Building Data Perimeter in Cloud in 2024
In this episode, Ashish gets into the critical topic of data perimeters in AWS with our guest, Tyler Warren, a Lead Cloud Security Engineer at USAA. As cloud environments continue to evolve, the importance of securing your data through trusted networks and identities has never been more crucial.
Tyler shares his insights on the challenges and strategies involved in building effective data perimeters, emphasizing the need for a holistic security approach that includes both preventative and detective controls. We explore how concepts like trusted resources, networks, and identities play a pivotal role in safeguarding your cloud infrastructure and why these elements should be at the core of your security strategy. Join us as we discuss practical steps for implementing and managing data perimeters, the significance of understanding your zones of trust, and how to scale your security measures as your cloud footprint grows.
Guest Socials: Tyler's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:28) A bit about Tyler
(04:22) Data Perimeter in Cloud Security
(08:18) Why was there a need to look into data perimeter?
(09:39) Should people look at data perimeter from the beginning?
(12:16) Starting point for data perimeter
(15:42) Defining boundaries of Zone of Trust
(21:25) Data perimeter in hybrid environments
(24:47) Challenges in setting up data perimeter
(31:31) Should you start in dev, test or prod?
(34:55) How often should you review your SCPs?
(36:05) What Skillsets does the team need?
(37:26) Are Data Perimeters Developer Friendly?
(40:06) Technical challenges with detective and preventative controls
(42:14) Getting stakeholders onboard
(46:56) Levels of maturity for data perimeter strategy
(49:30) The Fun Section
Resources spoken about during the interview:
AWS Data Perimeter at USAA: Things we knew, things we thought we knew and things you should know!

Navigating NIST CSF 2.0: Guide to Frameworks and Governance
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance, and broader security programs in industries like retail and advertising.
Throughout the conversation, we dive into the specific challenges of transitioning from a purely cloud-based tech company to a bricks-and-mortar retail operation, highlighting how the threat models differ dramatically between these environments. Lukasz shares his unique perspective on cybersecurity frameworks like NIST CSF 2.0, essential for building resilient programs, and offers practical advice for selecting the right framework based on your organization's needs.
Guest Socials: Lukasz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(03:00) A bit about Lukasz
(04:32) Security Challenges for Tech First advertising company
(05:16) Security Challenges for Retail Industry
(06:00) Difference between the two industries
(07:01) Best way to build Cybersecurity Program
(09:44) NIST CSF 2.0
(13:02) Why go with a framework?
(16:26) Which framework to start with for your cybersecurity program?
(18:33) Technical CISO vs Non Technical CISO
(25:37) The Fun Section
Resources spoken about during the interview:
Mapping between the frameworks
https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-nist-csf-2-0
https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-asds-essential-eight

Building a SOC Team in 2024 - Automation & AI
What is the future of SOC? In this episode Ashish sat down with Allie Mellen, Principal Analyst at Forrester, to explore the current state of security operations and the evolving role of AI in cybersecurity. Allie spoke about why Cloud Detection Response (CDR) might be dead, how Generative AI is failing to live up to its hype in security use cases, and why automation will never fully replace human security analysts.
We get into the challenges faced by SOC teams today, the burnout issue among security analysts, and how adopting detection engineering and eliminating the outdated structures could transform the way security teams operate.
Guest Socials: Allie's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:48) A bit about Allie
(03:13) The role of analysts in cybersecurity
(05:56) What is EDR?
(06:30) What is XDR?
(08:42) The impact of GenAI
(10:19) How is GenAI going to impact SOAR?
(14:52) Where to start with SOC?
(24:08) Starting to build your SOC team
(27:32) How SOC should respond to new technology?
(31:48) Expectations from Managed SOC providers
(35:16) Detection challenges for Hybrid Environments
(38:01) Level 2 and 3 SOC in new world
(42:37) What training is required for the SOC team?
(48:49) How will this space evolve?
(51:48) The Fun Questions
Resources spoken about during the interview:

Cloud Identity Lifecycle Management Explained!
In this episode Ashish Rajan sits down with Shashwat Sehgal, co-founder and CEO of P0 Security, to talk about the complexities of cloud identity lifecycle management. Shashwat spoke to us about why traditional identity solutions like SAML are no longer sufficient in today’s cloud environments. He discusses the need for organisations to adopt a more holistic approach to secure access across cloud infrastructures, addressing everything from managing IAM roles to gaining complete visibility and inventory of all cloud identities.
This episode goes into the growing challenges around managing human and non-human identities, and the importance of shifting from legacy solutions to cloud-native governance.
Guest Socials: Shashwat's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:47) A bit about Shashwat
(02:20) What is Identity Lifecycle Management?
(04:55) What is IGA and PAM?
(10:10) Complexity of Identity Management
(13:12) What are non human identities?
(15:56) Maturity Levels for Cloud Identity Lifecycle Management
(19:03) The role of SAML in Identity Management
(20:07) Identity Management of Third parties and SaaS Providers
(21:28) Who’s responsible for identity management in Cloud?
(23:28) Changing landscape of identity management
(27:46) Native Solutions for identity management
(30:03) Fun Questions

Traditional PAM vs Cloud CPAM for a cloud first world
In this episode of the Cloud Security Podcast, Ashish sat down with Art Poghosyan, CEO and co-founder of Britive, to explore the changing world of identity and access management (IAM) in the cloud era. With over two decades of experience in the identity space, Art breaks down the challenges of traditional Privileged Access Management (PAM) and how cloud-native environments require a rethinking of security strategies.
From understanding the complexities of cloud infrastructure entitlements to unpacking the differences between on-premise and cloud-based PAM, Art explains why "Identity is the new perimeter" and how modern organizations must adapt. They dive deep into the importance of Just-in-Time (JIT) access, non-human identities, and the critical role identity plays as the first and last line of defense in cloud security.
Guest Socials: Art's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:53) A bit about Art
(02:51) What is IAM?
(04:02) What is Cloud Privilege Access Management?
(06:08) Why do we need CloudPAM in 2024?
(07:52) Non Human Identities
(08:39) Privilege in Cloud vs On Premise
(09:49) SAML vs PAM
(12:21) Just in Time provisioning in Cloud
(17:17) Making Access Management Developer Friendly
(19:12) What should security team be looking at ?
(21:22) Communicating IAM vulnerabilities
(23:45) Tactical steps to level up IAM
(27:20) Zero Trust and IAM
(30:56) Fun Questions

The Role of Cloud Security Research in 2024
Why does Cloud Security Research matter in 2024? At fwd:cloudsec EU in Brussels, we sat down with Scott Piper, a renowned cloud security researcher at Wiz, to discuss the growing importance of cloud security research and its real-world impact. Scott spoke to us about the critical differences between traditional security testing and cloud security research, explaining how his team investigates cloud providers to find out vulnerabilities, improve detection tools, and safeguard data.
Guest Socials: Scott's Linkedin + Scott's Twitter
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:07) A bit about Scott Piper
(02:48) What is a Cloud Security Research Team?
(04:30) Difference between traditional and Cloud Security Research
(07:21) Cloud Pentesting vs Cloud Security Research
(08:10) What is request collapsing?
(10:26) GitHub Actions and OIDC Research
(13:47) How has cloud security evolved?
(17:02) Tactical things for Cloud Security Program
(18:41) Impact of Kubernetes and AI on Cloud
(20:37) How to become a Cloud Security Researcher
(22:46) AWS Cloud Security Best Practices
(26:35) Trends in AWS Cloud Security Research
(28:11) Fun Questions
(30:22) A bit about fwd:cloudsec
Resources mentioned during the interview:
Wiz.io - Cloud Security Podcast listeners can also get a free cloud security health scan
Avoiding security incidents due to request collapsing
A security community success story of mitigating a misconfiguration
CTFs

Edge Security is the Key to Cloud Protection
How does Edge Security fit into the future of Cloud Protection ? In this episode, we sat down with Brian McHenry, Global Head of Cloud Security Engineering at Check Point at BlackHat USA, to chat about the evolving landscape of cloud security in 2024. With cloud adoption accelerating and automation reshaping how we manage security, Brian spoke to us about the challenges that organizations face today—from misconfigurations and alert fatigue to the role of AI in application security.
We tackle the question: Is CSPM (Cloud Security Posture Management) still enough, or do we need to rethink our approach? Brian shares his thoughts on edge security, why misconfigurations are more dangerous than ever, and how automation can quickly turn small risks into significant threats.
Guest Socials: Brian's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(03:28) State of Cloud Market
(04:44) Is CSPM not enough?
(06:35) Edge Security in Cloud Context
(08:31) Where is edge security going?
(10:11) Where to start with Cloud Security Tooling?
(11:08) Transitioning from Network Security to Cloud Security
(13:11) How is AI Changing Edge Security?
(14:45) How is WAF and DDos Protection evolving?
(18:16) Should people be doing network pentest?
(19:57) North Star for WAF in a cybersecurity program
(20:55) The evolution to platformization
(23:13) Highlight from BlackHat USA 2024

Is your CI/CD Pipeline your Biggest Security Risk?
How CI/CD Tools can expose your Code to Security Risks? In this episode, we’re joined by Mike Ruth, Senior Staff Security Engineer at Rippling and returning guest, live from BlackHat 2024. Mike dives deep into his research on CI/CD pipeline security, focusing on popular tools like GitHub Actions, Terraform, and Buildkite. He reveals the hidden vulnerabilities within these tools, such as the ability for engineers to bypass code reviews, modify configuration files, and run unauthorized commands in production environments.
Mike explains how the lack of granular access control in repositories and CI/CD configurations opens the door to serious security risks. He shares actionable insights on how to mitigate these issues by using best practices like GitHub Environments and Buildkite Clusters, along with potential solutions like static code analysis and granular push rule sets. This episode provides critical advice on how to better secure your CI/CD pipelines and protect your organization from insider threats and external attacks.
Guest Socials: Mike's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introductions
(01:56) A word from episode sponsor - ThreatLocker
(02:31) A bit about Mike Ruth
(03:08) SDLC in 2024
(08:05) Mitigating Challenges in SDLC
(09:10) What is Buildkite?
(10:11) Challenges observed with Buildkite
(12:30) How Terraform works in the SDLC
(15:41) Where to start with these CICD tools?
(18:55) Threat Detection in CICD Pipelines
(21:31) Building defensive libraries
(23:58) Scaling solutions across multiple repositories
(25:46) The Fun Questions
Resources mentioned during the call:

State of Cloud Security - Practitioner Edition
In this episode of the Cloud Security Podcast, we bring together an incredible panel of experts to explore the evolving landscape of cloud security in 2024. Hosted by Ashish Rajan, the discussion dives deep into the challenges and realities of today’s multi-cloud environments. With perspectives ranging from seasoned veterans to emerging voices this episode offers a broad spectrum of insights from cloud security practitioners who are living and breathing cloud security everyday. We are very grateful to our panelist who took part in 1st of its kind edition for the State of Cloud Security - Meg Ashby, Damien Burks, Chris Farris, Rich Mogull, Patrick Sanders, Ammar Alim and Abdie Mohamed.
The conversation covers essential topics such as the pitfalls of multi-cloud adoption, the persistent security issues that remain even as cloud technologies advance, and the importance of specializing in one cloud platform while maintaining surface-level knowledge of others. The panelists also share their thoughts on the future of cloud security, including the increasing relevance of Kubernetes and edge security.
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:22) How much has Cloud Security Changed?
(07:05) Is the expectation to be MultiCloud?
(19:07) What’s top of mind in Cloud Security in 2024?
(27:17) The current Cloud Service Provider Landscape
(39:26) Where to start in Cloud Security ?
(52:10) The Fun Section
Resources discussed during the episode:

BlackHat USA 2024 Highlights and Recap
What were the main themes at BlackHat USA 2024? With respect to Cloud Security, maybe with a sprinkle of AI Security. Our team was on the ground at BlackHat and DefCon32 this year, we heard many talks and panels, spoke to many practitioner, leaders and CISOs and had the pleasure of recording some great interviews (coming soon!). This conversation is a distillation of everything we heard and the themes we saw.
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:15) A word from our episode sponsor, ThreatLocker
(04:35) Resiliency in Cybersecurity
(07:00) Commentary on upcoming US elections
(09:42) Identity Centric Security
(15:55) Cloud Security is getting more Complex
(23:47) Growing importance of Data Security
(25:42) Use Cases for AI Security
(31:25) Shared Responsibility and Shared Fate
(33:21) Is CSPM Dead?
(37:32) The Conclusion
Resources from the episode:
BlackHat USA Keynote - Democracy's Biggest Year: The Fight for Secure Elections Around the World
Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data

Building an Incident Response Team for High-Growth Companies
In this episode, we sit down with Santiago, a Senior Security Engineer at Canva, to talk about the complexities of building and managing an incident response team, especially in high-growth companies. Santiago shares his experience transitioning from penetration testing to incident response and highlights the unique challenges that come with protecting a rapidly expanding organization.
We explore the differences between incident response in high-growth versus established companies, the importance of having the right personnel, and the critical skills needed for effective incident response.
Guest Socials: Santiago's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:58) A word from our sponsor - SentinelOne
(02:48) A bit about Santiago
(03:18) What is Incident Response?
(04:06) How IR differs in different organisations?
(04:48) Red Team vs Incident Response Team
(06:17) Challenges for Incident Response in Cloud
(07:16) Incident Response in a High Growth Company
(07:56) Skillsets required for high growth
(09:14) Cloud vs On Prem Incident Response
(10:03) Building Incident Response in High Growth Company
(11:39) Responding to incidents that are not high risk
(14:41) Transition from pentesting to incident responder
(17:20) Endpoint vulnerability management at scale
(25:32) The Fun Section
Resources from the episode:

State of Cloud Security 2024 - Leadership Edition
Leadership Insights on Cloud Security in 2024. Ashish sat down with return guest Srinath Kuruvadi, a seasoned cloud security leader with over two decades of experience in the field. Together, they explored the current state and future of cloud security, discussing the importance of detection & incident response teams, building and maintaining a robust cloud security program, understanding the importance of stakeholder management, and the role of data security in mitigating risks. Srinath shared his perspective on the evolution of cloud security, the critical need for a prevention-first mindset while tackling the challenges of managing security in a multi-cloud environment
Guest Socials: Srinath's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:42) A bit about Srinath
(01:55) How has the Cloud Security space changed?
(05:27) Are CloudSec and AppSec merging?
(06:29) Are stakeholders more engaged with Cloud Security?
(08:10) Where are the boundaries for Cloud Security?
(10:06) Finding the right talent in Cloud Security
(12:31) Building a Multi Cloud Security Team
(15:06) The role of platform teams
(16:45) Maturity level for Cloud Security
(19:18) Current patterns in Cloud Security
(22:03) What should CSPs be taking more about?

Cloud Native Strategies from a FinTech CISO
What are you doing differently today that you're stopping tomorrow's legacy? In this episode Ashish spoke to Adrian Asher, CISO and Cloud Architect at Checkout.com, to explore the journey from monolithic architecture to cloud-native solutions in a regulated fintech environment. Adrian shared his perspective on why there "aren't enough lambdas" and how embracing cloud-native technologies like AWS Lambda and Fargate can enhance security, scalability, and efficiency.
Guest Socials: Adrian's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:59) A bit about Adrian
(02:47) Cloud Naive vs Cloud Native
(03:54) Checkout’s Cloud Native Journey
(05:44) What is AWS Fargate?
(06:52) There are not enough Lambdas
(09:52) The evolution of the Security Function
(12:15) Culture change for being more cloud native
(15:23) Getting security teams ready for Gen AI
(18:16) Where to start with Cloud Native?
(19:14) Where you can connect with Adrian?
(19:39) The Fun Section

Fixing Cloud Security with AWS Lambda
How to secure AWS cloud using AWS Lambda? We spoke to Lily Chau from Roku at BSidesSF about her experience and innovative approach to tackling security issues in AWS environments. From deploying IAM roles to creating impactful playbooks with AWS Lambda, Lily shared her take on automating remediation processes. We spoke about the challenges of managing cloud security with tools like CSPM and CNAPP, and how Lily and her team took a different approach that goes beyond traditional methods to achieve real-time remediation.
Guest Socials: Lily Twitter
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:56) A bit about Lily
(02:27) What is Auto Remediation?
(03:56) Example of Auto Remediation
(05:19) CSPMs and Auto Remediation
(06:58) Make Auto Remediation in Cloud work for you
(09:49) Where to get started with Auto Remediation?
(11:52) What defines a High Impact Playbook?
(12:58) Auto Remediation for Lateral Movement
(14:35) What is running in the background?
(16:41) What skillset is required?
(19:08) The Fun Section
Resources for the episode:

What is confidential computing? Explained for 2024
How can you protect your data with Confidential Compute and Containers? Ashish spoke to Zvonko Kaiser, Principal Systems Software Engineer, Confidential Containers and Kubernetes at Nvidia about confidential containers, confidential computing, and their importance in protecting sensitive data. They speak about the various threat models, use cases, and the role of GPUs in enhancing compute power for AI workloads
Guest Socials: Zvonko's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:45) A word from our sponsor SentinelOne
(02:18) A bit about Zvonko
(02:24) Encryption for Confidential Computing
(04:20) Confidential Computing vs Confidential Containers
(05:45) What sectors focus on Confidential Computing?
(07:09) Common Threats in Confidential Computing
(08:55) What is a Secure Enclave?
(10:05) Value of Attestation for Confidential Computing
(11:35) Lift and Shift Strategy for AI
(13:59) The role of GPU in confidential Computing
(15:37) Shared Responsibility with Confidential Computing
(17:10) Confidential Computing project you can get involved in
(18:16) The fun section

The Evolution of Infrastructure as Code so far - 2024 Edition
How to implement infrastructure as code? Ashish spoke to Armon Dadgar. Co-Founder and CTO at HashiCorp at Hashidays London. Armon speaks about his journey from co-creating Terraform, the first open-source language in the IaC space, to addressing the complex challenges enterprises face in cloud environments today. They speak about why having a platform team from the beginning is crucial for large enterprises, the evolution of IaC, the importance of standardization in managing cloud applications, and how automation plays a key role in maintaining security.
Guest Socials: Armon's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
00:00 Introduction
01:54 A bit about Armon
02:32 How has infrastructure as code evolved?
03:43 The role of Terraform
04:38 Infrastructure and Security Lifecycle Management
06:51 Best Practice for Infrastructure Lifecycle Management
09:11 Best Practice for Security Lifecycle Management
09:38 What is a Platform Team?
11:02 When should people start thinking about a platform team?
13:02 What is Zero Trust?
14:52 Challenges with IaC
17:35 How GenAI is impacting IaC?
20:04 Starting an open source project?
24:53 The Fun Section

What is AI-SPM?
What is the future of AI Security and Data Protection? At AWS re:Inforce in Philadelphia this year, Ashish spoke to Dan Benjamin, Head of Data, Identity and AI Security at Prisma Cloud about the new category of AI-SPM (Artificial Intelligence Security Posture Management) and why does it fit within all the other toolings organisations have. They spoke about the importance of building an AI and data inventory, understanding AI access, and the critical role of DSPM (Data Security Posture Management) in creating effective AI security controls.
Guest Socials: Dan's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
00:00 Introduction
02:09 A bit about Dan
02:29 What is AISPM?
03:16 How should CISOs tackle AI Security?
06:16 Right Controls around AI Services
07:32 AISPM vs CSPM
09:52 The role of DSPM
10:25 Tackling data security in world of AI
13:28 Maturity Curve for CISOs to consider
16:36 Security Teams for AI Security
19:51 The Fun Section

Creating Effective Sigma Rules with AI
Can Threat Detection be enhanced with AI? Ashish sat down with Dave Johnson, Senior Threat Intelligence Advisor at Feedly, at BSides SF 2024, where Dave also presented a talk.
Dave shares his journey in cyber threat intelligence, including his 15-year career with the FBI and his transition to the private sector. The conversation focuses on the innovative use of large language models (LLMs) to create Sigma rules for threat detection and the challenges faced along the way. Dave spoke about his four approaches to creating Sigma rules with AI, ultimately highlighting the benefits of prompt chaining and Retrieval Augmented Generation (RAG) systems.
Guest Socials: Dave's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:44) A word for our episode sponsor, Panoptica
(02:39) A bit about Dave Johnson
(03:33) What are Sigma Rules?
(04:36) Where to get started with Sigma Rules?
(05:27) Skills required to work with Sigma Rules
(06:32) The four approaches Dave took to Sigma Rules
(11:29) Are Sigma Rules complimentary to existing log systems?
(12:18) Challenges Dave had during his research
(14:09) Validating Sigma Rules
(16:01) Working on Sigma Rule Projects
(18:54) The Fun Section
Resources spoken about during the episode:

What is the future of security operations with AI in 2024?
How can AI impact Cloud Security Operations? Ashish sat down with Ely Kahn, VP of Cloud Security and AI at SentinelOne to talk about the evolving landscape of cloud security and the future of Security Operations Centers (SOC). Ely spoke about the shift from centralized to decentralized SOC operations, the increasing complexity in cloud security and its benefits.
Guest Socials: Ely's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:10) A bit about Ely
(02:47) Has Cloud Security become simpler or more complex?
(05:09) How has the threat landscape for cloud evolved?
(08:00) Who is managing all the alerts?
(09:53) What will happen to SOAR?
(11:03) How AI will impact Cloud Security in 2024?
(18:36) Is there a skillset change coming?
(20:06) The Fun Section

Cloud Native Security Strategies for 2024
Is having a CSPM enough for Cloud Security? At RSA Conference 2024, Ashish sat down with returning guest Jimmy Mesta, Co-Founder and CTO of RAD Security, to talk about the complexities of Kubernetes security and why sometimes traditional Cloud Security Posture Management (CSPM) falls short in a Kubernetes-centric world.
We speak about the significance of behavioural baselining, the limitations of signature-based detection, the role of tools like eBPF in enhancing real-time security measures and the importance of proactive security measures and the need for a paradigm shift from reactive alert-based systems to a more silent and efficient operational model.
Guest Socials: Jimmy's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(03:12) A bit about Jimmy Mesta
(03:48) What is Cloud Native Security?
(05:15) How is Cloud Native different to traditional approach?
(07:37) What is eBPF?
(09:12) Why should we care about eBPF?
(11:51) Separating the signal from the noise
(13:48) Challenges on moving to Cloud Native
(15:58) Proactive Security in 2024
(17:02) Whose monitoring Cloud Native alerts?
(23:10) Getting visibility into the complexities of Kubernetes
(24:24) Skillsets and Resources for Kubernetes Security
(27:54) The Fun Section
Resources spoke about the during the interview:

Real-World Cloud Security Challenges and Solutions Explained for 2024
What are the practical steps for orienting yourself in a new cloud environment? Ashish sat down with Rich Mogull and Chris Farris to explore the intricacies of effective cloud security strategies. Drawing on their extensive experience, Rich and Chris speak about critical importance of moving beyond just addressing vulnerabilities and embracing a more comprehensive approach to cloud security.Rich and Chris share their professional experiences and practical advice for anyone who finds themselves "airdropped" into an organization's cloud environment. They also discuss the development of the Universal Threat Actor Model and how it can help prioritize security efforts in a chaotic landscape of constant alerts and threats.
Guest Socials: Rich's Linkedin + Chris's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:26) A bit about Chris Farris
(03:10) A bit about Rich Mogull
(03:45) First Cloud Service they worked on!
(06:27) Where to start in an AWS environment?
(10:50) Cloud Security Threat Landscape
(15:25) Navigating through the CSPM findings
(18:14) Using the Universal Cloud Threat Model
(23:16) How is Cloud Ransomware different?
(25:44) Surprising attacks or compromises in Cloud
(29:43) Where are the CSPM Alerts going?
(36:30) Cloud Security Landscape in 2024
(45:37) The need for Cloud Security training in 2024
(46:58) Good starting point to learn Cloud Security
(52:13) The Fun Section
Resources spoken about during the episode:
The Universal Cloud Threat Model
AWS Customer Security Incidents by Rami McCarthy

Why Least Privilege Matters in Cloud Security?
What's the best way to navigate least privilege complexities in a multi cloud environment? And how is the role of identity management evolving? We spoke to Jeff Moncrief from Sonrai Security on why identity is the new network in the cloud-driven world. We speak about the challenges of implementing least privilege in cloud environments, the misconceptions surrounding identity roles, and the critical importance of segmenting access across public clouds just as rigorously as we did on-premises.
Guest Socials: Jeff's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:59) A bit about Jeff
(03:01) How is identity different in the Cloud?
(05:40) Misconceptions about least priviledge in the cloud
(08:50) Cloud Native solutions for Permission Attack Surface Management
(15:36) Common themes when addressing privilege in Cloud
(17:22) Starting point when dealing with identities
(20:03) Frameworks when working through least privilege
(23:21) Showing ROI on doing least privilege

How is Kubernetes Network Security Evolving?
How is eBPF impacting Kubernetes Network Security? In this episode, recorded LIVE at Kubecon EU Paris 2024, Liz Rice, Chief Open Source Officer at Isovalent took us through the technical nuances of eBPF and its role in enabling dynamic, efficient network policies that go beyond traditional security measures. She also discusses Tetragon, the new subproject under Cilium, designed to enhance runtime security with deeper forensic capabilities. A great conversation for anyone involved in Kubernetes workload management, offering a peek into the future of cloud-native technologies and the evolving landscape of network security.
Guest Socials: Liz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:46) A bit about Liz Rice
(02:11) What is eBPF and Cilium?
(03:24) SC Linux vs eBPF
(04:11) Business use case for Cilium
(06:37) Cilium vs Cloud Managed Services
(08:51) Why was there a need for Tetragon?
(11:20) Business use case for Tetragon
(11:32) Projects related to Multi-Cluster Deployment
(12:45) Where can you learn more about eBPF and Tetragon
(13:50) Hot Topics from Kubecon EU 2024
(15:07) The Fun Section
(15:35) How has Kubecon changed over the years?
Resources spoken about during the interview:

The Future of Software Development with AI
How can we leverage AI for more secure and efficient code and how will it impact devsecops? Ashish spoke to Michael Hanley, CSO and SVP of Engineering at GitHub, about the transformative impact of GitHub Copilot and AI on software development and security. Michael speaks about GitHub's internal use of Copilot for over three years and its role in enhancing developer satisfaction and productivity by removing mundane coding tasks. They speak about the broader implications for DevSecOps, the future of AI in coding, and strategic tips for integrating AI tools within organizations.
Guest Socials: Michael's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(02:19) A bit about Michael Hanley
(04:25) Making Security Easy for Developers
(07:17) What is GitHub Copilot?
(10:01) Whats the Future of AI for Security and Developers?
(13:36) Security Recommendations for using AI
(16:35) How is data stored in GitHub Copilot?
(17:40) How is AI impacting DevSecOps?
(21:50) The balance between Security and Innovation
(24:18) The evolution of education with AI
(27:30) Strategic Approach for CISOs implementing AI Pair Programmers
(30:08) Bridging the gap between Security and Engineering
(34:37) The Fun Questions
Resources spoken about during the episode:
https://resources.github.com/copilot-trust-center/
https://www.github.careers/careers-home