エピソード
-
Many organizations focus on keeping attackers out, but what happens when one gets in? We spoke to Ramesh Ramani, Staff Security Engineer at Block about the real challenge, which is preventing them from leaving with your data. In this episode, Ramesh details the innovative system his team built to automate egress access control at scale, moving beyond traditional, inefficient methods.
Ramesh explains how by establishing "sources of truth" for both internal applications and external partners, they created a centralized governance model. This system uses SPIFFE IDs to understand application identity, validates data-sharing requests against partner approvals, and provides a seamless, self-service experience for developers. Discover how this approach not only enhances security by preventing unauthorized data exfiltration but also improves incident response, allowing them to instantly revoke access to compromised third-party domains.
Guest Socials - Ramesh's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) - Introduction(00:55) - Ramesh Ramani's Journey: From Network Engineer to Cloud Security at Block(02:03) - The "Trapped Thief" Analogy: Why Egress Is a Critical, Overlooked Problem(04:07) - The Trigger for Automation: Why Traditional Egress Security Doesn't Scale(07:36) - The Secret Sauce: Using SPIFFE IDs for Application Identity Across Any Cloud(14:42) - How It Works: Requesting Access & Denying Leaks to Partners like ChatGPT(30:39) - The Foundation: Why You Must Start with a "Source of Truth" for Apps & Partners(31:23) - Incident Response: Instantly Cutting Off Access When a Partner is Compromised(33:58) - Rollout Strategy: How to Implement Egress Controls Without Burdening Other Teams(37:35) - The Fun Section: Tech, Family, RPGs, and the Best Vegetarian Ramen
Resources discussed during the episode:
BSidesSF 2025 - Centralizing Egress Access Controls Across a Hybrid Environment.
-
When you can't protect everything at once, how do you decide what matters most? This episode tackles the core challenge of security prioritization. Geet Pradhan, Senior Security Engineer at Lime joins the podcast to share his framework for building a SecOps plan when you're a small team. Learn why his team made AWS logs their number one priority , how to leverage compliance requirements to guide your strategy , and why he advises starting with a small list of 1-5 critical applications instead of 35. Tune in for a conversation about strategic security for the modern cloud environment.
Guest Socials - Geet's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(00:32) Meet Geet Pradhan: Senior Security Engineer at Lime
(01:17) What is Detection & Response in 2025?
(04:35) Defining the Cloud Detection & Response Pipeline
(09:42) Why SIEM-Only Alerts Don't Work for Remote Teams
(12:02) How to Choose Your First Log Sources
(17:00) Building Security Culture: How to Not Be "The Police"
(22:45) Where to Find Pre-Built Detection Rules & Alerts
(28:38) On-Prem vs. Cloud: Why The Threat Model Is Different
(36:53) Fun Questions
Resources spoken about during the interview:
Geet's BSides SF Talk
Nate Lee - Power of Persuasion
-
エピソードを見逃しましたか?
-
In many organizations, security exception management is a manual process, often treated as a simple compliance checkbox. While necessary, this approach can lead to unmonitored configurations that drift from their approved state, creating inconsistencies in an organization's security posture over time. How can teams evolve this process to support modern development without compromising on security?
In this episode, Ashish Rajan sits down with security expert Santosh Bompally, Cloud Security Engineering Team Lead at Humana to discuss a practical framework for automating exception management. Drawing on his journey from a young tech enthusiast to a security leader at Humana, Santosh explains how to transform this process from a manual task into a scalable, continuously monitored system that enables developer velocity.
Learn how to build a robust program from the ground up, starting with establishing a security baseline and leveraging policy-as-code, certified components, and continuous monitoring to create a consistent and secure cloud environment.
Guest Socials - Santosh's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction(00:39) From Young Hacker to Cybersecurity Pro(02:14) The "Tick Box" Problem with Exception Management(03:17) Exposing Your Threat Landscape: The Risk of Not Automating(05:43) Where Do You Even Start? The First Steps(08:26) VMs vs Containers vs Serverless: Is It Different?(11:15) Building Your Program: Start with a Security Baseline(14:44) What Standard to Follow? (CIS, PCI, HIPAA)(17:20) The Lifecycle of a Control: When Should You Retire One?(19:42) The 3 Levels of Security Automation Maturity(23:25) Do You Need to Be a Coder for GRC Automation?(26:16) Fun Questions: Home Automation, Family & Food
-
In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn about the challenges of building your own AI solutions and how this new approach can eliminate noise and build trust between security and engineering team
Guest Socials - Harry's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction(02:27) Who is Harry Wetherald?(04:45) The "Wall of Red": Why Security Tools Create 90% False Positives(06:21) The Mission: Solving Vulnerability Overload with AI(10:11) How an AI Agent Investigates a Vulnerability(16:09) The Hard Reality of Building Your Own AI Solution(18:14) Building for a Future of Evolving AI Models(20:00) What is the Role of an MCP (AI Copilot)?(27:31) Building AI Agents for Cloud Security(31:25) "Think Like a Hacker": Asking AI to Red Team Your Cloud(33:04) How AI Will Shape Security Programs in 2025 & Beyond(36:20) Fun Questions with Harry
Thank you Maze for sponsoring this episode.
-
AI is reshaping cybersecurity as we know it. From sophisticated AI-driven phishing attacks to the amplified risk of insider threats using tools like Copilot, the landscape is shifting at an unprecedented pace. How can security leaders and practitioners adapt?
Join Ashish Rajan and Matthew Radolec (Varonis) as they explore the critical challenges and opportunities AI presents. Learn why 86% of attacks involve credential misuse and how AI agents are making it easier than ever for non-technical insiders to exfiltrate data.
In this episode, you'll learn about:
The "Blast Radius": How AI tools can dramatically increase data exposure.From "Breaking In" to "Logging In": The dominance of credential-based attacks.AI-Powered Social Engineering: The rise of "conversational bait".Copilot Use Cases & "Aha!" MomentsData Integrity in AI: The critical, overlooked pillar of AI security.The Enduring Importance of Access Management in an AI World.Transforming Security Operations: AI for incident response, playbooks, and forensics.Guest Socials - Matt's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:57) New Threat Landscape in Cloud & AI
(08:08) Use cases for regulated industries
(10:03) Impact of Agentic AI in the cybersecurity space
(12:22) Blind spots of going into AI
(18:06) Shared responsibility for LLM providers
(20:56) Lifting up security programs for AI
(27:82) How is incident response changing with AI?
(29:30) Cybersecurity areas that will be most impacted by AI
(34:43) The Fun Section
Thank you to our episode sponsor Varonis
-
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security.
Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts:
Jackie Bow (Anthropic): Championing the "How to Train Your Dragon" approach, Jackie reveals how we can leverage AI, and even its 'hallucinations,' for advanced threat detection, response, and creative security solutions.Kane Narraway (Canva): Taking the "Knight/Wizard" stance, Kane illuminates the critical challenges in securing AI systems, understanding the new layers of risk, and the complexities of AI threat modeling.🔥 In this episode, we tackle the tough questions:
Is the hype around past 'AI-powered' security justified, or was it "hot garbage"?How can you build effective threat models when AI introduces new, complex failure points?What are the real risks and challenges when implementing AI in production?Can AI tools like 'vibe coding' democratize security, or do they risk deskilling professionals?How can defenders possibly keep pace with AI-driven attacks without fully embracing AI themselves?Exploring the future of AI in both offensive and defensive cybersecurity.Guest Socials - Jackie's Linkedin + Kane's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Intro: Slaying or Training the AI Dragon at BSidesSF?
(03:15) Meet Jackie Bow (Anthropic): Training AI for Security Defense
(03:41) Meet Kane Narraway (Canva): Securing AI Systems & Facing Risks
(04:51) Was Traditional Security Ops "Hot Garbage"? Setting the Scene
(06:32) The Real Risks: What AI Brings to Your Organisation
(07:27) AI in Action: Leveraging AI for Threat Detection & Response
(08:37) AI Hallucinations: Bug, Feature, or Security Blind Spot?
(09:54) Threat Modeling AI: The Core Challenges & Learnings
(13:29) Getting Started: Practical AI Threat Detection First Steps
(17:56) AI & Cloud: Integrating AI into Your Existing Environments
(25:38) AI vs. Traditional: Is Threat Modeling Different Now?
(29:52) Your First Step: Where to Begin with AI Threat Modeling?
(33:17) Fun Questions & Final Thoughts on the Future of AI Security
-
As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier.
In this episode, we unpack the complexities of securing AI, from the fundamental shifts in application architecture to the emerging attack vectors. Discover why Ankur believes "you can only secure AI with AI" and how organizations can prepare for a future where "your imagination is the new limit," but so too are the potential vulnerabilities.
Guest Socials - Ankur's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(00:30) Meet Ankur Shah (CEO, Straiker)
(01:54) Current AI Deployments in Organizations (Copilots & Agents)
(04:48) AI vs. Traditional Security: Why Old Methods Fail for AI Apps
(07:07) AI Application Types: Native, Immigrant & Explorer Explained
(10:49) AI's Impact on the Evolving Cyber Threat Landscape
(17:34) Ankur Shah on Core AI Security Principles (Visibility, Governance, Guardrails)
(22:26) The AI Security Vendor Landscape (Acquisitions & Startups)
(24:20) Current AI Security Practices in Organizations: What's Working?
(25:42) AI Security & Hyperscalers (AWS, Azure, Google Cloud): Pros & Cons
(26:56) What is AI Inference? Explained for Cybersecurity Pros
(33:51) Overlooked AI Attack Surfaces: Hidden Risks in AI Security
(35:12) How to Uplift Your Security Program for AI
(37:47) Rapid Fire: Fun Questions with Ankur Shah
Thank you to this episode's sponsor - Straiker.ai
-
The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security.
Elad shares his insights on how the landscape has shifted, moving beyond the era of CSPM and CNAPP as standalone solutions. We delve into why a cloud-aware Security Operations Center (SOC) is no longer a luxury but a necessity, and what "runtime security" truly means in today's complex, multi-cloud environments.
The conversation also tackles the double-edged sword of Artificial Intelligence, how it’s empowering both attackers with new capabilities and defenders with advanced tools. Elad discusses the critical considerations for organizations undergoing digital transformation, the importance of AI governance, and provides actionable advice for companies at all stages of their cloud adoption journey, from securing code from day one to building holistic visibility across their entire infrastructure.
Guest Socials - Elad's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:38) How has Cloud Security Evolved?
(04:21) Why CNAPP is not enough anymore?
(07:13) What is runtime security?
(07:54) Impact of AI on Cloud Security
(11:41) What to include in your cybersecurity program in 2025?
(16:47) The Fun Section
Thank you to this episode's sponsor - PaloAlto Networks
Resources discussed during the episode:
PaloAlto Networks RSAC Announcement 1
PaloAlto Networks RSAC Announcement 2
-
Dive deep into the key takeaways from RSA Conference 2025 with our expert panel! Join Ashish Rajan, James Berthoty, Chris Hughes, Tanya Janca, and Francis Odum as they dissect the biggest trends, surprises, and "hot takes" from one of the world's largest cybersecurity events.
In this episode, we cover:
Initial reactions and the sheer scale of RSA Conference 2025.Major themes: AI's impact on cybersecurity, especially AppSec, vendor consolidation, the evolution of runtime security, and more.The rise of AI-native applications and how they're reshaping the landscape.Deep dives into Application Security (AppSec), secure coding with AI, and the future of vulnerability management.Understanding runtime security beyond DAST and its critical role.Unexpected insights and surprising takeaways from the conference floor.Guests include:
Chris Hughes – CEO at Aquia & host of Resilient CyberJames Berthoty – Cloud and AppSec engineer, known for sharp vendor analysis and engineering-first content and Latio TechTanya Janca – Founder of She Hacks PurpleFrancis Odum – Founder of Software Analyst Cyber ResearchPodcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction: Unpacking the RSA Conference 2025
(02:20) Meet the Experts: Panelist Introductions
(03:39) RSAC First Impressions: Scale, Excitement & Attendee Numbers
(07:52) Top Themes from RSA Conference 2025
(16:01) AI's Evolution: Native Applications & AppSec's Transformation
(33:30) Demystifying Runtime Security (Beyond DAST)
(40:23) RSA Surprises & Unexpected Takeaways
-
Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig.
Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains. Sergej explains the critical shift from basic posture management (CSPM/CNAPP) towards runtime security, emphasizing the need for an "assume breach" mindset.
Learn about the staggering reality that over 60% of containers now live for less than a minute and the immense challenges this poses for detection, incident response, and forensics.
This episode covers:
The evolution from traditional security to cloud-native and runtime security.Why CNAPP/CSPM is like a map, but runtime security is the essential radar.The complexities of modern incident response with ephemeral workloads.Key strategies for Security Operations Centers (SOC) adapting to the cloud.The importance of visibility, data collection, and tools for hybrid and even air-gapped environments.How AI is starting to aid security operations and forensics.Guest Socials: Sergej Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction: Cloud Security & The One-Minute Container Problem
(01:31) Meet Sergej Epp: 20+ Years in Cybersecurity (Deutsche Bank, Palo Alto, Sysdig)
(02:44) What is Cloud Native Today? From Train Stations to Airports with Drones
(05:34) Runtime Security Explained: Why It's Crucial Now
(11:05) The Evolution of Cloud Security: Beyond Basic Posture Management
(13:49) Incident Response Evolution: Tackling One-Minute Containers
(18:34) Who Needs Runtime Security? Platform Engineers, SOC Teams & More
(21:01) Runtime Security as a Platform: Beyond Detection to Prevention & Insights
(24:45) Cloud Security Program Maturity: From On-Prem to Cloud Native SOC
(29:20) AI in SOC Operations: Speeding Up Forensics & Context
-
Are you struggling to implement robust container security at scale without creating friction with your development teams? In this episode, host Ashish Rajan sits down with Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer, for a masterclass in practical container security. This episode was recorded LIVE at KubeCon EU, London 2025.
In this episode, you'll learn about:
Automating Security Effectively: Moving beyond basic vulnerability scanning to implement comprehensive automationBridging the Security-Developer Gap: Strategies for educating developers, building trust, fostering collaboration, and understanding developer use cases instead of just imposing rules.The "Shift Down" Philosophy: Why simply "Shifting Left" isn't enough, and how security teams can proactively provide secure foundations, essentially "Shifting Down."Leveraging Open Source Tools: Practical discussion around tools like Trivy, Kubeaudit, Dependabot, RenovateBot, TruffleHog, Kube-bench, OPA, and more.The Power of Immutable Infrastructure: Exploring the benefits of using minimal, immutable images to drastically reduce patching efforts and enhance security posture.Understanding Real Risks: Discussing the dangers lurking in default configurations and easily exposed APIs/ports in container environments.Getting Leadership Buy-In: The importance of aligning security initiatives with business goals and securing support from leadership.Guest Socials: Cailyn's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Intro: Container Security at Scale
(01:56) Meet Cailyn Edwards: Kubernetes SIG Security Co-Chair
(03:34) Why Container Security Matters: Risks & Exposures Explained
(06:21) Automating Container Security: From Scans to Admission Controls
(12:19) Essential Container Security Tools (Trivy, OPA, Chainguard & More)
(19:35) Overcoming DevSecOps Challenges: Working with Developers
(21:31) Proactive Security: Shifting Down, Not Just Left
(25:24) Fun Questions with Cailyn
Resources spoken about during the interview:
Cailyn's talk at KubeCon EU 2025
-
In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected.
Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders.
The 3 common ways attackers stay stealthy in AzureWhy read-only enumeration activity often isn’t loggedWhat detection is possible and how to improve itHow conditional access and logging configuration can help defendersWhy understanding Microsoft Graph matters for security opsGuest Socials: Christian's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:09) A bit about Christian
(02:39) What is considered stealthy in Azure?
(04:39) Which services are stealthy in Azure?
(06:25) PIM and Ibiza API
(12:53) The role of Defender for Cloud
(18:04) Does the Stealthy API approach scale?
(19:26) Preventing Stealthy API attacks
(21:49) Best Practices for Prevention in Azure
(25:47) Behaviour Analysis in Azure
(29:31) The Fun Section
Resources spoken about during the interview:
Christian's fwd:cloudsec talk - Staying Sneaky in Microsoft Azure
Christian's Disobey Talk
-
Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team.
Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Google GKE. You’ll hear:
How Confluent manages Kubernetes clusters across cloud providers.Real-world issues encountered during DNS security migration.Deep dives into cloud-specific quirks with Azure’s overlay mode, GKE’s Cilium integration, and AWS’s IP routing limitations.Race conditions, IP tables, reverse path filters, and practical workarounds.Lessons they’d share for any platform team planning a similar move.Guest Socials: Alvaro's Linkedin + Nimisha's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:55) A bit about Alvaro
(02:41) A bit about Nimisha
(03:11) About their Kubecon NA talk
(03:51) The Cilium use case
(05:16) Using Kubernetes Native tools in all 3 cloud providers
(011:41) Lessons learnt from the project
Resources spoken about during the interview
Confluent's Multi-Cloud Journey to Cilium: Pitfalls and Lessons Lea... Nimisha Mehta & Alvaro Aleman
-
The cloud security landscape may have just shifted — and we're here to break it down.
In this special panel episode, host Ashish Rajan is joined by an all-star group of cloud and cybersecurity experts to discuss one of the most important conversations in cloud security today: the changing nature of security architecture, SOC readiness, and how teams must evolve in a multi-cloud world.
Guests include:
Chris Hughes – CEO at Acqui & host of Resilient CyberJames Berthoty – Cloud and AppSec engineer, known for sharp vendor analysis and engineering-first content and Latio TechMike Privette – Founder of Return on Security, expert in cybersecurity economicsFrancis Odum – Founder of Software Analyst Cyber ResearchWe Cover:
Why cloud security is now beyond CSPM and CNAPPThe impact of major market moves on enterprise cloud strategyWhat vendor lock-in really means in a multi-cloud eraHow runtime and real-time security are taking center stageThe rise of AI-SPM and AI-powered SOCsWhat CISOs and practitioners should actually be doing nowPodcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:05) A bit about our panelists
(04:24) Current Cloud Security Landscape
(09:36) Challenges with Multi-Cloud Security
(18:06) Runtime Security for Cloud
(23:34) Can SOC deal with CNAPP Alerts
(26:23) CISO planning their cybersecurity program
(32:38) Regulatory requirements in public sector
(36:27) Success Metrics for Modern Cloud Security Program
-
Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.
Why prevention isn’t enough—and how detection fills the gapThe biggest mistakes in detection rules that could blow up your SOCHow to scale detections across hundreds (or thousands) of cloud accountsThe ROI of Detection as Code—why security leaders should careCommon low-hanging fruit detections every cloud security team should implementDavid has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.
Guest Socials: David's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(03:06) What is Detection as Code?
(03:41) What was before Detection as Code?
(05:36) Business ROI for doing Detection as Code?
(07:49) Building Security Operations in Google Cloud
(12:41) Threat Detection for different type of workload
(14:54) What is Google SecOps?
(20:36) Different kinds of Detection people can create
(24:46) Scaling Detection across many Google Cloud accounts
(28:47) The role of Data Pipeline in Detection
(31:44) Detections people can start with
(34:14) Stages of maturity for detection
(36:43) Skillsets for Detection Engineering
(39:32) The Fun Section
-
In this episode we speak to Nick Jones, an expert in offensive cloud security and Head of Research at WithSecure to expose the biggest security gaps in cloud environments and why CNAPPs and CSPMs alone are not enough often.
How cloud pentesting differs from traditional pentestingWhy CSPMs & CNAPPs don’t tell the full cloud security storyThe biggest cloud attack paths—identity, IAM users, and CI/CDWhy “misconfigurations vs vulnerabilities” is the wrong debateHow organizations should prepare for a cloud pentestWith real-world examples from red team engagements and cloud security research, Nick shares insider knowledge on how attackers target AWS, Azure, and Kubernetes environments—and what security teams can do to stop them.
Guest Socials: Nick's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:40) A bit about Nick Jones
(03:56) How has Cloud Security Evolved?
(05:52) Why do we need pentesting in Cloud Security?
(08:09) Misconfiguration vs Vulnerabilities
(11:04) Cloud Pentesting in Different Environments
(17:05) Impact of Kubernetes Adoption on Offensive Cloud Security
(20:19) Planning for a Cloud Pentest
(29:04) Common Attacks Paths in Cloud
(33:05) Mitigating Common Risk in Cloud
(35:14) What is Detection as Code?
(41:17) Skills for Cloud Pentesting
(45:28) Fun Sections
-
What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape.
What is an AIBOM and why it mattersThe stages of AI adoption: experimentation to optimizationShadow AI: A factor of 10 more than you thinkPractical strategies for pre- and post-deployment securityThe future of AI security with agent swarms and beyondGuest Socials: Bar-El's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:24) A bit about Bar-el
(03:32) What is AIBOM?
(12:58) What is an embedding model?
(16:12) What should Leaders have in their AI Security Strategy?
(19:00) Whats different about the AI Security Landscape?
(23:50) Challenges with integrating security into AI based Applications
(25:33) Has AI solved the disconnect between Security and Developers
(28:39) Risk framework for AI Security
(32:26) Dealing with threats for current AI Applications in production
(36:51) Future of AI Security
(41:24) The Fun Section
-
AWS networking isn’t as simple as it seems and when you’re dealing with regulated industries like healthcare, the stakes are even higher.
In this episode we sit down with Kyler Middleton and Jack W. Harter from Veradigm — who have navigated complex AWS networking challenges while migrating from on-prem data centers to the cloud.
We speak about:
The real struggles of moving from data centers to AWS Why networking can feel like a black box The anti-pattern that surprisingly worked best How to build secure cloud networks—without losing your sanity The hidden security & compliance challenges in healthcare cloud migrationGuest Socials: Kyler's Linkedin + Jack's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(01:55) A bit about Kyler and Jack
(03:18) Security Challenges in Medical Industry
(06:01) Where to start when migrating from data centres to AWS?
(07:42) Networking Challenges for Regulated Industries
(11:26) Networking in On-Prem vs Cloud
(19:24) Security by Design considerations
(29:31) The Terraform pieces
(34:34) Network Firewall in Cloud
(39:46) Lessons learnt from the project
(46:21) The Fun Section
Resources:
Let's Do DevOps - Kyler's Website
Jack's Website
Day Two DevOps - Podcast Co-Hosted by Kyler
-
In this episode, we dive deep into Azure security, incident response, and the evolving cloud threat landscape with Katie Knowles, Security Researcher and former Azure Incident Responder. We spoke about common Azure incident response scenarios you need to prepare for, how identity and privilege escalation work in Azure, how Active Directory and Entra ID expose new risks and what security teams need to know about Azure networking and logging.
Guest Socials: Katie's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:27) A bit about Katie
(03:17) Domain Admin in Azure
(07:03) Common causes of incidents in Azure
(08:53) Identities in Azure
(11:44) Third Party Identities in Azure
(17:34) Azure Networking and Incident Response
(22:35) Common Incidents in Azure
(26:53) AI specific incidents in Azure
(28:45) Privilege escalation in Azure
(39:37) Where to start with Azure Research?
(48:20) The Fun Questions
-
🚀 How do you secure thousands of AWS accounts without slowing down developers? Netflix’s cloud security experts Patrick Sanders & Joseph Kjar join us to break down their identity-first security model and share lessons from scaling security across a massive AWS multi-account environment.
In this episode, we cover:
Why identity, not network, is the best security boundaryThe challenges of least privilege and right-sized accessHow Netflix migrates IAM roles while minimizing disruptionsThe impact of multi-account AWS security strategiesGuest Socials: Patrick's Linkedin +Joseph's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
-Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity Podcast
Questions asked:
(00:00) Introduction
(02:05) A bit about Joseph
(02:32) A bit about Patrick
(02:38) Scaling security across multiple accounts
(03:29) Least Privilege is hard
(06:44) Why go down the identity path?
(08:49) Identity based approach for least privilege
(15:43) Security at scale for Multi Account in AWS
(23:54) Lessons from the project
(27:02) What would be classified as an easy migration?
(30:55) How the project has progressed?
(35:01) Automation Pieces that enabled the project
(37:54) Where to start with scaling security across Multi Accounts?
(39:21) Resource Access Manager and how it fits into migration
Resources discussed in this interview:
Accelerate insights using AWS SDK instrumentation Talk
Patrick and Joseph’s Talk - Netflix's massive multi-account journey: Year two
Joseph and Patrick's previous interview on Cloud Security Podcast
- もっと表示する