RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
RSA Conference Podcasts
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Tech guru and veteran CNBC and Bloomberg journalist Eric Chemi takes on modern business and what it takes to break through from a journalist’s perspective. It’s all about being assertive (!!) in a way that wins friends and nurtures relationships – what we at Bospar have branded “Politely Pushy”. From CEOs, founders and investors, to IT experts, luminaries, and other interesting sorts, Eric delivers straight talk in a relaxed “let’s have coffee” conversation that’s interesting, fast-paced, an ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
The ThreatReal Podcast covers Information Security news, events, and trends in cybersecurity with a technical focus. Join hosts Matt Scheurer and Micah K. Brown as they dig deep into the threats impacting enterprise environments and home networks. Discussion topics around threats include the actors, the hunting, the intelligence, the modeling, and more! Visit us online at https://threatreel.com
…
continue reading

1
Courage and Resilience : Getting it, Keeping it, and Growing it
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16Jennifer Leggio will discuss her RSAC(TM) 2025 Conference session on how it's critical that practitioners find ways to unlock courage, in the right ways, at the right times. This podcast will show every attendee how to turn their dulcet roar into a grand one, and change the trajectory of their cyber careers, and they will be given a clear format on…
…
continue reading

1
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
…
continue reading

1
How Red Teamers Are Exposing Flaws in AI Pipelines
41:46
41:46
Play later
Play later
Lists
Like
Liked
41:46Send us a text Prolific bug bounty hunter and Offensive Security Lead at Toreon, Robbe Van Roey (PinkDraconian), joins the MLSecOps Podcast to break down how he discovered RCEs in BentoML and LangChain, the risks of unsafe model serialization, and his approach to red teaming AI systems. Full transcript, video, and links to episode resources availab…
…
continue reading

1
Guide to Hybrid Cloud & Bare Metal Secret Management
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Is your organization struggling with secret management across bare metal, hybrid, and multi-cloud environments? Standard cloud-native tools often fall short when you need a single, standardized solution that bridges all your infrastructure. Dan Popescu, Senior Site Reliability Engineer at Booking.com joins us to share how they built a cloud-agnosti…
…
continue reading

1
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Cyber threat intelligence (CTI) is no longer just a technical stream of indicators or a feed for security operations center teams. In this episode, Ryan Patrick, Vice President at HITRUST; John Salomon, Board Member at the Cybersecurity Advisors Network (CyAN); Tod Beardsley, Vice President of Security Research at runZero; Wayne Lloyd, Federal Chie…
…
continue reading

1
"Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27Many organizations focus on keeping attackers out, but what happens when one gets in? We spoke to Ramesh Ramani, Staff Security Engineer at Block about the real challenge, which is preventing them from leaving with your data. In this episode, Ramesh details the innovative system his team built to automate egress access control at scale, moving beyo…
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading

1
Securing AI for Government: Inside the Leidos + Protect AI Partnership
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Send us a text On this episode of the MLSecOps Podcast, Rob Linger, Information Advantage Practice Lead at Leidos, join hosts Jessica Souder, Director of Government and Defense at Protect AI, and Charlie McCarthy to explore what it takes to deploy secure AI/ML systems in government environments. Full transcript, video, and links to episode resource…
…
continue reading

1
Prioritizing Cloud Security: How to Decide What to Protect First
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08When you can't protect everything at once, how do you decide what matters most? This episode tackles the core challenge of security prioritization. Geet Pradhan, Senior Security Engineer at Lime joins the podcast to share his framework for building a SecOps plan when you're a small team. Learn why his team made AWS logs their number one priority , …
…
continue reading

1
Migrating from “Tick Box" Compliance to Automating GRC in a Multi-Cloud World
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48In many organizations, security exception management is a manual process, often treated as a simple compliance checkbox. While necessary, this approach can lead to unmonitored configurations that drift from their approved state, creating inconsistencies in an organization's security posture over time. How can teams evolve this process to support mo…
…
continue reading

1
Using AI Agents to Solve Cloud Vulnerability Overload
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09In this episode, Ashish Rajan talks with Harry Wetherald, Co-Founder & CEO of Maze, about the reality of modern vulnerability management. They explore why current tools like CNAPPs can generate up to 90% false positives and how AI agents can provide a real solution by thinking like a security engineer to identify genuine, exploitable threats. Learn…
…
continue reading

1
The Human Firewall: People-First Cybersecurity
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and hum…
…
continue reading
Send us a text Jason Haddix, CEO of Arcanum Information Security, joins the MLSecOps Podcast to share his methods for assessing and defending AI systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/holistic-ai-pentesting-playbook. Thanks for checking out the MLSecOps Podcast! Get involved with th…
…
continue reading

1
Unmasking the Risks of Generative AI Deception
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Generative AI is revolutionizing content creation, from news to entertainment. But as AI tools create increasingly realistic text, images, and video, the line between truth and fiction blurs. This podcast episode dives into the critical ethical and security challenges posed by deceptive generative AI. Tune in to explore the implications and potenti…
…
continue reading

1
Adapting to New Threats, Copilot Risks & The Future of Data (Feat. Matthew Radolec, Varonis)
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31AI is reshaping cybersecurity as we know it. From sophisticated AI-driven phishing attacks to the amplified risk of insider threats using tools like Copilot, the landscape is shifting at an unprecedented pace. How can security leaders and practitioners adapt? Join Ashish Rajan and Matthew Radolec (Varonis) as they explore the critical challenges an…
…
continue reading
Welcome to AI University! At Bospar, we understand that AI isn’t going anywhere. So instead of resisting, we are embracing AI and leveraging the power it holds to help us do our jobs better. Courtney Merolle and Kyle Ankney, our professors at AI University, join Eric Chemi to talk through how we thoughtfully leverage AI in our day-to-day operations…
…
continue reading
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
…
continue reading
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security. Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts: Jackie B…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
AI Agent Security: Threats & Defenses for Modern Deployments
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Send us a text Researchers Yifeng (Ethan) He and Peter Rong join host Madi Vorbrich to break down their paper "Security of AI Agents." They explore real-world AI agent threats, like session hijacks and tool-based jailbreaks, and share practical defenses, from sandboxing to agent-to-agent protocols. Full transcript with links to resources available …
…
continue reading

1
CYBERSECURITY for AI: The New Threat Landscape & How Do We Secure It?
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43As Artificial Intelligence reshapes our world, understanding the new threat landscape and how to secure AI-driven systems is more crucial than ever. We spoke to Ankur Shah, Co-Founder and CEO of Straiker about navigating this rapidly evolving frontier. In this episode, we unpack the complexities of securing AI, from the fundamental shifts in applic…
…
continue reading

1
Mental Health Awareness Month: How Bospar Supports Its Employees
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30At Bospar, we’ve been proudly remote before it was trendy, but working from anywhere doesn’t mean escaping the pressures of PR. In this Mental Health Awareness Month episode of Politely Pushy, we get candid about the unique mental health challenges of remote communications professionals. From always-on expectations to navigating digital burnout, we…
…
continue reading

1
Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve.…
…
continue reading

1
Cloud Security Evolved: From CNAPP to AI Threats
19:16
19:16
Play later
Play later
Lists
Like
Liked
19:16The world of cloud security is evolving at breakneck speed. Are traditional tools and strategies enough to combat the sophisticated threats of tomorrow? In this episode, we're joined by Elad Koren, Vice President of Product Management from Palo Alto Networks, to explore the dynamic journey of cloud security. Elad shares his insights on how the land…
…
continue reading

1
Beyond Learning to Code: How to Get Kids Curious About Cybersecurity
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04As technology evolves, it's hard to imagine what the cybersecurity workforce of the future will look like. What skills will they need, what new roles will emerge? Regardless of 'what,' the industry will need, they will need a human workforce. So how can the practitioners, parents, and educators inspire curiosity in young people so that they see cyb…
…
continue reading
Send us a text Part 2 with Gavin Klondike dives into autonomous AI agents—how they really work, the attack paths they open, and practical defenses like least-privilege APIs and out-of-band auth. A must-listen roadmap for anyone building—or defending—the next generation of AI applications. Full transcript with links to resources available at https:/…
…
continue reading

1
RSA Conference 2025 Recap: Top Themes, Actionable Insights & Future Trends
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52Dive deep into the key takeaways from RSA Conference 2025 with our expert panel! Join Ashish Rajan, James Berthoty, Chris Hughes, Tanya Janca, and Francis Odum as they dissect the biggest trends, surprises, and "hot takes" from one of the world's largest cybersecurity events. In this episode, we cover: Initial reactions and the sheer scale of RSA C…
…
continue reading
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
…
continue reading

1
Beyond Prompt Injection: AI’s Real Security Gaps
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Choosing the Right Social Media Platforms for B2B Success
43:48
43:48
Play later
Play later
Lists
Like
Liked
43:48In this episode, we dive into the world of social media marketing for B2B businesses. With so many platforms to choose from, how do you know which ones will give you the best ROI? We break down the top social media channels for B2B companies, highlighting their unique benefits, potential drawbacks, and strategies for leveraging each platform to bui…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
Mindset: Modern SOC Strategies for Cloud & Kubernetes (Ft Sergej Epp. Ex-Deutsche Bank)
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01Join Ashish Rajan in this episodeas he dives deep into the evolving world of cloud security with Sergej Epp, formerly of Deutsche Bank and Palo Alto Networks, now with Sysdig. Discover why traditional security approaches fall short in today's dynamic cloud-native environments, where workloads resemble swarms of drones rather than predictable trains…
…
continue reading

1
Green is the New Office: Sustainability & the WFH Revolution
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39This Earth Day, we're diving into how the work-from-home movement is reshaping our environmental impact. Bospar Principal, Curtis Sparrer, joins Eric Chemi to examine how companies can implement sustainable practices that benefit both the environment and their bottom line.By Eric Chemi
…
continue reading

1
Game Plans and Playbooks: Building and Implementing a Cybersecurity Strategy
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16Christina Morillo, Head of Information Security at the National Football League’s New York Giants joins Ann on this week's episode of Afternoon Cyber Tea. Christina discusses the ins and outs of building a resilient cybersecurity strategy, the importance of entering organizations with curiosity—not checklists—and why listening is always her first s…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
Scaling Container Security Without Slowing Developers
28:13
28:13
Play later
Play later
Lists
Like
Liked
28:13Are you struggling to implement robust container security at scale without creating friction with your development teams? In this episode, host Ashish Rajan sits down with Cailyn Edwards, Co-Chair of Kubernetes SIG Security and Senior Security Engineer, for a masterclass in practical container security. This episode was recorded LIVE at KubeCon EU,…
…
continue reading

1
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean Martin
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
…
continue reading

1
Unpacking the Cloud Security Alliance AI Controls Matrix
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53Send us a text In this episode of the MLSecOps Podcast, we sit down with three expert contributors from the Cloud Security Alliance’s AI Controls Matrix working group. They reveal how this newly released framework addresses emerging AI threats—like model poisoning and adversarial manipulation—through robust technical controls, detailed implementati…
…
continue reading

1
The Power of Contributed Content: Crafting Stories That Resonate with Your Audience
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36As part of a comprehensive content strategy, contributed content, such as bylines or op-eds, is a powerful tool that builds credibility and carves out a space for your voice within your industry. In this episode of Politely Pushy, Bospar Chief Content Officer Paula Bernier and Content Director Joann Whitcher join Eric Chemi to analyze the effective…
…
continue reading

1
How Attackers Stay Hidden Inside Your Azure Cloud
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27In this episode, Ashish sits down with Christian Philipov, Principal Security Consultant at WithSecure, to explore the stealth tactics threat actors are using in Azure and why many of these go undetected. Christian breaks down the lesser-known APIs like Ibiza and PIM, how Microsoft Graph differs from legacy APIs, and what this means for defenders. …
…
continue reading

1
Public Relations in the Tech Industry: Building Relationships with the Media
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18Whether you’re just beginning your career in media relations or trying to garner media attention for your company’s latest announcement, don’t skip this episode of Politely Pushy! Tune in with Bospar media experts Brent Shelton, Ryan Quintana, and Eric Chemi as they offer insights into the unique challenges of tech PR and strategies for building st…
…
continue reading

1
Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for cybersecurity and relentless dedication to learning and marketing helped him build an independent media…
…
continue reading
The cybersecurity industry is in a constant state of flux, presenting both challenges and opportunities for professionals at all levels. Staying ahead requires more than technical skills; it demands strategic thinking and ability to stay relevant. In this talk we will share my insights about the future of the industry and how you can find a place t…
…
continue reading

1
From Pickle Files to Polyglots: Hidden Risks in AI Supply Chains
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21Send us a text Join Keith Hoodlet from Trail of Bits as he dives into AI/ML security, discussing everything from prompt injection and fuzzing techniques to bias testing and compliance challenges. Full transcript with links to resources available at https://mlsecops.com/podcast/from-pickle-files-to-polyglots-hidden-risks-in-ai-supply-chains Thanks f…
…
continue reading

1
How Confluent Migrated Kubernetes Networking Across AWS, Azure & GCP
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32Ever tried solving DNS security across a multi-cloud, multi-cluster Kubernetes setup? In this episode recorded live at KubeCon, Ashish chats with Nimisha Mehta and Alvaro Aleman from Confluent's Kubernetes Platform Team. Together, they break down the complex journey of migrating to Cilium from default CNI plugins across Azure AKS, AWS EKS, and Goog…
…
continue reading

1
Third Party & Vendor Risk Management: The Program Committee's Perspective
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09With RSAC™ 2025 Conference just around the corner, join us for a sneak peek into the Third Party & Vendor Risk Management track. We're thrilled to welcome the program committee for this track as we preview the key themes and trends emerging from this year's submissions. The committee will share their perspectives on the critical insights and valuab…
…
continue reading

1
Guiding the Guide: Influence in Crisis Mode
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33This Podcast explores the essential skills needed to effectively influence leadership during a crisis. It begins by exploring different roles of crisis management and attendees will learn the importance of understanding what motivates the stakeholders and how aligning with these priorities enhances influence and explores the importance of building …
…
continue reading

1
The New Future of Cloud Security: Vendor Lock-In, Runtime, and SOC Readiness
51:35
51:35
Play later
Play later
Lists
Like
Liked
51:35The cloud security landscape may have just shifted — and we're here to break it down. In this special panel episode, host Ashish Rajan is joined by an all-star group of cloud and cybersecurity experts to discuss one of the most important conversations in cloud security today: the changing nature of security architecture, SOC readiness, and how team…
…
continue reading

1
Building Resilient Security Teams with Ryan Field
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Ryan Field, Executive Vice President & Chief Information Security Officer at Bank of Hawaii joins Ann on this week's episode of Afternoon Cyber Tea. With over two decades of experience in IT and cybersecurity, Ryan shares his approach to security leadership; and the importance of fostering collaboration and diverse perspectives. He discusses the un…
…
continue reading