loader from loading.io

Cloud Security Part 2

CISO Dojo

Release Date: 05/04/2021

From Reverse Engineering Malware to CISO show art From Reverse Engineering Malware to CISO

CISO Dojo

Lenny is the CISO at , which is a cybersecurity tech company. Lenny has also helped build anti-malware software at an innovative startup and oversaw security services at a Fortune 500 technology company. He has also lead the consulting practice at a leading cloud services provider. Lenny is also a Fellow Instructor at SANS and is the primary author of .  Lennny maintains a popular malware analysis tool kit called as well. REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community....

info_outline
Cloud Security Part 2 show art Cloud Security Part 2

CISO Dojo

In this episode we discuss concerns with security in the cloud that organizations need to be aware of. Moving to the cloud doesn't automatically mean it's more secure. We'll take a look at the CIS Controls and how you can implement them in a cloud environment to better secure your networks and data. The topics discussed in this episode are: Malware Defenses in the Cloud Limiting Network Protocol Ports and Services Cloud Security Data Recovery Capabilities Cloud Security Configurations

info_outline
Cloud Security show art Cloud Security

CISO Dojo

In this episode we discuss concerns with security in the cloud that organizations need to be aware of. Moving to the cloud doesn't automatically mean it's more secure. We'll take a look at the CIS Controls and how you can implement them in a cloud environment to better secure your networks and data.

info_outline
Cyberstalking show art Cyberstalking

CISO Dojo

Stalking- What is it, exactly? And, more importantly, what do you do if it happens to you? What are the steps you can take and how can you understand ways to better protect yourself? What are the avenues for reporting stalking? How has technology impacted stalking and what can we do, as a society, to keep these behaviors from perpetuating?  National Resources:  (1-800-799-SAFE)     Local Resources:           Stalking definition: The Department of Justice defines stalking as "A perpetrator engaging in a course of conduct directed at a...

info_outline
Data Governance show art Data Governance

CISO Dojo

Data governance is a huge undertaking when you don't build it in at the start. In this episode Stacy and Joe discuss data governance programs, the NIST Privacy Framework, and how to build a successful data governance program.

info_outline
The Birth Of a CISO show art The Birth Of a CISO

CISO Dojo

This week's episode acts as a follow up to provide answers to your burning questions following the interview of our special guest, Gordon Rudd of Stone Creek Coaching, who trains and coaches aspiring and current CISO's.    But, how do you know if you want to be a CISO. Heck- What is a CISO? It's in the name, right?    How do we know exactly what a Chief Information Security Officer is? Does the definition change between organizations? Are the expectations the same?    Listen as Joe and Stacy give the ins and outs of what it takes to get the title, what to...

info_outline
From Fortran to CISO to Executive Coaching show art From Fortran to CISO to Executive Coaching

CISO Dojo

Gordon Rudd joins us for this week's episode of the podcast. Gordon Rudd is a former CISO, executive coach, author, keynote speaker, and teacher with Stone Creek Coaching. Gordon founded the CISO Mentoring Project in 2012 and is an engaged mentor to many aspiring and active CISOs around the world. He founded Stone Creek Coaching in 2019 to help create world-class, cybersecurity leaders. Gordon is a regular instructor with (ISC)2 an international, nonprofit association for information security leaders, creating educational videos, leading educational events, and creating content for their...

info_outline
My Path in Information Security: Stacy Dunn show art My Path in Information Security: Stacy Dunn

CISO Dojo

In this episode of CISO Dojo, Stacy outlines how she broke through into the field of Information Technology, and, subsequently, Cyber Security. How does one connect the dots from being a Retail Store Manager with an Associate's in Fine Arts to becoming an aspiring Security Engineer with one of the world's largest security companies? Stained shirts and socks with sandals, that's how! What...? Wait just a minute...? Yeah, that's right! But, what does that have to do with IT!? Listen for the full story, down to the dirty details, and gain some insights in how to better build yourself up to...

info_outline
My Path in Information Security show art My Path in Information Security

CISO Dojo

This episode starts a new series about non traditional paths to information security. This series will post every Monday when we don't have a guest on the show. In this series we will look at ways to get into information security and how to progress in your career.  This pilot starts out with my own path in information security from auto technician, to CISO, to consultant.

info_outline
Risk Assessments, Frameworks, and Approaches show art Risk Assessments, Frameworks, and Approaches

CISO Dojo

Risk Assessments are the topic for this episode of the CISO Dojo Podcast. What is a risk assessment: The identification, evaluation, and estimation of the levels of risks involved in a situation, with comparisons against benchmarks or standards, and determination of an acceptable level of risk. There are two types of risk assessments we discuss […]

info_outline
 
More Episodes

In this episode we discuss concerns with security in the cloud that organizations need to be aware of. Moving to the cloud doesn't automatically mean it's more secure.

We'll take a look at the CIS Controls and how you can implement them in a cloud environment to better secure your networks and data.

The topics discussed in this episode are:

  1. Malware Defenses in the Cloud
  2. Limiting Network Protocol Ports and Services
  3. Cloud Security Data Recovery Capabilities
  4. Cloud Security Configurations