
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 1 chart position in 1 market.
By chart position
- 🇮🇳IN · Careers#2830K to 100K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
15K to 50K🎙 ~2x weekly·59 episodes·Last published 2d ago - Monthly Reach
Unique listeners across all episodes (30 days)
30K to 100K🇮🇳100% - Active Followers
Loyal subscribers who consistently listen
12K to 40K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 10 epsHost
Recent guests
Recent episodes
Identity for AI agents
May 10, 2026
Unknown duration
The future of CISO
Apr 11, 2026
44m 01s
AI agents and the future of cyber
Mar 11, 2026
48m 45s
From GTA to MFA
Nov 8, 2025
45m 03s
CISO burnout and boardroom truths
Sep 1, 2025
40m 22s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 5/10/26 | ![]() Identity for AI agents | AI agents are moving from answering questions to taking action. That changes everything for identity and access management.In this episode, Ken Huang joins Matt to break down why traditional IAM was not built for agentic AI, where service accounts and OAuth scopes fall short, and what CISOs should do now to govern agents before they hit production at scale.Episode LinksKen's substackKen's paper from 2011 on AI (he was way ahead!)NIST AI RMF | — | ||||||
| 4/11/26 | ![]() The future of CISO✨ | CISO rolecareer transitions+3 | Michael Piacente | NISTHitch Partners+2 | — | CISOcybersecurity+5 | — | 44m 01s | |
| 3/11/26 | ![]() AI agents and the future of cyber✨ | cybersecurityAI+4 | Kelly Bissell | AIUCCloud Security Alliance+1 | — | cybersecurityAI agents+5 | — | 48m 45s | |
| 11/8/25 | ![]() From GTA to MFA✨ | cybersecuritycareer transition+3 | Nicole Dove | Riot Games | — | cybersecurityfinance+5 | — | 45m 03s | |
| 9/1/25 | ![]() CISO burnout and boardroom truths✨ | CISO burnoutcybersecurity+4 | Rinki Sethi | Upwind Security | — | CISOcybersecurity+5 | — | 40m 22s | |
| 7/14/25 | ![]() Iron Maiden and cloud security✨ | cybersecuritycloud security+3 | Toni De La Fuente | ProwlerIron Maiden | — | cybersecuritycloud security+5 | — | 45m 36s | |
| 5/29/25 | ![]() Navigating identity security✨ | identity securityshadow IT+5 | Bel Lepe | CerbyOoyala | — | identity securityshadow IT+8 | — | 34m 08s | |
| 4/22/25 | ![]() The human side of cyber✨ | leadershipempathy+4 | Tammy Klotz | Leading with Empathy and Grace | — | cyber leadershipempathy+4 | — | 46m 10s | |
| 3/23/25 | ![]() Principles in cyber leadership✨ | cyber leadershipmentorship+3 | MK Palmore | Marine CorpsFBI+1 | — | leadershipcybersecurity+4 | — | 42m 58s | |
| 2/23/25 | ![]() Rethinking security awareness✨ | cybersecuritysecurity culture+3 | Lance Spitzner | Honeynet Project | — | cybersecurityHoneynet Project+5 | — | 45m 45s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 1/20/25 | ![]() Dr. Zero Trust on zero trust✨ | zero trustcybersecurity+4 | Dr. Chase Cunningham | — | — | zero trustcybersecurity+5 | — | 36m 10s | |
| 12/20/24 | ![]() Cybersecurity compensation 2025 | Send a textIn this conversation, Steve Martano discusses his journey from writing about baseball analytics to becoming a key player in cybersecurity executive search and strategy. He emphasizes the evolving role of CISOs, the importance of aligning with business objectives, and the need for strong leadership skills. The discussion also covers trends in CISO compensation, the mental health challenges faced by security leaders, and the significance of organizational culture in driving satisfaction and effectiveness in cybersecurity roles.The Latest CISO Compensation Trends & Benchmarks.TakeawaysUnderstanding economics can enhance a CISO's effectiveness.Compensation data must be contextualized for accurate benchmarking.Low attrition doesn't always indicate job satisfaction.CISOs face increasing pressures and scope creep in their roles.The job market is expected to become more active in 2025.Chapters00:00 The Journey from Baseball to Cybersecurity05:53 The Intersection of Leadership and Cybersecurity12:00 Mental Health and Satisfaction Among CISOs17:49 Preparing for Future Attrition in Cybersecurity Roles26:29 Engagement and Satisfaction Beyond Compensation32:13 The Evolving Role of Cybersecurity Leadership38:15 Mentorship and Professional GrowthThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 11/20/24 | ![]() LLMs: risks, rewards, and realities | Send a textNate Lee discusses his transition from a CISO role to fractional CISO work, emphasizing the importance of variety and exposure in his career. He delves into the rise of AI, particularly large language models (LLMs), and the associated security concerns, including prompt injection risks. Nate highlights the critical role of orchestrators in managing AI interactions and the need for security practitioners to adapt to the evolving landscape. He shares insights from his 20 years in cybersecurity and offers recommendations for practitioners to engage with AI responsibly and effectively.TakeawaysNate transitioned to fractional CISO work for variety and exposure.Prompt injection is a major vulnerability in LLM systems.Orchestrators are essential for managing AI interactions securely.Security practitioners must understand how LLMs work to mitigate risks.Nate emphasizes the importance of human oversight in AI systems.Link to Nate's research with the Cloud Security Alliance.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 10/20/24 | ![]() Tackling cyber & AI in the boardroom | Send a textSummaryIn this conversation, Chris Hetner discusses the evolving role of boards of directors in cybersecurity, emphasizing the need for improved communication and understanding of cyber risks. He highlights the challenges boards face in adapting to new SEC rules and the importance of leveraging AI responsibly. Hetner also shares insights on tools for quantifying cyber risk and prioritizing investments while advocating for continuous learning and proactive engagement with board members.TakeawaysBoards are becoming more aware of cybersecurity risks.Cybersecurity discussions often receive limited airtime in board meetings.The SEC's new disclosure rules can drive more frequent discussions on cyber risk.AI governance is crucial as AI technologies become more prevalent.Collaboration with general counsel and risk officers is essential.Chapters00:00 Introduction and Background on Cybersecurity and Boards03:05 Current Challenges Facing Boards in Cybersecurity06:11 Understanding Cyber Risk and Communication with Boards08:58 Improving Board Engagement with Cybersecurity11:56 Leveraging SEC Guidelines for Cyber Risk Discussions15:02 The Role of AI in Cybersecurity Governance18:05 Tools for Quantifying Cyber Risk21:12 Prioritizing Cybersecurity Investments24:02 The Importance of AI Governance26:57 Staying Informed in Cybersecurity30:13 Final Thoughts and Continuous LearningThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 9/22/24 | ![]() Attracting and retaining cyber talent | Send a textMeg Anderson, the CISO at Principal Financial Group, discusses her 17-year tenure as a CISO and the factors contributing to her long-term success. She attributes her longevity to her passion for the job and the opportunities for growth and development at Principal. Meg emphasizes the importance of understanding the business impact of cybersecurity and holding people accountable. She also highlights the significance of focusing on the basics of cybersecurity and not getting caught up in the latest trends. Meg shares her experience with mentorship and its role in her career. She also discusses the programs implemented at Principal to attract and retain cyber talent, such as a formal mentorship program and a robust internship program.TakeawaysPassion for the job and naivete can contribute to long-term success as a CISO.Understanding the business impact of cybersecurity and holding people accountable is crucial.Focusing on the basics of cybersecurity is essential, rather than getting caught up in the latest trends.Mentorship plays a significant role in career development.Taking time away from work is essential for personal growth and avoiding burnout.Chapters00:00 Introduction and Long-Term Success as a CISO03:15 The Importance of Naivete and Passion06:34 The Role of Mentorship10:54 Attracting and Retaining Cyber Talent12:50 Organizing a Cyber Youth Summit21:13 Building a Cyber Program Around Company Culture28:07 Focusing on the Basics of Cybersecurity36:19 Personal Growth and Parting WordsThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 8/20/24 | ![]() Microsoft 365 incident response | Send a textPurav Desai is a Microsoft 365 incident responder at a large financial institution (name withheld to protect the innocent). He shares his journey and expertise in the field. He explains how his early exposure to Microsoft security solutions and their constant innovation led him to specialize in 365 security and incident response. He discusses the importance of mentors and influential figures in his career, highlighting the lessons he learned from them. He then dives into his popular project, Deciphering UAL (Unified Audit Logs), which aims to make sense of the complex logs in Microsoft 365. Purav shares an incident response scenario involving a banking Trojan and how he used telemetry and logging to investigate and remediate the issue. He concludes by discussing effective threat detection methods in Microsoft 365, including threat hunting with KQL and leveraging Zero-Hour Auto-Purge (ZAP) to prevent the spread of attacks. In our conversation, we dive into:How specializing in Microsoft 365 security and incident response can be a wise choice due to the constant innovation and market demand for Microsoft solutions.How having mentors and influential figures in your career can provide valuable guidance and inspire you to push yourself and try new things.His personal project, Deciphering UAL (Unified Audit Logs), aims to make sense of the complex logs in Microsoft 365, providing insights for digital forensics and incident response.How proper licensing and logging configuration are crucial for effective incident response.How native tools like Purview Audit and eDiscovery provide valuable insights for forensic analysis.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 5/6/24 | ![]() Bonus: AI and data security | Send a textEpisode SummaryOn this episode, Global Head of InfoSec and GRC Strategy at VMWare, Ashish Suri, joins the show to discuss data security and AI. Ashish has over 20 years of experience in business transformation, cybersecurity, data privacy, and enterprise risk management. He has served in numerous roles, including Head for Data Risk, Privacy, and Cybersecurity at Apple, Head of Technology Process and Controls at PayPal, and Senior Director of Finance Internal Controls at Visa.Today, Ashish talks about the distinction between data secrecy and data security, data security in the Cloud, and the business benefits of investing in data security. How does AI fit into security? Hear about cost-effective risk mitigation strategies and the evolving DSPM space, and get Ashish’s formula for personal growth. Timestamp Segments· [01:33] Ashish’s role at Apple.· [04:27] Data secrecy vs data security.· [07:20] Data security in the Cloud.· [09:30] Ashish’s approach to data security.· [13:53] What does a business get out of data security?· [17:34] The CIA Triad.· [21:39] AI and Cloud security.· [24:24] AI in cybersecurity products.· [27:59] Cost-effective risk mitigation strategies.· [30:49] Wading through the DSPM space.· [35:15] Ashish’s growth formula.· [37:06] Being humble.· [38:00] Ashish’s parting words. Notable Quotes· “The more we are out there in the Cloud, the larger our footprint becomes, and the risk continues multiplying in different directions.”· “Speed, accuracy, and automation will also get complimented with people, process, and technology.”· “Keep learning and keep listening.” Relevant LinksWebsite: Bedrock Security | — | ||||||
| 4/22/24 | ![]() The art of security transformation | Send a textEpisode SummaryOn this episode, CISO at Palo Alto Networks, Niall Browne, joins the show to talk about Security, Cloud, and AI. Before joining Palo Alto Networks, he served as the CSO of Cloud platforms for the past sixteen years, including as the CSO and CTO at Workday.Today, Niall talks about his journey starting in the early days of the Internet, his work during Palo Alto’s shift to Cloud and now AI, and how to keep track of risk with automation. How can teams do more with less? Hear about how to communicate risk to company board members, the usefulness of Gen AI, and the cyber skills shortage. Timestamp Segments· [01:39] Niall’s Bank of Ireland experience.· [05:07] How did the early internet catch Niall’s attention?· [08:56] What is Niall most proud of?· [11:34] Palo Alto’s shift to Cloud.· [16:43] Overcoming resistance to the shift.· [22:53] Keeping a pulse on risk.· [28:07] Communicating risk to boards.· [33:46] Doing More With Less.· [38:00] How does Gen AI make processes better?· [41:27] The cyber skills shortage.· [47:04] Niall’s personal growth formula. Notable Quotes· “More with less is key.”· “Hiring the right skill set is very difficult.” Relevant LinksWebsite: www.paloaltonetworks.comLinkedIn: Niall Browne Resources:Doing More with Less: The Case for SOC Consolidation.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 1/20/24 | ![]() The Talent Shortage That Doesn’t Exist | Send a textEpisode SummaryOn this episode, Best Selling author of Cyber for Builders and blogger Ross Haleliuk joins the show to talk about his writing on the cybersecurity industry. Ross is active in the cybersecurity ecosystem as a startup advisor and angel investor, currently leading the VIS Angel Syndicate. He often writes about cybersecurity, security investment, growth, and building security startups on TechCrunch, in other leading industry media, and in his blog, Venture in Security, read by tens of thousands of security leaders every month.Today, Ross talks about the usefulness of apprenticeship programs and the impact of AI on the talent shortage. What makes the talent shortage a qualitative issue? Hear about AI and cybersecurity problem-solving, Ross’s recently released book, and how Ross stays sharp (and fit). Timestamp Segments· [02:23] Pivoting into cybersecurity.· [08:20] The role of project manager.· [11:24] The BISO role.· [13:41] The talent shortage as a qualitative issue.· [23:58] Apprenticeship programs.· [30:51] Qualitative vs quantitative talent shortage.· [33:15] The impact of AI.· [39:06] AI in cybersecurity.· [41:54] What is Ross writing about next?· [43:12] How Ross stays sharp. Notable Quotes· “A lot of problems in cybersecurity are not unique to the space.”· “It is difficult to find an entry-level job in the technology space, period.”· “There is a shortage of senior talent, but there is also an oversupply of junior talent.” Relevant LinksLinkedIn: Ross Haleliuk Resources:ventureinsecurity.netThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 12/20/23 | ![]() 30 years in cybersecurity | Send a textEpisode SummaryOn this episode, InfoSec veteran, Aaron Turner, joins the show to talk about everything from Cloud to AI. Over the past three decades, Aaron has served as Security Strategist at Microsoft, Co-Founder and CEO of RFinity, Co-Founder and CEO of Terreo, VP of Security Products R&D at Verizon, Founder and CEO of Hotshot Technologies, Founder and CEO of Siriux, Faculty Member of IANS, Board Member at HighSide, President and Board Member of IntegriCell, and most recently as CISO at a large infrastructure player.Today, Aaron talks about the critical decisions that led to his success, the findings in his IANS research, and the importance of physical vs logical separation in home networks. What are the things that are lacking in current AI services? Hear about the security applications of behavioral AI, Aaron’s approach as he gets back into industry, and what it takes for Aaron to remain sharp. Timestamp Segments· [02:49] Getting started.· [10:53] Aaron’s keys to success.· [16:40] Aaron’s IANS research.· [20:42] Physical vs logical separation.· [24:19] Top mistakes that customers make.· [26:56] Real-world AI applications.· [32:13] Thinking about AI and risk.· [36:15] What’s missing in the current AI services?· [40:46] Getting back into the industry.· [45:22] How does Aaron stay sharp? Notable Quotes· “Get deep in something.”· “Make sure you put yourself in situations where people expect you to be sharp.” Relevant LinksLinkedIn: Aaron Turner. Resources:www.iansresearch.comThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 9/21/23 | ![]() SBOMs: Good but less than a silver bullet | Send a textEpisode SummaryOn today’s episode, Senior Advisor and Strategist at the Cybersecurity and Infrastructure Security Agency, Allan Friedman, joins Matt to discuss SBOMs. As Senior Advisor and Strategist at CISA, Allan coordinates the global cross-sector community efforts around software bill of materials (SBOM). He was previously the Director of Cybersecurity Initiatives at NTIA, leading pioneering work on vulnerability disclosure, SBOM, and other security topics.Before joining the Federal government, Friedman spent over a decade as a noted information security and technology policy scholar at Harvard’s Computer Science Department, the Brookings Institution, and George Washington University’s Engineering School.He is the co-author of the popular text Cybersecurity and Cyberwar: What Everyone Needs to Know, has a C.S. degree from Swarthmore College, and a Ph.D. from Harvard University.Today, Allan talks about SBOMs and their adoption in non-security industries, Secure by design and secure by default tactics, and how to make software security second nature. What, exactly, is the SBOM? Hear about how SBOMs could’ve helped against significant attacks, the concept of antifragility, and why vulnerability disclosure programs are so important. Timestamp Segments· [02:27] Allan’s career path.· [05:10] Allan’s day-to-day.· [06:15] What has been most rewarding?· [08:00] SBOMs in non-security startups.· [10:50] Real-world examples of Secure by Design tactics.· [17:30] Will software security ever seem obvious to us?· [19:30] What is the SBOM, and will it solve all our problems?· [23:41] Could an SBOM have helped against the SolarWinds attack?· [27:52] Memory-safe programming languages.· [30:16] Misconceptions around Secure by Design, Secure by Default.· [32:00] The importance of vulnerability disclosure programs.· [35:37] Antifragility in cybersecurity.· [41:47] VEX.· [44:29] How to get involved with CISA.· [48:00] How does Allan stay sharp? Notable Quotes· “Sometimes, organizations need a good excuse to do the right thing.”· “It is bananas that software that we use, and pay for, still delivers with it not just the occasional vulnerability, but very real risks that require massive investments from customers.”· “When tech vendors make important logging information available for free, everyone wins.”· “The SB in SBOM doesn’t stand for Silver Bullet.” Relevant LinksEmail: sbom@cisa.dhs.govWebsite: www.cisa.govLinkedIn: Allan Friedman Resources:Open Source Security PodcastRisky Business PodcastThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 5/21/23 | ![]() Accelerating security maturity | Send a textEpisode SummaryOn this episode, AWS Security Practice Manager, Chad Lorenc, joins Matt to talk about Cloud Security. Chad has spent over 20 years building and implementing security programs for numerous organizations, ranging from global Fortune 500 infrastructure teams to billion-dollar financial institutions. He has previously served as Senior Infrastructure Security Architect at Keysight Technologies, President of Montana Chapter, and Information Security and Risk Management Infrastructure Architect at Agilent Technologies.Today, Chad talks about the roadmap to security maturity, security best practices, and benchmarking assessments. Why doesn’t AWS necessarily hire people with Cloud skills? Hear about The Five Pillars, when Cloud security goes wrong, CISO reporting Cloud security, and Chad’s formula for personal growth. Timestamp Segments· [01:24] A bit about Chad.· [03:13] Chad’s role at AWS.· [04:03] Transitioning to AWS.· [08:30] AWS doesn’t hire for Cloud skills.· [10:41] Where to start.· [13:54] Assessment benchmarking.· [15:09] Getting to security maturity.· [19:17] The Five Pillars.· [24:21] Cloud security gone wrong.· [32:14] The Cloud Center of Excellence.· [35:15] Reporting Cloud security maturity.· [40:54] Chad’s formula for personal growth.· [44:50] Chad’s words of wisdom. Notable Quotes· “There’s no algorithm for compressing security experience.”· “Figuring out how to integrate Cloud into your operational processes and technology is key.”· “The key to growing fast is to prioritize ruthlessly.” Relevant LinksWebsite: aws.amazon.com Resources:awsfundamentals.comThe future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 3/21/23 | ![]() Book review: CISO Evolution | Send a textOn this episode, the Founder of CISO Evolution LLC, Matthew Sharp, joins Matt to talk about his book, CISO Evolution. Prior to founding CISO Evolution LLC, Matt served as a strategic advisor to CISOs of Fortune 500 and global institutions. He holds a Bachelor of Science (BS) in Electrical and Computer Engineering from the University of Colorado and a Master of Business Administration (MBA) from Colorado State University. Matt is a co-author of "The CISO Evolution: Business Knowledge for Cybersecurity Executives."Today, Matthew talks about his 2012 sabbatical, walking the Camino de Santiago, and the CISO Evolution book. Why does process matter more than analysis? Hear about value creation, business negotiations, and Matthew’s formula for personal growth.Timestamp Segments· [02:06] A bit about Matthew.· [04:30] Matthew’s sabbatical & the Camino de Santiago.· [09:21] What prompted the book?· [12:23] Why does process matter more than analysis?· [19:08] Did Matthew’s MBA lead him down this path?· [24:22] Value creation.· [27:40] Standard metrics.· [31:23] Why is it important for a CISO to know terms?· [33:32] Negotiations and decision-making.· [37:19] What’s Matthew’s formula for personal growth?· [41:12] Matthew’s words of wisdom. Notable Quotes· “If you want to be in the room where it happens, then you have to be equipped to participate in the conversation.”· “Ask the questions that go unasked.”· “Don’t be afraid to go and look like an idiot in front of another business stakeholder.”The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 1/21/23 | ![]() SEC-retly Telling All: The New Cyber-Disclosure Rules | Send a textEpisode SummaryOn this episode, Matt speaks with Senior Executive, Board Director, and leader in Cybersecurity, risk management, and regulatory compliance, Chris Hetner about cybersecurity and the newly-proposed SEC cybersecurity rules. With over 25 years of experience in the cybersecurity space, Chris has served in roles including as Senior Cybersecurity Advisor to the Chairman at the SEC, Managing Director of Information Security Operations at GE Capital, and SVP Information Security at Citi.Today, Chris talks about understanding the proposed cybersecurity rules, defining materiality, and the importance of focusing on cyber-resilience. Where does the Cloud come into it? Hear about the cost of cyberattacks, the core risk exposures, and Chris’s formula to personal growth. Timestamp Segments· [02:47] Chris’s proudest moments.· [10:00] The new proposed rules.· [14:26] Defining materiality.· [23:56] Bridging the language gap.· [32:14] Focusing on cyber-resilience.· [35:36] Cybersecurity expertise on the board.· [41:27] The cloud.· [45:32] The formula to personal growth. Notable Quotes· “Ransomware extortion is relatively insignificant relative to the overall cost of the event.”· “You can’t outsource the risk.”· “Realize that you’re not always the smartest person in the room.”· “We don’t know it all, and we never will.”The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
| 10/21/22 | ![]() What Serverless Can Do For You | Send a textWhat Serverless Can Do For You? With Mark GouldEpisode SummaryOn this episode, Cloud Security Engineer at Manhattan Associates, Mark Gould, joins Matt to talk about serverless computing. Mark is a Cybersecurity specialist, with a focus on the Google Cloud Platform, and is a Certified Google Architect.Today, Mark talks about serverless computing, the security risk to consider, and working with DevOps teams. What are the top three metrics to start with for automation and security? Hear about cloud automation, Mark’s NSG alerting system, and his greatest accomplishments in recent years. Timestamp Segments· [01:22] About Mark.· [02:49] About Manhattan Associates.· [04:46] How does cloud fit in?· [06:16] Automation in the cloud.· [09:03] Modernization at Manhattan Associates.· [10:18] Serverless computing.· [14:39] Security risks with using serverless functions.· [17:58] Mark’s NSG alerting system.· [21:27] Three metrics for automation and security.· [23:33] What should security teams be doing differently when working with DevOps?· [25:43] What is Mark most proud of?· [27:45] How does Mark continue to learn?· [30:31] Is Manhattan Associates hiring? Notable Quotes· “You definitely have to pick what kind of processes you want to automate and make sure that you’re willing to put in the work to maintain them.”· “Sometimes serverless isn’t always the cheapest option.”· “Leaders are learners.” Relevant LinksManhattan Associates: https://www.manh.comLinkedIn: https://www.linkedin.com/in/mark-gould-15a7a3149The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. | — | ||||||
Showing 25 of 60
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.

