Posted in: Season 3

Data Security

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Justin Warren, and Jim Czuprynski for a conversation about the most important element in IT: the data. They discuss what businesses should do to protect their data and the people, process, and technology functions it takes. Data security needs to cover everything from protecting emailed spreadsheets to database security.

Posted in: Season 3

Log Management and Monitoring

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Leon Adato, Amanda Berlin, and Steve Sims for a conversation about Log Management and SIEM technologies. For many organizations, SIEM is about moving forward with compliance or cyber insurance requirements and… not much else. However, when utilized properly, these deep tools provide SOC analysts with actionable insights and data to protect your business. Our panelists discuss the uses of SIEM, what a proper installation in the cloud will look like, and the material ways in which it benefits your security posture.

Posted in: Season 3

Malware Defense

11:11 Systems of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Allan Liska, and Christian Mohn for a conversation about malware. Are cyber-criminals still lurking around each corner ready to infect your endpoints with ransomware, or are there new actors in the threat landscape? Should corporate IT still be in charge of security? We also discuss the importance of constant vigilance and DR plans.

Posted in: Season 3

Data Protection

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Vic Comacho, and Gina Rosenthal for a conversation about how Data Protection is critical to security. You’ve almost certainly heard that it’s the “last line of defense” in the event of a cybersecurity breach. But what exactly changed between the days of shipping tape backups and now? In fact, the same things that were important back then may have only gotten more so as threat actors grow more sophisticated.

Posted in: Season 3

Network Defenses

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Tom Hollingsworth, Leon Adato, and Mike Spanbauer for a conversation about a new generation of thinking about security. Many of the same tools still apply, as things like firewalls and micro-segmentation are relevant but may be used in different ways. In the end it comes down to good monitoring and observability to make sure our defenses are performing as expected.

Posted in: Season 3

Secure Configuration

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Zoë Rose, Ryan Laverdiere, and John Grange for a conversation about securely configuring the cloud. They discuss how to avoid leaking data, how important it is to change default configurations, and where to find guidance. The takeaway: never, never, never (well, almost never) accept the default configuration settings for your cloud provider workloads.

Posted in: Season 3

Incident Response

11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Jason Carrier, Richard Kenyan, and Christian Mohn for a conversation about the keys to an effective Incident Response plan. They discuss the importance of good communications, how to handle cloud providers, and some of the best and worst examples. This communication needs to be intentional and, once communication paths are defined and tested, the plan should be iterated on constantly.

Posted in: Season 3

Identity and Access Management

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Ivan Dwyer, and Chris Williams for a conversation about how users are identified and granted access to applications and data. They discuss the familiar aspects, as well as how it applies to cloud applications and new methodologies. While there are a variety of technologies to assist in getting access management correct at the ground level it all starts with procedure and policy.