11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Bill Gardner, Zoë Rose, and Ryan Laverdiere for a conversation about how humans participate in cybersecurity. They discuss how to prepare employees and the importance of experienced professionals. Criminals want the easy in, so it’s critical that everyone be prepared.
Data Security
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Justin Warren, and Jim Czuprynski for a conversation about the most important element in IT: the data. They discuss what businesses should do to protect their data and the people, process, and technology functions it takes. Data security needs to cover everything from protecting emailed spreadsheets to database security.
Log Management and Monitoring
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Leon Adato, Amanda Berlin, and Steve Sims for a conversation about Log Management and SIEM technologies. For many organizations, SIEM is about moving forward with compliance or cyber insurance requirements and… not much else. However, when utilized properly, these deep tools provide SOC analysts with actionable insights and data to protect your business. Our panelists discuss the uses of SIEM, what a proper installation in the cloud will look like, and the material ways in which it benefits your security posture.
Data Recovery
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests David Klee, Cato Grace, and Erik Ableson for a conversation about the importance of recovering data to support cybersecurity and how to handle it differently in the cloud. A security incident is just another disaster waiting to happen, so make sure you plan and practice for it.
Malware Defense
11:11 Systems of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Allan Liska, and Christian Mohn for a conversation about malware. Are cyber-criminals still lurking around each corner ready to infect your endpoints with ransomware, or are there new actors in the threat landscape? Should corporate IT still be in charge of security? We also discuss the importance of constant vigilance and DR plans.
Data Protection
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Vic Comacho, and Gina Rosenthal for a conversation about how Data Protection is critical to security. You’ve almost certainly heard that it’s the “last line of defense” in the event of a cybersecurity breach. But what exactly changed between the days of shipping tape backups and now? In fact, the same things that were important back then may have only gotten more so as threat actors grow more sophisticated.
Network Defenses
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Tom Hollingsworth, Leon Adato, and Mike Spanbauer for a conversation about a new generation of thinking about security. Many of the same tools still apply, as things like firewalls and micro-segmentation are relevant but may be used in different ways. In the end it comes down to good monitoring and observability to make sure our defenses are performing as expected.
Secure Configuration
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Zoë Rose, Ryan Laverdiere, and John Grange for a conversation about securely configuring the cloud. They discuss how to avoid leaking data, how important it is to change default configurations, and where to find guidance. The takeaway: never, never, never (well, almost never) accept the default configuration settings for your cloud provider workloads.
Incident Response
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Jason Carrier, Richard Kenyan, and Christian Mohn for a conversation about the keys to an effective Incident Response plan. They discuss the importance of good communications, how to handle cloud providers, and some of the best and worst examples. This communication needs to be intentional and, once communication paths are defined and tested, the plan should be iterated on constantly.
Identity and Access Management
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Ivan Dwyer, and Chris Williams for a conversation about how users are identified and granted access to applications and data. They discuss the familiar aspects, as well as how it applies to cloud applications and new methodologies. While there are a variety of technologies to assist in getting access management correct at the ground level it all starts with procedure and policy.