11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Leon Adato, Amanda Berlin, and Steve Sims for a conversation about Log Management and SIEM technologies. For many organizations, SIEM is about moving forward with compliance or cyber insurance requirements and… not much else. However, when utilized properly, these deep tools provide SOC analysts with actionable insights and data to protect your business. Our panelists discuss the uses of SIEM, what a proper installation in the cloud will look like, and the material ways in which it benefits your security posture.
Data Recovery
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests David Klee, Cato Grace, and Erik Ableson for a conversation about the importance of recovering data to support cybersecurity and how to handle it differently in the cloud. A security incident is just another disaster waiting to happen, so make sure you plan and practice for it.
Malware Defense
11:11 Systems of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Allan Liska, and Christian Mohn for a conversation about malware. Are cyber-criminals still lurking around each corner ready to infect your endpoints with ransomware, or are there new actors in the threat landscape? Should corporate IT still be in charge of security? We also discuss the importance of constant vigilance and DR plans.
Data Protection
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Vic Comacho, and Gina Rosenthal for a conversation about how Data Protection is critical to security. You’ve almost certainly heard that it’s the “last line of defense” in the event of a cybersecurity breach. But what exactly changed between the days of shipping tape backups and now? In fact, the same things that were important back then may have only gotten more so as threat actors grow more sophisticated.
Network Defenses
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Tom Hollingsworth, Leon Adato, and Mike Spanbauer for a conversation about a new generation of thinking about security. Many of the same tools still apply, as things like firewalls and micro-segmentation are relevant but may be used in different ways. In the end it comes down to good monitoring and observability to make sure our defenses are performing as expected.
Secure Configuration
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Zoë Rose, Ryan Laverdiere, and John Grange for a conversation about securely configuring the cloud. They discuss how to avoid leaking data, how important it is to change default configurations, and where to find guidance. The takeaway: never, never, never (well, almost never) accept the default configuration settings for your cloud provider workloads.
Incident Response
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Jason Carrier, Richard Kenyan, and Christian Mohn for a conversation about the keys to an effective Incident Response plan. They discuss the importance of good communications, how to handle cloud providers, and some of the best and worst examples. This communication needs to be intentional and, once communication paths are defined and tested, the plan should be iterated on constantly.
Identity and Access Management
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Ivan Dwyer, and Chris Williams for a conversation about how users are identified and granted access to applications and data. They discuss the familiar aspects, as well as how it applies to cloud applications and new methodologies. While there are a variety of technologies to assist in getting access management correct at the ground level it all starts with procedure and policy.
Secure Connectivity
Rob Stabile, Tom Hollingsworth, and Trevor Pott join Brian Knudtson to talk about Connectivity, how it’s changed in recent years, and what is the most important aspect: Connectivity, security, locality, scale, or a careful balance all of them? And how does IT get there?
Vulnerability Management
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests James Charter, Cristian Sandescu, and Andrew Green for a conversation about the state of vulnerability management. They talk about the various aspects of vulnerability management and prioritization based on your business needs. With over 4000 vulnerabilities discovered in 2021, it is no easy task to keep up with all of the patching and remediation efforts.