11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Jason Carrier, Richard Kenyan, and Christian Mohn for a conversation about the keys to an effective Incident Response plan. They discuss the importance of good communications, how to handle cloud providers, and some of the best and worst examples. This communication needs to be intentional and, once communication paths are defined and tested, the plan should be iterated on constantly.
Private Cloud
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Vince Wood and Asaf Blubshtein for a conversation about the security implications of private cloud infrastructure. They discuss the inherent security of having your own cloud, how it contrasts with public cloud, and if community cloud can be a good middle ground. It’s not hard to be secure in any cloud if you plan ahead and know your business needs.
Penetration Testing
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Martin Edwards, Mike Spanbauer, and Nico Stein for a conversation about the whys and hows of Penetration testing. We discuss how to prioritize pentesting in your own organization, how to properly run tests in someone else’s cloud without getting yourself into trouble, and how to find a good pentesting firm. Make sure you’re not relying on any random provider or any single test.
Detection and Response
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Chris Ray, Amanda Berlin, and Steve Sims for a conversation about detection and response tools. They discuss all the permutations of detect and response tools, what’s necessary for defense in depth, and how much is really just Marketing hype. Define your requirements and you too can become a savvy booth-to-booth hopper who will strategically improve your business’ defenses.
The Human Element
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Bill Gardner, Zoë Rose, and Ryan Laverdiere for a conversation about how humans participate in cybersecurity. They discuss how to prepare employees and the importance of experienced professionals. Criminals want the easy in, so it’s critical that everyone be prepared.
Log Management and Monitoring
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Leon Adato, Amanda Berlin, and Steve Sims for a conversation about Log Management and SIEM technologies. For many organizations, SIEM is about moving forward with compliance or cyber insurance requirements and… not much else. However, when utilized properly, these deep tools provide SOC analysts with actionable insights and data to protect your business. Our panelists discuss the uses of SIEM, what a proper installation in the cloud will look like, and the material ways in which it benefits your security posture.
Data Recovery
11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests David Klee, Cato Grace, and Erik Ableson for a conversation about the importance of recovering data to support cybersecurity and how to handle it differently in the cloud. A security incident is just another disaster waiting to happen, so make sure you plan and practice for it.
Data Protection
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Vic Comacho, and Gina Rosenthal for a conversation about how Data Protection is critical to security. You’ve almost certainly heard that it’s the “last line of defense” in the event of a cybersecurity breach. But what exactly changed between the days of shipping tape backups and now? In fact, the same things that were important back then may have only gotten more so as threat actors grow more sophisticated.
Secure Configuration
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Zoë Rose, Ryan Laverdiere, and John Grange for a conversation about securely configuring the cloud. They discuss how to avoid leaking data, how important it is to change default configurations, and where to find guidance. The takeaway: never, never, never (well, almost never) accept the default configuration settings for your cloud provider workloads.
Identity and Access Management
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Ivan Dwyer, and Chris Williams for a conversation about how users are identified and granted access to applications and data. They discuss the familiar aspects, as well as how it applies to cloud applications and new methodologies. While there are a variety of technologies to assist in getting access management correct at the ground level it all starts with procedure and policy.