Incident Response

11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Jason Carrier, Richard Kenyan, and Christian Mohn for a conversation about the keys to an effective Incident Response plan. They discuss the importance of good communications, how to handle cloud providers, and some of the best and worst examples. This communication needs to be intentional and, once communication paths are defined and tested, the plan should be iterated on constantly.

Private Cloud

11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Vince Wood and Asaf Blubshtein for a conversation about the security implications of private cloud infrastructure. They discuss the inherent security of having your own cloud, how it contrasts with public cloud, and if community cloud can be a good middle ground. It’s not hard to be secure in any cloud if you plan ahead and know your business needs.

Penetration Testing

11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Martin Edwards, Mike Spanbauer, and Nico Stein for a conversation about the whys and hows of Penetration testing. We discuss how to prioritize pentesting in your own organization, how to properly run tests in someone else’s cloud without getting yourself into trouble, and how to find a good pentesting firm. Make sure you’re not relying on any random provider or any single test.

Detection and Response

11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Chris Ray, Amanda Berlin, and Steve Sims for a conversation about detection and response tools. They discuss all the permutations of detect and response tools, what’s necessary for defense in depth, and how much is really just Marketing hype. Define your requirements and you too can become a savvy booth-to-booth hopper who will strategically improve your business’ defenses.

Log Management and Monitoring

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Leon Adato, Amanda Berlin, and Steve Sims for a conversation about Log Management and SIEM technologies. For many organizations, SIEM is about moving forward with compliance or cyber insurance requirements and… not much else. However, when utilized properly, these deep tools provide SOC analysts with actionable insights and data to protect your business. Our panelists discuss the uses of SIEM, what a proper installation in the cloud will look like, and the material ways in which it benefits your security posture.

Data Protection

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Vic Comacho, and Gina Rosenthal for a conversation about how Data Protection is critical to security. You’ve almost certainly heard that it’s the “last line of defense” in the event of a cybersecurity breach. But what exactly changed between the days of shipping tape backups and now? In fact, the same things that were important back then may have only gotten more so as threat actors grow more sophisticated.

Secure Configuration

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Zoë Rose, Ryan Laverdiere, and John Grange for a conversation about securely configuring the cloud. They discuss how to avoid leaking data, how important it is to change default configurations, and where to find guidance. The takeaway: never, never, never (well, almost never) accept the default configuration settings for your cloud provider workloads.

Identity and Access Management

11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Ivan Dwyer, and Chris Williams for a conversation about how users are identified and granted access to applications and data. They discuss the familiar aspects, as well as how it applies to cloud applications and new methodologies. While there are a variety of technologies to assist in getting access management correct at the ground level it all starts with procedure and policy.