Scale to Zero - No Security Questions Left Unanswered

Scale To Zero
undefined
May 7, 2025 • 1h 12min

Minimalist Security: Architecting a Lean & Effective Cloud Strategy | Ft. Lalit Kumar | Ep. 88 | ScaleToZero Podcast

In this insightful episode of the podcast, we speak with a seasoned Senior Cloud Security Consultant and Architect about a unique approach to security: minimalism. We explore how the principles of minimalist living can be applied to build leaner, more effective security strategies in the cloud and beyond.Whether you're a security leader, architect, or cloud enthusiast, this episode offers a fresh perspective on building robust and efficient security strategies.YouTube: https://youtu.be/plqzCwd1rUM00:00 Teaser and Introduction06:45 Minimalist living09:30 Applying the minimalist living approach to security16:30 Do organizations practice the basics of security?24:45 Investing early in security29:40 Balancing local and global security frameworks37:17 Best ways for startups to work with AWS and vice versa42:55 Educating global leaders to work with Indian customers48:50 Maximizing AWS Benefits for Startups56:19 How can India win in cyberspace?01:08:31 Learning recommendations
undefined
Apr 23, 2025 • 52min

Scaling Security Champions: From Zero to Hero | Ft. Bonnie Viteri | Ep. 87 | ScaleToZero Podcast

In this episode of the Scale To Zero podcast, we dive deep into the world of Security Champions with our guest speaker Bonnie Viteri, a seasoned cybersecurity expert. We explore how to build, scale, and maintain a thriving Security Champions program that truly makes a difference.Watch on YouTube: https://youtu.be/3bpNxeKmWugBonnie: https://www.linkedin.com/in/bonniebyer-viteri/ScaleToZero: https://www.scaletozero.com/Cloudanix: https://www.cloudanix.com/Here's what we covered:00:00 Teaser and Introduction03:15 Defining the role of a security champion04:45 Signals to identify a security champion when working with development teams06:00 Real life example of someone turning into an excelent security champion07:50 Why security teams at Yahoo are called paranoids?09:16 How does a security champion evolve over time?11:20 Principles of successful security champions program13:55 Scaling security champions program along with organization's growth16:28 North star for scaling security champions program19:14 Differences in building champions program at startup vr large orgs22:30 Aligning security champions program with business outcomes26:00 Metrics to show alignment and progress of security program28:55 Data driven security champions program for non-believers31:46 Keeping security champions program fresh and relevant34:28 Keeping individual security champions engaged and happy37:50 Tips to prevent burnout39:34 Examples of recognition and appreciation of security champions42:39 Bridging gaps between security teams and other business teams45:45 Challenges of fostering collaboration between security and other business teams48:28 Summary49:27 Learning recommendations
undefined
Apr 9, 2025 • 59min

Securing Production | AWS IAM Security | Best Practices | Ft. Rowan Udell | Ep.87 | Cloudanix

In this episode of the ScaleToZero podcast, we had an insightful conversation with Rowan Udell, an AWS IAM leader and security consultant, about the future of cloud security. We delved into critical topics like prohibiting human access to production accounts, maximizing ROI in IAM and policy management, and the role of Just-In-Time access. We also explored the impact of LLMs on IAM engineering and discussed practical strategies for minimizing attack surfaces in the healthcare industry. This episode is a must-listen for anyone responsible for AWS security and identity management.Watch on YouTube: https://youtu.be/r0eupMDCqB8#cybersecurity AWS #IAM #CloudSecurity #DevSecOps #JustInTimeAccess #LLM #SecurityBestPractices00:00 Teaser and Introduction05:45 Prohibiting human access to production cloud accounts12:00 Recommendations to prohibit human access to production accounts15:30 Strategy to maximize ROI in IAM and Policy Management19:00 Thoughts on the ability to create users and roles at will in the cloud23:19 What is Just-In-Time and its role in the cloud?30:14 Providing secure access to teams in the healthcare industry via IAM38:05 How organizations can keep the attack surface minimum41:51 Common misconfigurations seen with minimal fix44:22 Less-known features of AWS IAM with great impact48:30 Are LLMs a blessing or curse to IAM engineers?51:20 Shift of LLMs that IAM engineers should expect in 202555:35 Summary56:38 Learning recommendations
undefined
Mar 26, 2025 • 53min

The Secrets Of Product Security | Application Security | AppSec | Ft. Anshuman Bhartiya | Ep. 86 ScaleToZero Podcast | Cloudanix

In our latest episode of the ScaleToZero podcast, we had a fascinating conversation with Anshuman Bhartiya, an AppSec Tech Lead and cybersecurity expert. We explored the intricacies of product security, including the challenges of implementation, building a strong security culture, and leveraging AI models for application security.Anshuman shared with us practical tips for balancing user experience with robust security measures and offered valuable recommendations for integrating AI into development processes. A must-listen for anyone invested in application security and the future of secure product development.Transcript: Website: https://scaletozero.com/Cloudanix: https://www.cloudanix.com/#podcast AppSec #ProductSecurity #SDLC #Cybersecurity #GenAI #SecurityCulture00:00 Teaser and Introduction04:19 Defining Product Security07:42 Challenges of implementing security10:28 Balancing the workflow with engineering and security teams with use-case15:38 Tools and processes to build secure SDLC processes19:47 Practical ways to build the right security culture22:45 Balancing user experience and security of a product with an example28:52 Catering to the third-party security ecosystem33:00 Key metrics to measure the effectiveness of the product security program39:11 Use of AI models to secure the application43:12 How GenAI has changed the world of product security46:30 Recommendations to appsec team for integrating AI into dev processes49:39 Summary50:49 Learning recommendations
undefined
Mar 12, 2025 • 1h

The Magical World Of Digital Forensics | Ft. Jason Jordaan | Ep. 85 ScaleToZero Podcast | Cloudanix

Join us for an in-depth conversation with Jason Jordaan, a seasoned Principal Digital Forensics Analyst, as we unravel the complexities of modern digital forensics. In this episode, we have covered topics such as the most common digital evidence, cloud and mobile impact, essential skills, and the DFIR intersection. Whether you're a seasoned professional or just starting, this episode offers valuable insights into the dynamic world of digital forensics.YouTube: https://youtu.be/JPzgCTFm_j000:00 Teaser and Introduction08:55 Most common types of digital evidence encountered in investigations11:30 Impact of cloud computing and mobile devices in the field of digital forensics15:30 Key skills required in digital forensics19:01 Tackling most challenging aspects of digital forensics investigation24:03 Ensuring the chain of custody and authenticity of digital evidence29:05 Is the Digital Forensics job overwhelming33:50 Intersection of Digital Forensics and Incident Response39:45 Practical ways for organizations to investigate threats via digital forensics45:52 Challenges of investigating deepfakes and other forms of AI-generated content51:02 Advice for beginners interested in Digital Forensics57:00 Summary58:03 Learning recommendations on Digital Forensics
undefined
Feb 12, 2025 • 1h 9min

Detection Engineering, Generative AI for Cybersecurity Leaders | Ft. Reanna Schultz | Ep. 84

Join us as we delve into the world of threat detection with our expert guest Reanna Shultz, a renowned security leader and community builder.In this insightful podcast, we explore the critical challenges facing security teams today, including the need for real-time threat detection, the constant evolution of the threat landscape, and the importance of stakeholder buy-in. We also discuss strategies for breaking the detection-reaction cycle, leveraging AI/ML for enhanced detection, and the skills needed to thrive as a future detection engineer. This podcast is a must-watch for anyone interested in cybersecurity, threat intelligence, and the future of security operations.00:00 Teaser and guest introduction06:08 Importance of real-time threat detection in consumer electronics industry11:50 How to detect bad actors?16:07 Challenges faced by security teams to convince stakeholders about security21:14 Creating playbooks for threat detection27:45 Balancing threat detection with false positives in high-volume settings.31:13 Staying current with the fast-paced threat landscape.33:15 How to automate keeping up with the threat landscape?37:21 Breaking the detection-reaction cycle in cybersecurity40:32 Rubrik for SOC analysts to manage their stress levels46:55 Scaling programs to prioritize threat detection50:54 Detection-reaction to insider threats54:27 Tips to involve other business areas in security programs56:41 Impact of ML/AI on threat detection59:30 What does a future detection engineer look like?01:02:50 Is the industry moving to build its own SIEM systems?01:05:05 Summary01:06:55 Reading and learning recommendations from Reanna
undefined
Jan 22, 2025 • 57min

AI, Scams, and Exploiting Human Nature | Ft. Perry Carpenter | Ep.82 | ScaleToZero Podcast

In this insightful podcast, we explore the transformative impact of AI on the cybersecurity landscape. Join us as we discuss how AI can be leveraged to enhance threat detection, improve incident response, and augment human analysts. We also delve into the emerging risks and threats posed by AI, such as deepfakes and AI-powered attacks. Learn about the evolving role of human factors in cybersecurity and the essential skills security professionals need to thrive in an AI-driven world. Threat Modeling: https://www.cloudanix.com/learn/what-is-threat-modeling ScaleToZero website: https://www.scaletozero.com Cloudanix: https://www.cloudanix.com 00:00 Teaser and Introduction 06:40 How can AI be powerful for enhancing security? 11:22 Emerging risks and threats that AI can introduce 14:22 Role of human factors in deepfakes 20:20 How can AI augment human analysts? 26:50 Leveraging AI for prevention and prediction of cyber attacks 28:31 New skills security professionals require in an AI-driven world 30:52 How do cybercriminals exploit humans? 34:00 How should organizations face insider threat attacks? 40:55 Evolving teams from awareness to taking a proactive security approach 44:00 KPIs to measure implemented security practices 48:42 Protecting data from generative AI tools and maintaining data confidentiality 53:58 Summary 54:49 Learning recommendations
undefined
Jan 8, 2025 • 56min

Security Awareness Training | Incident Response Management | Ft. Mauricio Duarte | Ep.82 | Cloudanxi

Join us as we delve into the critical role of security awareness programs in building a strong security posture.In this insightful podcast episode with Mauricio Duarte, our host Purusottam has discussed the challenges faced by security awareness program managers, the importance of tailored training, and effective methods for delivering engaging and impactful training. We also explore incident response best practices, including measuring effectiveness and leveraging incident data for continuous improvement. Finally, we offer valuable advice for managing stress and burnout within security leadership roles. 00:00 Introduction of Mauricio Durate 08:55 Role of security awareness program manager in an organization 10:00 Challenges faced by the security awareness program manager 11:50 Challenges faced in maintaining security awareness program 14:35 Phishing simulation training programs 21:46 Tailoring security programs to different business stakeholders 24:40 Effective methods of delivering security awareness program 27:27 Ensuring the effective of security awareness training programs 30:57 Determining the severity of the Incident 34:24 Ensuring the least threats to organizational assets during an incident 36:14 Leveraging incident response information for deeper analysis 38:24 Measuring the effectiveness of incident response plan 41:55 How can security culture teams and incident response teams go hand-in-hand 45:54 Tips for burnout and stress caused within security leadership roles 51:45 Summary of episode learnings 52:52 Learning recommendations from Mauricio
undefined
Dec 18, 2024 • 1h 14min

From Detection to Recovery | Incident Response Lifecycle | Ft. Giorgio Perticone | Ep.81 | Cloudanix

Join us as we delve into the world of incident response with our guest expert Giorgio Peticone, a seasoned incident detection and response consultant.In this insightful podcast, we explore real-life incident scenarios, key components of a robust incident response plan, and the critical importance of team collaboration and effective communication. Learn valuable lessons from past incidents, discover how to navigate the challenges of shifting from detection to containment, and gain insights into managing stress and burnout within the incident response team. 00:00 Teaser and Introduction 06:30 Real-life experience of a security incident 09:36 Lessons learned from security incidents 12:47 Key components for building an incident response plan 16:51 Testing and validating an incident response plan 23:46 Team collaboration challenges faced during an incident 27:47 Team collaboration challenges before and after an incident has occurred 31:55 Shift from detection to containment 37:35 Challenges faced when shifting focus from detection to containment 42:00 The Most challenging phase of an incident response 44:50 Approaching a client who recently faced an incident 49:35 Role of automation in improving the efficiency of incident response 52:30 Ensuring automation does not compromise security 55:00 Role of Human Analysts in Incident Response 58:08 Managing stress and burnout after an incident response 01:02:14 Advice for upcoming incident response leaders 01:07:07 How not build a detection engineering capability in an organization? 01:09:55 Summary 01:10:50 Learning recommendation from Giorgio ScaleToZero: https://scaletozero.com/ Cloudanix: https://www.cloudanix.com/
undefined
Dec 4, 2024 • 54min

Vulnerability Management | Security Leadership | Ft. Ross Young | Ep.80 | Scale To Zero Podcast

Join us as we delve into the complex world of cybersecurity with our guest Ross Young, a seasoned CISO. In this insightful podcast, we discuss the challenges faced by CISOs, including burnout, leadership, and communication. Learn how to navigate the complexities of cloud security, prioritize vulnerabilities, and stay ahead of emerging threats. We also explore the impact of generative AI on security and the importance of a strong security culture. 00:00 Teaser and Introduction 06:00 73% of CISOs in the world feel burnout 08:03 How to handle burnout 10:27 Where do next-generation CISOs lack? 12:43 Must have leadership skills for CISOs 16:00 Communicating complex problems with different teams 19:40 Implementing cloud security in an organization for the first time CISO 26:27 Major pain points for CISO and Security Leaders 27:55 Generative AI and its Impact on Security 31:22 Vulnerability management program for supply chain security 39:52 Are you prioritizing the right vulnerability? 42:48 Staying on top of emerging vulnerabilities 45:00 Security at government org vs private sectors 47:37 Keeping the right balance between compliance and real risks 50:28 Summary of the podcast 51:45 Learning recommendation from Ross

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app