

Scale to Zero - No Security Questions Left Unanswered
Scale To Zero
We know security is challenging, but a timely understanding of security is far more challenging! Scale to Zero is built for all the security professionals for helping them to be more privacy and security-sensitive. With this show, we hope to address all the security-related issues that are challenging to understand and resolve without the help of experts. We believed that a community space like Scale to Zero would make things a little bit simpler for everyone after we discovered the discomfort of constantly switching back and forth.
Episodes
Mentioned books

May 7, 2025 • 1h 12min
Minimalist Security: Architecting a Lean & Effective Cloud Strategy | Ft. Lalit Kumar | Ep. 88 | ScaleToZero Podcast
In this insightful episode of the podcast, we speak with a seasoned Senior Cloud Security Consultant and Architect about a unique approach to security: minimalism. We explore how the principles of minimalist living can be applied to build leaner, more effective security strategies in the cloud and beyond.Whether you're a security leader, architect, or cloud enthusiast, this episode offers a fresh perspective on building robust and efficient security strategies.YouTube: https://youtu.be/plqzCwd1rUM00:00 Teaser and Introduction06:45 Minimalist living09:30 Applying the minimalist living approach to security16:30 Do organizations practice the basics of security?24:45 Investing early in security29:40 Balancing local and global security frameworks37:17 Best ways for startups to work with AWS and vice versa42:55 Educating global leaders to work with Indian customers48:50 Maximizing AWS Benefits for Startups56:19 How can India win in cyberspace?01:08:31 Learning recommendations

Apr 23, 2025 • 52min
Scaling Security Champions: From Zero to Hero | Ft. Bonnie Viteri | Ep. 87 | ScaleToZero Podcast
In this episode of the Scale To Zero podcast, we dive deep into the world of Security Champions with our guest speaker Bonnie Viteri, a seasoned cybersecurity expert. We explore how to build, scale, and maintain a thriving Security Champions program that truly makes a difference.Watch on YouTube: https://youtu.be/3bpNxeKmWugBonnie: https://www.linkedin.com/in/bonniebyer-viteri/ScaleToZero: https://www.scaletozero.com/Cloudanix: https://www.cloudanix.com/Here's what we covered:00:00 Teaser and Introduction03:15 Defining the role of a security champion04:45 Signals to identify a security champion when working with development teams06:00 Real life example of someone turning into an excelent security champion07:50 Why security teams at Yahoo are called paranoids?09:16 How does a security champion evolve over time?11:20 Principles of successful security champions program13:55 Scaling security champions program along with organization's growth16:28 North star for scaling security champions program19:14 Differences in building champions program at startup vr large orgs22:30 Aligning security champions program with business outcomes26:00 Metrics to show alignment and progress of security program28:55 Data driven security champions program for non-believers31:46 Keeping security champions program fresh and relevant34:28 Keeping individual security champions engaged and happy37:50 Tips to prevent burnout39:34 Examples of recognition and appreciation of security champions42:39 Bridging gaps between security teams and other business teams45:45 Challenges of fostering collaboration between security and other business teams48:28 Summary49:27 Learning recommendations

Apr 9, 2025 • 59min
Securing Production | AWS IAM Security | Best Practices | Ft. Rowan Udell | Ep.87 | Cloudanix
In this episode of the ScaleToZero podcast, we had an insightful conversation with Rowan Udell, an AWS IAM leader and security consultant, about the future of cloud security. We delved into critical topics like prohibiting human access to production accounts, maximizing ROI in IAM and policy management, and the role of Just-In-Time access. We also explored the impact of LLMs on IAM engineering and discussed practical strategies for minimizing attack surfaces in the healthcare industry. This episode is a must-listen for anyone responsible for AWS security and identity management.Watch on YouTube: https://youtu.be/r0eupMDCqB8#cybersecurity AWS #IAM #CloudSecurity #DevSecOps #JustInTimeAccess #LLM #SecurityBestPractices00:00 Teaser and Introduction05:45 Prohibiting human access to production cloud accounts12:00 Recommendations to prohibit human access to production accounts15:30 Strategy to maximize ROI in IAM and Policy Management19:00 Thoughts on the ability to create users and roles at will in the cloud23:19 What is Just-In-Time and its role in the cloud?30:14 Providing secure access to teams in the healthcare industry via IAM38:05 How organizations can keep the attack surface minimum41:51 Common misconfigurations seen with minimal fix44:22 Less-known features of AWS IAM with great impact48:30 Are LLMs a blessing or curse to IAM engineers?51:20 Shift of LLMs that IAM engineers should expect in 202555:35 Summary56:38 Learning recommendations

Mar 26, 2025 • 53min
The Secrets Of Product Security | Application Security | AppSec | Ft. Anshuman Bhartiya | Ep. 86 ScaleToZero Podcast | Cloudanix
In our latest episode of the ScaleToZero podcast, we had a fascinating conversation with Anshuman Bhartiya, an AppSec Tech Lead and cybersecurity expert. We explored the intricacies of product security, including the challenges of implementation, building a strong security culture, and leveraging AI models for application security.Anshuman shared with us practical tips for balancing user experience with robust security measures and offered valuable recommendations for integrating AI into development processes. A must-listen for anyone invested in application security and the future of secure product development.Transcript: Website: https://scaletozero.com/Cloudanix: https://www.cloudanix.com/#podcast AppSec #ProductSecurity #SDLC #Cybersecurity #GenAI #SecurityCulture00:00 Teaser and Introduction04:19 Defining Product Security07:42 Challenges of implementing security10:28 Balancing the workflow with engineering and security teams with use-case15:38 Tools and processes to build secure SDLC processes19:47 Practical ways to build the right security culture22:45 Balancing user experience and security of a product with an example28:52 Catering to the third-party security ecosystem33:00 Key metrics to measure the effectiveness of the product security program39:11 Use of AI models to secure the application43:12 How GenAI has changed the world of product security46:30 Recommendations to appsec team for integrating AI into dev processes49:39 Summary50:49 Learning recommendations

Mar 12, 2025 • 1h
The Magical World Of Digital Forensics | Ft. Jason Jordaan | Ep. 85 ScaleToZero Podcast | Cloudanix
Join us for an in-depth conversation with Jason Jordaan, a seasoned Principal Digital Forensics Analyst, as we unravel the complexities of modern digital forensics. In this episode, we have covered topics such as the most common digital evidence, cloud and mobile impact, essential skills, and the DFIR intersection. Whether you're a seasoned professional or just starting, this episode offers valuable insights into the dynamic world of digital forensics.YouTube: https://youtu.be/JPzgCTFm_j000:00 Teaser and Introduction08:55 Most common types of digital evidence encountered in investigations11:30 Impact of cloud computing and mobile devices in the field of digital forensics15:30 Key skills required in digital forensics19:01 Tackling most challenging aspects of digital forensics investigation24:03 Ensuring the chain of custody and authenticity of digital evidence29:05 Is the Digital Forensics job overwhelming33:50 Intersection of Digital Forensics and Incident Response39:45 Practical ways for organizations to investigate threats via digital forensics45:52 Challenges of investigating deepfakes and other forms of AI-generated content51:02 Advice for beginners interested in Digital Forensics57:00 Summary58:03 Learning recommendations on Digital Forensics

Feb 12, 2025 • 1h 9min
Detection Engineering, Generative AI for Cybersecurity Leaders | Ft. Reanna Schultz | Ep. 84
Join us as we delve into the world of threat detection with our expert guest Reanna Shultz, a renowned security leader and community builder.In this insightful podcast, we explore the critical challenges facing security teams today, including the need for real-time threat detection, the constant evolution of the threat landscape, and the importance of stakeholder buy-in. We also discuss strategies for breaking the detection-reaction cycle, leveraging AI/ML for enhanced detection, and the skills needed to thrive as a future detection engineer. This podcast is a must-watch for anyone interested in cybersecurity, threat intelligence, and the future of security operations.00:00 Teaser and guest introduction06:08 Importance of real-time threat detection in consumer electronics industry11:50 How to detect bad actors?16:07 Challenges faced by security teams to convince stakeholders about security21:14 Creating playbooks for threat detection27:45 Balancing threat detection with false positives in high-volume settings.31:13 Staying current with the fast-paced threat landscape.33:15 How to automate keeping up with the threat landscape?37:21 Breaking the detection-reaction cycle in cybersecurity40:32 Rubrik for SOC analysts to manage their stress levels46:55 Scaling programs to prioritize threat detection50:54 Detection-reaction to insider threats54:27 Tips to involve other business areas in security programs56:41 Impact of ML/AI on threat detection59:30 What does a future detection engineer look like?01:02:50 Is the industry moving to build its own SIEM systems?01:05:05 Summary01:06:55 Reading and learning recommendations from Reanna

Jan 22, 2025 • 57min
AI, Scams, and Exploiting Human Nature | Ft. Perry Carpenter | Ep.82 | ScaleToZero Podcast
In this insightful podcast, we explore the transformative impact of AI on the cybersecurity landscape. Join us as we discuss how AI can be leveraged to enhance threat detection, improve incident response, and augment human analysts.
We also delve into the emerging risks and threats posed by AI, such as deepfakes and AI-powered attacks. Learn about the evolving role of human factors in cybersecurity and the essential skills security professionals need to thrive in an AI-driven world.
Threat Modeling: https://www.cloudanix.com/learn/what-is-threat-modeling
ScaleToZero website: https://www.scaletozero.com
Cloudanix: https://www.cloudanix.com
00:00 Teaser and Introduction
06:40 How can AI be powerful for enhancing security?
11:22 Emerging risks and threats that AI can introduce
14:22 Role of human factors in deepfakes
20:20 How can AI augment human analysts?
26:50 Leveraging AI for prevention and prediction of cyber attacks
28:31 New skills security professionals require in an AI-driven world
30:52 How do cybercriminals exploit humans?
34:00 How should organizations face insider threat attacks?
40:55 Evolving teams from awareness to taking a proactive security approach
44:00 KPIs to measure implemented security practices
48:42 Protecting data from generative AI tools and maintaining data confidentiality
53:58 Summary
54:49 Learning recommendations

Jan 8, 2025 • 56min
Security Awareness Training | Incident Response Management | Ft. Mauricio Duarte | Ep.82 | Cloudanxi
Join us as we delve into the critical role of security awareness programs in building a strong security posture.In this insightful podcast episode with Mauricio Duarte, our host Purusottam has discussed the challenges faced by security awareness program managers, the importance of tailored training, and effective methods for delivering engaging and impactful training. We also explore incident response best practices, including measuring effectiveness and leveraging incident data for continuous improvement. Finally, we offer valuable advice for managing stress and burnout within security leadership roles.
00:00 Introduction of Mauricio Durate
08:55 Role of security awareness program manager in an organization
10:00 Challenges faced by the security awareness program manager
11:50 Challenges faced in maintaining security awareness program
14:35 Phishing simulation training programs
21:46 Tailoring security programs to different business stakeholders
24:40 Effective methods of delivering security awareness program
27:27 Ensuring the effective of security awareness training programs
30:57 Determining the severity of the Incident
34:24 Ensuring the least threats to organizational assets during an incident
36:14 Leveraging incident response information for deeper analysis
38:24 Measuring the effectiveness of incident response plan
41:55 How can security culture teams and incident response teams go hand-in-hand
45:54 Tips for burnout and stress caused within security leadership roles
51:45 Summary of episode learnings
52:52 Learning recommendations from Mauricio

Dec 18, 2024 • 1h 14min
From Detection to Recovery | Incident Response Lifecycle | Ft. Giorgio Perticone | Ep.81 | Cloudanix
Join us as we delve into the world of incident response with our guest expert Giorgio Peticone, a seasoned incident detection and response consultant.In this insightful podcast, we explore real-life incident scenarios, key components of a robust incident response plan, and the critical importance of team collaboration and effective communication. Learn valuable lessons from past incidents, discover how to navigate the challenges of shifting from detection to containment, and gain insights into managing stress and burnout within the incident response team.
00:00 Teaser and Introduction
06:30 Real-life experience of a security incident
09:36 Lessons learned from security incidents
12:47 Key components for building an incident response plan
16:51 Testing and validating an incident response plan
23:46 Team collaboration challenges faced during an incident
27:47 Team collaboration challenges before and after an incident has occurred
31:55 Shift from detection to containment
37:35 Challenges faced when shifting focus from detection to containment
42:00 The Most challenging phase of an incident response
44:50 Approaching a client who recently faced an incident
49:35 Role of automation in improving the efficiency of incident response
52:30 Ensuring automation does not compromise security
55:00 Role of Human Analysts in Incident Response
58:08 Managing stress and burnout after an incident response
01:02:14 Advice for upcoming incident response leaders
01:07:07 How not build a detection engineering capability in an organization?
01:09:55 Summary
01:10:50 Learning recommendation from Giorgio
ScaleToZero: https://scaletozero.com/
Cloudanix: https://www.cloudanix.com/

Dec 4, 2024 • 54min
Vulnerability Management | Security Leadership | Ft. Ross Young | Ep.80 | Scale To Zero Podcast
Join us as we delve into the complex world of cybersecurity with our guest Ross Young, a seasoned CISO.
In this insightful podcast, we discuss the challenges faced by CISOs, including burnout, leadership, and communication. Learn how to navigate the complexities of cloud security, prioritize vulnerabilities, and stay ahead of emerging threats. We also explore the impact of generative AI on security and the importance of a strong security culture.
00:00 Teaser and Introduction
06:00 73% of CISOs in the world feel burnout
08:03 How to handle burnout
10:27 Where do next-generation CISOs lack?
12:43 Must have leadership skills for CISOs
16:00 Communicating complex problems with different teams
19:40 Implementing cloud security in an organization for the first time CISO
26:27 Major pain points for CISO and Security Leaders
27:55 Generative AI and its Impact on Security
31:22 Vulnerability management program for supply chain security
39:52 Are you prioritizing the right vulnerability?
42:48 Staying on top of emerging vulnerabilities
45:00 Security at government org vs private sectors
47:37 Keeping the right balance between compliance and real risks
50:28 Summary of the podcast
51:45 Learning recommendation from Ross


