Tuesday, October 4, 2022
HomeCyber SecurityIANS 2022 Los Angeles Cybersecurity Discussion board | by Teri Radichel |...

IANS 2022 Los Angeles Cybersecurity Discussion board | by Teri Radichel | Cloud Safety | Oct, 2022


Only a word to let you understand I’m talking on the LA IANS Cybersecurity Discussion board on October 4th, 2022

I’m in Los Angeles tonight. Tomorrow I shall be talking on the 2022 IANS Analysis Cybersecurity Discussion board on multi-cloud safety, developer governance, and the way safety and improvement groups can work collectively higher in a DevOps surroundings.

I’m not the one one presenting — there shall be lots of different nice presenters and distributors taking part so come test it out should you can.

Sadly, I’ve to leap proper again on a aircraft and head again to Savannah afterwards. I’m going to be giving a digital presentation on cybersecurity metrics the next day for the IANS CISO Roundtable. There are totally different approaches to cybersecurity metrics. My goal is to get individuals eager about how and what they’re measuring on the subject of cybersecurity metrics.

In my newest weblog put up collection, I’m engaged on a framework for an automatic pipeline to collect and course of cybersecurity metrics. It’s sluggish going as a result of I solely have a little bit of time per day and as you see once you learn the posts, working in a cloud surroundings comes with a slew of challenges however I’ve already labored via lots of code associated to IAM and networking.

Ultimately, you get some working code as I implement every bit of the puzzle right here in case you are .

You’ll additionally get an opportunity to assume via what sort of metrics it’s possible you’ll wish to seize after we assume via all of the issues for constructing this explicit structure. Quite a bit what is roofed in these posts and code will apply to any structure. Another architectures would have totally different or extra issues.

After we attempt to seize cybersecurity metrics we have to think about all of the items and the way they match collectively. Checklists are place to begin, however a single guidelines is probably going not going to cowl all facets of safe cloud infrastructure and functions. When an architects design a home, they don’t use a easy guidelines. They should perceive how all of the items match collectively to make sure the constructing is structurally sound.

Even if you wish to use predictive analytics, you’ll want to begin with information. And that information comes out of your cloud and utility configurations and structure. If you happen to don’t know what is feasible to configure and the potential vulnerabilities you then gained’t know what information to seize. If you happen to don’t assume via your cloud structure as a complete, you’ll find yourself with gaps that go away your cloud programs weak to assaults.

Be a part of me on the discussion board to listen to extra about cloud safety or schedule a name with me via IANS Analysis should you can’t make it.

Teri Radichel

If you happen to appreciated this story please clap and observe:

Medium: Teri Radichel or E mail Record: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests providers by way of LinkedIn: Teri Radichel or IANS Analysis

© 2nd Sight Lab 2022

All of the posts in my collection on cybersecurity metrics:

____________________________________________

Writer:

Cybersecurity for Executives within the Age of Cloud on Amazon

Want Cloud Safety Coaching? 2nd Sight Lab Cloud Safety Coaching

Is your cloud safe? Rent 2nd Sight Lab for a penetration check or safety evaluation.

Have a Cybersecurity or Cloud Safety Query? Ask Teri Radichel by scheduling a name with IANS Analysis.

Cybersecurity & Cloud Safety Assets by Teri Radichel: Cybersecurity and Cloud safety lessons, articles, white papers, shows, and podcasts



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments