Title: Cyber Security Issues and Cloud Migration
Description:
This episode of the Information Security Podcast features an interview with Bob Kalka @bobkalka ‏from IBM @IBM with host Rob Nettgen (@Robert_Nettgen). The conversation examines the definition of Cyber Security and its relationship with and how it is impacted by an organization’s migration to the Cloud.
Key Discussion Points and Actionable Items:

As part of a migration to the Cloud, do you know where your sensitive data exists?

The perception that Cloud service providers will manage all an organization’s cyber security requirements once their workloads reside in the Cloud.

The level of sophistication of “cyber criminals” continues to evolve as they further leverage contemporary technologies to assist their efforts.

Requirement to exercise Incident Response preparedness and response plans through simulated attacks and exercises.

Sponsored By:
ASMGi (@ASMGi_CLE) and https://www.asmgi.com/
Briteskies (@NoBrownCow) and https://www.briteskies.com/
Recorded and Production By:
Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).
Additional Information and Resources:
For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

Title: Cyber Security Issues and Cloud Migration

Description:

This episode of the Information Security Podcast features an interview with Bob Kalka @bobkalka ‏from IBM @IBM with host Rob Nettgen (@Robert_Nettgen). The conversation examines the definition of Cyber Security and its relationship with and how it is impacted by an organization’s migration to the Cloud.

Key Discussion Points and Actionable Items:


As part of a migration to the Cloud, do you know where your sensitive data exists?
The perception that Cloud service providers will manage all an organization’s cyber security requirements once their workloads reside in the Cloud.
The level of sophistication of “cyber criminals” continues to evolve as they further leverage contemporary technologies to assist their efforts.
Requirement to exercise Incident Response preparedness and response plans through simulated attacks and exercises.

Sponsored By:

ASMGi (@ASMGi_CLE) and https://www.asmgi.com/

Briteskies (@NoBrownCow) and https://www.briteskies.com/

Recorded and Production By:

Evergreen Podcasts (@StreamEvergreen) at https://evergreenpodcasts.com/ and production assistance provided by Frank Yako (@fyako).

Additional Information and Resources:

For additional information on the Information Security Summit, please visit us on the web at https://www.informationsecuritysummit.org/ or on Twitter (@InfoSecurSummit). Planning is underway for the Summit 2020 scheduled for October 26 through October 30, 2020, please join us!

Twitter Mentions