Attendees
Guest: Ory Segal, Puresec
Guest title: CTO & Co-Founder at PureSec
Company: Puresec is the global leader in serverless architectures security.
Serverless functions are one the most interesting things that is happening in architecture of application development. With Serverless, application developers can stop worry about the underlying infrastructure and scalability of the application, but they must address other risks at application level. In this podcast we are interviewing Puresec CTO, Ory Segal , co-author of the top 12 risks to serverless applications
Timing
0:00 – 2:35 – intro
2:35 – 8:05 - what are Serverless functions
8:05- 12:20 - how Serverless is different (security wise)
12:20 - 19:40 - Serverless risks & threats
19:40 - 24:00 - common mistakes and misconfiguration with Serverless
24:00 – 29:30 - Serverless effect on people, process and technology
29:30 – 37:00 – Summary and conclusions
Guest: Adam Gavish Guest Title: Co-Founder and CEO, DoControl.io Topic: Protecting SaaS services using automation & continuous monitoring Abstract: SaaS services are blooming and organizations are adopting more and more of them. In this episode, we hosted Adam Gavish, co-founder, and CEO at DoControl - an innovative startup that is reshaping the way we govern and monitor SaaS applications - about the business case of SaaS services, the market gaps, and how organizations should catalog, protect and monitor their SaaS portfolio. ...
Guest: Omri Segev Moyal Guest title: Co-Founder and CEO at Profero Language: English Abstract Incident response and forensics of cloud breaches is one of the most challenging topics in Information security. In this episode, (recording date Aug 2021) Omri Segev Moyal, co-founder & CEO at Profero, shares fascinating stories regarding recent incidents his team was involved in and provides insights, recommendations and best practices that are really eye opening for any organization out there. ...
Sponsored By: Attendees Guest: Arick Goomanovsky Guest title: Co-Founder & Chief Business Officer Company: Ermetic Abstract In cloud platforms, identity and permissions are the most important control that customers get to implement. Network segmentation and other traditional controls are often ineffective and access to resources is determined by a mixture of roles & policies. This mixture can become very complex and difficult to lock down. In this episode, we are hosting Arick Goomanovsky, Chief Business Officer at Ermetic, to discuss Cloud identity and access challenges, and to review real life examples of what can happen when neglecting identity and access entitlements in cloud infrastructure. Mail to: [email protected] Timing: 0:00 Introducing our guest and Ermetic 2:21 Understanding Identity Governance 4:40 Cloud identity challenges 10:55 Dealing with identity challenges by adding visualization and analysis of permissions 16:30 Who are the organizational stakeholders relevant? 22:01 Examples for IAM challenges and outbreaks 22:25 Example 1: Protecting sensitive resources 26:25 Example 2: Third party access 29:49 Example 3: The visibility challenge when using SSO 31:30 Summary and final words ...