Guest: Dalit Ben Israel
Guest title: Partner, head of IT & Data protection practice
Company: Naschitz Brandes Amir
In the cloud era, the information security officer's new best friends are the lawyers in the legal department. Legal matters such as cross border data transfers, contractual controls and privacy laws becoming critical in cloud migrations. In this episode we talk with Dalit Ben Israel, Partner at NBlaw, about the legal challenges of cloud computing: cross border transfers, the rise of privacy laws and proper contract management and monitoring.
0:00 - Opening
2:03 - Introduction of our guest
4:95 - Considerations of data center location and the effect of the Schrems2 judgement invalidating the Privacy shield
12:50 - The roles and responsibilities of cloud providers and customers
15:27 - Choosing cloud providers - why do we need lawyers in the process and the obligation to enter into DPAs
20:00 - Specific challenges with SaaS and agreements with subprocessors
22:12 – Negotiating cloud contracts - what are the challenges? minimizing risks.
30:32 - Dispute resolution and venue of jurisdiction
33:24 - Ongoing contract monitoring
36:10 - Summary
Connect with Dalit here:
Email: [email protected]
Attendees Guest: Liran Tal Guest title: Developer Advocate Company: Synk Abstract Open source software takes a big part in our daily lives, and also in our development environments. Many applications developers rely on open source libraries & tools and integrating it into their code. This is a great improvement for developers allowing them to innovate quickly and efficiently. But all this good comes with a big responsibility - open source software should be carefully examined in order to make sure its reliability. In this episode we talk with Liran Tal from Synk about the growing importance of adding security evaluation of open source software in the development cycle. Timing: 0:00 introducing our guest 5:50 what is the challenge of open-source security 10:05 - open source security - the people angel 16:00 - open source security - the process angel 24:55 - open source security - the technology angel 29:42 summary and last words ...
Guest: David W. Schropfer Guest Title: Host of DIY Cyber Guy Podcast Abstract: Many IT & security professionals are asking what Is the best way to enter the world of cloud computing. In this episode we continue our conversation with David W. Schropfer from DIY cyber guy about the cloud computing career paths ...
Guest: Yan Michalevsky Guest title: Co-Founder and CTO at Anjuna Language: English Abstract Confidential computing is one of the more interesting technologies that is developed today. The combination of using secure hardware features, advanced cryptography with tight virtualization integration enables us to protect data at untrusted environments and protect from very illusive threats such as government access and malicious insiders. In this episode we spoke with Yan Michalevsky, Co-Founder and CTO at Anjuna, regarding confidential computing and why we should pay attention to it. ...