Afleveringen
-
In this season's finale, we dive into cybersecurity with Dwayne Natwick, a seasoned expert with over 30 years of IT experience. Dwayne shares his journey from running Token Ring cables as a teenager to becoming a global cloud security lead.
Discover the evolution of cloud security, the importance of risk awareness, and the critical role of identity in modern cybersecurity. Learn about the latest trends in cloud security architecture, the significance of data classification, and the future of cybersecurity in the age of AI.
Dwayne also discusses the challenges of keeping up with rapid technological changes and offers insights into building a risk-aware organization.
This episode is packed with valuable insights for IT and business decision-makers looking to enhance their security posture and stay ahead in the ever-evolving tech landscape. Enjoy!
CHAPTERS
(00:00) Introduction and Background
(06:47) The Evolution of Cloud Security
(10:40) Data Classification and User Awareness
(13:44) Privacy Regulations: Europe vs. US
(23:59) Assessing Risk Culture and Tolerance
(26:24) The Importance of Planning and Preparedness
(30:11) Building a Risk-Aware Organization
(34:16) Allocating Budget for Security Initiatives
(38:54) The Critique of 'DevSecOps'
(44:15) The Future Outlook: Expanding Training Services and Mentoring Initiatives
-
In this episode, I sit down with Ahilan Ponnusamy, co-author of the book “Technology Operating Models for Cloud and Edge.”
Ahilan shares his journey from being a Java developer to becoming a thought leader in cloud-native development and technology operating models.
We delve into the evolution of IT operating models, the impact of cloud and edge technologies, and the future of AI in enterprise environments.
Tune in to explore the complexities of hybrid cloud ecosystems, the pitfalls of bimodal IT, and best practices when creating a technology operating model.
Enjoy!
CHAPTERS
(00:00) Understanding Operating Models
(08:02) The Impact of Cloud and Edge Technologies
(12:58) The Failure of Bimodal IT
(23:44) Building a Foundation for Future-Proof IT
-
Zijn er afleveringen die ontbreken?
-
In this episode of the BlueDragon Podcast, I talk with Benny Lauwers, author of ‘The Good, The Bad and the Practical: AI for Doeners’!
We explore his journey into practical AI, tackling real-world challenges in manufacturing, and a cool case study on predicting tile quality.
Tune in for insights on AI’s impact on quality, safety, and organizational culture.
Enjoy!
CHAPTERS
(00:00) Introduction and Background
(08:32) Practical AI in Industrial Environments
(13:09) Case Study: Using AI in Manufacturing
(21:58) Taking Action Based on AI Signals
(24:02) The Impact of AI on Organizational Culture and Processes
(26:04) The Importance of Data Quality and Preparation
(28:47) Considering Alternative Technologies and Starting from the Desired Output
(32:00) Continuous Training and Retraining of AI Models
-
In this episode of the BlueDragon Podcast, I interview Qamar Nomani about the fascinating world of Cloud Security Posture Management (CSPM).
Qamar shares his journey into cloud security and what led him to write a book on the topic.
We dive into what CSPM is, its benefits, and how it integrates into the broader cloud security landscape.
We also tackle the myth that cloud is less secure than on-premises and discuss the shared responsibility model. Plus, we touch on compliance management and governance, especially in light of European directives.
Enjoy!
CHAPTERS
(00:00) Introduction and Background
(03:03) Understanding Cloud Security Posture Management (CSPM)
(05:18) The Benefits of Cloud Security Posture Management
(09:17) Integrating CSPM into the Cloud Security Ecosystem
(19:04) The Importance of Cloud Asset Inventory in Cybersecurity
(25:05) Addressing the Perception of Cloud Insecurity
(29:02) Compliance Management and Governance in the Cloud
(32:06) Introduction to CSPM and Compliance Management
(36:42) CSPM Tools for Hybrid Cloud Environments
(39:53) Expanding Compliance Beyond IT Infrastructure
(48:49) DevSecOps and the Shift Left Approach
(54:29) The Future of Qamar Nomani
-
In this episode, I talk with technology executive and author Marcelo Leite.
We discuss the concepts of a database, data warehouse, data lake, and data lake house. He explains how these concepts have evolved and are used in modern data management.
We also discuss the importance of data classification and data loss prevention (DLP) in ensuring data security, introduce the concept of data mesh and its relevance for CTOs and CIOs and covering two main themes: data mesh and the impact of cloud-based data platforms on security.
We end with the Kusto Query Language (KQL) and the trend of SaaS solutions for data platforms. Enjoy!
CHAPTERS
(00:00) Introduction and Background of Marcelo Leite
(07:40) Understanding the Concepts of Database, Data Warehouse, Data Lake, and Data Lake House
(19:14) The Importance of Data Classification and DLP in Data Security
(26:55) Exploring the Concept of Data Mesh
(32:02) Why CTOs and CIOs Should Consider Data Mesh
(33:09) Managing Complex Data Environments with Data Mesh
(41:00) Ensuring Security in Cloud-Based Data Platforms
(49:53) Analyzing Logs and Telemetry with Kusto Query Language (KQL)
(53:23) Simplifying Data Analytics with SaaS Solutions
(58:37) The Future of Data: Serving AI and Automation
-
In this episode, I interview Vincent van Dijk, an information security specialist and founder of Security Scientist.
We discuss the importance of writing in cybersecurity, the need for data-driven decision-making in cybersecurity, and the impact of cloud computing on information security.
We also talk about the rise of managed security service providers and the challenges small and medium enterprises face in securing their systems. Enjoy, and let us know what you think in the comments!
CHAPTERS
(00:00:00) Introduction and Background
(00:06:15) The Importance of Writing in Cybersecurity
(00:11:10) Marker 7
(00:13:19) The Impact of Cloud Computing on Information Security
(00:25:33) Data-Driven Decision-Making in Cybersecurity
(00:34:21) Challenges in the Cybersecurity Industry: Stress and Burnout
(00:41:18) Upcoming Books: Making Choices and Becoming the Best Cybersecurity Expert
-
In this episode, I interview Stephane Eyskens, author of the Azure Cloud Native Architecture Map book.
We discuss the drivers for organizations to move to the cloud.
We talk about the evolution of Azure in the last five years, the importance of cloud security, and the need for collaboration between cloud architects and security professionals.
We also discuss the role of DevSecOps in integrating security into the development process, the difficulty of retraining existing professionals, and the comparison between Azure and other cloud providers.
Eventually, we have a very interesting talk about the future of AI and data platforms and Microsoft's open-minded approach to multi-cloud and open source.
Enjoy!
CHAPTERS
(00:00:00) Introduction and Background
(00:07:00) Privatization of PaaS Services
(00:15:00) Cloud Repatriation: Trends and Considerations
(00:29:30) Challenges of MLOps and Data Platforms
(00:35:55) Continuous Learning and Keeping Up
(00:45:34) Microsoft's Open-Minded Approach
-
In this episode, Mike Bursell discusses the concept of trust in computer systems and the cloud.
We also explore the topics of trust in the cloud and the emerging trend of zero-trust. Mike highlights the importance of a trusted computing base and the role of hardware-based protection in confidential computing.
We discuss the benefits of confidential computing, including data and application protection, and its potential future in various industries.
We also touch on the relationship between open-source software and trust, as well as the role of blockchain in enhancing trust.
Enjoy!
CHAPTERS
(00:00:00) Introduction and Background of Mike Bursell
(00:06:22) The Rise of Confidential Computing
(00:12:31) The Role of Open Source in Trust
(00:30:27) Upcoming Projects and Research
-
In this episode, I talk to Walter Rocchi, an ISO 27001 Lead Implementer and Lead Auditor, to discuss the importance of cybersecurity and privacy in European organizations.
We talk about continuous improvement and training to ensure effective security measures.
We compare the European mindset toward privacy and data protection with other continents, discuss the challenges of balancing European innovation and regulation, investigate the importance of frameworks like ISO 27001 and NIST in ensuring cybersecurity and data protection.
We also touch on the relevance of cloud security and the role of information security officers in understanding cloud security and AI security.
Then we conclude with a discussion on the current legal framework for exchanging personal data of European citizens with the US and the importance of technical controls in data protection.
Enjoy!
CHAPTERS
(00:00:00) Introduction and Professional Background
(00:08:31) The Evolution of Information Security and Privacy Risk Categories
(00:24:12) Addressing the Gap Between Certification and Security Improvement
(00:30:59) The Use of Frameworks in Different Countries
(00:45:12) The Role of Information Security Officers in Cloud Security
(00:53:28) The Current Legal Framework for Data Exchange between the EU and the US
(01:01:13) The Future of Security and Privacy in Europe
-
This first episode of the BlueDragon Podcast delves into the transformative world of cloud computing, featuring insights from industry expert Jonah Andersson. We discuss the evolution of Azure, cloud adoption trends, and the foundational knowledge necessary for leveraging cloud technologies effectively.
CHAPTERS
(00:00:00) Introduction and Overview
(00:06:16) Cloud Adoption and Attitude of Organizations
(00:12:40) Auto Scaling and Benefits of Cloud
(00:24:28) Challenges and Benefits of Cloud Repatriation
(00:36:01) The Importance of Cloud Security
(00:40:24) The Evolving Role of Cloud Solution Architects
(00:50:23) Jonah's Journey: Writing and Publishing a Book on Azure