In this episode of Getting Defensive, hosts Jerry Bell and Andrew Kalat welcome Derek Held, a senior cloud security engineer, to discuss the challenges organizations face in cloud security. The conversation explores the transition from traditional IT environments to cloud-native architectures, emphasizing the importance of leveraging cloud capabilities, particularly in identity management. Derek shares insights […]
--------
1:05:48
Getting Defensive With Michael Taggart
In this episode of the Getting Defensive podcast, hosts Jerry Bell and Andrew Kalat welcome cybersecurity educator Michael Taggart. They discuss Taggart’s journey into cybersecurity, the challenges of educating others in the field, and the importance of empathy and communication in security training. The conversation also touches on affordable training options, the role of security […]
--------
43:44
Getting Defensive With Sophie Schmieg
In this episode, Jerry Bell and Andrew Kalat discuss the evolving landscape of cryptography with expert Sophie Schmeig. They explore her journey into cryptography, the implications of quantum computing on classical cryptography, and the importance of transitioning to post-quantum cryptography. Sophie shares insights on current cryptographic standards, the challenges posed by quantum threats, and the […]
--------
52:45
Getting Defensive With Martin Fisher
Summary In this episode of the Getting Defensive podcast, hosts Jerry Bell and Andrew Kalat welcome Martin Fisher, a seasoned CISO with over 20 years of experience in information security, particularly in the healthcare sector. Martin shares insights from his decade-long tenure at Northside Hospital Group, discussing the unique challenges of cybersecurity in healthcare, the […]
--------
59:46
Getting Defensive With Chris Dotson
Summary In this episode of the Getting Defensive podcast, hosts Jerry Bell and Andy Kalat welcome Chris Dotson, a cloud security expert and author of ‘Practical Cloud Security’. The conversation covers a range of topics including the challenges of writing a book, common security mistakes in cloud environments, the importance of identity and access management, […]