25 episodes

Do you know what’s going on in your cloud? With the security threat landscape constantly evolving, giving developers the speed they want and CISOs the control they need is critical. Protecting your cloud-native applications from code to production is imperative. And building the foundations of security into everything you create is a must. If your cloud-native business prioritizes security while innovating, this is the podcast for you. On Code to Cloud, we will hear from CISOs and thought leaders in the industry about the tools and tactics helping them succeed. Learn how they’ve approached industry trends and challenges, how they’re “shifting left,” and what opportunities lie ahead. Cloud security at cloud scale -- join us for Code to Cloud, hosted by Tim Chase and Andy Schneider. And powered by Lacework.

Code to Cloud Lacework

    • Technology
    • 5.0 • 39 Ratings

Do you know what’s going on in your cloud? With the security threat landscape constantly evolving, giving developers the speed they want and CISOs the control they need is critical. Protecting your cloud-native applications from code to production is imperative. And building the foundations of security into everything you create is a must. If your cloud-native business prioritizes security while innovating, this is the podcast for you. On Code to Cloud, we will hear from CISOs and thought leaders in the industry about the tools and tactics helping them succeed. Learn how they’ve approached industry trends and challenges, how they’re “shifting left,” and what opportunities lie ahead. Cloud security at cloud scale -- join us for Code to Cloud, hosted by Tim Chase and Andy Schneider. And powered by Lacework.

    Cybersecurity challenges in manufacturing: Insights from Church & Dwight's Global CISO

    Cybersecurity challenges in manufacturing: Insights from Church & Dwight's Global CISO

    This episode of Code to Cloud features a discussion with the Global CISO at Church and Dwight Co., the parent company of brands like Arm & Hammer and OxiClean. And at Church & Dwight Co., David transformed the global enterprise-wide information security program key areas of strategy, risk management, and compliance, among others. Prior to joining the company in 2020, David spent over 22 years in security at Bed, Bath & Beyond. David and host Andy Schneider, Field CISO EMEA at Lacework, discuss the primary cyber threats facing the manufacturing sector, with a specific focus on ransomware, and the strategies utilized by Church & Dwight to mitigate these threats, including a robust third-party vendor assessment process. Ortiz highlights the importance of adaptability in cybersecurity, the role of leadership qualities such as empathy, accountability, and urgency, and underscores the significance of identity management, preparedness, and swift response in enhancing cyber resilience. The conversation also covers the benefits and considerations of moving services to the cloud, reflecting on the necessity of collaboration between cybersecurity teams, manufacturing units, and other stakeholders to safeguard against an ever-changing threat landscape.

    • 31 min
    Strengthening security culture: the CISO-CTO dream team

    Strengthening security culture: the CISO-CTO dream team

    This episode of Code to Cloud features a discussion with Immuta's CISO, Mike Scott, and Co-Founder and CTO, Steve Touw, hosted by Andy Schneider, Field CISO EMEA at Lacework. Mike is a highly experienced and accomplished leader in information and data security, real-time analysis of immediate threats, and IT and infrastructure designs. And Steve is known for his data science work with US Special Operations Command and the US Intelligence Community. The conversation centers around the importance of a 'shift left' culture in software development, emphasizing security from the start of the development process. Both guests share how this approach has enabled Immuta to move to a SaaS model, deliver features and security fixes more rapidly, and foster a strong security culture by bringing the CISO and CTO teams closer together. Practical insights include the adoption of communication tools like Slack, the significance of automation in maintaining a rapid release cadence, and the importance of understanding employee communication styles using the DISC assessment. The discussion also touches on overcoming conflicts and the critical role of setting realistic goals in achieving security and compliance milestones.

    • 46 min
    Data dialogues: Protecting personal data with AWS Director Jenny Brinkley

    Data dialogues: Protecting personal data with AWS Director Jenny Brinkley

    This episode features an interview with Jenny Brinkley. Jenny is Director of Amazon Security at AWS. Prior to joining Amazon, she co-founded an artificial intelligence start-up called Harvest.ai focused on protecting highly sensitive data using behavior analytics to prevent data loss. Harvest.ai was then acquired by AWS in April 2016. Jenny has also been awarded a few patents focused on data loss prevention and the right to be digitally forgotten. And on this episode, Jenny and host Tim Chase discuss the value of personal data, the importance of security at the executive level, and diversification of the workforce.

    • 35 min
    Decoding AppSec in the Cloud Age: A Conversation with Sean Wright of Featurespace

    Decoding AppSec in the Cloud Age: A Conversation with Sean Wright of Featurespace

    This episode features an interview with Sean Wright. Sean is Head of Application Security at Featurespace, the world leader in Enterprise Financial Crime prevention for fraud and Anti-Money Laundering. He is an experienced application security engineer, having started his career as a software developer. His expertise is in web based application security with a special interest in TLS related subjects. And on this episode, Sean and host Andy Schneider discuss navigating AppSec in the cloud age, finding and leveraging security champions, and Sean’s take on open source as it relates to supply chain risks with third party software libraries.

    • 39 min
    Securing Data in the AI Era: Jeff Deverter's Business-First Approach

    Securing Data in the AI Era: Jeff Deverter's Business-First Approach

    This episode features an interview with Jeff DeVerter, Chief Technology Evangelist managed cloud computing company Rackspace. He has over 25 years of experience in IT and technology, and has worked at Rackspace Technology since 2008. Over his career, Jeff has helped companies like American Express, Ralph Lauren, and Thomson Reuters create and execute against multi-year digital transformation strategies. And on this episode, Jeff and host Tim Chase discuss how to navigate an excessive amount of data due to the popular use of AI, why security by obscurity is ineffective, and aligning day-to-day security duties with business goals.

    • 30 min
    Incident Ready: Dr. Kevin Tham's Strategies for Cryptography in Cybersecurity Response

    Incident Ready: Dr. Kevin Tham's Strategies for Cryptography in Cybersecurity Response

    This episode features an interview with Dr. Kevin Tham. Kevin is a CISO leader in the Australian Digital Banking sector and a seasoned information security veteran in the financial services industry. Most recently, he served as CISO at etika, a purpose-driven lender. And on this episode, Kevin and host Tim Chase discuss cryptography including how it’s changed over the last 25 years, and how quantum computing and AI will affect it. They also discuss handling cybersecurity incidents from first steps to when to notify the board.

    • 35 min

Customer Reviews

5.0 out of 5
39 Ratings

39 Ratings

AllieNF1010 ,

Helpful podcast, great advice from CISOs, for CISOs

Really enjoying this podcast! Great advice from security leaders working at a wide range of companies. Very interesting to hear about their different career paths

jerowell11 ,

Amazing perspective

Incredible insights from industry leaders. Super impressed with this series.

Security listener ,

We’ll worth a listen

Educational, informative, and an efficient use of time.

Look forward to the next episode!

Thank you!

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
TED Radio Hour
NPR
Search Engine
PJ Vogt, Audacy, Jigsaw