62 episodes

We know security is challenging, but a timely understanding of security is far more challenging! Scale to Zero is built for all the security professionals for helping them to be more privacy and security-sensitive. With this show, we hope to address all the security-related issues that are challenging to understand and resolve without the help of experts. We believed that a community space like Scale to Zero would make things a little bit simpler for everyone after we discovered the discomfort of constantly switching back and forth.

Scale to Zero - No Security Questions Left Unanswered Scale To Zero

    • Technology

We know security is challenging, but a timely understanding of security is far more challenging! Scale to Zero is built for all the security professionals for helping them to be more privacy and security-sensitive. With this show, we hope to address all the security-related issues that are challenging to understand and resolve without the help of experts. We believed that a community space like Scale to Zero would make things a little bit simpler for everyone after we discovered the discomfort of constantly switching back and forth.

    Conquering Enterprise Risk Management with Amit Subhanje | Ep. 32 | Cloudanix

    Conquering Enterprise Risk Management with Amit Subhanje | Ep. 32 | Cloudanix

    Feeling overwhelmed by cyber risk? We've got you covered! In this episode of ScaletoZero, Our guest Amit Subhanje dives deep into everything risk management, from understanding its importance to conquering cybersecurity and cloud security challenges. Remember security awareness is the key, get ready to become a risk management master! Hit play and join now!



    00:00 Teaser + Introduction

    04:35 Day in Amit's life

    06:20 What is risk management and it's importance?

    08:22 Risk management and cybersecurity or cloud security

    11:00 Challenges organizations face managing cyber risks

    13:55 How to address cyber risk challenges?

    16:30 Thin line between enterprise risk management and risk management

    17:00 How can startups build comprehensive risk mitigation plan?

    22:45 Building security awareness in an organization

    29:20 How can teams lead and be accountable for security incidents?

    33:10 Summary

    34:10 Rating security practices

    • 42 min
    Exploring the World of Incident Response and Detection with Pablo Vidal | Ep 31 | Cloudanix

    Exploring the World of Incident Response and Detection with Pablo Vidal | Ep 31 | Cloudanix

    Feeling lost in the world of Detection and Response (D&R)? In this episode of ScaletoZero, our guest Pablo Vidal equips you with everything you need, from core concepts and overcoming common challenges to leveraging automation and building a winning incident response process. We explore the future of D&R with Generative AI, offer valuable advice for aspiring security engineers, and provide organizations with strategies to hire top talent and identify red flags during recruitment. Join us and become a D&R master!

    00:00 Teaser
    01:00 Introduction and more
    07:00 Concept of Detection and Response
    08:21 Motivation to continue in detection and response
    11:40 Challenges in implementing incident detection and response process
    13:30 Typical incident response process
    15:25 Using automation or orchestration tools for incident response
    17:00 Keeping the right balance between SDLC and incident response
    19:35 Generative AI and Incident Response Process
    22:20 Will GenAi replace security engineers?
    24:40 Advice to newbies in incident and response
    26:40 Additional skills to have
    28:00 Skills organizations should look for while hiring security engineering teams
    31:30 Strategies for organizations to attract top talent
    33:45 Common do's and don't of hiring security engineering team
    35:25 Red flags in candidates during the hiring process
    37:37 Summary
    38:37 Rating Security Practices

    • 43 min
    Building Cybersecurity Teams and Virtuous Circle With Clients ft. Jesse Miller

    Building Cybersecurity Teams and Virtuous Circle With Clients ft. Jesse Miller

    In episode 30 of the ScaletoZero podcast, we had a very thoughtful discussion with Jesse Miller who is also known as an operational powerhouse when it comes to information security and compliance. This episode is a must-watch for all the leaders who are building their cybersecurity teams. Jesse shares some real uncommon insights (without sugarcoating facts) that will help security leaders and SMBs build their cybersecurity teams.
    00:00 Teaser + Introduction 07:00 Skills to look for when hiring security teams10:57 How do you attract the right talent to your organization?13:47 Hiring early security roles for growing startups14:22 Setting KPIs for the newly hired security roles17:50 How security teams can engage with other business units?21:30 Where organizations are making mistakes?26:24 What is Building Virtuous Circle?29:40 Benefits of building a virtuous circle with clients in your organization.30:55 How can CISOs educate their clients about sound security investments?32:50 Advice to aspiring CISOs and CIOs35:28 Summary36:18 Rating Security Practices

    • 42 min
    Beyond the Basics: Understanding Threat Hunting and Security Research with Josh Pyorre | Cloudanix

    Beyond the Basics: Understanding Threat Hunting and Security Research with Josh Pyorre | Cloudanix

    In episode 29 of the ScaletoZero Podcast, we had an insightful discussion with Josh Pyorre about threat-hunting approaches in today's digital world. Josh shared his expertise on balancing security complexities and creativity while discussing ways to reduce cyber risks for individuals and organizations.

    00:00 Teaser
    01:00 Introduction
    05:00 What is Threat Hunting?
    08:00 Why threat hunting is important for organizations?
    08:55 Proactive vs. Reactive approach to threat hunting
    10:17 Challenges of adopting a proactive or reactive approach
    12:00 Creatively approaching Threat Research
    16:25 Generative AI in Cybersecurity
    18:33 Challenges of GenAI for security threat research
    22:22 Keeping balance in presenting complex security topics to a diverse audience
    24:25 Why security ecosystems should prioritize startups and non-profits
    29:20 Summary
    30:20 Rating Security Practices

    • 35 min
    Keeping Pace with Cloud Security: A Guide to Maturity Models with Rich Mogull | Ep28 S2 | Cloudanix

    Keeping Pace with Cloud Security: A Guide to Maturity Models with Rich Mogull | Ep28 S2 | Cloudanix

    In this episode of the ScaletoZero podcast, we had an enlightening discussion with cloud security expert Rich Mogull. We delve into the Cloud Security Maturity Model (CSMM) and its profound impact on modern cybersecurity practices. Rich takes us on a journey through the evolution of CSMM, from its inception to its current significance in cloud security strategies.

    00:00 Teaser
    01:02 Introduction
    07:35 What is the Cloud Security Maturity Model?
    09:30 Importance of CSMM and Life before Cloud Security Maturity model
    13:10 How does CSPM align with the existing cloud framework
    17:22 Challenges security leaders face when implementing CSMM
    21:50 Recent updates to the Cloud Security Maturity Model
    26:50 Impact of updates to organizations following existing CSMM
    30:14 How can organizations use CSMM v2
    32:32 Cloud Security Lab A Week
    35:00 Journey of Cloud security lab a week
    37:50 Wisdom for folks thinking of starting a project around cloud security
    40:00 Summary
    41:00 Rating Security Practices section

    • 50 min
    Mastering the Route53 Secure Sweep Tool with Divyanshu Shukla | Ep. 27 | Scaletozero | Cloudanix

    Mastering the Route53 Secure Sweep Tool with Divyanshu Shukla | Ep. 27 | Scaletozero | Cloudanix

    This episode of ScaletoZero focuses on a security tool called Route 53 Secure Sweep, created for cloud security engineers to use internally. This presentation aims at security engineers who want to learn about internal cloud security practices and how to identify and mitigate risks associated with Route 53. We will be covering the below-mentioned topics:

    - What is Route 53 Secure Sweep?
    - Why was it created?
    - What is Route 53 and how does it work?
    - Security risks associated with Route 53.
    - A demonstration of the tool.

    • 40 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
The TED AI Show
TED
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR