Learn What Security in the Cloud Really Takes on The Virtual CISO Podcast from Pivot Point Security

The Virtual CISO Podcast by Pivot Point Security
What does it take to secure your critical applications in the public cloud, as workloads stampede to the public cloud and new security risks accompany them?
To discuss the whole cloud application security lifecycle, including why it’s such a challenge and where he sees companies having problems, Jeff Schlauder, Founder at Catalina Worldwide LLC, joined the latest episode of The Virtual CISO Podcast. The show’s host is John Verry, Pivot Point Security CISO and Managing Partner.
Topics discussed include:
• Why the traditional model of “outsource development, DIY operations” often creates security gaps
• The security risks from “too much automation”
• To containerize or not to containerize—that is the question
• Key technical resources you’ll need to bring critical applications to the cloud
• Where security automation fits in your DevOps pipeline
If you’re concerned about keeping your cloud-based application environments and data secure, don’t miss this podcast episode with Jeff Schlauder.
To hear this episode anytime, along with any of the previous episodes in The Virtual CISO Podcast series, visit this page.
About Pivot Point Security
Since 2001, Pivot Point Security has been helping organizations understand and effectively manage their information security risk. We work as a logical extension of your team to simplify the complexities of security and compliance. We’re where to turn—when InfoSec gets challenging.
Richard Rebetti
Pivot Point Security
+1 732-456-5618
email us here
Visit us on social media:
Facebook
LinkedIn
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.