Uncovering Hidden Risks: Ep 12 - Cloud Security Posture Management: Top Risks and Best Practice Solutions

Thomas Fox - Compliance Evangelist
Contact
Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week’s episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft’s consulting services, Microsoft’s customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers See more +
Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week’s episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft’s consulting services, Microsoft’s customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture and take a risk-based approach to proactive cloud security.

In This Episode You Will Learn:

1. How cloud security posture fits into the big picture of security

2. Qualities organizations should look for in a cloud security posture management tool

3. How different platforms can help strengthen cloud security posture

Some Questions We Ask:

1. Regarding cloud-native application development, what security trends have you seen?

2. Why is cloud security posture so important?

3. What risks can a unified security posture management approach help address?

Resources:

View Drew Nicholas on LinkedIn | https://www.linkedin.com/in/drewnicholas1/

View Daniela Villarreal on LinkedIn | https://www.linkedin.com/in/danielavillarr/

View Erica Toelle on LinkedIn | https://www.linkedin.com/in/ericatoelle/

Related Microsoft Podcasts:

Listen to: Afternoon Cyber Tea with Ann Johnson | https://thecyberwire.com/podcasts/afternoon-cyber-tea

Listen to: Security Unlocked | https://thecyberwire.com/podcasts/security-unlocked

Listen to: Security Unlocked: CISO Series with Bret Arsenault | https://thecyberwire.com/podcasts/security-unlocked-ciso-series

Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Connect with the Compliance Podcast Network at:

LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/

Facebook: https://www.facebook.com/compliancepodcastnetwork/

YouTube: https://www.youtube.com/@CompliancePodcastNetwork

Twitter: https://twitter.com/tfoxlaw

Instagram: https://www.instagram.com/voiceofcompliance/

Website: https://compliancepodcastnetwork.net/ See less -

Embed
Copy

Other MultiMedia by Thomas Fox - Compliance Evangelist

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Thomas Fox - Compliance Evangelist | Attorney Advertising

Written by:

Thomas Fox - Compliance Evangelist
Contact
more
less

Thomas Fox - Compliance Evangelist on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide