Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Security and Compliance WeeklySubscribe

SCW #50

November 3, 2020
Section 0

Sponsored By

sponsor
Visit https://securityweekly.com/aptible for more information!

Cloud computing services have become the norm for companies — even on-prem die-hards are using hybrid models. This leads to an increased need for compliance evidence. There are more controls in frameworks like SOC 2 and ISO 27001 related to cloud computing services than ever before, which means more effort to prove compliance. Join our session to learn how intelligent automations can simplify cloud computing compliance beyond what you’re doing today.

This segment is sponsored by Aptible.

Visit https://securityweekly.com/aptible to learn more about them! Visit https://www.securityweekly.com/scw for all the latest episodes!

Full Episode Show Notes

Cloud Computing Compliance: Intelligent vs Basic Automations, Part 1

https://www.aptible.com/comply/integrations

https://www.aptible.com/use-cases/automate-compliance-management

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

John Snyder

John Snyder – CEO

Josh Marpet

Josh Marpet – COO

Scott Lyons

Scott Lyons – CEO

Guests

Frank Macreery

Frank Macreery – Co-Founder and CTO

Announcements

  • Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!

  • In our webcast on November 5th, we’ll show you how to build proper metrics and KPIs! Learn why you should stop trying to discover and classify data in our webcast on November 12th! Learn how to thwart attackers using deception in our November 19th technical training! Visit https://securityweekly.com/webcasts to see what we have coming up! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!

http://traffic.libsyn.com/sw-all/SCW_50_-_Frank_Macreery_Aptible-0_converted.mp3
Section 1

Sponsored By

sponsor
Visit https://securityweekly.com/aptible for more information!

The conversation continues on how intelligent automations can simplify cloud computing compliance.

This segment is sponsored by Aptible.

Visit https://securityweekly.com/aptible to learn more about them! Visit https://www.securityweekly.com/scw for all the latest episodes!

Full Episode Show Notes

Cloud Computing Compliance: Intelligent vs Basic Automations, Part 2

https://www.aptible.com/comply/integrations

https://www.aptible.com/use-cases/automate-compliance-management

Hosts

Jeff Man

Jeff Man – Sr. InfoSec Consultant

John Snyder

John Snyder – CEO

Josh Marpet

Josh Marpet – COO

Scott Lyons

Scott Lyons – CEO

Guests

Frank Macreery

Frank Macreery – Co-Founder and CTO

Announcements

  • Join Amit Bareket, Co-founder & CEO of Perimeter 81 & Paul Asadoorian for a technical deep-dive into the problems inherent in legacy VPN technology. Together they will explore solutions for the modern workforce & how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity. Register Now by visiting https://securityweekly.com/perimeter81

  • Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe

http://traffic.libsyn.com/sw-all/SCW_50_-_Frank_Macreery_Part_2-0_converted.mp3

Related

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.