While the vision for app security is relatively clear, executing on that vision is still somewhat of a work in progress. Fast-moving, interdependent pieces—custom code and open source packages, infrastructure and network configurations, user entitlements—make for complex systems. In this episode, we discuss the challenge in addressing each piece independently and consider how consolidated, multi-purpose tools may present an emerging solution.
This segment is sponsored by Prisma Cloud/ Palo Alto Networks.Full Episode Show Notes
Ankur Shah - VP, Product Management at Prisma Cloud
Ankur has spent 16+ years bringing innovative security, collaboration and virtualization technologies to market. He is passionate about building products from the ground up into market leaders. He joined Palo Alto Networks through the acquisition of RedLock where he ran product management for securing public clouds. In his current role as a VP of products, he is responsible for driving product strategy, roadmap and execution for public cloud security. In his previous role, he built and led go-to-market efforts for the CASB solution at CipherCloud. Ankur has also held leadership positions at Symantec, Citrix and Cisco. He holds a B.S. in electrical engineering and an MBA from the UCLA Anderson School of Management.
John Kinsella - Chief Architect at Accurics
John Kinsella is the Chief Architect for Accurics
Mike Shema - Product Security Lead at Square
Mike Shema is the Product Security Lead of Square
Do you want to stay in the loop on all things Security Weekly? Visit https://securityweekly.com/subscribe to subscribe on your favorite podcast catcher or our Youtube channel, sign up for our mailing list, join our Discord Server, and follow us on our newest live-streaming platform, Twitch!
In our next technical training webcast on May 13th at 11am ET, see how attackers gain access to endpoints, and learn how to use defensive strategies to protect against those attacks! In our May 27th webcast at 11am ET, we’ll explore the latest attacks against DNS and the latest techniques that make it possible to discover and disrupt attacks. Then join our webcast on June 3 to learn about pen testing tools and why every organization should be using them regularly. Visit https://securityweekly.com/webcasts to register now! If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand