Third party cloud platforms around the Hash Table.

Third party cloud platforms as a cybersecurity first principle strategy. As we learned from the deep dive into Azure, AWS, and GCP, none of the primary cloud providers check the box for every security first principle. To do so, Rick looks at third party cloud security providers. In this session, Rick and the Hash Table discuss big security platforms like Fortinet, Cisco, Check Point, and Palo Alto Networks. We discover that comprehensive security orchestration across all data islands is the key, so much so that Rick adds orchestration as one of the five primary first principles. With Rick Howard, the Cyberwire’s CSO and Chief Analyst and three guests: Ram Boreda, a Palo Alto Networks Field CTO, Joakim Lialias, a Product Marketing Director at Cisco, and Ashish Rajan, the host of the Cloud Security Podcast. Cybersecurity professional development and continued education. You will learn about: third party security platforms as first principle tools, cloud security orchestration, virtual firewalls and first principle strategies, converging cloud security tools into a single platform CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram Additional first principles resources for your cybersecurity program. For more third party cloud platforms and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices

Om Podcasten

CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.