orca.security
Open in
urlscan Pro
192.0.66.46
Public Scan
Submitted URL: https://go.orca.security/e/898611/resources-podcast-/4qx67/350121537?h=Cdg-pe7NtJoroCHGyeN6SJBTEcR0ujMkOlJrybVMkNs
Effective URL: https://orca.security/resources/podcast/
Submission: On March 29 via api from CH — Scanned from DE
Effective URL: https://orca.security/resources/podcast/
Submission: On March 29 via api from CH — Scanned from DE
Form analysis
2 forms found in the DOM<form class="ais-SearchBox-form" novalidate="">
<input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
<button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
<div class="ais-SearchBox-close">
<span class="push-enter-text">Press enter to search</span>
<button class="ais-SearchBox-reset-inner" aria-label="Close Search">
<svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd"
d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
fill="white"></path>
</svg>
</button>
</div>
</form>
<form>
<div style="display: flex; align-items: stretch; flex-direction: row; padding-bottom: 18px;">
<div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px; padding-right: 24px;"><label forhtml="wistia_subscribe_285_first_name"
style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">FIRST NAME</label><input type="text" id="wistia_subscribe_285_first_name" name="wistia_subscribe_285_first_name"
style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
<div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px;"><label forhtml="wistia_subscribe_286_last_name" style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">LAST
NAME</label><input type="text" id="wistia_subscribe_286_last_name" name="wistia_subscribe_286_last_name"
style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
</div>
<div style="padding-bottom: 40px;">
<div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px;"><label forhtml="wistia_subscribe_287_email" style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">EMAIL
ADDRESS</label><input type="email" id="wistia_subscribe_287_email" name="wistia_subscribe_287_email"
style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
</div>
<div style="display: flex; align-items: center; justify-content: center; padding-bottom: 40px;"><button type="submit" disabled=""
style="background: rgb(255, 151, 0); border-radius: 6px; border: 0px; color: rgb(255, 255, 255); cursor: default; font-family: "Open Sans", WistiaPlayerInter, Helvetica, sans-serif; font-size: 18px; padding-left: 30px; padding-right: 30px; height: 54px; opacity: 0.5; outline: none; transform: scale(1.001); transform-origin: center bottom; transition: transform 200ms cubic-bezier(0.15, 0.51, 0.25, 1) 0s;">Subscribe
for updates</button></div>
<div style="font-size: 12px; line-height: 1.83;">By subscribing, you agree to our terms of service and privacy policy.</div>
</form>
Text Content
* English * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Platform Platform The Orca Platform Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless platform. * Platform Overview * Cloud Security Posture Management Identify and remediate misconfigurations across clouds * Cloud Workload Protection Protect VMs, containers, and serverless functions * Container and Kubernetes Security Scalable security for containers and Kubernetes for every cloud layer * Cloud Detection & Response 24x7 monitoring and response across the entire cloud attack surface * Vulnerability Management Agentless vulnerability management that prioritizes your most critical risks * Cloud Infrastructure Entitlement Management Secure cloud identities and entitlements * Multi-Cloud Compliance Achieve regulatory compliance with frameworks, benchmarks, and custom checks * Shift Left Security Secure cloud-native apps across the SDLC * SideScanning™ Technology Our innovative approach provides complete cloud coverage * API Security Complete API discovery, security posture management, and drift detection * Data Security and Posture Management Reduce the risk of data breaches and protect sensitive PII * Use Cases Use Cases Case Studies Orca Security is trusted by the most innovative companies across the globe. * Browse Case Studies Industries * Financial Services * Technology * Government * Retail * Healthcare * Media & Entertainment User Roles * CISO * Security Architect * DevOps Orca Powers Cloud Security for Digital Turbine. Read Case Study Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca Security. Read Case Study * Partners Partners Our Partners Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem. * Partner Overview * Join the Program * Amazon Web Services * Microsoft Azure * Google Cloud * Alibaba Cloud * Oracle Cloud * Research Research Orca Research Pod Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform. * See Our Latest Discoveries Orca Research How Orca Found SSRF Vulnerabilities in Four Different Azure Services CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks * Resources Resources Resource Library Download and view eBooks, whitepapers, videos and more in our packed Resource Library. * Browse Resources Blog Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts. * Browse Blogs * Cloud Risk Encyclopedia * Product Articles & Videos * Comparisons * Events & Webinars * Podcasts * Customer Support * About About Our Customers Orca Security is trusted by the most innovative companies across the globe. * Browse Case Studies * Why Orca * About Us * Newsroom * Ratings & Reviews * Media & Press * Careers * FAQs * Contact Us * English * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Free Trial * Get Demo Press enter to search * Cloud Risk Superglue: A remediated zero-day vulnerability in AWS Glue * Cloud Risk BreakingFormation: Vulnerability in AWS CloudFormation * Blog Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production Checklists * Event Virtual Cloud Security Camp * Case Studies Clearco Enhances Comprehensive Security on Google Cloud Platform with Orca Security * Cloud Risk Superglue: A remediated zero-day vulnerability in AWS Glue View more results Cloud Security Reinvented is a podcast for security leaders who oversee or manage the security infrastructure within their organization with a focus on the cloud. Each episode provides a glimpse inside a day in the life of a successful security leader who has an interesting perspective on cloud security. Security professionals hear directly from their peers about the ongoing trials and tribulations of maintaining a strong security posture and how they disconnect from it all at the end of the day. Play Subscribe for updates WATCH S1 RECAP - BOARD BUY-IN. CLOUD SECURITY POLICIES. VULNERABILITY MANAGEMENT PROVIDING SECURITY WITHOUT PASSWORDS WITH JEREMY TURNER, DEPUTY CISO AT PAIDY JAY THODEN VAN VELZEN (SAP) – HOW A MULTI-CLOUD STRATEGY DRIVES MORE OPTIONS FOR ORGANIZATIONS JADEE HANSON, CISO AT CODE42 – USING CLOUD SECURITY TO FLEX YOUR ADAPTABILITY MUSCLE KATHY WANG, CSO AT DISCORD – GOING FROM B2B TO B2C: WHY IS SECURITY STILL SUCH A HARD SELL? WHY COMPLEXITY IS SYNONYMOUS WITH THE CLOUD AND HOW TO DEAL WITH IT FEATURING ALLISON MILLER HOW TO TAKE A PROACTIVE APPROACH TO RISK MANAGEMENT AND ZERO-DAY VULNERABILITIES WITH AMANDA FENNELL HOW THE WILLINGNESS TO LEARN HELPS WITH CYBERSECURITY FEATURING ROLAND CLOUTIER THE PAST, THE PRESENT, AND THE FUTURE OF CLOUD WITH ANDY STEINGRUEBL OF PINTEREST LEARNING HOW THE CLOUD HELPS WITH IDENTITY AND ACCESS MANAGEMENT FEATURING MEG ANDERSON HOW TO CREATE A CULTURE OF SHARED RESPONSIBILITY IN CYBERSECURITY WITH SAMEER SAIT HOW TO APPROACH SECURITY IN THE IGAMING SPACE WITH JUSTIN SOMAINI HOW TO BECOME CLOUD-NATIVE AND WHY IT'S IMPORTANT WITH NICK VIGIER LEARNING HOW ATTENTION TO DETAIL HELPS WITH CLOUD SECURITY WITH NICK SELBY GOING FROM ON-PREMISE TO CLOUD SECURITY WITH RENEE GUTTMANN HOW TO LET GO OF THE "GOTCHA" MENTALITY IN SECURITY WITH BRIAN HAUGLI HOW TO USE THE CLOUD TO DISTINGUISH BETWEEN TRUE AND FALSE INFORMATION WITH MOREY HABER LEARNING WHY SECURITY IS NON-BINARY WITH RYAN GURNEY, THE CISO-IN-RESIDENCE AT YL VENTURES HOW TO BUILD TRUST AND REPUTATION IN INFORMATION SECURITY WITH DAN WALSH WHY WE NEED MORE DIVERSITY IN CYBERSECURITY WITH CHRIS FOULON WHY WE SHOULD EMBRACE AUTOMATION TO IMPROVE SECURITY WITH JONATHAN JAFFE HEALTHCARE HAS A LOT OF POTENTIAL WHEN IT COMES TO EMBRACING TECHNOLOGY WITH BEN WAUGH HOW TO PROVIDE STRONG LEADERSHIP IN THE SECURITY INDUSTRY WITH DREW DANIELS THE CHALLENGES AND STRESS OF BEING A CSO WITH TY SBANO UNCOVERING THE CHANGES CLOUD TECHNOLOGIES HAVE SPARKED IN THE AIRLINE INDUSTRY WITH DENEEN DEFIORE LISTEN S1 RECAP - BOARD BUY-IN. CLOUD SECURITY POLICIES. VULNERABILITY MANAGEMENT PROVIDING SECURITY WITHOUT PASSWORDS WITH JEREMY TURNER, DEPUTY CISO AT PAIDY JAY THODEN VAN VELZEN (SAP) – HOW A MULTI-CLOUD STRATEGY DRIVES MORE OPTIONS FOR ORGANIZATIONS JADEE HANSON, CISO AT CODE42 – USING CLOUD SECURITY TO FLEX YOUR ADAPTABILITY MUSCLE KATHY WANG, CSO AT DISCORD – GOING FROM B2B TO B2C: WHY IS SECURITY STILL SUCH A HARD SELL? WHY COMPLEXITY IS SYNONYMOUS WITH THE CLOUD AND HOW TO DEAL WITH IT FEATURING ALLISON MILLER HOW TO TAKE A PROACTIVE APPROACH TO RISK MANAGEMENT AND ZERO-DAY VULNERABILITIES WITH AMANDA FENNELL HOW THE WILLINGNESS TO LEARN HELPS WITH CYBERSECURITY FEATURING ROLAND CLOUTIER THE PAST, THE PRESENT, AND THE FUTURE OF CLOUD WITH ANDY STEINGRUEBL OF PINTEREST LEARNING HOW THE CLOUD HELPS WITH IDENTITY AND ACCESS MANAGEMENT FEATURING MEG ANDERSON HOW TO CREATE A CULTURE OF SHARED RESPONSIBILITY IN CYBERSECURITY WITH SAMEER SAIT HOW TO APPROACH SECURITY IN THE IGAMING SPACE WITH JUSTIN SOMAINI HOW TO BECOME CLOUD-NATIVE AND WHY IT'S IMPORTANT WITH NICK VIGIER LEARNING HOW ATTENTION TO DETAIL HELPS WITH CLOUD SECURITY WITH NICK SELBY GOING FROM ON-PREMISE TO CLOUD SECURITY WITH RENEE GUTTMANN HOW TO LET GO OF THE "GOTCHA" MENTALITY IN SECURITY WITH BRIAN HAUGLI HOW TO USE THE CLOUD TO DISTINGUISH BETWEEN TRUE AND FALSE INFORMATION WITH MOREY HABER LEARNING WHY SECURITY IS NON-BINARY WITH RYAN GURNEY, THE CISO-IN-RESIDENCE AT YL VENTURES HOW TO BUILD TRUST AND REPUTATION IN INFORMATION SECURITY WITH DAN WALSH WHY WE NEED MORE DIVERSITY IN CYBERSECURITY WITH CHRIS FOULON WHY WE SHOULD EMBRACE AUTOMATION TO IMPROVE SECURITY WITH JONATHAN JAFFE HEALTHCARE HAS A LOT OF POTENTIAL WHEN IT COMES TO EMBRACING TECHNOLOGY WITH BEN WAUGH HOW TO PROVIDE STRONG LEADERSHIP IN THE SECURITY INDUSTRY WITH DREW DANIELS UNCOVERING THE CHANGES CLOUD TECHNOLOGIES HAVE SPARKED IN THE AIRLINE INDUSTRY WITH DENEEN DEFIORE THE CHALLENGES AND STRESS OF BEING A CSO WITH TY SBANO GET CLOUD SECURITY REINVENTED UPDATES FIRST NAME LAST NAME EMAIL ADDRESS Subscribe for updates By subscribing, you agree to our terms of service and privacy policy. See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through. * PLATFORM * CLOUD SECURITY PLATFORM * Platform * SideScanning™ Technology * Context-Aware Security * Built-in Compliance * Automation & Customization * TECHNOLOGY ECOSYSTEM * Amazon Web Services * Microsoft Azure * Google Cloud Platform * SOLUTIONS * BY SOLUTION * Malware Detection * Vulnerability Management * Sensitive Data Detection * Container and Kubernetes Security * Multi-Cloud Compliance and Security * Cloud Security Posture Management (CSPM) * CIEM * Cloud Workload Protection Platform (CWPP) * Cloud Detection and Response (CDR) * Shift Left Security * API Security * Data Security and Posture Management (DSPM) * BY INDUSTRY * Financial Services * Technology Services * Media & Entertainment * Healthcare * Retail * RESOURCES * * Library * Product Info * Podcast * Case Studies * Cloud Risk Encyclopedia * Blog * Events * COMPARISONS * Prisma Cloud Security 2022 * Qualys Cloud Agent * Twistlock Container Security * Redlock Palo Alto * Rapid7 InsightVM * Check Point CloudGuard Dome9 * COMPANY * * About * Partners * Reviews * Orca Research Pod * Careers * Newsroom * Media Kit * FAQs * Contact * Support * Login * STAY IN TOUCH Get cloud security insights and the latest Orca news * * * * * * -------------------------------------------------------------------------------- ©2023 Orca Security. All rights reserved. * Privacy Policy * Terms of Use * * * * word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 COOKIES & PRIVACY We use cookies to personalize your experience. More information SELECT COOKIES TO ACCEPT * Necessary * Site Preferences * Analytics * Marketing Accept CookiesCustomise Cookies