orca.security Open in urlscan Pro
192.0.66.46  Public Scan

Submitted URL: https://go.orca.security/e/898611/resources-podcast-/4qx67/350121537?h=Cdg-pe7NtJoroCHGyeN6SJBTEcR0ujMkOlJrybVMkNs
Effective URL: https://orca.security/resources/podcast/
Submission: On March 29 via api from CH — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="ais-SearchBox-form" novalidate="">
  <input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
  <button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
  <div class="ais-SearchBox-close">
    <span class="push-enter-text">Press enter to search</span>
    <button class="ais-SearchBox-reset-inner" aria-label="Close Search">
      <svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
          fill="white"></path>
      </svg>
    </button>
  </div>
</form>

<form>
  <div style="display: flex; align-items: stretch; flex-direction: row; padding-bottom: 18px;">
    <div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px; padding-right: 24px;"><label forhtml="wistia_subscribe_285_first_name"
        style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">FIRST NAME</label><input type="text" id="wistia_subscribe_285_first_name" name="wistia_subscribe_285_first_name"
        style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
    <div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px;"><label forhtml="wistia_subscribe_286_last_name" style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">LAST
        NAME</label><input type="text" id="wistia_subscribe_286_last_name" name="wistia_subscribe_286_last_name"
        style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
  </div>
  <div style="padding-bottom: 40px;">
    <div style="display: flex; flex-direction: column; justify-content: center; align-items: stretch; width: 100%; margin-top: 18px;"><label forhtml="wistia_subscribe_287_email" style="margin-bottom: 8px; font-size: 12px; font-weight: bold;">EMAIL
        ADDRESS</label><input type="email" id="wistia_subscribe_287_email" name="wistia_subscribe_287_email"
        style="box-sizing: border-box; color: rgb(0, 0, 0); height: 60px; border-radius: 6px; font-size: 18px; padding-left: 20px; width: 100%; border-width: 1px; border-style: solid; border-color: rgb(255, 255, 255);"></div>
  </div>
  <div style="display: flex; align-items: center; justify-content: center; padding-bottom: 40px;"><button type="submit" disabled=""
      style="background: rgb(255, 151, 0); border-radius: 6px; border: 0px; color: rgb(255, 255, 255); cursor: default; font-family: &quot;Open Sans&quot;, WistiaPlayerInter, Helvetica, sans-serif; font-size: 18px; padding-left: 30px; padding-right: 30px; height: 54px; opacity: 0.5; outline: none; transform: scale(1.001); transform-origin: center bottom; transition: transform 200ms cubic-bezier(0.15, 0.51, 0.25, 1) 0s;">Subscribe
      for updates</button></div>
  <div style="font-size: 12px; line-height: 1.83;">By subscribing, you agree to our terms of service and privacy policy.</div>
</form>

Text Content

 * English
 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Platform
   Platform
   
   The Orca Platform
   
   Secure cloud infrastructure, workloads, data, APIs, and identities with our
   industry-leading agentless platform.
   
    * Platform Overview
   
    * Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    * Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    * Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    * Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
   
    * Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical
      risks
    * Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    * Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom
      checks
    * Shift Left Security
      Secure cloud-native apps across the SDLC
   
    * SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    * API Security
      Complete API discovery, security posture management, and drift detection
    * Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII

 * Use Cases
   Use Cases
   
   Case Studies
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
   Industries
   
    * Financial Services
    * Technology
    * Government
    * Retail
    * Healthcare
    * Media & Entertainment
   
   User Roles
   
    * CISO
    * Security Architect
    * DevOps
   
   Orca Powers Cloud Security for Digital Turbine.
   
   Read Case Study
   
   Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca
   Security.
   
   Read Case Study

 * Partners
   Partners
   
   Our Partners
   
   Our team is extended and strengthened by our strong partnerships across the
   Cloud Security ecosystem.
   
    * Partner Overview
    * Join the Program
   
    * Amazon Web Services
    * Microsoft Azure
    * Google Cloud
    * Alibaba Cloud
    * Oracle Cloud

 * Research
   Research
   
   Orca Research Pod
   
   Our expert security research team discovers and analyzes cloud risks and
   vulnerabilities to strengthen the Orca platform.
   
    * See Our Latest Discoveries
   
   Orca Research
   
   How Orca Found SSRF Vulnerabilities in Four Different Azure Services
   
   CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability
   
   Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

 * Resources
   Resources
   
   Resource Library
   
   Download and view eBooks, whitepapers, videos and more in our packed Resource
   Library.
   
    * Browse Resources
   
   Blog
   
   Read Cloud Security thought leadership, how-to's, and insightful posts from
   Orca Security experts.
   
    * Browse Blogs
   
    * Cloud Risk Encyclopedia
    * Product Articles & Videos
    * Comparisons
    * Events & Webinars
    * Podcasts
    * Customer Support

 * About
   About
   
   Our Customers
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
    * Why Orca
    * About Us
    * Newsroom
    * Ratings & Reviews
    * Media & Press
    * Careers
    * FAQs
    * Contact Us

 * English
 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Free Trial
 * Get Demo



Press enter to search
 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue
 * Cloud Risk
   BreakingFormation: Vulnerability in AWS CloudFormation
 * Blog
   Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production
   Checklists
 * Event
   Virtual Cloud Security Camp
 * Case Studies
   Clearco Enhances Comprehensive Security on Google Cloud Platform with Orca
   Security

 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue

View more results

Cloud Security Reinvented is a podcast for security leaders who oversee or
manage the security infrastructure within their organization with a focus on the
cloud. Each episode provides a glimpse inside a day in the life of a successful
security leader who has an interesting perspective on cloud security. Security
professionals hear directly from their peers about the ongoing trials and
tribulations of maintaining a strong security posture and how they disconnect
from it all at the end of the day.

Play
Subscribe for updates

 


WATCH


S1 RECAP - BOARD BUY-IN. CLOUD SECURITY POLICIES. VULNERABILITY MANAGEMENT




PROVIDING SECURITY WITHOUT PASSWORDS WITH JEREMY TURNER, DEPUTY CISO AT PAIDY




JAY THODEN VAN VELZEN (SAP) – HOW A MULTI-CLOUD STRATEGY DRIVES MORE OPTIONS FOR
ORGANIZATIONS




JADEE HANSON, CISO AT CODE42 – USING CLOUD SECURITY TO FLEX YOUR ADAPTABILITY
MUSCLE




KATHY WANG, CSO AT DISCORD – GOING FROM B2B TO B2C: WHY IS SECURITY STILL SUCH A
HARD SELL?




WHY COMPLEXITY IS SYNONYMOUS WITH THE CLOUD AND HOW TO DEAL WITH IT FEATURING
ALLISON MILLER




HOW TO TAKE A PROACTIVE APPROACH TO RISK MANAGEMENT AND ZERO-DAY VULNERABILITIES
WITH AMANDA FENNELL




HOW THE WILLINGNESS TO LEARN HELPS WITH CYBERSECURITY FEATURING ROLAND CLOUTIER




THE PAST, THE PRESENT, AND THE FUTURE OF CLOUD WITH ANDY STEINGRUEBL OF
PINTEREST




LEARNING HOW THE CLOUD HELPS WITH IDENTITY AND ACCESS MANAGEMENT FEATURING MEG
ANDERSON




HOW TO CREATE A CULTURE OF SHARED RESPONSIBILITY IN CYBERSECURITY WITH SAMEER
SAIT




HOW TO APPROACH SECURITY IN THE IGAMING SPACE WITH JUSTIN SOMAINI




HOW TO BECOME CLOUD-NATIVE AND WHY IT'S IMPORTANT WITH NICK VIGIER




LEARNING HOW ATTENTION TO DETAIL HELPS WITH CLOUD SECURITY WITH NICK SELBY




GOING FROM ON-PREMISE TO CLOUD SECURITY WITH RENEE GUTTMANN




HOW TO LET GO OF THE "GOTCHA" MENTALITY IN SECURITY WITH BRIAN HAUGLI




HOW TO USE THE CLOUD TO DISTINGUISH BETWEEN TRUE AND FALSE INFORMATION WITH
MOREY HABER




LEARNING WHY SECURITY IS NON-BINARY WITH RYAN GURNEY, THE CISO-IN-RESIDENCE AT
YL VENTURES




HOW TO BUILD TRUST AND REPUTATION IN INFORMATION SECURITY WITH DAN WALSH




WHY WE NEED MORE DIVERSITY IN CYBERSECURITY WITH CHRIS FOULON




WHY WE SHOULD EMBRACE AUTOMATION TO IMPROVE SECURITY WITH JONATHAN JAFFE




HEALTHCARE HAS A LOT OF POTENTIAL WHEN IT COMES TO EMBRACING TECHNOLOGY WITH BEN
WAUGH




HOW TO PROVIDE STRONG LEADERSHIP IN THE SECURITY INDUSTRY WITH DREW DANIELS




THE CHALLENGES AND STRESS OF BEING A CSO WITH TY SBANO




UNCOVERING THE CHANGES CLOUD TECHNOLOGIES HAVE SPARKED IN THE AIRLINE INDUSTRY
WITH DENEEN DEFIORE




LISTEN


S1 RECAP - BOARD BUY-IN. CLOUD SECURITY POLICIES. VULNERABILITY MANAGEMENT




PROVIDING SECURITY WITHOUT PASSWORDS WITH JEREMY TURNER, DEPUTY CISO AT PAIDY




JAY THODEN VAN VELZEN (SAP) – HOW A MULTI-CLOUD STRATEGY DRIVES MORE OPTIONS FOR
ORGANIZATIONS




JADEE HANSON, CISO AT CODE42 – USING CLOUD SECURITY TO FLEX YOUR ADAPTABILITY
MUSCLE




KATHY WANG, CSO AT DISCORD – GOING FROM B2B TO B2C: WHY IS SECURITY STILL SUCH A
HARD SELL?




WHY COMPLEXITY IS SYNONYMOUS WITH THE CLOUD AND HOW TO DEAL WITH IT FEATURING
ALLISON MILLER




HOW TO TAKE A PROACTIVE APPROACH TO RISK MANAGEMENT AND ZERO-DAY VULNERABILITIES
WITH AMANDA FENNELL




HOW THE WILLINGNESS TO LEARN HELPS WITH CYBERSECURITY FEATURING ROLAND CLOUTIER




THE PAST, THE PRESENT, AND THE FUTURE OF CLOUD WITH ANDY STEINGRUEBL OF
PINTEREST




LEARNING HOW THE CLOUD HELPS WITH IDENTITY AND ACCESS MANAGEMENT FEATURING MEG
ANDERSON




HOW TO CREATE A CULTURE OF SHARED RESPONSIBILITY IN CYBERSECURITY WITH SAMEER
SAIT




HOW TO APPROACH SECURITY IN THE IGAMING SPACE WITH JUSTIN SOMAINI




HOW TO BECOME CLOUD-NATIVE AND WHY IT'S IMPORTANT WITH NICK VIGIER




LEARNING HOW ATTENTION TO DETAIL HELPS WITH CLOUD SECURITY WITH NICK SELBY




GOING FROM ON-PREMISE TO CLOUD SECURITY WITH RENEE GUTTMANN




HOW TO LET GO OF THE "GOTCHA" MENTALITY IN SECURITY WITH BRIAN HAUGLI




HOW TO USE THE CLOUD TO DISTINGUISH BETWEEN TRUE AND FALSE INFORMATION WITH
MOREY HABER




LEARNING WHY SECURITY IS NON-BINARY WITH RYAN GURNEY, THE CISO-IN-RESIDENCE AT
YL VENTURES




HOW TO BUILD TRUST AND REPUTATION IN INFORMATION SECURITY WITH DAN WALSH




WHY WE NEED MORE DIVERSITY IN CYBERSECURITY WITH CHRIS FOULON




WHY WE SHOULD EMBRACE AUTOMATION TO IMPROVE SECURITY WITH JONATHAN JAFFE




HEALTHCARE HAS A LOT OF POTENTIAL WHEN IT COMES TO EMBRACING TECHNOLOGY WITH BEN
WAUGH




HOW TO PROVIDE STRONG LEADERSHIP IN THE SECURITY INDUSTRY WITH DREW DANIELS




UNCOVERING THE CHANGES CLOUD TECHNOLOGIES HAVE SPARKED IN THE AIRLINE INDUSTRY
WITH DENEEN DEFIORE




THE CHALLENGES AND STRESS OF BEING A CSO WITH TY SBANO




GET CLOUD SECURITY REINVENTED UPDATES

FIRST NAME
LAST NAME
EMAIL ADDRESS
Subscribe for updates
By subscribing, you agree to our terms of service and privacy policy.

See Orca in action-> View a 10 minute recorded demo or sign up for a
personalized one-on-one walk-through.


 * PLATFORM
   
   
   * CLOUD SECURITY PLATFORM
     
     * Platform
     * SideScanning™ Technology
     * Context-Aware Security
     * Built-in Compliance
     * Automation & Customization
   
   
   * TECHNOLOGY ECOSYSTEM
     
     * Amazon Web Services
     * Microsoft Azure
     * Google Cloud Platform


 * SOLUTIONS
   
   
   * BY SOLUTION
     
     * Malware Detection
     * Vulnerability Management
     * Sensitive Data Detection
     * Container and Kubernetes Security
     * Multi-Cloud Compliance and Security
     * Cloud Security Posture Management (CSPM)
     * CIEM
     * Cloud Workload Protection Platform (CWPP)
     * Cloud Detection and Response (CDR)
     * Shift Left Security
     * API Security
     * Data Security and Posture Management (DSPM)
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Technology Services
     * Media & Entertainment
     * Healthcare
     * Retail


 * RESOURCES
   
   * * Library
     * Product Info
     * Podcast
     * Case Studies
     * Cloud Risk Encyclopedia
     * Blog
     * Events
   
   
   * COMPARISONS
     
     * Prisma Cloud Security 2022
     * Qualys Cloud Agent
     * Twistlock Container Security
     * Redlock Palo Alto
     * Rapid7 InsightVM
     * Check Point CloudGuard Dome9


 * COMPANY
   
   * * About
     * Partners
     * Reviews
     * Orca Research Pod
     * Careers
     * Newsroom
     * Media Kit
     * FAQs
   * Contact
     * Support
     * Login


 * STAY IN TOUCH
   
   Get cloud security insights
   and the latest Orca news
   
   
   * 
   * 
   * 
   * 
   * 
   * 

--------------------------------------------------------------------------------

©2023 Orca Security. All rights reserved.

 * Privacy Policy
 * Terms of Use

 * 
 * 
 * 
 * 


word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1

COOKIES & PRIVACY

We use cookies to personalize your experience. More information

SELECT COOKIES TO ACCEPT

 * Necessary
 * Site Preferences
 * Analytics
 * Marketing

Accept CookiesCustomise Cookies