by O3 CYBER
Together with our guest we share knowledge and insight about Cyber Security. The podcast is ad-free. Follow us at: https://O3C.no
Language
🇺🇲
Publishing Since
7/29/2020
Email Addresses
1 available
Phone Numbers
0 available
April 11, 2025
<p>In this episode of the O3 Cloud Security Podcast, Håkon Sørum and Anja Olsen delve into the intricacies of cloud threat detection, discussing its differences from traditional detection methods, the importance of application-specific knowledge, and the evolving landscape of cybersecurity. Anja shares her journey in cybersecurity, her role at DNB, and insights into effective detection strategies, including the significance of risk-based alerting and community engagement. </p><p>DNB Threat Report:<a href=" https://www.dnb.no/okonomisk-radgiver/sikkerhet/trusler-og-trender" target="_blank" rel="ugc noopener noreferrer"> https://www.dnb.no/okonomisk-radgiver/sikkerhet/trusler-og-trender</a></p><p>Detection Engineering Weekly: <a href="https://www.detectionengineering.net/ " target="_blank" rel="ugc noopener noreferrer">https://www.detectionengineering.net/</a> </p><p>Detection at scale: <a href="http://detectionatscale.com/" target="_blank" rel="ugc noopener noreferrer">detectionatscale.com </a></p><p>Deathcon: <a href="https://deathcon.io/" target="_blank" rel="ugc noopener noreferrer">https://deathcon.io/</a> </p>
February 27, 2025
<p>In this episode of the O3C Cloud Security Podcast, host Håkon Sørum and guests Rami McCarthy and Olav Østbye delve into the intricacies of cloud security strategy. Rami shares his extensive background in cloud security, discussing his transition from consultancy to in-house roles and now to a vendor position. The conversation emphasizes the importance of visibility in cloud security, the need to understand the business context, and the critical steps for CISOs moving to the cloud. They explore the challenges faced by security leaders in navigating the evolving landscape of cloud security, the significance of identity and data security, and the need for democratizing security practices across organizations. The discussion also highlights the role of people in shaping security strategies and the future trends that will impact cloud security.</p><p><br></p><p>You can find Rami at: </p><p>https://www.linkedin.com/in/ramimac/ and https://ramimac.me/</p>
February 6, 2025
<p>In this episode Håkon has Olav and Karim on the podcast to discuss the upcoming season and some common challenges organizations face when using cloud services. </p> <p><br></p> <p><strong>Find us at: </strong></p> <p>https://www.linkedin.com/company/o3cyber</p> <p>https://www.youtube.com/@o3cyber</p> <p><br></p> <p><strong>Host:</strong></p> <p>www.linkedin.com/in/hakonsorum</p> <p><br></p> <p><strong>Guests:</strong></p> <p>https://www.linkedin.com/in/karim-el-melhaoui</p> <p>https://www.linkedin.com/in/oestbye/</p>
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
Norges Bank Investment Management
Graham Cluley & Carole Theriault
Malicious Life
risky.biz
VICE
Patrick Gray
Breaking Marathon Limits
Jim Love
N2K Networks
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.