Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Backup
      • Microsoft 365 Backup
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Backup
    • Microsoft 365 Backup
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: The CloudBytes Podcast
Author: Brian Knudtson
Date: December 2, 2022

The CloudBytes Podcast: Season 3 is Here!

Here’s an understatement: Data security is a major concern! Don’t fret. Listen to the freshly-launched Season 3 of the CloudBytes Podcast for an in-depth primer on all things cybersecurity.

It’s been been nearly three years, two seasons, and 45 episodes since we first launched The CloudBytes Podcast in 2020. Being a part of those (approximately) 1,350 minutes of fantastic conversation — not to mention the many more spent working off air — gave me such immense pleasure. Indeed, I consider them to be a highlight of my time spent at iland. That’s why I’m so excited to announce the official launch of Season 3, and another 23 episodes ready to be binged!

For those who may be unfamiliar with the first two seasons of CloudBytes (go check them out!), we focused very strongly on — you guessed it — the cloud. However, for me, there was one discussion topic that clearly stood out: Security is a top concern for organizations moving their data to the cloud. In fact, we devoted an entire episode to it last season. In the meantime, iland was acquired by 11:11 Systems (in case you hadn’t heard) — a company with cloud, connectivity, and security at its core. This major development opened up a whole new opportunity for me and the podcast: the ability to directly address cybersecurity.

As a legacy sysadmin, I decided to approach Season 3 as a cybersecurity primer for systems/cloud administrators like me. But I also wanted it to be something that could be interesting to people who specialize in cybersecurity. Anyone who is in this industry for more than a few years (generally) knows what “cybersecurity” is. But there are many, many disciplines that comprise such a simple phrase. So, with the intention of building a primer, I laid them out and tackled what we could.

The result is a brand new season of The CloudBytes Podcast with episodes that address the following topics:

  • Network Defenses: Classic defenses like firewalls and network segmentation.
  • Secure Connectivity: Distributed environments are almost a given, so how do we connect them together securely?
  • Asset Management: You can’t protect or recover what you don’t know about, so tracking what you have is critical.
  • Service Provider Management: If you rely on another organization to support your infrastructure (like a cloud provider), how do you ensure the security of your data with them?
  • Supply Chain Protection: The Solarwinds attack made us all acutely aware of how much trust we put into our technology providers, but should we?
  • Application Protection: Applications allow us to access data, so putting up defenses to protect them is important. Unfortunately, doing so is very dependent on the application.
  • Data Protection: Data is what it’s all about, so how can we go about protecting the most elemental part of our infrastructure?
  • Malware Defense: Ransomware is the cybersecurity threat at the forefront of all our minds. Understanding this threat must be the first step in stopping it.
  • Vulnerability Management: Defending infrastructure is often times a battle to keep the holes in the dam filled, so how you track and address those vulnerabilities is critical to success.
  • The Human Element: Cybersecurity is more than computer systems – there are people managing the infrastructure, defending the systems, and using the applications. They’re all critical to the protection of the data.
  • Employee Awareness: It’s often said that people are the weakest link in the cybersecurity battle, so how do we best equip them knowing they’re still likely to fail?
  • Identity and Access Management: Secure access to applications and data means properly identifying who is trying to gain access, what is being accessed, and what level of access they should have.
  • Secure Configuration: The security posture of all systems, especially the cloud, is predicated on securely configuring the system – which can be daunting and should not to be taken lightly.
  • Data Protection (Part II!): In the wake of ransomware and other destructive cyber incidents, the ultimate safety net is reverting to backups. So how should this be done?
  • Data Recovery: Backups are great, but only if they can be recovered in the right place, at the right time.
  • Log Management and Monitoring: Logs are haystacks that carry precious needles, but it’s no small task to find them.
  • Detection and Response: The best way to find and stop cybercriminals is to detect their behavior from the very start and respond as quickly as possible.
  • Penetration Testing: The best way to know where defenses are weakest is actively test them, but it’s not always as simple as finding a friendly neighborhood hacker.
  • Private Cloud: Somewhere between public cloud and on-premises data centers is an approach to cloud that gives organizations a dedicated cloud environment, but is it also middle ground for security?
  • Incident Response: Even the best defenses can fail, so every organization should have a plan on how to respond to a full-blown cyber incident.

As with past seasons, all the episodes have been released at once and are now available to binge over at cloudbytes.cloud. But if you’re a once-a-week podcast listener, you can subscribe to our Apple or Spotify feeds (or simply search in your podcast app of choice) to listen to the weekly episode drops. It was an ambitious amount of content to cover, but I was very fortunate to find a fantastic and varied set of panelists to discuss these topics. I hope you enjoy listening to these conversations as much as I did having them!

Categories: Cloud Backup, Cybercrime, DRaaS, Ransomware, Security, UncategorizedBy Brian KnudtsonDecember 2, 2022
Tags: The CloudBytes Podcast

Author: Brian Knudtson

In his 20-year career, Brian has experienced many different perspectives of the IT industry. He has worked as a value-added reseller, vendor and service provider in roles in web development, system administration, post-sales deployment, pre-sales architecting, public cloud design and technical marketing. Currently, Brian is the Director of Cloud Market Intelligence at 11:11. He enjoys spending time with his wife and three kids. He is also heavily involved with the Destination Imagination program and has been a long-time member of the VMware community, notably starting the Omaha VMUG and putting on VMunderground at VMworld. You can find him online occasionally blogging at http://knudt.net/vblog and tweeting at @bknudtson.

Post navigation

PreviousPrevious post:Changes To Cyber Insurance Mean Adjusting Your Approach to Managing RiskNextNext post:Litigation Hold Is Not Backup

Related Posts

Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
What is 11:11 Systems?
What is 11:11 Systems? A company built on cloud, connectivity, and security
January 30, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
Why Staying Connected to the Cloud Can Be Simple, Secure, and Seamless
January 24, 2023
11:11 Managed Connectivity Solutions
11:11 Managed Connectivity Solutions
January 23, 2023
Risky Business
Risky Business: Managing Vulnerabilities by Prioritizing Risk
January 11, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}