<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/static/rss.xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
     version="2.0">
<channel>
<title>Head In The Cloud</title>
<link>http://myheadinthe.cloud</link>
<atom:link href="https://pinecast.com/feed/head-in-the-cloud" rel="self" type="application/rss+xml" />
<generator>Pinecast (https://pinecast.com)</generator>
<language>en-CA</language><itunes:author>John Svazic</itunes:author>
<description><![CDATA[Security, DevOps and Life In the Cloud - A discussion about security as it relates to cloud computing and all the technology and process that comes with it.]]></description>
<itunes:owner>
<itunes:name>John Svazic</itunes:name>
<itunes:email>jsvazic@gmail.com</itunes:email>
</itunes:owner>
<itunes:explicit>no</itunes:explicit>
<itunes:image href="https://storage.pinecast.net/podcasts/covers/3ee873eb-7433-4de3-99fe-50c60e767401/podcast_cover.png" />
<image>
<title>Head In The Cloud</title>
<link>http://myheadinthe.cloud</link>
<url>https://storage.pinecast.net/podcasts/covers/3ee873eb-7433-4de3-99fe-50c60e767401/podcast_cover.png</url>
</image><itunes:type>episodic</itunes:type>
<copyright>Copyright (c) 2017 - John Svazic</copyright>
<itunes:subtitle>Security, DevOps, and Life In The Cloud</itunes:subtitle>
<itunes:complete>Yes</itunes:complete>
<itunes:category text="Technology" />
<item><title>Goodnight, Goodbye, and Good Luck</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=124</guid>
<pubDate>Sun, 13 Aug 2017 12:03:04 -0000</pubDate>

<itunes:duration>00:16:09</itunes:duration>
<itunes:subtitle>Its the final episode of Head In The Cloud, but its not the end of one of your favourite security podcasters! Listen up to hear whats in store for the podcast and why Im shutting down Head In The Cloud. </itunes:subtitle>
<link>http://myheadinthe.cloud/episode/c18391500f584aaf/goodnight-goodbye-and-good-luck</link>
<description><![CDATA[<p>It's the final episode of Head In The Cloud, but it's not the end of one of your favourite security podcasters! Listen up to hear what's in store for the podcast and why I'm shutting down Head In The Cloud. </p>
<p>Some links:</p>
<ul>
<li><a href="https://purplesquadsec.com/" rel="nofollow">Purple Squad Security</a></li>
<li><a href="https://signup.purplesquadsec.com/" rel="nofollow">Purple Squad Security Slack Signup Bot</a></li>
</ul>
<p>Head In The Cloud was proud to be a part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek Podcast Network</a>!</p>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/c1839150-0f58-4aaf-aad7-9ac2ac1de6ae:437954c7-4f68-455d-ae71-6d3564ebed54.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>AWS, Breaches, Chihuahuas, and more with Corey Quinn</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=120</guid>
<pubDate>Sun, 30 Jul 2017 13:22:08 -0000</pubDate>

<itunes:duration>00:45:38</itunes:duration>
<itunes:subtitle>I speak with Corey Quinn about AWS and their recent news headlines related to various breaches amongst other things...</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/e860386addb14a14/aws-breaches-chihuahuas-and-more-with-corey-quinn</link>
<description><![CDATA[<p>I speak with Corey Quinn about AWS and their recent news headlines related to various breaches amongst other things...</p>
<p>Corey Quinn joins me on today's podcast to talk about AWS and how they've been in the news lately for all the wrong reasons. We talk about the shared security model, things we like and may not like so much about AWS, as well as ... chihuahuas? You'll need to listen to get the full story.</p>
<p>Some links:</p>
<ul>
<li><a href="https://lastweekinaws.com/" rel="nofollow">Last Week In AWS</a> (Corey's Newsletter)</li>
<li><a href="http://money.cnn.com/2017/07/12/technology/verizon-data-leaked-online/index.html" rel="nofollow">Verizon Data Leak</a></li>
<li><a href="https://www.dailydot.com/debug/wwe-database-leak/" rel="nofollow">WWE Data Leak</a></li>
<li><a href="https://thehackernews.com/2017/07/sweden-data-breach.html" rel="nofollow">Sweden Data Leak</a></li>
</ul>
<p>Head In The Cloud is proud to be part of the GonnaGeek Podcast Network!</p>
<p>Want to get in touch?  Want to join the discussion on Slack? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/e860386a-ddb1-4a14-bea8-7c5b6ba74d57:2c5520d2-018e-47a7-a492-86a15374edf0.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Disaster Recovery In The Cloud</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=115</guid>
<pubDate>Sun, 23 Jul 2017 14:01:45 -0000</pubDate>

<itunes:duration>00:47:32</itunes:duration>
<itunes:subtitle>A brief look at disaster recovery and how it applies to the cloud.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/adeb812ea5c04868/disaster-recovery-in-the-cloud</link>
<description><![CDATA[<p>A brief look at disaster recovery and how it applies to the cloud.</p>
<p>Disaster recovery is an important part of any security plan you have for your organization. Disaster recovery in the cloud is equally important but is often overlooked. In this episode I take a look at different levels of disaster recover, how to apply them to the cloud and some ideas for defining your own disaster recovery plan.</p>
<p>Some links:</p>
<ul>
<li><a href="http://www.tomsitpro.com/articles/azure-vs-aws-cloud-comparison,2-870-2.html" rel="nofollow">Compare Azure and AWS Service Offerings</a></li>
<li><a href="https://cloud.google.com/free/docs/map-aws-google-cloud-platform" rel="nofollow">Compare Google Cloud Platform and AWS Service Offerings</a></li>
<li><a href="https://about.gitlab.com/2017/02/10/postmortem-of-database-outage-of-january-31/" rel="nofollow">Gitlab Outage Post Mortem</a></li>
<li><a href="https://www.terraform.io/" rel="nofollow">Terraform</a></li>
</ul>
<p>Head In The Cloud is proud to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek Podcast Network</a>!</p>
<p>Want to get in touch?  Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/adeb812e-a5c0-4868-b47d-e96ac99473f8:48bbc914-c8b6-4b18-8bc6-a9e7e089e359.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Uncovering flAWS In Your AWS Cloud Environment</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=111</guid>
<pubDate>Sun, 16 Jul 2017 13:54:51 -0000</pubDate>

<itunes:duration>00:41:28</itunes:duration>
<itunes:subtitle>Scott Piper (@0xdabbad00) joins me to talk about flAWS, a website he created that is part capture the flag (CTF), red/blue team training, AWS security guide and honeypot!</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/9c2ce17069f24cd8/uncovering-flaws-in-your-aws-cloud-environment</link>
<description><![CDATA[<p>Scott Piper (@0xdabbad00) joins me to talk about flAWS, a website he created that is part capture the flag (CTF), red/blue team training, AWS security guide and honeypot!</p>
<p>Lots of interesting topics of discussion in this episode you definitely don't want to miss!</p>
<p>Some links:</p>
<ul>
<li><a href="http://flaws.cloud/" rel="nofollow">flAWS</a></li>
<li><a href="https://summitroute.com/" rel="nofollow">SummitRoute</a></li>
<li><a href="https://summitroute.com/blog/2017/07/09/downclimb/" rel="nofollow">Downclimb</a></li>
<li><a href="https://summitroute.com/blog/2017/05/30/free_tools_for_auditing_the_security_of_an_aws_account/" rel="nofollow">Blog Article - Free Tools for Auditing The Security of an AWS Account</a></li>
<li><a href="mailto:scott@summitroute.com" rel="nofollow">Email Scott</a></li>
<li>Twitter: <a href="https://twitter.com/0xdabbad00" rel="nofollow">@0xdabbad00</a></li>
</ul>
<p>Head In The Cloud is proud to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek Podcast Network</a>!</p>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/9c2ce170-69f2-4cd8-99a2-bcd410ec2ff5:25e92033-48e8-47dc-8e88-9ed0f62a89f4.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>IaaS, PaaS, and SaaS – Oh My!</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=109</guid>
<pubDate>Sun, 09 Jul 2017 13:22:34 -0000</pubDate>

<itunes:duration>00:48:10</itunes:duration>
<itunes:subtitle>Looking at the different *aaS solutions, what they are and what the security concerns around them are.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/42c4f6454eec4d3d/iaas-paas-and-saas-oh-my-</link>
<description><![CDATA[<p>Looking at the different *aaS solutions, what they are and what the security concerns around them are.</p>
<p>The big three! The "ah-s" or "as-s" if you will. I discuss what IaaS, PaaS, and SaaS are, what they stand for and what security related concerns you should have regarding each one.</p>
<p>Some links:</p>
<ul>
<li><a href="https://www.cisecurity.org/cis-benchmarks/" rel="nofollow">CIS Hardening Benchmarks</a></li>
</ul>
<p>Proud to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek Podcast Network</a>!</p>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/42c4f645-4eec-4d3d-b2d6-04dc4b5ce155:e48e833e-aa32-433d-90b3-f5a30c05ec4a.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Malware – What Can We Do About It?</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=106</guid>
<pubDate>Sun, 02 Jul 2017 17:07:08 -0000</pubDate>

<itunes:duration>00:39:30</itunes:duration>
<itunes:subtitle>I talk about Malware and some protections we can take in preventing its spread.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/4b01c51ba52e446f/malware-what-can-we-do-about-it-</link>
<description><![CDATA[<p>I talk about Malware and some protections we can take in preventing its spread.</p>
<p>Today's episode is all about Malware - what can we do to protect ourselves, what are some best practices we can follow, etc. I'm a firm believer that Malware is something we can help curtail if we all do our part in protecting ourselves. The fewer systems there are to infect, the less common it will be.</p>
<p>Some links:</p>
<ul>
<li><a href="https://www.sans.org/reading-room/whitepapers/incident/incident-handling-process-small-medium-businesses-1791" rel="nofollow">SANS Incident Handling for Small and Medium Businesses Whitepaper</a></li>
<li><a href="http://blog.talosintelligence.com/" rel="nofollow">Cisco's Talos Intelligence Blog</a></li>
<li><a href="https://isc.sans.edu/" rel="nofollow">SANS Internet Storm Center</a></li>
<li><a href="https://otx.alienvault.com/" rel="nofollow">AlienVault Open Threat Exchange</a></li>
</ul>
<p>Happy to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek</a> Podcast Network!</p>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/4b01c51b-a52e-446f-b4d4-12bf7946adf3:6b288101-cb6a-4a18-8fb3-99d7fdb5c5c0.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>DevSecOps and Rugged DevOps with Anurag “Archie” Agarwal</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=103</guid>
<pubDate>Sun, 25 Jun 2017 17:27:39 -0000</pubDate>

<itunes:duration>00:31:36</itunes:duration>
<itunes:subtitle>I speak with Anurag “Archie” Agarwal from ThreadModeler about DevSecOps, Rugged DevOps, their differences and a bit about threat modeling.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/dada75997bec4eba/devsecops-and-rugged-devops-with-anurag-archie-agarwal</link>
<description><![CDATA[<p>I speak with Anurag “Archie” Agarwal from ThreadModeler about DevSecOps, Rugged DevOps, their differences and a bit about threat modeling.</p>
<p>In this episode I speak with "Archie" Agarwal about DevSecOps and Rugged DevOps before venturing off to some other topics. Great interview, Archie is very knowledgable and a great guest! Have a listen and make sure to look up his company if you're in the market for threat modeling to increase your security posturing.</p>
<p>Contact info for Archie:</p>
<ul>
<li>Email: <a href="mailto:archie@threatmodeler.com" rel="nofollow">archie@threatmodeler.com</a></li>
<li>Website: <a href="http://threatmodeler.com/" rel="nofollow">threatmodeler.com</a></li>
</ul>
<p>Happy to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek</a> Podcast Network!</p>
<p>Want to get in touch?  Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/dada7599-7bec-4eba-bc9b-c228aebe5ab0:95a1f474-3e46-4802-a079-f725955ad7e5.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>The Different Colours of Security</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=101</guid>
<pubDate>Sun, 18 Jun 2017 17:29:19 -0000</pubDate>

<itunes:duration>00:43:38</itunes:duration>
<itunes:subtitle>In this episode, I take a look at the different colours that often come up in security discussions, such as black, white, red, blue, gray, and purple! Looking at each one in turn as well as figuring out what they mean is the purpose of this episode. An</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/f85e3ac75a4c4ff0/the-different-colours-of-security</link>
<description><![CDATA[<p>In this episode, I take a look at the different colours that often come up in security discussions, such as black, white, red, blue, gray, and purple! Looking at each one in turn as well as figuring out what they mean is the purpose of this episode. And people thought InfoSec was boring...</p>
<p>Happy to be part of the <a href="https://www.gonnageek.com/" rel="nofollow">GonnaGeek</a> Podcast Network!</p>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/f85e3ac7-5a4c-4ff0-8c80-485da94021b4:70d2e0e0-cd03-4fe1-a4b3-3665593780c6.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Let’s Talk About IDSs!</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=99</guid>
<pubDate>Sun, 11 Jun 2017 16:15:20 -0000</pubDate>

<itunes:duration>00:53:28</itunes:duration>
<itunes:subtitle>Taking a look at IDSs, what they are, how they work and how they relate to cloud security.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/5d301b148fa74d1a/let-s-talk-about-idss-</link>
<description><![CDATA[<p>Taking a look at IDSs, what they are, how they work and how they relate to cloud security.</p>
<p>In this week's podcast I take a look at Intrusion Detection Systems (IDSs), what they are, what they do, how they work and how they fit into a cloud security model. I went a bit long on this one but I think it's necessary given the breadth of this topic.</p>
<p>Some useful links from this podcast:</p>
<ul>
<li><a href="https://www.snort.org/" rel="nofollow">Snort</a></li>
<li><a href="https://www.bro.org/" rel="nofollow">Bro</a></li>
<li><a href="https://suricata-ids.org/" rel="nofollow">Suricata</a></li>
<li><a href="https://ossec.github.io/" rel="nofollow">OSSEC</a></li>
<li><a href="http://www.la-samhna.de/samhain/" rel="nofollow">Samhain</a></li>
<li><a href="https://wazuh.com/" rel="nofollow">Wazuh</a></li>
<li><a href="https://www.tripwire.com/" rel="nofollow">Tripwire</a></li>
<li><a href="http://threatstack.com/" rel="nofollow">ThreatStack</a></li>
<li><a href="https://evident.io/" rel="nofollow">Evident.io</a></li>
<li><a href="https://youtu.be/WUQNeMhkaco" rel="nofollow">AWS re:Invent 2014 | (SEC402) Intrusion Detection in the Cloud</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/5d301b14-8fa7-4d1a-869d-9fd7927efc88:986759b8-94d8-4b7f-ab31-d822e74d5d7f.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Data Residency and Privacy with Ishay Tentser</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=93</guid>
<pubDate>Sun, 04 Jun 2017 18:05:14 -0000</pubDate>

<itunes:duration>00:38:15</itunes:duration>
<itunes:subtitle>I speak with Ishay Tentser, CEO of IniTech-Digital Products &amp;#038; Innovation, about Data Residency and Privacy.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/72d94541864044db/data-residency-and-privacy-with-ishay-tentser</link>
<description><![CDATA[<p>I speak with Ishay Tentser, CEO of IniTech-Digital Products &amp; Innovation, about Data Residency and Privacy.</p>
<p>In this week's podcast I welcome Ishay Tentser to discuss data residency, privacy and law. This is an important topic that can get overlooked as you focus on security, but with a global economy, it's important to keep it at the forefront. Ishay is the CEO of IniTech-Digital Products &amp; Innovation and was kind enough to join me from Jerusalem, Israel to discuss this important topic. Definitely not one you want to miss! You can reach Ishay via his email address, <a href="mailto:ishay@initech.co.il" rel="nofollow">ishay@initech.co.il</a>.</p>
<p>Some useful links from this podcast:</p>
<ul>
<li><a href="https://www.slideshare.net/IshayTentser/privacy-by-design-for-peerlyst-meetup" rel="nofollow">Privacy by Design Presentation</a></li>
<li><a href="https://www.linkedin.com/in/tentser/" rel="nofollow">Ishay's LinkedIn Profile</a></li>
<li><a href="https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/" rel="nofollow">Overview of the GDPR</a></li>
<li><a href="https://www.privacyshield.gov/welcome" rel="nofollow">Privacy Shield Framework</a></li>
<li><a href="https://initech.co.il/en/" rel="nofollow">IniTech Website</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/72d94541-8640-44db-932e-034265b19803:07cfe7e8-16be-464c-8e3b-47f8813baba0.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Relationships and Soft Skills</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=92</guid>
<pubDate>Sun, 28 May 2017 22:31:54 -0000</pubDate>

<itunes:duration>00:45:03</itunes:duration>
<itunes:subtitle>Are you a security dictator or a respected colleague? Soft skills and relationship building are on the menu for this episode!</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/9ec4259121fc43e4/relationships-and-soft-skills</link>
<description><![CDATA[<p>Are you a security dictator or a respected colleague? Soft skills and relationship building are on the menu for this episode!</p>
<p>Taking a bit of a different turn in this episode. I will be looking at relationship building, whom to start with and who may require a softer touch. Do you want to be the security dictator or someone who is viewed as a peer? Fears or respected? Have a listen!</p>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/9ec42591-21fc-43e4-8bf6-adea1606a1a1:b04e08fc-1eb5-4c0f-a3b2-9950d6414f54.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>A high level overview of DevOps and Related Tools</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=90</guid>
<pubDate>Sun, 21 May 2017 21:11:23 -0000</pubDate>

<itunes:duration>00:52:27</itunes:duration>
<itunes:subtitle>In todays podcast I take a look at system provisioning and the tools your DevOps team may want to look into, and how these tools can help increase your security stance in the cloud!</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/f3feabe3b3324ac5/a-high-level-overview-of-devops-and-related-tools</link>
<description><![CDATA[<p>In today's podcast I take a look at system provisioning and the tools your DevOps team may want to look into, and how these tools can help increase your security stance in the cloud!</p>
<p>Back from a mini-break for Mother's Day, in today's podcast I take a look at system provisioning and the tools your DevOps team may want to look into, and how these tools can help increase your security stance in the cloud! Tools like Chef, Puppet, Terraform and Cloudformation are on the agenda and can be invaluable for success in your adventures in the cloud!</p>
<p>Some links:</p>
<ul>
<li><a href="https://www.chef.io/chef/" rel="nofollow">Chef</a></li>
<li><a href="https://puppet.com/" rel="nofollow">Puppet</a></li>
<li><a href="https://www.ansible.com/" rel="nofollow">Ansible</a></li>
<li><a href="http://kitchen.ci/" rel="nofollow">Test Kitchen</a></li>
<li><a href="https://www.terraform.io/" rel="nofollow">Terraform</a></li>
<li><a href="https://aws.amazon.com/cloudformation/" rel="nofollow">CloudFormation</a></li>
<li><a href="http://www.tothenew.com/blog/register-chef-client-in-aws-autoscaling/" rel="nofollow">Autoscaling with Chef</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/f3feabe3-b332-4ac5-be5a-8d853db1ea80:dc400353-e293-4b36-9c66-6a311aed9afc.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>Interview with Loïc Simon about Scout2</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=87</guid>
<pubDate>Sun, 07 May 2017 21:30:58 -0000</pubDate>

<itunes:duration>00:37:03</itunes:duration>
<itunes:subtitle>I interview Loïc Simon about Scout2, a great tool to help assess your security posturing on AWS!</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/f83ddb9d675d4ab9/interview-with-lo-c-simon-about-scout2</link>
<description><![CDATA[<p>I interview Loïc Simon about Scout2, a great tool to help assess your security posturing on AWS!</p>
<p>In this episode I speak with Loïc Simon, the author of Scout2, a great tool to assess your security posture on AWS. We cover what Scout2 is, why it came about and how it differs from other tools like AWS Trusted Advisor. It's a great interview with an author of a great tool, so definitely check it out! You can reach Loic on Twitter (links below).</p>
<p>Some links:</p>
<ul>
<li><a href="https://nccgroup.github.io/Scout2/" rel="nofollow">Scout2</a></li>
<li><a href="https://twitter.com/l01cd3v" rel="nofollow">Loïc's Twitter</a></li>
<li><a href="https://l01cd3v.github.io/" rel="nofollow">Loïc's Blog</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/f83ddb9d-675d-4ab9-8d68-432d6eac794a:c9626ff0-3c08-4930-a516-7b359a6f222e.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>CIS AWS Foundations Benchmark – Sections 2-4</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=85</guid>
<pubDate>Sun, 30 Apr 2017 23:33:19 -0000</pubDate>

<itunes:duration>00:43:44</itunes:duration>
<itunes:subtitle>Completing our review of the CIS AWS Foundations Benchmark, sections 2 through 4.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/10bf3da5b4d94e03/cis-aws-foundations-benchmark-sections-2-4</link>
<description><![CDATA[<p>Completing our review of the CIS AWS Foundations Benchmark, sections 2 through 4.</p>
<p>In this episode we will finish off the remaining sections of the CIS AWS Foundations Benchmark, looking at sections 2 through 4. Lots of good stuff in here, including a number of things you may not have considered if you're new to AWS, so it's definitely worth a listen!</p>
<p>Some links:</p>
<ul>
<li><a href="https://benchmarks.cisecurity.org/downloads/browse/index.cfm?category=benchmarks.cloud.amazon" rel="nofollow">Center for Internet Security AWS Foundations Benchmark v1.1.0</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/10bf3da5-b4d9-4e03-91e1-00b6cd6c5e94:3d477558-6fc9-4ab7-9cf8-1be1c456ca48.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>CIS AWS Foundations Benchmark – Section 1</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=83</guid>
<pubDate>Sun, 23 Apr 2017 23:44:41 -0000</pubDate>

<itunes:duration>00:28:17</itunes:duration>
<itunes:subtitle>In this our second episode, we look at the first section of the CIS AWS Foundations Benchmark and answer the question, what should you do first to lock down your cloud systems?</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/a69ad89f4c3942e4/cis-aws-foundations-benchmark-section-1</link>
<description><![CDATA[<p>In this, my second episode, I look at the first section of the CIS AWS Foundations Benchmark and answer the question, what should you do first to lock down your cloud systems?</p>
<p>In the second episode of the podcast I take a look at some first steps in securing your AWS account by looking at the Center for Internet Security's AWS Foundations Benchmark! Since this is a long benchmark, we will be focusing on Section 1 in this podcast, with the remaining sections in a follow-up podcast.</p>
<p>Some links:</p>
<ul>
<li><a href="https://benchmarks.cisecurity.org/downloads/browse/index.cfm?category=benchmarks.cloud.amazon" rel="nofollow">Center for Internet Security AWS Foundations Benchmark v1.1.0</a></li>
<li><a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_example-policies.html" rel="nofollow">IAM Policy Samples for MFA</a></li>
<li><a href="https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/grantaccess.html" rel="nofollow">Granting AWS Billing Access To Non-Root Account IAM Users</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a></li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a></li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening, and have a great week!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/a69ad89f-4c39-42e4-b63d-1e3c570ecd99:d2770eef-f237-4c4b-9546-421b15dc56b8.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
<item><title>5 Cloud Security Misconceptions</title>
<guid isPermaLink="false">http://myheadinthe.cloud/?post_type=podcast&amp;p=76</guid>
<pubDate>Mon, 17 Apr 2017 04:01:53 -0000</pubDate>

<itunes:duration>00:34:25</itunes:duration>
<itunes:subtitle>Meet the host and hear about 5 common cloud security misconceptions and why you should ignore them.</itunes:subtitle>
<link>http://myheadinthe.cloud/episode/c7e562a9044e4f96/5-cloud-security-misconceptions</link>
<description><![CDATA[<p>Meet the host and hear about 5 common cloud security misconceptions and why you should ignore them.</p>
<p>In this first podcast I introduce myself and then cover 5 common security misconceptions related to cloud computing, in no particular order. Still getting my bearings, so please bear with me.</p>
<p>Some links:</p>
<ul>
<li><a href="https://www.srgresearch.com/articles/microsoft-google-and-ibm-charge-public-cloud-expense-smaller-providers" rel="nofollow">Synergy Research Group Cloud Provider Market Share Report</a></li>
</ul>
<p>Want to get in touch? Feel free to reach out!</p>
<ul>
<li>Website: <a href="https://myheadinthe.cloud" rel="nofollow">https://myheadinthe.cloud</a>  </li>
<li>Twitter: <a href="https://twitter.com/JohnsNotHere" rel="nofollow">@JohnsNotHere</a>  </li>
<li>Peerlyst: <a href="https://www.peerlyst.com/users/john-svazic" rel="nofollow">https://www.peerlyst.com/users/john-svazic</a></li>
</ul>
<p>Thanks for listening!</p>]]></description>
<itunes:explicit>no</itunes:explicit>
<enclosure url="https://pinecast.com/listen/c7e562a9-044e-4f96-bbb5-633a8fae01a7:33d80c11-e87c-4b7f-9396-3f5a7796f435.mp3?source=rss&amp;ext=asset.mp3" length="1" type="audio/mpeg" />
</item>
</channel>
<!-- generated in 0s 14428us -->
</rss>