Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Resilient Cyber w/ Rajan Kapoor - Native Cloud Workspace Gaps and Risks
Manage episode 462343231 series 2947250
In this episode, we sit down with Rajan Kapoor, Field CISO of Material Security, to discuss the security risks and shortcomings of native cloud workspace security offerings and the role of modern platforms for email security, data governance, and posture management.
Email and Cloud Collaboration Workspace Security continues to be one of the most pervasive and challenging security environments, and Rajan provided a TON of excellent insights. We covered:
- Why email and cloud workspaces are some of the most highly targeted environments by cyber criminals, what they can do once they do compromise the email environment, and the broad implications.
- The lack of security features and capabilities of native cloud workspaces such as M365 and Google Workspaces and the technical and resource constraints that drive teams to seek out innovative products such as Material Security.
- The tug of war between security and productivity and how Material Security helps address challenges of the native workspaces that often make it hard for people to do their work and lead to security being sidestepped.
- Particularly industries that are targeted and impacted the most, such as healthcare, where there is highly sensitive data, regulatory challenges, and more.
- Common patterns among threats, attacks, and vulnerabilities and how organizations can work to bolster the security of their cloud workspace environments.
This is a fascinating area of security. We often hear “identity is the new perimeter” and see identity play a key role in trends such as zero trust. But, so often, that identity starts with your email, and it can lead to lateral movement, capturing MFA codes, accessing sensitive data, impacting business partners, phishing others in the organization, and more, all of which can have massive consequences for the organizations impacted.
Raja brought his expertise as a Field CISO and longtime security practitioner to drop a ton of gems in this one, so be sure to check it out!
166 episodes
Manage episode 462343231 series 2947250
In this episode, we sit down with Rajan Kapoor, Field CISO of Material Security, to discuss the security risks and shortcomings of native cloud workspace security offerings and the role of modern platforms for email security, data governance, and posture management.
Email and Cloud Collaboration Workspace Security continues to be one of the most pervasive and challenging security environments, and Rajan provided a TON of excellent insights. We covered:
- Why email and cloud workspaces are some of the most highly targeted environments by cyber criminals, what they can do once they do compromise the email environment, and the broad implications.
- The lack of security features and capabilities of native cloud workspaces such as M365 and Google Workspaces and the technical and resource constraints that drive teams to seek out innovative products such as Material Security.
- The tug of war between security and productivity and how Material Security helps address challenges of the native workspaces that often make it hard for people to do their work and lead to security being sidestepped.
- Particularly industries that are targeted and impacted the most, such as healthcare, where there is highly sensitive data, regulatory challenges, and more.
- Common patterns among threats, attacks, and vulnerabilities and how organizations can work to bolster the security of their cloud workspace environments.
This is a fascinating area of security. We often hear “identity is the new perimeter” and see identity play a key role in trends such as zero trust. But, so often, that identity starts with your email, and it can lead to lateral movement, capturing MFA codes, accessing sensitive data, impacting business partners, phishing others in the organization, and more, all of which can have massive consequences for the organizations impacted.
Raja brought his expertise as a Field CISO and longtime security practitioner to drop a ton of gems in this one, so be sure to check it out!
166 episodes
All episodes
×
1 Resilient Cyber w Phil Venables Security Leadership: Vulnerabilities to VC 30:37

1 Resilient Cyber w/ Vineeth Sai Narajala: Model Context Protocol (MCP) - Potential & Pitfalls 18:32

1 Resilient Cyber w/ Jay Jacobs & Michael Roytman - VulnMgt Modernization & Localized Modeling 33:53

1 Resilient Cyber: Ravid Circus - Tackling the Prioritization Crisis in Cyber 23:02

1 Resilient Cyber w/ Varun Badhwar - AI for AppSec - Beyond the Buzzwords 26:44

1 Resilient Cyber w/ Jit - Agentic AI for AppSec is Here 28:03

1 Resilient Cyber w/ Piyush Sharrma - AI-Powered Defense & Security Mesh 29:10

1 Resilient Cyber w/ Elad Schulman - Secure Enterprise LLM/GenAI Adoption 32:33

1 Resilient Cyber w/ Sergej Epp - Cloud-native Runtime Security & Usage 32:13

1 Resilient Cyber w/ Lior Div & Nate Burke - Agentic AI & the Future of Cyber 36:25

1 Resilient Cyber w/ Chenxi Wang - The Intersection of AI & Cybersecurity 36:25

1 Resilient Cyber w/ Rob Shavell - Personal Data & Online Privacy 28:49

1 Resilient Cyber w/ Steve Martano - CISO's, Security Budgets & Careers 25:06

1 Resilient Cyber w/ Katie Norton - AppSec Industry Analysis & Trends 47:19

1 Resilient Cyber w/ Ed Merrett - AI Vendor Transparency: Understanding Models, Data and Customer Impact 23:55

1 Resilient Cyber w/ Sounil Yu - The Intersection of AI and Need-to-Know 26:41

1 Resilient Cyber w/ Grant Oviatt - Transforming SecOps with AI SOC Analysts 19:25

1 Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025 31:30

1 Resilient Cyber w/ Rajan Kapoor - Native Cloud Workspace Gaps and Risks 30:17

1 Resilient Cyber w/ Greg Martin - Agentic AI and AppSec 27:13

1 Resilient Cyber w/ Filip Stojkovski & Dylan Williams - Agentic AI & SecOps 22:45

1 Resilient Cyber w/ Walter Haydock - Implementing AI Governance 28:31

1 Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape 56:54

1 Resilient Cyber w/ Tyler Shields and James Berthoty - Is "Shift Left" Losing its Shine? 25:12

1 Resilient Cyber w/ Shyam Sankar - The Primacy of Digital Dominance 34:03

1 Resilient Cyber w/ Mark Simos - Cybersecurity Anti-Patterns 29:30

1 Resilient Cyber w/ Ross Young - How to Become a CISO 32:57

1 Resilient Cyber w/ Helen Oakley - Exploring the AI Supply Chain 20:26

1 Resilient Cyber w/ Jit - Exploring the Emerging ASPM Ecosystem 26:33

1 Resilient Cyber w/ Christina Liaghati - Navigating Threats to AI Systems 24:58

1 Resilient Cyber w/ Steve Wilson - Securing the Adoption of GenAI & LLM's 28:40

1 Resilient Cyber w/ Snehal Antani - Building and Scaling a Security Startup 29:33

1 Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust 24:58

1 Resilient Cyber w/ Chloe Messdaghi - AI Security & the Threat Landscape 20:43

1 Resilient Cyber w/ Travis McPeak - Securing Cloud-native Infrastructure 17:59

1 Resilient Cyber w/ Stuart Mitchell Cyber Talent, Recruiting & the Workforce 47:33

1 S6E22: Daniel Shechter - Application Detect & Response (ADR) 23:44

1 S6E21: Christoph Kern - Dissecting Secure-by-Design 45:51

1 S6E20: Joe McCaffrey - Securing the Digital Arsenal of Democracy 39:34

1 S6E19: Madison Oliver - Open Source & GitHub Advisory Database 30:00

1 S6E18: Stephen Carter - VulnMgt Modernization & FedRAMP 31:20

1 S6E17: Jimmy Mesta - Kubernetes, Runtime and Supply Chains 26:12

1 S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms 34:30

1 S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation 38:24

1 S6E14: Dr. Georgianna Shea: Cyber-Physical Resilience & Supply Chain Security 28:23
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.