The Cyber5 Podcast

Defending a Cloud-based Remote Workforce with Attila Torok, Head of Security at Zapier

Episode 33 of the podcast covers strategies to defend a cloud-based, remote workforce with Attila Torok, Head of Security at Zapier.

Outline:

  • Question 1 (01:44): Are you more worried about developer misconfigurations and inadvertent leaks more than a compromised endpoint?
  • Question 2 (04:29): What strategies have you put in place for defending a remote workforce?
  • Question 3 (13:10): Is logging at scale or network segmentation even rational for small to mid-sized cloud-based companies?
  • Question 4 (15:25): What are some custom ways you use threat intelligence?
  • Question 5 (17:20): Can parts of a security team be condensed for a company that is cloud-based and be more efficient?

Episode 33 | November 19, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights Retainer℠
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks