<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="rss.xslt" ?>
<rss
    xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
    xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:spotify="http://www.spotify.com/ns/rss"
    xmlns:psc="http://podlove.org/simple-chapters/"
    xmlns:media="https://search.yahoo.com/mrss/"
    xmlns:podcast="https://podcastindex.org/namespace/1.0"
    version="2.0">
    <channel>
        <title>Head Securely in the Clouds</title>
                    <link>https://podcast.ausha.co/head-securely-in-the-clouds</link>
                <atom:link rel="self" type="application/rss+xml" href="https://feed.ausha.co/10PX4hrWq693"/>
        <description>Head Securely in the Clouds is a podcast that brings together security and cloud experts to discuss the latest news and deep insights on the technologies, threats, regulations, and landscape evolution that are shaping cloud security. Get the views from the finest experts on how to foster trust, productivity, and profitability in your cloud environments.  

Hosted on Ausha. See ausha.co/privacy-policy for more information.</description>
        <language>en</language>
        <copyright>Marjolaine Lombard</copyright>
        <lastBuildDate>Mon, 30 Mar 2026 13:23:43 +0000</lastBuildDate>
        <pubDate>Mon, 30 Mar 2026 13:23:43 +0000</pubDate>
        <webMaster>feeds@ausha.co (Ausha)</webMaster>
        <generator>Ausha (https://www.ausha.co)</generator>
                    <spotify:countryOfOrigin>fr</spotify:countryOfOrigin>
        
        <itunes:author>Eviden</itunes:author>
        <itunes:owner>
            <itunes:name>Marjolaine Lombard</itunes:name>
            <itunes:email>marjolaine.lombard@atos.net</itunes:email>
        </itunes:owner>
        <itunes:summary>Head Securely in the Clouds is a podcast that brings together security and cloud experts to discuss the latest news and deep insights on the technologies, threats, regulations, and landscape evolution that are shaping cloud security. Get the views from the finest experts on how to foster trust, productivity, and profitability in your cloud environments.  

Hosted on Ausha. See ausha.co/privacy-policy for more information.</itunes:summary>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>no</itunes:block>
        <podcast:block>no</podcast:block>
        <podcast:locked>yes</podcast:locked>
        <itunes:type>episodic</itunes:type>
                
        <googleplay:author>Eviden</googleplay:author>
        <googleplay:email>marjolaine.lombard@atos.net</googleplay:email>
        <googleplay:description>Head Securely in the Clouds is a podcast that brings together security and cloud experts to discuss the latest news and deep insights on the technologies, threats, regulations, and landscape evolution that are shaping cloud security. Get the views from the finest experts on how to foster trust, productivity, and profitability in your cloud environments.  

Hosted on Ausha. See ausha.co/privacy-policy for more information.</googleplay:description>
        <googleplay:explicit>false</googleplay:explicit>

                    <podcast:funding url="">Support us!</podcast:funding>
        
        <category>Technology</category>
    
            <itunes:category text="Technology"/>
    
                    <image>
                <url>https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538</url>
                <title>Head Securely in the Clouds</title>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds</link>
                            </image>
            <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
            <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
        
                    <item>
                <title>Episode 9 – AWS re:Inforce 2023 highlights: exploring security innovations</title>
                <guid isPermaLink="false">71481812544d3d4dcd233ba841d92598c10d8991</guid>
                <description><![CDATA[<p>Step into the world of <b>cloud security</b> and <b>compliance </b>as we bring you the essence of A<b>WS re:Inforce</b>—the largest annual conference hosted by Amazon Web Services (AWS). With a captivating lineup of over 250 sessions and hands-on labs, in collaboration with 80+ AWS partner sponsors, this event was a goldmine of insights.</p>
<p><br></p>
<p>If you couldn't attend or wish to relive the event discussions, join us as <b>Dwayne Natwick</b>, Eviden Global Security Lead,<b> Amo Matharu</b>, Eviden Head of Cloud Security &amp; Strategic Programs and <b>Jeffrey Kaiserman</b>, Principal Security Partner Solutions Architect at AWS, share their main highlights.</p>
<p><br></p>
<p>From the rising topics of sovereignty to the fascinating realm of generative AI, this ninth episode of Head Securely in the Clouds unravels the top announcements and key innovations showcased at AWS re:Inforce.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>Step into the world of <b>cloud security</b> and <b>compliance </b>as we bring you the essence of A<b>WS re:Inforce</b>—the largest annual conference hosted by Amazon Web Services (AWS). With a captivating lineup of over 250 sessions and hands-on labs, in collaboration with 80+ AWS partner sponsors, this event was a goldmine of insights.</p>
<p><br></p>
<p>If you couldn't attend or wish to relive the event discussions, join us as <b>Dwayne Natwick</b>, Eviden Global Security Lead,<b> Amo Matharu</b>, Eviden Head of Cloud Security &amp; Strategic Programs and <b>Jeffrey Kaiserman</b>, Principal Security Partner Solutions Architect at AWS, share their main highlights.</p>
<p><br></p>
<p>From the rising topics of sovereignty to the fascinating realm of generative AI, this ninth episode of Head Securely in the Clouds unravels the top announcements and key innovations showcased at AWS re:Inforce.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Sat, 02 Sep 2023 12:00:00 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/kkq5zhK2D1dE.mp3?t=1692871118" length="12383367" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-9-aws-re-inforce-2023-highlights-exploring-security-innovations</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>AWS,Cybersecurity,sovereignty,generativeai,genAI</itunes:keywords>
                                <itunes:duration>12:52</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>2</itunes:season>
                    <podcast:season>2</podcast:season>
                                            <itunes:episode>5</itunes:episode>
                        <podcast:episode>5</podcast:episode>
                                                    <itunes:subtitle>Step into the world of cloud security and compliance as we bring you the essence of AWS re:Inforce—the largest annual conference hosted by Amazon Web Services (AWS). With a captivating lineup of over 250 sessions and hands-on labs, in collaboration wit...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/LdnIBAysLbkQUi5jfBzCwkYURl2DBukBtTaT604m_1400x1400.jpeg?t=1692870885"/>
                    <googleplay:image href="https://image.ausha.co/LdnIBAysLbkQUi5jfBzCwkYURl2DBukBtTaT604m_1400x1400.jpeg?t=1692870885"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="90"
                                title="3 key highlights: Amazon Security Lake, Global Partner Security Initiative, EC2 Instance Connect"
                                                                                            />
                                                    <psc:chapter
                                start="212"
                                title="SBOMs with Amazon Inspector"
                                                                                            />
                                                    <psc:chapter
                                start="290"
                                title="The rising topic of sovereignty"
                                                                                            />
                                                    <psc:chapter
                                start="365"
                                title="Innovative startups and the future of generative AI"
                                                                                            />
                                                    <psc:chapter
                                start="565"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 8 – The future of managed detection and response</title>
                <guid isPermaLink="false">3117855d74e8e5031aa8448160ce8c53ba4088b8</guid>
                <description><![CDATA[<p>What strategies can help you master the art of <b>integrating security products</b> in an ever-changing threat landscape?</p>
<p><br></p>
<p>Embark on an insightful journey with <b>Dwayne Natwick</b>, Eviden Global Security Lead, <b>Amo Matharu</b>, Eviden Head of Cloud Security &amp; Strategic Programs, <b>Vinod Vasudevan</b>, Eviden Global CTO for MDR &amp; Deputy CTO for Cybersecurity services and <b>Gary Meshell</b>, Global Principal Partner Security Leader, AWS as we explore the visionary collaboration between <b>AWS </b>and <b>Eviden </b>for the future of security. </p>
<p><br></p>
<p>In this eighth episode of Head Securely in the Clouds, discover how this powerful partnership is reshaping the cybersecurity landscape with a symphony of predictive analytics, generative AI, and a security lake architecture.</p>
<p><br></p>
<p>Uncover their shared vision of a future where <b>managed detection and response</b> emphasizes <b>recovery </b>just as much as detection, empowering businesses with unparalleled cyber <b>resilience</b>.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>What strategies can help you master the art of <b>integrating security products</b> in an ever-changing threat landscape?</p>
<p><br></p>
<p>Embark on an insightful journey with <b>Dwayne Natwick</b>, Eviden Global Security Lead, <b>Amo Matharu</b>, Eviden Head of Cloud Security &amp; Strategic Programs, <b>Vinod Vasudevan</b>, Eviden Global CTO for MDR &amp; Deputy CTO for Cybersecurity services and <b>Gary Meshell</b>, Global Principal Partner Security Leader, AWS as we explore the visionary collaboration between <b>AWS </b>and <b>Eviden </b>for the future of security. </p>
<p><br></p>
<p>In this eighth episode of Head Securely in the Clouds, discover how this powerful partnership is reshaping the cybersecurity landscape with a symphony of predictive analytics, generative AI, and a security lake architecture.</p>
<p><br></p>
<p>Uncover their shared vision of a future where <b>managed detection and response</b> emphasizes <b>recovery </b>just as much as detection, empowering businesses with unparalleled cyber <b>resilience</b>.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Fri, 01 Sep 2023 12:00:00 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/PANOWumYYMWY.mp3?t=1692871566" length="14971534" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-8-the-future-of-managed-detection-and-response</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>MDR,AWS,Cybersecurity,cloud security,SecurityLake</itunes:keywords>
                                <itunes:duration>15:34</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>2</itunes:season>
                    <podcast:season>2</podcast:season>
                                            <itunes:episode>4</itunes:episode>
                        <podcast:episode>4</podcast:episode>
                                                    <itunes:subtitle>What strategies can help you master the art of integrating security products in an ever-changing threat landscape?

Embark on an insightful journey with Dwayne Natwick, Eviden Global Security Lead, Amo Matharu, Eviden Head of Cloud Security &amp;amp; Strat...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/UR9ArhNHPIHomwj8DXCsJcMqY9qXgKt19vi9IcsL_1400x1400.jpeg?t=1692871379"/>
                    <googleplay:image href="https://image.ausha.co/UR9ArhNHPIHomwj8DXCsJcMqY9qXgKt19vi9IcsL_1400x1400.jpeg?t=1692871379"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="82"
                                title="Security partner initiative announced at AWS re:Inforce"
                                                                                            />
                                                    <psc:chapter
                                start="210"
                                title="Next generation-MDR: AIsaac cyber mesh"
                                                                                            />
                                                    <psc:chapter
                                start="450"
                                title="Amazon Security Lake"
                                                                                            />
                                                    <psc:chapter
                                start="658"
                                title="Eviden-AWS partnership for security"
                                                                                            />
                                                    <psc:chapter
                                start="870"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 7 – Inside Microsoft Secure 2023: Copilot's breakthrough and security innovations</title>
                <guid isPermaLink="false">9e6d83ff0cf5bca1ceaf5de7d2a7ae89baa04125</guid>
                <description><![CDATA[<p>How can AI and automation help security professionals stay ahead of threats?</p>
<p><br></p>
<p><b>Microsoft Secure</b>, Microsoft’s new annual security event, explored the innovations transforming the future of security. Enter <b>Microsoft Security Copilot</b>: introduced at the event, its purpose is to empower defenders to keep pace with the speed and scale of AI.</p>
<p><br></p>
<p>Join us for a replay of the event discussions with <b>Dwayne Natwick</b>, Eviden Global Security Lead; <b>Chris Hoard</b>, Vuzion partner education Lead; <b>Ru Campbell</b>, Microsoft MVP and Microsoft consultancy practice Lead at Threatscape; and <b>Peter Rising</b>, Microsoft MVP in M365 apps and services and consulting Manager for security and compliance practice at Insight, as they share their main highlights.</p>
<p><br></p>
<p>In this seventh episode of <b>Head Securely in the Clouds</b>, get key insights on Microsoft's latest solutions and how they are transforming cloud security with the transformative power of AI.</p>
<p><br></p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>How can AI and automation help security professionals stay ahead of threats?</p>
<p><br></p>
<p><b>Microsoft Secure</b>, Microsoft’s new annual security event, explored the innovations transforming the future of security. Enter <b>Microsoft Security Copilot</b>: introduced at the event, its purpose is to empower defenders to keep pace with the speed and scale of AI.</p>
<p><br></p>
<p>Join us for a replay of the event discussions with <b>Dwayne Natwick</b>, Eviden Global Security Lead; <b>Chris Hoard</b>, Vuzion partner education Lead; <b>Ru Campbell</b>, Microsoft MVP and Microsoft consultancy practice Lead at Threatscape; and <b>Peter Rising</b>, Microsoft MVP in M365 apps and services and consulting Manager for security and compliance practice at Insight, as they share their main highlights.</p>
<p><br></p>
<p>In this seventh episode of <b>Head Securely in the Clouds</b>, get key insights on Microsoft's latest solutions and how they are transforming cloud security with the transformative power of AI.</p>
<p><br></p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Thu, 31 Aug 2023 17:40:18 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/LnzLRC7Kw0nn.mp3?t=1693496260" length="43632572" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-7-inside-microsoft-secure-2023-copilot-s-breakthrough-and-security-innovations</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,Cybersecurity,copilot,cloud security,MicrosoftSecure</itunes:keywords>
                                <itunes:duration>34:15</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>2</itunes:season>
                    <podcast:season>2</podcast:season>
                                            <itunes:episode>3</itunes:episode>
                        <podcast:episode>3</podcast:episode>
                                                    <itunes:subtitle>How can AI and automation help security professionals stay ahead of threats?

Microsoft Secure, Microsoft’s new annual security event, explored the innovations transforming the future of security. Enter Microsoft Security Copilot: introduced at the eve...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="140"
                                title="The changing face of security conferences"
                                                                                            />
                                                    <psc:chapter
                                start="232"
                                title="How AI and automation will impact security careers"
                                                                                            />
                                                    <psc:chapter
                                start="575.453"
                                title="Microsoft Copilot: the AI-powered security tool that could change everything"
                                                                                            />
                                                    <psc:chapter
                                start="1087.305"
                                title="Microsoft Copilot: mapping attack paths to improve security posture"
                                                                                            />
                                                    <psc:chapter
                                start="1217.87"
                                title="Collaborative security for Microsoft Teams"
                                                                                            />
                                                    <psc:chapter
                                start="1303.038"
                                title="General availability of cloud security posture management: a step forward for multi-cloud security"
                                                                                            />
                                                    <psc:chapter
                                start="1474.333"
                                title="The evolution of third-party protection with Microsoft 365"
                                                                                            />
                                                    <psc:chapter
                                start="1693.721"
                                title="Conditional access: the key to zero trust security"
                                                                                            />
                                                    <psc:chapter
                                start="1859.523"
                                title="Adaptive protection within Microsoft Purview"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 6 – Women in Cybersecurity: overcoming challenges, building careers</title>
                <guid isPermaLink="false">cf768441ed39c64b7dc1b09802eaf79c20130ddf</guid>
                <description><![CDATA[<p>Don't let anyone tell you that you can't be a cybersecurity expert! In a <b>male-dominated </b>workforce like <b>cybersecurity</b>, women often face challenges like imposter syndrome. How to rewrite the rules?</p>
<p><br></p>
<p>In this sixth episode of <b>Head Securely in the Clouds</b>, <b>Dwayne Natwick</b>, Eviden Global Security, engages discussion with four women who are breaking down barriers in the field of cybersecurity. <b>Amy Colyer</b>, Microsoft Senior Cloud Advocate; <b>Shannon Kuehn</b>, AHEAD Principal Solutions Architect; <b>Juliette Besnier</b>, Eviden Global Cybersecurity Alliance Manager; and <b>Marjolaine Lombard</b>, Eviden Big Data and Security Offering &amp; Marketing Manager share their stories of overcoming imposter syndrome, building confidence, and achieving success. </p>
<p><br></p>
<p>Tune in to discover:</p>
<ul>
  <li>Strategies to overcome imposter syndrome and emerge stronger.</li>
  <li>The pivotal role of mentorship, networking, and continuous learning in the tech realm.</li>
  <li>Why inclusivity is the cornerstone of a thriving tech industry.</li>
</ul><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>Don't let anyone tell you that you can't be a cybersecurity expert! In a <b>male-dominated </b>workforce like <b>cybersecurity</b>, women often face challenges like imposter syndrome. How to rewrite the rules?</p>
<p><br></p>
<p>In this sixth episode of <b>Head Securely in the Clouds</b>, <b>Dwayne Natwick</b>, Eviden Global Security, engages discussion with four women who are breaking down barriers in the field of cybersecurity. <b>Amy Colyer</b>, Microsoft Senior Cloud Advocate; <b>Shannon Kuehn</b>, AHEAD Principal Solutions Architect; <b>Juliette Besnier</b>, Eviden Global Cybersecurity Alliance Manager; and <b>Marjolaine Lombard</b>, Eviden Big Data and Security Offering &amp; Marketing Manager share their stories of overcoming imposter syndrome, building confidence, and achieving success. </p>
<p><br></p>
<p>Tune in to discover:</p>
<ul>
  <li>Strategies to overcome imposter syndrome and emerge stronger.</li>
  <li>The pivotal role of mentorship, networking, and continuous learning in the tech realm.</li>
  <li>Why inclusivity is the cornerstone of a thriving tech industry.</li>
</ul><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Mon, 28 Aug 2023 09:54:49 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/ZgQdqFN8A0z9.mp3?t=1693214962" length="45008913" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-6-women-in-cybersecurity-overcoming-challenges-building-careers</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,#networking,mentorship,Cybersecurity,cloud security,womenincybersecurity</itunes:keywords>
                                <itunes:duration>46:52</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>2</itunes:season>
                    <podcast:season>2</podcast:season>
                                            <itunes:episode>2</itunes:episode>
                        <podcast:episode>2</podcast:episode>
                                                    <itunes:subtitle>Don't let anyone tell you that you can't be a cybersecurity expert! In a male-dominated workforce like cybersecurity, women often face challenges like imposter syndrome. How to rewrite the rules?

In this sixth episode of Head Securely in the Clouds, D...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="249"
                                title="The path less traveled: how you navigated into tech"
                                                                                            />
                                                    <psc:chapter
                                start="791"
                                title="Crushing impostor syndrome: strategies for success"
                                                                                            />
                                                    <psc:chapter
                                start="1653"
                                title="Earning respect and building confidence"
                                                                                            />
                                                    <psc:chapter
                                start="2194"
                                title="Challenging boundaries: seeking growth and learning"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 5 – Training for cloud security excellence: beyond the basics</title>
                <guid isPermaLink="false">eeabc5f700ba9fffcc0aef6a05955522232e35c7</guid>
                <description><![CDATA[<p>Ever wondered how professionals stay at the forefront of cloud security? </p>
<p><br></p>
<p>In this episode, our expert panel of instructors, including <b>Dwayne Natwick</b>, Eviden Global Security Lead; <b>Brian Nielsen</b>, Senior Cloud Training Architect at Opsgility; <b>Jeff Kellum</b>, Senior Content Manager at LinkedIn Learning; and <b>Mohd Riyan Khan</b>, Lead Cybersecurity Portfolio at Packt, uncovers the secrets to staying ahead in the rapidly changing world of cloud security. Discover how <b>training methods</b> have transformed from print to on-demand and live instructor-led sessions, and learn how to maximize the benefits of these approaches for <b>your professional growth</b>.</p>
<p><br></p>
<p>From virtual training to self-paced learning, this fifth episode of Head Securely in the Clouds equips you with practical insights to navigate your training journey. </p>
<p><br></p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>Ever wondered how professionals stay at the forefront of cloud security? </p>
<p><br></p>
<p>In this episode, our expert panel of instructors, including <b>Dwayne Natwick</b>, Eviden Global Security Lead; <b>Brian Nielsen</b>, Senior Cloud Training Architect at Opsgility; <b>Jeff Kellum</b>, Senior Content Manager at LinkedIn Learning; and <b>Mohd Riyan Khan</b>, Lead Cybersecurity Portfolio at Packt, uncovers the secrets to staying ahead in the rapidly changing world of cloud security. Discover how <b>training methods</b> have transformed from print to on-demand and live instructor-led sessions, and learn how to maximize the benefits of these approaches for <b>your professional growth</b>.</p>
<p><br></p>
<p>From virtual training to self-paced learning, this fifth episode of Head Securely in the Clouds equips you with practical insights to navigate your training journey. </p>
<p><br></p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Fri, 25 Aug 2023 12:45:04 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/Kwr8OSmG27PR.mp3?t=1693216707" length="32602237" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-5-training-for-cloud-security-excellence-beyond-the-basics</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,digitallearning,training,Cybersecurity,certification,cloud security</itunes:keywords>
                                <itunes:duration>33:57</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>2</itunes:season>
                    <podcast:season>2</podcast:season>
                                            <itunes:episode>1</itunes:episode>
                        <podcast:episode>1</podcast:episode>
                                                    <itunes:subtitle>Ever wondered how professionals stay at the forefront of cloud security? 

In this episode, our expert panel of instructors, including Dwayne Natwick, Eviden Global Security Lead; Brian Nielsen, Senior Cloud Training Architect at Opsgility; Jeff Kellum...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/VCX52IIEe2gTaFQsNU2QSNv4wGi2uNgZYu5Gm3yD_1400x1400.jpeg?t=1692955641"/>
                    <googleplay:image href="https://image.ausha.co/VCX52IIEe2gTaFQsNU2QSNv4wGi2uNgZYu5Gm3yD_1400x1400.jpeg?t=1692955641"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="153"
                                title="How consuming security trainings has evolved: the need for more immersivity in courses"
                                                                                            />
                                                    <psc:chapter
                                start="388"
                                title="Balancing video and print for deeper learning"
                                                                                            />
                                                    <psc:chapter
                                start="536"
                                title="Strategies to prepare for an exam"
                                                                                            />
                                                    <psc:chapter
                                start="942"
                                title="Practical approaches to hands-on learning"
                                                                                            />
                                                    <psc:chapter
                                start="1419"
                                title="Gauging the success of training"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 4 – Modernizing security operations: how the cloud is changing the game</title>
                <guid isPermaLink="false">6a328a9d03b3c4974f4c51a7b1c1e166ee84f9cb</guid>
                <description><![CDATA[<p>Modern security operations are required for the modern enterprise.</p>
<p><br></p>
<p>Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp; Strategic Programs, Dan Gora, Cloud security practice and architect at Cloudreach, an Atos company, and Dr. Anton Chuvakin who works for Office of the CISO at Google Cloud are sharing how the migration to the cloud has led to the need for more <b>agile </b>and <b>automated security </b>processes.</p>
<p><br></p>
<p>In this fourth episode of <b>Head Securely in the Clouds</b>, learn how the face of traditional security operations has evolved and which key considerations and cloud security architecture best practices you need to consider to build efficient<b> modern SecOps</b>.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>Modern security operations are required for the modern enterprise.</p>
<p><br></p>
<p>Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp; Strategic Programs, Dan Gora, Cloud security practice and architect at Cloudreach, an Atos company, and Dr. Anton Chuvakin who works for Office of the CISO at Google Cloud are sharing how the migration to the cloud has led to the need for more <b>agile </b>and <b>automated security </b>processes.</p>
<p><br></p>
<p>In this fourth episode of <b>Head Securely in the Clouds</b>, learn how the face of traditional security operations has evolved and which key considerations and cloud security architecture best practices you need to consider to build efficient<b> modern SecOps</b>.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Wed, 01 Feb 2023 08:53:36 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/104mDUArmqX3.mp3?t=1675237157" length="38057328" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-4-modernizing-security-operations-how-the-cloud-is-changing-the-game</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,Cybersecurity,secops,SOC,cloud security,ModernSOC</itunes:keywords>
                                <itunes:duration>39:36</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>1</itunes:season>
                    <podcast:season>1</podcast:season>
                                            <itunes:episode>4</itunes:episode>
                        <podcast:episode>4</podcast:episode>
                                                    <itunes:subtitle>Modern security operations are required for the modern enterprise.

Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp;amp; Strategic Programs, Dan Gora, Cloud security practice and architect at Cloudreach, an Atos com...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="45.438"
                                title="How to design a modern cloud security architecture"
                                                                                            />
                                                    <psc:chapter
                                start="170"
                                title="A modern SOC for the modern enterprise"
                                                                                            />
                                                    <psc:chapter
                                start="585"
                                title="The perspective from a managed security provider"
                                                                                            />
                                                    <psc:chapter
                                start="1231"
                                title="Building a realistic threat model for cloud"
                                                                                            />
                                                    <psc:chapter
                                start="1549"
                                title="The 6 top considerations when running security operations for the cloud"
                                                                                            />
                                                    <psc:chapter
                                start="2325"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 3 – Unpacking the top cloud security announcements from AWS re:Invent 2022</title>
                <guid isPermaLink="false">a24731ffe37b0ef1bf6e4495e2def45db914064c</guid>
                <description><![CDATA[<p>Security was at the forefront of <b>AWS re:Invent</b> this year. Join Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp; Strategic Programs, Jeff Kaiserman, AWS Principal GSI Security Partner Solutions Architect, and Gary Meshell, Worldwide Leader for AWS Global GSI Cyber Security Integrators, as they discuss the top security announcements from AWS re:Invent 2022.</p>
<p><br></p>
<p>In this third episode of <b>Head Securely in the Clouds</b>, learn how to leverage these announcements to accelerate your journey to the cloud and meet your business's security requirements, from sovereignty to security data lakes.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>Security was at the forefront of <b>AWS re:Invent</b> this year. Join Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp; Strategic Programs, Jeff Kaiserman, AWS Principal GSI Security Partner Solutions Architect, and Gary Meshell, Worldwide Leader for AWS Global GSI Cyber Security Integrators, as they discuss the top security announcements from AWS re:Invent 2022.</p>
<p><br></p>
<p>In this third episode of <b>Head Securely in the Clouds</b>, learn how to leverage these announcements to accelerate your journey to the cloud and meet your business's security requirements, from sovereignty to security data lakes.</p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Wed, 01 Feb 2023 08:42:58 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/AjAaPixVDLDr.mp3?t=1675237041" length="27163909" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-3-unpacking-the-top-cloud-security-announcements-from-aws-re-invent-2022</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,AWS,Cybersecurity,reinvent,cloud security</itunes:keywords>
                                <itunes:duration>28:12</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>1</itunes:season>
                    <podcast:season>1</podcast:season>
                                            <itunes:episode>3</itunes:episode>
                        <podcast:episode>3</podcast:episode>
                                                    <itunes:subtitle>Security was at the forefront of AWS re:Invent this year. Join Dwayne Natwick, Atos Global Security Lead, Amo Matharu, Atos Head of Cloud Security &amp;amp; Strategic Programs, Jeff Kaiserman, AWS Principal GSI Security Partner Solutions Architect, and Gar...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="4"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="134"
                                title="AWS Security Lake"
                                                                                            />
                                                    <psc:chapter
                                start="376"
                                title="Focus on the OCSF framework"
                                                                                            />
                                                    <psc:chapter
                                start="443"
                                title="AWS External Key Store (XKS)"
                                                                                            />
                                                    <psc:chapter
                                start="519"
                                title="AWS Verified Access"
                                                                                            />
                                                    <psc:chapter
                                start="642"
                                title="Amazon Macie automated sensitive data discovery"
                                                                                            />
                                                    <psc:chapter
                                start="676"
                                title="About sovereignty &amp; compliance"
                                                                                            />
                                                    <psc:chapter
                                start="976"
                                title="The impact of re:Invent security announcements in cloud journey’s acceleration"
                                                                                            />
                                                    <psc:chapter
                                start="1415"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 2 – Cloud Security vs. On-Premises Security: which one should you select?</title>
                <guid isPermaLink="false">1c6c93264aa6b19ba71babf4c90efb2501941fb5</guid>
                <description><![CDATA[<p><b>On-premises or cloud?</b> Businesses can now decide between these two environments across their IT services. Each method has benefits and drawbacks of its own, from the endless possibilities of customization for on-premises and flexibility for cloud. But when it comes to choosing your security, which system will be the right fit for you?</p>
<p><br>
In this second episode of <b>Head Securely in the Clouds</b>, Dwayne Natwick, Global Security Lead for Atos, Karl Ots, Head of Cloud Security at EPAM Systems, and Tom Smith, Senior Cybersecurity Architect at Sirius Computer Solutions, share the pros and cons when thinking cloud security vs. on-premises security and discuss how to bring these two worlds closer to each other. </p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p><b>On-premises or cloud?</b> Businesses can now decide between these two environments across their IT services. Each method has benefits and drawbacks of its own, from the endless possibilities of customization for on-premises and flexibility for cloud. But when it comes to choosing your security, which system will be the right fit for you?</p>
<p><br>
In this second episode of <b>Head Securely in the Clouds</b>, Dwayne Natwick, Global Security Lead for Atos, Karl Ots, Head of Cloud Security at EPAM Systems, and Tom Smith, Senior Cybersecurity Architect at Sirius Computer Solutions, share the pros and cons when thinking cloud security vs. on-premises security and discuss how to bring these two worlds closer to each other. </p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Wed, 01 Feb 2023 08:27:51 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/DPmZaTG8L78K.mp3?t=1675236928" length="33387586" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-2-cloud-security-vs-on-premises-security-which-one-should-you-select</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,Cybersecurity,cloud security,on-premises security,on-prem</itunes:keywords>
                                <itunes:duration>34:41</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>1</itunes:season>
                    <podcast:season>1</podcast:season>
                                            <itunes:episode>2</itunes:episode>
                        <podcast:episode>2</podcast:episode>
                                                    <itunes:subtitle>On-premises or cloud? Businesses can now decide between these two environments across their IT services. Each method has benefits and drawbacks of its own, from the endless possibilities of customization for on-premises and flexibility for cloud. But w...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="0"
                                title="Speaker presentation"
                                                                                            />
                                                    <psc:chapter
                                start="135"
                                title="Introduction: cloud security vs on-premises security"
                                                                                            />
                                                    <psc:chapter
                                start="214"
                                title="The clash between two worlds"
                                                                                            />
                                                    <psc:chapter
                                start="346"
                                title="The challenges of moving to cloud security from an on-premises data center"
                                                                                            />
                                                    <psc:chapter
                                start="855"
                                title="The impacts of users’ mobility"
                                                                                            />
                                                    <psc:chapter
                                start="1297"
                                title="What are the top foundations of security in the cloud?"
                                                                                            />
                                                    <psc:chapter
                                start="1882"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
                    <item>
                <title>Episode 1 – What's new in Cloud Security from Microsoft Ignite 2022</title>
                <guid isPermaLink="false">9d3f207def813373d28659aa0c3da0a381e3400b</guid>
                <description><![CDATA[<p>First episode of <b>Head Securely in the Clouds</b>, hosted by Dwayne Natwick, Global Security Lead for Atos, is here! Our first guests are Shannon Kuehn, Senior Product Manager at Microsoft, and Rod Trent, Senior Cloud Security Advocate at Microsoft.</p>
<p><br>
In this episode, Dwayne, Shannon and Rod discuss what were the most important security announcements from <b>Microsoft Ignite 2022</b>, diving a little deeper on how they will impact security strategies. </p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></description>
                <content:encoded><![CDATA[<p>First episode of <b>Head Securely in the Clouds</b>, hosted by Dwayne Natwick, Global Security Lead for Atos, is here! Our first guests are Shannon Kuehn, Senior Product Manager at Microsoft, and Rod Trent, Senior Cloud Security Advocate at Microsoft.</p>
<p><br>
In this episode, Dwayne, Shannon and Rod discuss what were the most important security announcements from <b>Microsoft Ignite 2022</b>, diving a little deeper on how they will impact security strategies. </p><br/><p>Hosted on Ausha. See <a href="https://ausha.co/privacy-policy">ausha.co/privacy-policy</a> for more information.</p>]]></content:encoded>
                <pubDate>Wed, 01 Feb 2023 07:47:14 +0000</pubDate>
                <enclosure url="https://audio.ausha.co/8wJRxSlglala.mp3?t=1675234366" length="35821748" type="audio/mpeg"/>
                                    <link>https://podcast.ausha.co/head-securely-in-the-clouds/episode-1-what-s-new-in-cloud-security-from-microsoft-ignite-2022</link>
                
                                <itunes:author>Eviden</itunes:author>
                <itunes:explicit>false</itunes:explicit>
                                    <itunes:keywords>cloud,Cybersecurity,cloud security,MicrosoftIgnite</itunes:keywords>
                                <itunes:duration>37:18</itunes:duration>
                <itunes:episodeType>full</itunes:episodeType>
                                    <itunes:season>1</itunes:season>
                    <podcast:season>1</podcast:season>
                                            <itunes:episode>1</itunes:episode>
                        <podcast:episode>1</podcast:episode>
                                                    <itunes:subtitle>First episode of Head Securely in the Clouds, hosted by Dwayne Natwick, Global Security Lead for Atos, is here! Our first guests are Shannon Kuehn, Senior Product Manager at Microsoft, and Rod Trent, Senior Cloud Security Advocate at Microsoft.

In thi...</itunes:subtitle>

                
                <googleplay:author>Eviden</googleplay:author>
                                <googleplay:explicit>false</googleplay:explicit>

                                    <itunes:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                    <googleplay:image href="https://image.ausha.co/vW7XOq5p6GHCgIhJjrmxeOXmLWsKrxZM0ix9JDcm_1400x1400.jpeg?t=1692967538"/>
                
                                    <psc:chapters version="1.1">
                                                    <psc:chapter
                                start="213"
                                title="Introduction to Microsoft Ignite event"
                                                                                            />
                                                    <psc:chapter
                                start="374"
                                title="How to identify important announcement?"
                                                                                            />
                                                    <psc:chapter
                                start="470"
                                title="Defender for DevOps Announcement"
                                                                                            />
                                                    <psc:chapter
                                start="595"
                                title="Configuration manager in the Intune family"
                                                                                            />
                                                    <psc:chapter
                                start="692"
                                title="Identity protection announcements"
                                                                                            />
                                                    <psc:chapter
                                start="920"
                                title="Focus on Phishing resilience"
                                                                                            />
                                                    <psc:chapter
                                start="1078"
                                title="Focus on workload identity"
                                                                                            />
                                                    <psc:chapter
                                start="1172"
                                title="Integration with Microsoft Sentinel (signals)"
                                                                                            />
                                                    <psc:chapter
                                start="1352"
                                title="Magic Quadrant for SIEM"
                                                                                            />
                                                    <psc:chapter
                                start="1652"
                                title="Multi-cloud solutions within Microsoft security family"
                                                                                            />
                                                    <psc:chapter
                                start="1744"
                                title="Data lifecycle Management preview"
                                                                                            />
                                                    <psc:chapter
                                start="1916"
                                title="Partner network, integration and customer-centricity"
                                                                                            />
                                                    <psc:chapter
                                start="2137"
                                title="Wrap-up"
                                                                                            />
                                            </psc:chapters>
                
                            </item>
            </channel>
</rss>
