{"id":90886,"date":"2020-04-13T09:00:33","date_gmt":"2020-04-13T16:00:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90886"},"modified":"2023-05-15T22:58:03","modified_gmt":"2023-05-16T05:58:03","slug":"afternoon-cyber-tea-building-operational-resilience-digital-world","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/13\/afternoon-cyber-tea-building-operational-resilience-digital-world\/","title":{"rendered":"Afternoon Cyber Tea: Building operational resilience in a digital world"},"content":{"rendered":"
Operational resiliency is a topic of rising importance in the security community. Unplanned events, much like the one we are facing today, are reminders of how organizations can be prepared to respond to a cyberattack. Ian Coldwater and I explored a variety of options in my episode of Afternoon Cyber Tea with Ann Johnson<\/a>.<\/p>\n Ian Coldwater is a Kubernetes containers and cloud infrastructure specialist with a background in penetration testing and DevOps. In their role as a consultant, Ian has helped companies bridge the gaps between security and DevOps. It was a real pleasure to discuss what Ian has learned in these roles, and I think you\u2019ll find our discussion valuable.<\/p>\n During our conversation, Ian and I talked about threat modeling and how to best protect your crown jewels. We also explored what it means to bring security into DevOps. Hint: it\u2019s about more than just new tooling. And, we demystified Kubernetes. Do you wonder which projects are a good fit for Kubernetes, and which are not? Are you concerned about how to keep Kubernetes containers secure? Take a listen to Building operational resiliency in a digital work on Afternoon Cyber Tea with Ann Johnson<\/a> for actionable advice that you can apply to your own SecDevOps organization.<\/p>\n In this important cyber series, I talk with cybersecurity influencers about trends shaping the threat landscape in these unprecedented times, and explore the risk and promise of systems powered by artificial intelligence (AI), Internet of Things (IoT), and other emerging tech.<\/p>\n You can listen to Afternoon Cyber Tea with Ann Johnson on:<\/strong><\/p>\n In the meantime, bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity. Or reach out to me on\u00a0LinkedIn<\/a>\u00a0or\u00a0Twitter<\/a>\u00a0if you have guest or topic suggestions.<\/p>\n","protected":false},"excerpt":{"rendered":" On Afternoon Cyber Tea with Ann Johnson, Ann and Ian Coldwater talk about how CISOs can prepare for a cyberattack, master the magic and complexity of containers, and encourage collaboration between engineering and security.<\/p>\n","protected":false},"author":96,"featured_media":90887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3660],"topic":[3676,3683,3684],"products":[],"threat-intelligence":[],"tags":[3825,3822,3802,3809],"coauthors":[1849],"class_list":["post-90886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-events","topic-iot-security","topic-security-management","topic-security-operations","tag-developers","tag-microsoft-security-insights","tag-ransomware","tag-security-strategies"],"yoast_head":"\nWhat\u2019s next<\/h3>\n
\n