Please like, subscribe, and leave a comment.
Bio:
With over 30 years of experience in enterprise technology, David Linthicum is a globally recognized thought leader, innovator, and influencer in cloud computing, AI, and cybersecurity. He authorizes over 17 best-selling books, over 7,000 articles, and over 50 courses on LinkedIn Learning. He is also a frequent keynote speaker, podcast host, and media contributor on digital transformation, cloud architecture, AI, and cloud security topics.
He drives new market offerings, service innovation, and thought leadership outreach, leveraging his extensive knowledge and experience in generative AI and cloud computing for business agility and growth. David is passionate about educating and empowering the next generation of cloud professionals, as he is an adjunct instructor for Louisiana State University and a mentor.
Reference(s) for this video:
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
Kicking cloud to the curb video:
[ Ссылка ]
My RSA coverage with TheCUBE:
[ Ссылка ]
Where you can find me:
My Gen AI Architecture Course on GoCloudCareers:
[ Ссылка ]
My InfoWorld Blog: [ Ссылка ]
Follow me on LinkedIn: [ Ссылка ]
Follow me in X/Twitter: [ Ссылка ]
My LinkedIn learning courses: [ Ссылка ]
My latest book: [ Ссылка ]
Video sponsorship opportunities: Email me at david@linthicumresearch.com
Talking points:
Fresh back from The RSA Conference 00:34
Cloud Security Historical Context 1:06
• I’m not an apologist for cloud computing (kicking cloud to the curb video).
• Overview of the evolution from on-premises to cloud computing.
• Historical challenges of on-premises security.
Advantages of Cloud Security
• Economies of scale: stronger security in general due to larger budgets of providers. 3:04
• Regular updates and patches are automatically handled by the cloud service providers. 4:58
• Most breaches are misconfigurations due to a lack of training. 5:56
• Advanced security features including AI and machine learning for predictive analysis. 7:09
Advantages of On-Premises Security. 8:07
• Greater visibility and control over physical and network resources.
• Customization of security protocols to fit specific organizational needs without external dependencies. 9:30
• Potential for higher data privacy, given physical access is restricted.
Case Studies. 10:17
• Discuss a few real-world examples where companies faced security challenges and how cloud/on-premises decisions impacted the outcome.
Ещё видео!