Listen "Security is a process"
Episode Synopsis
Send us a textEpisode SummaryOn this episode, Co-Founder and CTO of Gutsy, John Morello, joins Matt to talk about Process Mining in Cybersecurity. Before co-founding Gutsy, John served as the CTO of Twistlock and VP of Product for Prisma Cloud.John holds multiple cybersecurity patents and is an author of NIST SP 800-190, the Container Security Guide. Before Twistlock, he was the CISO of an S&P 500 global chemical company. Before that, he spent 14 years at Microsoft, working on security technologies in Windows and Azure and consulting on security projects across the DoD, intelligence community, and at the White House. John graduated summa cum laude from LSU and lives in Baton Rouge with his wife and two sons. A lifelong outdoorsman and NAUI Master Diver and Rescue Diver, he's the former board chair of the Coalition to Restore Coastal Louisiana and a current Coastal Conservation Association board member.Today, John talks about governance challenges in cybersecurity, the importance of security as a process, and how to apply process mining. How is process mining useful in cybersecurity? Hear about process mining human actions and unstructured sources, and how John manages to stay sharp. Timestamp Segments· [02:20] John’s cybersecurity journey.· [07:43] Pivotal moments in John’s career.· [10:23] The most pressing governance challenges.· [14:07] What is process mining?· [19:03] How process mining can benefit certain functions.· [21:09] Security as a process, not a product.· [25:37] Why there’s not more focus on process.· [32:03] Applying process mining.· [38:07] Filling in the gaps.· [42:03] How John stays sharp. Notable Quotes· “Security is a process, not a product.”· “In security, inefficiency and inconsistency are highly correlated with risk.”· “Almost everything in security is about process.” Relevant LinksWebsite: gutsy.com.LinkedIn: www.linkedin.com/in/john-morello.The future of cloud security.Simplify cloud security with Prisma Cloud, the Code to Cloud platform powered by Precision AI.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
More episodes of the podcast Cloud Security Today
From GTA to MFA
08/11/2025
CISO burnout and boardroom truths
01/09/2025
Iron Maiden and cloud security
14/07/2025
Navigating identity security
29/05/2025
The human side of cyber
22/04/2025
Principles in cyber leadership
23/03/2025
Rethinking security awareness
23/02/2025
Dr. Zero Trust on zero trust
20/01/2025
Cybersecurity compensation 2025
20/12/2024
LLMs: risks, rewards, and realities
20/11/2024
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.