This is the second episode in a series of podcasts based on cloud-based solutions. In our previous episode, we discussed an overview of cloud solutions and security features. This episode dives a little deeper on customer engagement with the cloud and some technical aspects of cloud solutions.

Host

Dr. Nathan Wallace, Director & Co-Founder of GridIntel and Cybirical, has BS degrees in Electrical Engineering, and Physics, a MS in Engineering, and a Ph.D. in Engineering from Louisiana Tech University with a focus in Cyberspace Engineering. Dr. Wallace has worked for multiple utilities and joined Ampirical as a Staff Engineer and Director of Cyber Operations for its sister companies GridIntel and Cybirical. He is responsible for assessing various power system cybersecurity risks. He is a member of a cybersecurity industry advisory group to FERC and is the working group chair of two new IEEE Power system cybersecurity standards.

Guest

Ranjan Banerji is a Senior Partner Solutions Architect at Amazon Web Services (AWS) focused on the power and utilities vertical. Ranjan has been at AWS for 4 years, the first 2.5 of which he spend working on the department of defense (DoD) team helping all branches of the DoD migrate to and build new systems on AWS ensuring security and compliance requirements. Prior to AWS Ranjan was the Director of software development and enterprise architecture at SunEdison where he designed systems to acquire real time data from over 2000 power plants across the world. Ranjan has years of experience building and designing enterprise systems for the DoD, other federal agencies, the financial industry, and the energy sector. He has provided architecture and frameworks to help commercial ISVs and federal agencies achieve FedRAMP Authority to Operate(ATOs).

Additional Information

For additional information in reference to this episode, please utilize the below links:

AWS Security Best Practices

This whitepaper provides security best practices that will help you define your Information Security Management System (ISMS) and build a set of security policies and processes for your organization so you can protect your data and assets in the AWS Cloud.

Security, Identity, and Compliance on AWS

Learn more about securing your workloads and applications in the cloud and the use cases and services within the five security pillars (identity & access management; detection; infrastructure protection; data protection and incident response).

Questions?

    Name (Required)

    Email (Required)

    Company (Required)

    Any questions regarding this episode?

    Do you have a topic suggestion?