Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 33: Too big to wing it, too small for enterprise security

On this episode of Masters of Data, we tackle security for growing enterprises: past small business status but not quite full-scale yet. The challenge? Building effective programs with limited resources while balancing people, processes, and tools. We cover essentials like EDR, SIEM, SSO, identity management, and cloud security. The catch? Buying tools means nothing without proper implementation, tuning, and training. We explore fractional CISOs, cross-training to avoid single points of failure, and how AI supports operations.

Ep 30: What is data pipeline management, and why does it matter for security?

On this episode of Masters of Data, we're joined by Eric Avery, Sumo Logic's head of infrastructure and data, to break down data pipeline management: efficiently moving massive data volumes from multiple sources to one usable location. We explore how pipelines fuel analytics and AI, the role of data transformation, and where OpenTelemetry fits in. Eric shares insights from processing 3.5 exabytes daily and how AI has reignited excitement around data. We also cover pipeline security, the shift from data lakes to AI-powered platforms, and practical digital security tips.

Customer Insights with Clark Pichon, Security Operations Center Manager

In this video, Clark Pichon, Security Operations Center Manager, shares how they're leveling up security operations with the help of AI and automation. From building queries faster using Dojo AI to cutting down time-to-detection and closing alerts more efficiently with SIEM automation, see how these tools are helping the team work smarter and respond faster than ever before.

Ep 29: From detection to post-mortem: The complete incident cycle

On this episode of Masters of Data, we break down incident response from detection through containment, forensics, recovery, and postmortem. The foundation? Comprehensive logging. Without it, you're blind. We explore building cross-functional teams and a blame-free culture where people actually report issues. Communication is key: what you tell engineering isn't what you tell executives or customers. AI is accelerating investigations, but the fundamentals still rule: proper tool access, the right people on call, and translating technical chaos into business-speak. The takeaway?

Ep 28: Stop being the 'no' department: How modern GRC enables growth

On this episode of Masters of Data, we sit down with Cassandra Mooseberger, Manager of Security Compliance at Sumo Logic, to unpack governance, risk, and compliance (GRC). Cass breaks down her three-pillar framework: governance and compliance, risk management, and trust. She reveals how GRC teams can flip from cost center to sales enabler through trust pages, automated questionnaires, and proactive support. We explore practical strategies for working with engineering: listen first, understand before changing, and skip the "rip and replace" impulse.

Ep 27: 2026 Security operations insights

On this episode of Masters of Data, we dive into our 2026 Intelligent Security Operations report. While 90% of 500+ security leaders see AI/ML cutting alert fatigue, actual implementation remains stuck at basic anomaly detection—not the full automation everyone wants. The gap is real: only 51% say their SIEM effectively reduces detection and response times, exposing serious maturity issues. Add rampant tool sprawl (most orgs run 3-10+ security tools that don't communicate), and you've got an integration nightmare. We explore how Model Control Protocol and AI agents could solve this, but here's the truth.

Ep 26: You can patch your code, you can't patch burnout

In this episode of Masters of Data, we tackle why cybersecurity professionals burn out, and it's not just long hours. We explore how repetitive tasks, limited growth, and work that feels invisible drain security teams who face constant vigilance with few wins and no finish line. We discuss how high-stakes environments and rigid SLAs prevent real breaks, then share solutions: celebrate small victories, recognize contributions, prioritize physical health, and protect work-life balance. The key? Clear communication, realistic expectations, and making security's invisible impact visible.