{"id":83161,"date":"2026-02-19T10:33:30","date_gmt":"2026-02-19T10:33:30","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83161"},"modified":"2026-03-11T12:11:17","modified_gmt":"2026-03-11T12:11:17","slug":"bridging-the-cloud-security-gap-with-ccse","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/","title":{"rendered":"Bridging the Cloud Security Gap with CCSE \u2013 Interview with Robson Medeiros dos Santos"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83161\" class=\"elementor elementor-83161\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-016ba0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"016ba0f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-823c65f\" data-id=\"823c65f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11bff92 elementor-widget elementor-widget-text-editor\" data-id=\"11bff92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As organizations increasingly adopt multi-cloud environments, the need for specialized and practical knowledge in securing these platforms has become vital. Speaking to EC- Council&#8217;s Cyber-Talks, Robson Medeiros dos Santos shares his professional perspective on the importance of <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/best-cloud-security-certifications\/\">cloud security<\/a> training in today\u2019s enterprise landscape. Robson discusses the unique strengths of the EC-Council <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cloud-security-professional-with-ccse-certification\/\">Certified Cloud Security Engineer (CCSE)<\/a> program, highlighting its vendor-neutral approach to the security of prominent service providers like AWS, Azure, and Google Cloud Platform (GCP). He reflects on the value of the program&#8217;s hands-on labs and practical modules that focus on application security, CI\/CD integration, and business continuity. He also shares how the course enhanced his understanding of security practices with the help of advanced techniques and approaches that mirror real-world challenges and operations. Robson also emphasizes the growing global recognition of the CCSE certification and its future relevance in Latin American markets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d07b0f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d07b0f6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5ca4bbf\" data-id=\"5ca4bbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16823f3 elementor-widget elementor-widget-text-editor\" data-id=\"16823f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Considering the dependence on cloud services by enterprises today, what is the relevance of cloud security training?<\/strong><\/p><p>Cloud security training offers numerous benefits, including the implementation of business security models that comply with industry-specific standards such as PCI-DSS, HIPAA, and CSA. These trainings focus on security across different types of cloud environments and platforms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-732e347 elementor-widget elementor-widget-text-editor\" data-id=\"732e347\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What makes EC-Council&#8217;s Certified Cloud Security Engineer (CCSE) unique?<\/strong><\/p><p>CCSE provides insights on effectively leveraging cloud security across the three major cloud platforms\u2014GCP, AWS, and Azure, helping organizations quickly understand which cloud platform best suits different customer needs. It also focuses on raising security standards and ensuring compliance with sector-specific regulations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5455046 elementor-widget elementor-widget-text-editor\" data-id=\"5455046\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Which program modules do you consider most important in bridging the cloud security skills gap currently present in the cybersecurity market?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b2bec52 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2bec52\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2384b58\" data-id=\"2384b58\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c24382a elementor-widget elementor-widget-image\" data-id=\"c24382a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-532eb56\" data-id=\"532eb56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5940b99 elementor-widget elementor-widget-text-editor\" data-id=\"5940b99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tModules focusing on application security modeling and cloud integration within CI\/CD pipelines are among the most critical. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7711fb elementor-widget elementor-widget-text-editor\" data-id=\"d7711fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These modules help address vulnerabilities by embedding security into the software development lifecycle (SDLC) through shift-left security practices.<\/p><p>Another highly relevant module is business continuity using containerization and disaster recovery. It&#8217;s important to understand the various cloud backup strategies, how backup is stored, and the time required for data recovery to ensure minimal disruption to critical systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50ecd3b elementor-widget elementor-widget-text-editor\" data-id=\"50ecd3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How useful and relevant are the 80+ hands-on labs in preparing cybersecurity professionals to address real-world cloud security challenges?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-97e0c62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97e0c62\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c9819a1\" data-id=\"c9819a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6837ea6 elementor-widget elementor-widget-image\" data-id=\"6837ea6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f24684a\" data-id=\"f24684a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c417dc elementor-widget elementor-widget-text-editor\" data-id=\"7c417dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The 80+ hands-on labs are incredibly valuable in equipping cybersecurity professionals with practical, industry-relevant experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a87b60 elementor-widget elementor-widget-text-editor\" data-id=\"8a87b60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThey provide hands-on experience similar to platforms such as TryHackMe, Hack The Box, ACADITI, etc., which provide immersive environments to develop and test cloud security skills in realistic scenarios. The Top 10 labs from TryHackMe, in particular, are highly recommended for those looking to sharpen their skills across a range of modern cloud security challenges.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-798b711\" data-id=\"798b711\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3d13aa elementor-widget elementor-widget-text-editor\" data-id=\"a3d13aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Did the course help you gain a holistic perspective on AWS, Azure, and GCP security practices and vendor-neutral concepts?<\/strong><\/p><p><span style=\"word-spacing: normal;\">I already had experience working with AWS in a DevSecOps environment, and the course helped deepen my understanding of security practices across the cloud lifecycle\u2014from secure development to implementing effective disaster recovery. It also broadened my perspective on how these concepts apply across other platforms like Azure and GCP, highlighting vendor-neutral principles that are critical for multi-cloud security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afdeaae elementor-widget elementor-widget-text-editor\" data-id=\"afdeaae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How current and relevant are the various tools and techniques taught in the program, and are they readily applicable to the workplace?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7fc092e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7fc092e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-11c84d8\" data-id=\"11c84d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dd3a1c elementor-widget elementor-widget-image\" data-id=\"8dd3a1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fce118c\" data-id=\"fce118c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae3a39b elementor-widget elementor-widget-text-editor\" data-id=\"ae3a39b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe tools and techniques taught in the program are highly current and workplace-ready.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2af83c elementor-widget elementor-widget-text-editor\" data-id=\"b2af83c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor example, the DevSecOps practices covered in the program\u2014such as security implementation within CI\/CD pipelines\u2014are aligned with real-world applications. Similarly, AWS tools and techniques like CloudFormation, CloudTrail, encryption mechanisms, and security debugging within development pipelines are particularly useful and directly applicable in practical environments.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7871a elementor-widget elementor-widget-text-editor\" data-id=\"ce7871a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Do you find this program delivers value on investment for the cloud security learnings on AWS, Azure, and GCP, along with vendor-neutral concepts?<\/strong><\/p><p>Continuous learning is essential in information security, especially with the rapid evolution of tools and technologies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f356031 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f356031\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6cbda2a\" data-id=\"6cbda2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b054f2 elementor-widget elementor-widget-image\" data-id=\"0b054f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d1050d6\" data-id=\"d1050d6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bab60a elementor-widget elementor-widget-text-editor\" data-id=\"8bab60a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe CCSE program adds strong value by covering foundational concepts\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04db9eb elementor-widget elementor-widget-text-editor\" data-id=\"04db9eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tlike building security into the early stages of development, which are applicable across all cloud environments. Understanding how to use these techniques is crucial for professionals who care about protecting data and delivering secure solutions for their clients.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8762321 elementor-widget elementor-widget-text-editor\" data-id=\"8762321\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What kind of recognition did you get after becoming CCSE certified?<\/strong><\/p><p>The CCSE certification is internationally recognized, especially among American companies and startups. Earning the CCSE has helped position me well in the global market.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eea52ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eea52ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-979b81f\" data-id=\"979b81f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ffd6ac elementor-widget elementor-widget-image\" data-id=\"1ffd6ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-77308b0\" data-id=\"77308b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f573c elementor-widget elementor-widget-text-editor\" data-id=\"56f573c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tI believe it\u2019s only a matter of time before this certification gains more popularity in Brazil and across all of Latin America.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e78a82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9e78a82\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc8e625\" data-id=\"cc8e625\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aca3c7f elementor-widget elementor-widget-text-editor\" data-id=\"aca3c7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>\nConclusion<\/h3>\nRobson\u2019s experience with the CCSE program reinforces its value in preparing cybersecurity professionals for the challenges of modern cloud environments. By blending theory with hands-on practical labs, the course delivers actionable knowledge that can be used across multiple cloud platforms and aligns with industry standards. Robson\u2019s insights affirm that cloud security training is no longer optional but a strategic necessity for building resilient, compliant, and secure cloud infrastructure. As organizations navigate complex regulatory landscapes and multi-cloud ecosystems, certifications like CCSE serve as great means for global recognition and career growth.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c0ae2b elementor-widget elementor-widget-spacer\" data-id=\"3c0ae2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1fa39 tags-cloud elementor-widget elementor-widget-heading\" data-id=\"ae1fa39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">About the Interviewee<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-16b7783 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16b7783\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aac965c\" data-id=\"aac965c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d275314 elementor-widget elementor-widget-image\" data-id=\"d275314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1432\" height=\"1600\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson.jpg\" class=\"attachment-full size-full wp-image-83165\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson.jpg 1432w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson-269x300.jpg 269w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson-916x1024.jpg 916w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson-768x858.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/img-eccouncil-ccse-robson-1375x1536.jpg 1375w\" sizes=\"(max-width: 1432px) 100vw, 1432px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-700a382\" data-id=\"700a382\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4bacef elementor-widget elementor-widget-heading\" data-id=\"a4bacef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Robson Medeiros dos Santos<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-948bbdc elementor-widget elementor-widget-text-editor\" data-id=\"948bbdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSenior Information Security Analyst, GlobalWeb\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a6cde elementor-widget elementor-widget-spacer\" data-id=\"40a6cde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95e8a7c elementor-widget elementor-widget-text-editor\" data-id=\"95e8a7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Robson Medeiros dos Santos is a certified cloud security expert with experience in SIEM, DLP, IAM, and incident response. He is experienced in strengthening organizational security and believes that cybersecurity is vital to business strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5081923 tags-cloud elementor-widget elementor-widget-heading\" data-id=\"5081923\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tags<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7def88d tags-cloud elementor-widget elementor-widget-post-info\" data-id=\"7def88d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f2e3860 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/application-security\/\" class=\"elementor-post-info__terms-list-item\">application security<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/aws\/\" class=\"elementor-post-info__terms-list-item\">AWS<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/azure\/\" class=\"elementor-post-info__terms-list-item\">Azure<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/ci-cd\/\" class=\"elementor-post-info__terms-list-item\">CI\/CD<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cloud-security\/\" class=\"elementor-post-info__terms-list-item\">Cloud Security<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cybersecurity\/\" class=\"elementor-post-info__terms-list-item\">cybersecurity<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/devsecops\/\" class=\"elementor-post-info__terms-list-item\">DevSecOps<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/ec-council-2\/\" class=\"elementor-post-info__terms-list-item\">EC Council<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/gcp\/\" class=\"elementor-post-info__terms-list-item\">GCP<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/sdlc\/\" class=\"elementor-post-info__terms-list-item\">SDLC<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As organizations increasingly adopt multi-cloud environments, the need for specialized and practical knowledge in securing these platforms has become vital. Speaking to EC- Council&#8217;s Cyber-Talks, Robson Medeiros dos Santos shares his professional perspective on the importance of cloud security training in today\u2019s enterprise landscape. Robson discusses the unique strengths of the EC-Council Certified Cloud Security&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83163,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[11722],"tags":[12222,13020,13021,13019,12399,199,12538,12981,13022,12928],"class_list":{"0":"post-83161","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-security","8":"tag-application-security","9":"tag-aws","10":"tag-azure","11":"tag-ci-cd","12":"tag-cloud-security","13":"tag-cybersecurity","14":"tag-devsecops","15":"tag-ec-council-2","16":"tag-gcp","17":"tag-sdlc"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Bridge Cloud Security Gaps with CCSE Certification | EC-Council<\/title>\n<meta name=\"description\" content=\"Learn how EC-Council&#039;s CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bridge Cloud Security Gaps with CCSE Certification | EC-Council\" \/>\n<meta property=\"og:description\" content=\"Learn how EC-Council&#039;s CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-19T10:33:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T12:11:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Bridge Cloud Security Gaps with CCSE Certification | EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"Learn how EC-Council&#039;s CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Bridging the Cloud Security Gap with CCSE \u2013 Interview with Robson Medeiros dos Santos\",\"datePublished\":\"2026-02-19T10:33:30+00:00\",\"dateModified\":\"2026-03-11T12:11:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/\"},\"wordCount\":897,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png\",\"keywords\":[\"application security\",\"AWS\",\"Azure\",\"CI\\\/CD\",\"Cloud Security\",\"cybersecurity\",\"DevSecOps\",\"EC Council\",\"GCP\",\"SDLC\"],\"articleSection\":[\"Cloud Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/\",\"name\":\"Bridge Cloud Security Gaps with CCSE Certification | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png\",\"datePublished\":\"2026-02-19T10:33:30+00:00\",\"dateModified\":\"2026-03-11T12:11:17+00:00\",\"description\":\"Learn how EC-Council's CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cloud-security\\\/bridging-the-cloud-security-gap-with-ccse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cloud-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Bridging the Cloud Security Gap with CCSE \u2013 Interview with Robson Medeiros dos Santos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bridge Cloud Security Gaps with CCSE Certification | EC-Council","description":"Learn how EC-Council's CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/","og_locale":"en_US","og_type":"article","og_title":"Bridge Cloud Security Gaps with CCSE Certification | EC-Council","og_description":"Learn how EC-Council's CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-02-19T10:33:30+00:00","article_modified_time":"2026-03-11T12:11:17+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Bridge Cloud Security Gaps with CCSE Certification | EC-Council","twitter_description":"Learn how EC-Council's CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080-1.png","twitter_misc":{"Written by":"EC-Council","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Bridging the Cloud Security Gap with CCSE \u2013 Interview with Robson Medeiros dos Santos","datePublished":"2026-02-19T10:33:30+00:00","dateModified":"2026-03-11T12:11:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/"},"wordCount":897,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png","keywords":["application security","AWS","Azure","CI\/CD","Cloud Security","cybersecurity","DevSecOps","EC Council","GCP","SDLC"],"articleSection":["Cloud Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/","name":"Bridge Cloud Security Gaps with CCSE Certification | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png","datePublished":"2026-02-19T10:33:30+00:00","dateModified":"2026-03-11T12:11:17+00:00","description":"Learn how EC-Council's CCSE certification helps bridge the cloud security gap. Gain the skills to protect cloud infrastructure with expert-level training.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Interview-with-Robson-Medeiros-dos-Santos-Banner-04-1080x1080e.png","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/bridging-the-cloud-security-gap-with-ccse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cloud Security","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cloud-security\/"},{"@type":"ListItem","position":4,"name":"Bridging the Cloud Security Gap with CCSE \u2013 Interview with Robson Medeiros dos Santos"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83161"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83163"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}