Cloud Security Podcast by Google cover image

Cloud Security Podcast by Google

Latest episodes

undefined
9 snips
Jan 20, 2025 • 33min

EP207 Slaying the Ransomware Dragon: Can a Startup Succeed?

Bob Blakley, co-founder and chief product officer of Mimic, dives deep into the evolving threat of ransomware, tracing its transformation from extortion to a sophisticated exploitation tool influenced by cryptocurrency. He challenges conventional views, arguing that ransomware presents a unique security dilemma distinct from other malware. Bob also discusses the critical need for rapid, machine-speed responses and re-evaluating current cybersecurity practices, particularly within startups, to effectively combat this escalating menace.
undefined
Jan 13, 2025 • 33min

EP206 Paying the Price: Ransomware's Rising Stakes in the Cloud

Ransomware is a growing threat, with evolving tactics that include data leaks and DDoS attacks. The podcast discusses the intricate business models of ransomware gangs, highlighting their aggressive extortion methods. Challenges specific to cloud environments are examined, stressing the importance of robust data governance. The ethical dilemma of whether to pay ransoms is a key topic, alongside practical advice for organizations to strengthen their defenses. Listeners gain insights into the interconnected roles of cyber insurance and corporate responsibility in combating this menace.
undefined
Jan 6, 2025 • 28min

EP205 Cybersecurity Forecast 2025: Beyond the Hype and into the Reality

In this discussion, Andrew Kopcienski, a Principal Intelligence Analyst at Google Threat Intelligence Group, shares insights from the new Cybersecurity Forecast 2025 report. He addresses the misconceptions around AI's role in increasing threats, emphasizing the risk of compromised identities in hybrid environments. Andrew highlights the shift from phishing to stolen credentials and examines the growing complexities of zero-day vulnerabilities. He stresses the importance of effective detection strategies and regular audits to combat evolving threats, particularly from nation-state actors.
undefined
11 snips
Dec 23, 2024 • 31min

EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators

Phil Venables, CISO at Google Cloud, dives into the increasing obsession with resilience in cybersecurity, potentially sparked by the rise of ransomware. He discusses the PCAST report’s origins and stresses the importance of shifting from lagging to leading indicators for security. Venables introduces 'Cyber-Physical Modularity' as a key concept for enhancing critical infrastructure resilience. He also emphasizes rigorous stress testing and shares insights on overcoming challenges in implementing these strategies, suggesting that organizations can gain resilience benefits by leveraging Google Cloud.
undefined
9 snips
Dec 16, 2024 • 37min

EP203 Cloud Shared Responsibility: Beyond the Blame Game with Rich Mogull

Rich Mogull, SVP of Cloud Security at FireMon and CEO at Securosis, dives into the intricacies of cloud security responsibility. He introduces the Cloud Shared Irresponsibilities Model, suggesting that cloud providers bear some blame in breaches due to customer misconfigurations. The discussion includes insights on what 'using the cloud securely' really means today and how to effectively teach cloud security. Rich also touches on balancing free and paid security features in the cloud and shares his top lesson for safer cloud practices.
undefined
10 snips
Dec 9, 2024 • 37min

EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering

Amine Besson, Tech Lead on Detection Engineering at Behemoth Cyberdefence, shares his insights on the evolution of security operations and the importance of detection engineering. He discusses the inadequacies of traditional tiered SOCs against modern threats and introduces 'detection as code' as a transformative approach. Amine also elaborates on the fusion of threat intelligence with detection and response, stressing real-time actionable insights. Finally, he highlights new architectures like OpenTIDE that enhance threat detection and efficiency.
undefined
Dec 2, 2024 • 37min

EP201 Every CTO Should Be a CSTO (Or Else!) - Transformation Lessons from The Hoff

Chris Hoff, Chief Secure Technology Officer at LastPass, shares his journey of transforming tech stacks post-incident. He emphasizes that every CTO should adopt a security-first approach, combining technology with cultural shifts. He reveals the importance of integrating security into decision-making and enhancing telemetry for observability. Hoff humorously navigates the complex world of cloud technology, highlighting the need for resilience and collaboration in security. His insights on proactive cybersecurity offer valuable lessons for others in tech.
undefined
Nov 25, 2024 • 28min

EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security

Guest: Michael Czapinski, Security & Reliability Enthusiast, Google Topics: “How Google protects its production services” paper covers how Google's infrastructure balances several crucial aspects, including security, reliability, development speed, and maintainability. How do you prioritize these competing demands in a real-world setting? What attack vectors do you consider most critical in the production environment, and how has Google’s defenses against these vectors improved over time? Can you elaborate on the concept of Foundational services and their significance in Google's security posture? How does your security approach adapt to this vast spectrum of sensitivity and purpose of our servers and services, actually? How do you implement this principle of zero touch prod for both human and service accounts within our complex infrastructure?  Can you talk us through the broader approach you take through Workload Security Rings and how this helps? Resources: “How Google protects its production services” paper (deep!) SLSA framework  EP189 How Google Does Security Programs at Scale: CISO Insights EP109 How Google Does Vulnerability Management: The Not So Secret Secrets! EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil SREcon presentation on zero touch prod.  The SRS book (free access)  
undefined
Nov 18, 2024 • 29min

EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)

Guests: Michele Chubirka, Staff Cloud Security Advocate, Google Cloud Sita Lakshmi Sangameswaran, Senior Developer Relations Engineer, Google Cloud Topics: What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-) Everyone's talking about how "identity is the new perimeter" in the cloud. Can you break that down in simple terms? A lot of people say “in the cloud, you must do IAM ‘right’”. What do you think that means? What is the first or the main idea that comes to your mind when you hear it?  What’s this stuff about  least-privilege and separation-of-duties being less relevant? Why do they matter in the cloud that changes rapidly?  What are your IAM Top Pet Peeves? Resources: Video  (LinkedIn, YouTube) EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM? EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler IAM: There and back again using resource hierarchies IAM so lost: A guide to identity in Google Cloud I Hate IAM: but I need it desperately EP33 Cloud Migrations: Security Perspectives from The Field EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security “Identity Crisis: The Biggest Prize in Security” paper “Learn to love IAM: The most important step in securing your cloud infrastructure“ Next presentation
undefined
11 snips
Nov 11, 2024 • 27min

EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting Lessons

Ante Gojsalic, Co-Founder & CTO at SplxAI, dives into the intricacies of securing generative AI applications. He outlines the unique challenges of penetration testing in this realm, such as non-determinism and the complex interplay of data and applications. Ante discusses the most concerning current attack surfaces and shares his insights on common security mistakes companies make. He emphasizes the importance of blending automated pentesting with human expertise and offers practical strategies for learning about AI security. Tune in for crucial tips on navigating this evolving landscape!

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode