

Cloud Security Podcast by Google
Anton Chuvakin
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure.
We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or just for organizational benefit.
We hope you'll join us if you're interested in where technology overlaps with process and bumps up against organizational design. We're hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can't keep as the world moves from on-premises computing to cloud computing.
We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or just for organizational benefit.
We hope you'll join us if you're interested in where technology overlaps with process and bumps up against organizational design. We're hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can't keep as the world moves from on-premises computing to cloud computing.
Episodes
Mentioned books

9 snips
Nov 22, 2021 • 28min
EP44 Evolving a SIEM for the Future While Learning from the Past
Guest: Mike Orosz, a Chief Information and Product Security Officer @ Vertiv Topics: What are your views on modern SIEM? What should it do and what should it be? Should it even be called SIEM? Is SaaS/cloud-native SIEM the only way to go? Can anybody build a SIEM in the cloud by installing the regular SIEM on IaaS? What are the top challenges for organizations deploying and operationalizing SIEM today? What are some hidden or commonly forgotten costs for a SIEM deployment? Is open source the answer to SIEM? SIEM today should deliver on detection, hunting and investigation use cases, so what does it mean in terms of practical data retention? Resources: "On "Output-driven" SIEM" "Fake Cloud: Now There Are Two Hands in Your Pocket"

Nov 15, 2021 • 23min
EP43 Automation as Paved Roads in Cloud Enablement
Guests: Amber Shafi, Production Manager GSK Svetlin Zamfirov, Senior Platform Engineer at GSK Ivan Angelov, Principal Platform Engineer at GSK Topics: Tell us about your team, what are you responsible for and how is the team setup to make that happen? What components of cloud security do you cover? Tell us about cloud misconfigurations and why these are different from on- premise misconfiguration? How are you discovering these misconfigurations? You've automated responses to misconfiguration. Beyond the obvious upsides of reducing team toil and time to response, what are the other benefits? Are there risk in this approach and how are they handled? How did this idea to automate come about, and what lessons did you learn along the way? How have you integrated with the cloud provider security tooling? Resources: "Automate and/or Die?" (ep3) "Automating Response to Security Events on Google Cloud Platform" from GSK blog GCP security blog

Nov 8, 2021 • 24min
EP42 Missing Diversity Hurts Your Security
Guest: MK Palmore, Director at Office of the CISO, Google Cloud, member of Cybersecurity Action Team Topics: Why is there such a huge gap in security professionals who are women and people of color? How does the lack of women and people of color in tech impact the industry, cybersecurity & tech overall? Are diverse teams better performing, better morale, happier people? Are there kinds of threats that we miss in threat modeling exercises for lack of diverse team members? We've seen countless examples where AI/ML systems have had problems with laundering biases and having frankly appalling issues due to biased training data. What are security implications here? Are there organizations helping to close the representation gap in the security workforce and the cloud workforce? Why do the big tech companies and even the smaller ones have trouble identifying diverse talent? Why is this hard even for people and organizations who clearly want to improve it? Why do companies have a hard time retaining diverse talent? Resources: Cyversity Wicys

Nov 1, 2021 • 24min
EP41 Beyond Phishing: Email Security Isn't Solved
CEO of Material Security, Ryan Noon, discusses the challenges of email security beyond phishing. The podcast explores the concept of email security as an application security problem and the importance of protecting sensitive information in a zero trust world. It delves into challenges in the cybersecurity industry and offers tips on enhancing email security. Book recommendations are also provided.

Oct 25, 2021 • 32min
EP40 2021: Phishing is Solved?
Guests Elie Bursztein, security, anti-abuse and privacy researcher @ Google Kurt Thomas, security, anti-abuse and privacy researcher @ Google Topics: Can we say that "Multi-Factor Authentication - if done well - fixes phishing for good" or is this too much to say? What are the realistic and seen-in-the-wild bypasses for MFA as a protection? How do you think these controls fare vs top tier attackers (clearly, they work vs commodity threats)? What do we know about burden vs value of MFA today? What can we realistically do to increase MFA/2FA adoption to the 90%s? Can we share anything about what we're seeing as industry benchmarks on MFA adoption so far? We've seen a lot of ugly debates over the value of SMS as MFA, what is your research-based take on this? Resources: Google Titan Security Key "Malicious Documents Emerging Trends: A Gmail Perspective" (RSA 2020) "New research: How effective is basic account hygiene at preventing hijacking" "New Research: Lessons from Password Checkup in action" "New research reveals who's targeted by email attacks" "New research: Understanding the root cause of account takeover" ""Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns" "Tales from the Trenches: Using AI for Gmail Security" (ep28)

Oct 25, 2021 • 32min
EP40 2021: Phishing is Solved?
Guests Elie Bursztein, security, anti-abuse and privacy researcher @ Google Kurt Thomas, security, anti-abuse and privacy researcher @ Google Topics: Can we say that "Multi-Factor Authentication - if done well - fixes phishing for good" or is this too much to say? What are the realistic and seen-in-the-wild bypasses for MFA as a protection? How do you think these controls fare vs top tier attackers (clearly, they work vs commodity threats)? What do we know about burden vs value of MFA today? What can we realistically do to increase MFA/2FA adoption to the 90%s? Can we share anything about what we're seeing as industry benchmarks on MFA adoption so far? We've seen a lot of ugly debates over the value of SMS as MFA, what is your research-based take on this? Resources: Google Titan Security Key "Malicious Documents Emerging Trends: A Gmail Perspective" (RSA 2020) "New research: How effective is basic account hygiene at preventing hijacking" "New Research: Lessons from Password Checkup in action" "New research reveals who's targeted by email attacks" "New research: Understanding the root cause of account takeover" ""Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns" "Tales from the Trenches: Using AI for Gmail Security" (ep28)

Oct 18, 2021 • 31min
EP39 From False Positives to Karl Popper: Rationalizing Cloud Threat Detection
Guest: Jared Atkinson, Adversary Detection Technical Director at SpecterOps Topics: What are bad/good/great detections? Is this all about the Bianco's pyramid? Is high good and low bad? How should we judge the quality of detections? Can there be a quality framework? Is that judgment going to be site specific? What should we do to build more good directions? Is this all about reducing false positives? Can we really measure false negatives? How can we approach this? How can we test for detection goodness in the real world? What are the methods that work? It can't be just about paper ATT&CK coverage, right? What are your top 3 tips for improving the detection practice at an organization? Resources: "The Pyramid of Pain" post by David Bianco "On Threat Detection Uncertainty" "Detection Coverage and Detection-in-Depth" "Detection in Depth" by SpecterOps "Philosophy of Science: Rationality Without Foundations" by Karl Popper (yes, really) Red Canary "2021 Threat Detection Report" "The Black Swan: The Impact of the Highly Improbable" by Nassim Nicholas Taleb John Piaget's theory of cognitive development

Oct 14, 2021 • 31min
NEXT Special - 6 Cloud Security PMs (and a Developer Advocate!) Walk into a Studio
Guests: Stephanie Wong Vicente Diaz, Jerome McFarland Scott Ellis Patrick Faucher Il-Sung Lee, Anoosh Saboori Topics: What is your session about? Why would audience care? What is special about your security technology? Resources: Google Cloud Next 2021 SEC212 6 layers of GCP data center security SEC101 Ransomware and cyber resilience SEC204 Take charge of your sensitive data SEC207 Securing the software supply chain SEC300 Trust the cloud more by trusting it less: Ubiquitous data encryption

Oct 13, 2021 • 21min
NEXT Special - Google Cybersecurity Action Team: What's the Story?
Guest: Phil Venables (@philvenables), Vice President, Chief Information Security Officer (CISO) @ Google Cloud Topics: We are here to talk Google Cybersecurity Action Team, and this is your brainchild, so tell our audience the origin of this idea? How is Cybersecurity Action Team going to help secure GCP enterprise clients? Is there also a "improve the security of the internet" story? Many organizations seem stuck in the pre-cloud thinking and mental models, can Cybersecurity Action Team help them transform their security? How? When we sometimes present our security innovations to clients, they say "but we are not Google", so how does Cybersecurity Action Team help us bring more of Google Cybersecurity to the world? What else do we plan to do with Cybersecurity Action Team to help customers modernize their security? How should customers engage with Cybersecurity Action Team? Resources: Google Cybersecurity Action Team "Google Announces Cybersecurity Action Team to Support the Security Transformations of Public and Private Sector Organizations" "Site Reliability Engineering" book (free) "Autonomic Security Operations: 10X Transformation of the Security Operations Center" paper

Oct 12, 2021 • 19min
NEXT Special - Cloud Security and DEI: Being an Ally!
Guest: Aditi Joshi, Manager in Cloud Security Team @ Google Cloud Topics: What is Allyship? How is it defined? What is its main goal? Why is allyship important in Cloud Security, specifically? Are there aspects of security that make allyship particularly important? What specifically has Google Cloud Security deployed and operationalized around Allyship? How does effective allyship look like? More personally, how can I be a better ally? How does it fit into Google Cloud Security's overarching DEI efforts?


