

Cloud Security Podcast by Google
Anton Chuvakin
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure.
We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit.
We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit.
We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
Episodes
Mentioned books

6 snips
Oct 28, 2024 • 28min
EP196 AI+TI: What Happens When Two Intelligences Meet?
Vijay Ganti, Director of Product Management at Google Cloud Security, dives into the world of threat intelligence and AI-driven security. He addresses the challenges organizations face in utilizing threat intelligence effectively, highlighting the need for better integration. Vijay discusses the revolutionary impact of AI on threat detection and the crucial balance between human expertise and automation. The conversation also emphasizes the importance of staying updated with AI research to enhance understanding and application in the field.

10 snips
Oct 21, 2024 • 41min
EP195 Containers vs. VMs: The Security Showdown!
Michele Chubirka, a Cloud Security Advocate at Google Cloud with a rich background in finance and academia, delves into the security dynamics between containers and virtual machines. She discusses the implications of attack surfaces, patch speed, and the complexities of misconfigurations in orchestrators. Michele shares strategies for organizations to effectively balance the strengths and vulnerabilities of both technologies. With insights on the future interplay of containers, VMs, and WebAssembly, she inspires a proactive approach to evolving security challenges.

6 snips
Oct 14, 2024 • 31min
EP194 Deep Dive into ADR - Application Detection and Response
Daniel Shechter, Co-founder and CEO at Miggo Security, dives into the world of Application Detection and Response (ADR), highlighting its essential role in addressing today's complex cloud application threats. He explains how ADR differs from traditional EDR and CDR tools, emphasizing the need for contextual insights that improve security monitoring. Shechter also tackles the challenges of automation and collaboration in application security, offering real-world examples of ADR in action. Discover how ADR enhances visibility and efficiency for security teams facing evolving vulnerabilities.

15 snips
Oct 7, 2024 • 31min
EP193 Inherited a Cloud? Now What? How Do I Secure It?
Taylor Lehmann, Director at the Office of the CISO, and Luis Urena, Cloud Security Architect at Google Cloud, tackle the complexities of securing inherited cloud environments. They discuss the risks of late security team involvement and the impracticality of drastic measures like 'nuking' the environment. Instead, they offer strategic steps for immediate security improvements, such as managing overly permissive roles. They also evaluate the necessity of compromise assessments and the balance between current priorities and securing new systems.

Sep 30, 2024 • 33min
EP192 Confidential + AI: Can AI Keep a Secret?
Guest: Nelly Porter, Director of PM, Cloud Security at Google Cloud Topics: Share your story and how you ended here doing confidential AI at Google? What problem does confidential compute + AI solve and for what clients? What are some specific real-world applications or use cases where you see the combination of AI and confidential computing making the most significant impact? What about AI in confidential vs AI on prem? Should those people just do on-prem AI instead? Which parts of the AI lifecycle need to be run in Confidential AI: Training? Data curation? Operational workloads? What are the performance (and thus cost) implications of running AI workloads in a confidential computing environment? Are there new risks that arise out of confidential AI? Resources: Video EP48 Confidentially Speaking 2: Cloudful of Secrets EP1 Confidentially Speaking “To securely build AI on Google Cloud, follow these best practices“ blog (paper)

Sep 23, 2024 • 24min
EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!
Dan Nutting, a manager in Cyber Defense at Google Cloud, shares his insights on the concept of the Defender's Advantage. He discusses why many defenders struggle to realize this advantage and emphasizes the importance of being intelligence-led in cyber defense. Nutting explains the continuous cycle of detection engineering and how organizations can maintain effective detection capabilities. He also introduces the intriguing idea of 'Mission Control' for proactive security management, enhancing collaboration among teams to tackle threats.

9 snips
Sep 16, 2024 • 30min
EP190 Unraveling the Security Data Fabric: Need, Benefits, and Futures
Josh Liburdi, a Staff Security Engineer at Brex, dives deep into the concept of security data fabric and its transformative impact on security data management. He explains how this innovative technology shifts organizations from outdated syslog methods to modern data pipelines, improving log quality for threat detection. Josh discusses the importance of vendor selection and balancing costs with security needs, alongside the potential future of decoupled Security Information Management systems and the integration of open-source solutions.

11 snips
Sep 9, 2024 • 30min
EP189 How Google Does Security Programs at Scale: CISO Insights
Royal Hansen, the CISO of Alphabet, dives deep into Google's unique security culture and infrastructure. He discusses the challenges and advantages of operating at massive scale, highlighting the need for proactive security by design. Hansen shares insights on scaling teams effectively, utilizing AI for threat detection, and cultivating a resilient security environment. He also reflects on surprising aspects of Google's internal culture that could benefit the broader industry, emphasizing the importance of discipline and system design.

8 snips
Sep 2, 2024 • 29min
EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
In a compelling discussion with Dor Fledel, founder and CEO of Spera Security, he dives into the nuanced role of identity in cloud security. He explains the challenges of identity management, addressing concepts like 'identity management debt.' Fledel shares advice on how organizations can navigate this debt while stressing the importance of monitoring user identities, service accounts, and API keys. He also offers insights for founders transitioning from startup to acquisition, emphasizing the need for focus and repeatability in security practices.

15 snips
Aug 26, 2024 • 30min
EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM Evolution
Nicole Beckwith, a Sr. Security Engineering Manager at Kroger, shares her insights into leading successful Security Operations Centers. She emphasizes the importance of self-leadership and adaptability in fostering high-functioning teams while tackling burnout. Nicole discusses innovative, human-centric hiring strategies that value unique qualities over traditional metrics. She also dives into the evolution of SIEM technology, highlighting its transition towards AI-driven solutions. Finally, she outlines a strategic 70-30-90 day plan for new SOC leaders to ensure effective transitions.