

Cloud Security Podcast by Google
Anton Chuvakin
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure.
We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit.
We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit.
We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
Episodes
Mentioned books

6 snips
Oct 14, 2024 • 31min
EP194 Deep Dive into ADR - Application Detection and Response
Daniel Shechter, Co-founder and CEO at Miggo Security, dives into the world of Application Detection and Response (ADR), highlighting its essential role in addressing today's complex cloud application threats. He explains how ADR differs from traditional EDR and CDR tools, emphasizing the need for contextual insights that improve security monitoring. Shechter also tackles the challenges of automation and collaboration in application security, offering real-world examples of ADR in action. Discover how ADR enhances visibility and efficiency for security teams facing evolving vulnerabilities.

15 snips
Oct 7, 2024 • 31min
EP193 Inherited a Cloud? Now What? How Do I Secure It?
Taylor Lehmann, Director at the Office of the CISO, and Luis Urena, Cloud Security Architect at Google Cloud, tackle the complexities of securing inherited cloud environments. They discuss the risks of late security team involvement and the impracticality of drastic measures like 'nuking' the environment. Instead, they offer strategic steps for immediate security improvements, such as managing overly permissive roles. They also evaluate the necessity of compromise assessments and the balance between current priorities and securing new systems.

Sep 30, 2024 • 33min
EP192 Confidential + AI: Can AI Keep a Secret?
Guest: Nelly Porter, Director of PM, Cloud Security at Google Cloud Topics: Share your story and how you ended here doing confidential AI at Google? What problem does confidential compute + AI solve and for what clients? What are some specific real-world applications or use cases where you see the combination of AI and confidential computing making the most significant impact? What about AI in confidential vs AI on prem? Should those people just do on-prem AI instead? Which parts of the AI lifecycle need to be run in Confidential AI: Training? Data curation? Operational workloads? What are the performance (and thus cost) implications of running AI workloads in a confidential computing environment? Are there new risks that arise out of confidential AI? Resources: Video EP48 Confidentially Speaking 2: Cloudful of Secrets EP1 Confidentially Speaking “To securely build AI on Google Cloud, follow these best practices“ blog (paper)

Sep 23, 2024 • 24min
EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!
Dan Nutting, a manager in Cyber Defense at Google Cloud, shares his insights on the concept of the Defender's Advantage. He discusses why many defenders struggle to realize this advantage and emphasizes the importance of being intelligence-led in cyber defense. Nutting explains the continuous cycle of detection engineering and how organizations can maintain effective detection capabilities. He also introduces the intriguing idea of 'Mission Control' for proactive security management, enhancing collaboration among teams to tackle threats.

9 snips
Sep 16, 2024 • 30min
EP190 Unraveling the Security Data Fabric: Need, Benefits, and Futures
Josh Liburdi, a Staff Security Engineer at Brex, dives deep into the concept of security data fabric and its transformative impact on security data management. He explains how this innovative technology shifts organizations from outdated syslog methods to modern data pipelines, improving log quality for threat detection. Josh discusses the importance of vendor selection and balancing costs with security needs, alongside the potential future of decoupled Security Information Management systems and the integration of open-source solutions.

11 snips
Sep 9, 2024 • 30min
EP189 How Google Does Security Programs at Scale: CISO Insights
Royal Hansen, the CISO of Alphabet, dives deep into Google's unique security culture and infrastructure. He discusses the challenges and advantages of operating at massive scale, highlighting the need for proactive security by design. Hansen shares insights on scaling teams effectively, utilizing AI for threat detection, and cultivating a resilient security environment. He also reflects on surprising aspects of Google's internal culture that could benefit the broader industry, emphasizing the importance of discipline and system design.

8 snips
Sep 2, 2024 • 29min
EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
In a compelling discussion with Dor Fledel, founder and CEO of Spera Security, he dives into the nuanced role of identity in cloud security. He explains the challenges of identity management, addressing concepts like 'identity management debt.' Fledel shares advice on how organizations can navigate this debt while stressing the importance of monitoring user identities, service accounts, and API keys. He also offers insights for founders transitioning from startup to acquisition, emphasizing the need for focus and repeatability in security practices.

16 snips
Aug 26, 2024 • 30min
EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM Evolution
Nicole Beckwith, a Sr. Security Engineering Manager at Kroger, shares her insights into leading successful Security Operations Centers. She emphasizes the importance of self-leadership and adaptability in fostering high-functioning teams while tackling burnout. Nicole discusses innovative, human-centric hiring strategies that value unique qualities over traditional metrics. She also dives into the evolution of SIEM technology, highlighting its transition towards AI-driven solutions. Finally, she outlines a strategic 70-30-90 day plan for new SOC leaders to ensure effective transitions.

4 snips
Aug 19, 2024 • 27min
EP186 Cloud Security Tools: Trust the Cloud Provider or Go Third-Party? An Epic Debate, Anton vs Tim
Tim, a cloud security advocate, and Anton, a proponent of third-party solutions, engage in a compelling debate on cloud security tools. They explore the merits of relying on cloud providers versus independent vendors, discussing trust, flexibility, and essential security principles. The duo dives into strategies for navigating multi-cloud environments and emphasizes the importance of evaluating specific security needs. With lively exchanges, they encourage listeners to reflect on their own security practices while recommending intriguing readings to further delve into the topic.

Aug 12, 2024 • 24min
EP185 SAIF-powered Collaboration to Secure AI: CoSAI and Why It Matters to You
Guest: David LaBianca, Senior Engineering Director, Google Topics: The universe of AI risks is broad and deep. We’ve made a lot of headway with our SAIF framework: can you give us a) a 90 second tour of SAIF and b) share how it’s gotten so much traction and c) talk about where we go next with it? The Coalition for Secure AI (CoSAI) is a collaborative effort to address AI security challenges. What are Google's specific goals and expectations for CoSAI, and how will its success be measured in the long term? Something we love about CoSAI is that we involved some unexpected folks, notably Microsoft and OpenAI. How did that come about? How do we plan to work with existing organizations, such as Frontier Model Forum (FMF) and Open Source Security Foundation (OpenSSF)? Does this also complement emerging AI security standards? AI is moving quickly. How do we intend to keep up with the pace of change when it comes to emerging threat techniques and actors in the landscape? What do we expect to see out of CoSAI work and when? What should people be looking forward to and what are you most looking forward to releasing from the group? We have proposed projects for CoSAI, including developing a defender's framework and addressing software supply chain security for AI systems. How can others use them? In other words, if I am a mid-sized bank CISO, do I care? How do I benefit from it? An off-the-cuff question, how to do AI governance well? Resources: CoSAI site, CoSAI 3 projects SAIF main site Gen AI governance: 10 tips to level up your AI program “Securing AI: Similar or Different?” paper Our Security of AI Papers and Blogs Explained