Cloud Security Podcast by Google

Anton Chuvakin
undefined
Aug 5, 2024 • 25min

EP184 One Week SIEM Migration: Fact or Fiction?

Manan Doshi, a Senior Security Engineer at Etsy, shares insights on the challenges of migrating to a new SIEM platform. He discusses key hurdles organizations face and debunks myths surrounding flawed tools, emphasizing the importance of processes. Manan reveals the exciting prospect of completing a SIEM migration in just one week and explores the role of AI and 'Detection as Code' in enhancing detection logic. His focus on community insights and strategic planning highlights how a strong engineering culture can transform security operations.
undefined
10 snips
Jul 29, 2024 • 30min

EP183 Cloud Security Journeys: Improve, Evolve, Transform with Cloud Customers

Jaffa Edwards, a Senior Security Manager, and Lyka Segura, a Cloud Security Engineer at Google Cloud, dive into the challenges of cloud security transformation. They share their secrets for effectively tailoring security solutions to diverse customer needs. The duo discusses common pitfalls organizations face when transitioning from on-premises to cloud systems and the cultural shifts required for success. They offer invaluable advice for those starting their cloud security journeys, emphasizing proactive education and adapting security practices to modern environments.
undefined
7 snips
Jul 22, 2024 • 28min

EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?

Guest Adam Bateman, Co-founder of Push Security, discusses ITDR: its definition, benefits, and alternatives. Topics include workload vs human identity ITDR, common threats detected, and advice for implementation. The podcast explores the evolution of ITDR, its relationship with other security categories, advantages of browser telemetry, and specific threats addressed by ITDR tools.
undefined
23 snips
Jul 15, 2024 • 31min

EP181 Detection Engineering Deep Dive: From Career Paths to Scaling SOC Teams

Zack Allen, Senior Director at Datadog, discusses challenges in detection engineering and advice for aspiring engineers. Topics include the role of detection engineers, balancing vendor-made vs. custom detections, and tips for building effective detection rules. The podcast explores the importance of connecting detection efforts with business objectives and provides recommended reading materials to enhance detection engineering skills.
undefined
Jul 8, 2024 • 28min

EP180 SOC Crossroads: Optimization vs Transformation - Two Paths for Security Operations Center

Guests: Mitchell Rudoll, Specialist Master, Deloitte Alex Glowacki, Senior Consultant, Deloitte Topics: The paper outlines two paths for SOCs: optimization or transformation. Can you elaborate on the key differences between these two approaches and the factors that should influence an organization's decision on which path to pursue?  The paper also mentions that alert overload is still a major challenge for SOCs. What are some of the practices that work in 2024 for reducing alert fatigue and improving the signal-to-noise ratio in security signals? You also discuss the importance of automation for SOCs. What are some of the key areas where automation can be most beneficial, and what are some of the challenges of implementing automation in SOCs? Automation is often easier said than done… What specific skills and knowledge will be most important for SOC analysts in the future that people didn’t think of 5-10 years ago? Looking ahead, what are your predictions for the future of SOCs? What emerging technologies do you see having the biggest impact on how SOCs operate?  Resources: “Future of the SOC: Evolution or Optimization —Choose Your Path” paper and highlights blog “Meet the Ghost of SecOps Future” video based on the paper EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud and Beyond The original Autonomic Security Operations (ASO) paper (2021) “New Paper: “Future of the SOC: Forces shaping modern security operations” (Paper 1 of 4)” “New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” (Paper 2 of 4)” “New Paper: “Future Of The SOC: Process Consistency and Creativity: a Delicate Balance” (Paper 3 of 4)”
undefined
Jul 1, 2024 • 23min

EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response

Guests, Robin Shostack & Jibran Ilyas, discuss expedition behavior in cybersecurity incident response. Topics include teamwork under stress, applying knowledge to security teams, fostering expeditionary behavior, and creating it in new/existing teams. Emphasizes the significance of teamwork, communication, and trust for successful incident resolution.
undefined
7 snips
Jun 24, 2024 • 32min

EP178 Meet Brandon Wood: The Human Side of Threat Intelligence: From Bad IP to Trafficking Busts

Meet Brandon Wood, Google Threat Intelligence PM, discussing the human side of threat intelligence, breaking up human trafficking rings, moving past traditional cyber TI approaches, debunking monitoring the dark web myths, transitioning from sales to product management, and the impact on Google's threat intelligence go-to-market strategy.
undefined
14 snips
Jun 17, 2024 • 30min

EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant

Mandiant consultants discuss top 5 mistakes in cloud incidents, challenges in securing hybrid environments, attack surface evaluation, IAM importance, and incident preparedness for organizations transitioning to the cloud.
undefined
Jun 10, 2024 • 27min

EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use

Seth Vargo, Principal Software Engineer at Google, discusses how Google secures its own cloud use on GCP. Topics include unique cloud security practices, scaling controls, automation, threat analysis, and leveraging language models for anomaly detection. Seth highlights Google's emphasis on proactive security measures and balancing experimentation with security.
undefined
Jun 3, 2024 • 27min

EP175 Meet Crystal Lister: From Public Sector to Google Cloud Security and Threat Horizons

Crystal Lister discusses transitioning from public to private sector, impact on Google work, risk management, Google Threat Horizons reports, insider threats importance. Insights on cybersecurity career transitions, serverless computing threats, and empowering women in cybersecurity.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app