Cloud Security Podcast cover image

Cloud Security Podcast

Latest episodes

undefined
Mar 20, 2025 • 43min

Detection Engineering with Google Cloud

Detection rules aren’t just for fun—they’re critical for securing cloud environments. But are you using them the right way? In this episode, Ashish Rajan sits down with David French, Staff Adoption Engineer for Security at Google Cloud, to break down how organizations can scale Detection as Code across AWS, Azure, and Google Cloud.Why prevention isn’t enough—and how detection fills the gapThe biggest mistakes in detection rules that could blow up your SOCHow to scale detections across hundreds (or thousands) of cloud accountsThe ROI of Detection as Code—why security leaders should careCommon low-hanging fruit detections every cloud security team should implementDavid has spent over a decade working in detection engineering, threat hunting, and building SIEM & EDR products. He shares real-world insights on how companies can improve their detection strategies and avoid costly security missteps.Guest Socials: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠David's LinkedinPodcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Cybersecurity, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(03:06) What is Detection as Code?(03:41) What was before Detection as Code?(05:36) Business ROI for doing Detection as Code?(07:49) Building Security Operations in Google Cloud(12:41) Threat Detection for different type of workload(14:54) What is Google SecOps?(20:36) Different kinds of Detection people can create(24:46) Scaling Detection across many Google Cloud accounts(28:47) The role of Data Pipeline in Detection(31:44) Detections people can start with(34:14) Stages of maturity for detection(36:43) Skillsets for Detection Engineering(39:32) The Fun Section
undefined
16 snips
Mar 13, 2025 • 49min

CNAPPs & CSPMs don’t tell the full cloud security story

Nick Jones, Head of Research at WithSecure and an offensive cloud security expert, dives deep into the often overlooked aspects of cloud security. He explains why relying solely on CNAPPs and CSPMs can leave critical gaps. Nick reveals the biggest cloud attack paths and discusses how cloud pentesting differs from traditional methods. He emphasizes identity management's role over direct attacks, challenges common security misconceptions, and shares real-world insights from red team engagements to bolster organizational defenses.
undefined
Mar 6, 2025 • 45min

Securing AI Applications in the Cloud

Bar-el Tayouri, Head of Mend AI at Mend.io, is a leading expert in AI security and application security. In this conversation, he tackles the hidden dangers of shadow AI and the layers of an AI Bill of Materials (AIBOM). Bar-el emphasizes the necessity of red teaming and shares practical strategies for pre- and post-deployment security. He explores the journey of AI adoption and highlights the complexities in balancing innovation with security. Plus, he shares his love for Ethiopian cuisine, connecting personal passions with professional insights.
undefined
Feb 28, 2025 • 53min

Realities of Cloud Networking in AWS

Kyler Middleton, a skilled engineer exploring AI, and Jack W. Harter, a DevOps expert with a rich background in high-frequency trading, dive into the complexities of AWS networking. They discuss the formidable challenges of transitioning from on-premises to the cloud, especially in regulated healthcare environments. Listeners will be intrigued by their stories on adapting security measures, the surprising effectiveness of certain anti-patterns, and the hidden compliance hurdles faced during cloud migration, all while navigating the intricate landscape of AWS networks.
undefined
Feb 20, 2025 • 54min

Cloud Incident Response in Microsoft Azure

In this engaging discussion, security researcher Katie Knowles, a former Azure incident responder, dives into critical Azure security topics. She unpacks common incident response scenarios and the rising threat of LLM jacking, where attackers misuse authentication tokens. Katie shares insights on privilege escalation in Azure Key Vault and emphasizes the importance of secure role assignments. She also offers practical tips for developing an effective Azure incident response playbook, making Azure's intricate security landscape accessible to all.
undefined
18 snips
Feb 13, 2025 • 51min

AWS Multi-Account Security: What Netflix Learned

Join cloud security experts Patrick Sanders and Joseph Kjar from Netflix as they share their insights on securing AWS multi-account environments. They discuss why an identity-first approach is essential for security, tackling challenges like least privilege access and IAM role migrations. The duo emphasizes balancing security with developer efficiency, and they shed light on strategies for isolating cloud identities amidst complexities. Packed with practical tips, their conversation offers valuable lessons from Netflix's cloud security journey.
undefined
12 snips
Feb 4, 2025 • 58min

Cloud Security Detection & Response Strategies That Actually Work

Will Bengtson, VP of Security Operations at HashiCorp, dives into the complexities of cloud security. He explains how cloud incident response differs from on-prem solutions and reveals how quickly attackers exploit APIs. Will shares insights on building effective detection programs while highlighting detection blind spots in AWS and Azure. He also discusses the importance of collaboration in threat hunting and the evolving challenges in managing cloud security. Along the way, he reflects on personal growth and culinary favorites, adding a delightful twist to the conversation.
undefined
9 snips
Jan 28, 2025 • 32min

CISO Challenges Across Industries

In this discussion, Sunil Rane, a seasoned cybersecurity leader with over 20 years of experience, sheds light on the intricate challenges faced by CISOs across various sectors. He elaborates on balancing data sensitivity in healthcare with operational efficiency, the complexities of compliance in consulting, and the unique hurdles in the media industry regarding public accountability. Sunil also emphasizes the importance of communication and collaboration for effective cybersecurity leadership, all while sharing a personal touch with tales of his culinary passions.
undefined
Jan 24, 2025 • 51min

Why Solving the Data Problem is Key to Cloud Security?

Francis Odum, founder and lead research analyst at Software Analyst Cyber Research, shares valuable insights into cloud security and identity management. He discusses the critical role of addressing data problems to mitigate false positives and enhance SOC efficiency. The conversation also delves into the promising yet complex landscape of AI security, emphasizing the importance of proper data governance. Additionally, Odum predicts key trends for 2025, urging the cybersecurity industry to prioritize innovative solutions while navigating evolving challenges.
undefined
35 snips
Jan 21, 2025 • 26min

The economics of cybersecurity and trends

Mike Privette, founder of Return on Security, shares his deep insights into the economics of cybersecurity and its evolving landscape. He discusses how AI is reshaping governance, risk, and compliance while emphasizing the need for strategic planning in cybersecurity efforts. The integration of cloud and application security takes center stage, highlighting unified approaches to protect against data loss. Additionally, Mike touches on the rise of startups in the cyber market and the ongoing challenges they face in this dynamic environment.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app