Cloud Security Podcast by Google

By: Anton Chuvakin
  • Summary

  • Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.
    Copyright Google Cloud
    Show More Show Less
activate_samplebutton_t1
Episodes
  • EP194 Deep Dive into ADR - Application Detection and Response
    Oct 14 2024

    Guest:

    • Daniel Shechter, Co-Founder and CEO at Miggo Security

    Topics:

    • Why do we need Application Detection and Response (ADR)? BTW, how do you define it?
    • Isn’t ADR a subset of CDR (for cloud)? What is the key difference that sets ADR apart from traditional EDR and CDR tools?
    • Why can’t I just send my application data - or eBPF traces - to my SIEM and achieve the goals of ADR that way?
    • We had RASP and it failed due to instrumentation complexities. How does an ADR solution address these challenges and make it easier for security teams to adopt and implement?
    • What are the key inputs into an ADR tool?
    • Can you explain how your ADR correlates cloud, container, and application contexts to provide a better view of threats? Could you share real-world examples of types of badness solved for users?
    • How would ADR work with other application security technologies like DAST/SAST, WAF and ASPM?
    • What are your thoughts on the evolution of ADR?

    Resources:

    • EP157 Decoding CDR & CIRA: What Happens When SecOps Meets Cloud
    • EP143 Cloud Security Remediation: The Biggest Headache?
    • Miggo research re: vulnerability ALBeast
    • “WhatDR or What Detection Domain Needs Its Own Tools?” blog
    • “Making Sense of the Application Security Product Market” blog
    • “Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem“ book
    Show More Show Less
    31 mins
  • EP193 Inherited a Cloud? Now What? How Do I Secure It?
    Oct 7 2024

    Guests:

    • Taylor Lehmann, Director at Office of the CISO, Google Cloud
    • Luis Urena, Cloud Security Architect, Google Cloud

    Topics

    • There is a common scenario where security teams are brought in after a cloud environment is already established. From your experience, how does this late involvement typically impact the organization's security posture and what are the immediate risks they face?
    • Upon hearing this, many experts suggest that “burn the environment with fire” or “nuke it from orbit” are the only feasible approaches? What is your take on that suggestion?
    • On the opposite side, what if business demands you don't touch anything but “make it secure” regardless?
    • Could you walk us through some of the first critical steps you do after “inheriting a cloud” and why they are prioritized in this way?
    • Why not just say “add MFA everywhere”? What may or will blow up?
    • We also say “address overly permissive users and roles” and this sounds valuable, but also tricky. How do we go about it?
    • What are the chances that the environment is in fact compromised already? When is Compromise Assessment the right call, it does cost money, right?
    • How do you balance your team’s current priorities when you’ve just adopted an insecure cloud environment. How do you make tradeoffs among your existing stack and this new one?

    Resources:

    • “Confetti cannons or fire extinguishers? Here’s how to secure cloud surprises”
    • EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response
    • IAM Recommender
    • “TM" book by Adam Shostack
    • “Checklist Manifesto” book
    • “Moving shields into position: How you can organize security to boost digital transformation” (with a new paper!)
    Show More Show Less
    31 mins
  • EP192 Confidential + AI: Can AI Keep a Secret?
    Sep 30 2024

    Guest:

    • Nelly Porter, Director of PM, Cloud Security at Google Cloud

    Topics:

    • Share your story and how you ended here doing confidential AI at Google?
    • What problem does confidential compute + AI solve and for what clients?
    • What are some specific real-world applications or use cases where you see the combination of AI and confidential computing making the most significant impact?
    • What about AI in confidential vs AI on prem? Should those people just do on-prem AI instead?
    • Which parts of the AI lifecycle need to be run in Confidential AI: Training? Data curation? Operational workloads?
    • What are the performance (and thus cost) implications of running AI workloads in a confidential computing environment?
    • Are there new risks that arise out of confidential AI?

    Resources:

    • Video
    • EP48 Confidentially Speaking 2: Cloudful of Secrets
    • EP1 Confidentially Speaking
    • “To securely build AI on Google Cloud, follow these best practices“ blog (paper)
    Show More Show Less
    33 mins

What listeners say about Cloud Security Podcast by Google

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.