Episodios

  • EP221 Special - Semi-Live from Google Cloud Next 2025: AI, Agents, Security ... Cloud?
    Apr 23 2025

    Guests:

    • No guests [Tim in Vegas and Anton remote]

    Topics:

    • So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year?
    • Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends?
    • Last year, we pondered the 'Cloud Island' vs. 'Cloud Peninsula'. Based on Next 2025, is cloud security becoming more integrated with general cyber security, or is it still its own distinct domain?
    • What wider trends did you observe, perhaps from the expo floor buzz or partner announcements, that security folks should be aware of?
    • What was the biggest surprise for you at Next 2025? Something you absolutely didn't see coming?
    • Putting on your prediction hats (however reluctantly): based on Next 2025, what do you foresee as the major cloud security focus or challenge for the industry in the next 12 months?
    • If a busy podcast listener listening could only take one key message or action item away from everything announced and discussed at Next 2025, what should it be?

    Resources:

    • EP169 Google Cloud Next 2024 Recap: Is Cloud an Island, So Much AI, Bots in SecOps

    Más Menos
    30 m
  • EP220 Big Rewards for Cloud Security: Exploring the Google VRP
    Apr 21 2025

    Guests:

    • Michael Cote, Cloud VRP Lead, Google Cloud
    • Aadarsh Karumathil, Security Engineer, Google Cloud

    Topics:

    • Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure?
    • How do you determine how much to pay for each vulnerability? What is the largest reward we paid? What was it for?
    • What products get the most submissions? Is this driven by the actual product security or by trends and fashions like AI?
    • What are the most likely rejection reasons?
    • What makes for a very good - and exceptional? - vulnerability report? We hear we pay more for “exceptional” reports, what does it mean?
    • In college Tim had a roommate who would take us out drinking on his Google web app vulnerability rewards. Do we have something similar for people reporting vulnerabilities in our cloud infrastructure? Are people making real money off this?
    • How do we actually uniquely identify vulnerabilities in the cloud? CVE does not work well, right?
    • What are the expected risk reduction benefits from Cloud VRP?

    Resources:

    • Cloud VRP site
    • Cloud VPR launch blog
    • CVR: The Mines of Kakadûm
    Más Menos
    29 m
  • EP219 Beyond the Buzzwords: Decoding Cyber Risk and Threat Actors in Asia Pacific
    Apr 14 2025

    Guest:

    • Steve Ledzian, APAC CTO, Mandiant at Google Cloud

    Topics:

    • We've seen a shift in how boards engage with cybersecurity. From your perspective, what's the most significant misconception boards still hold about cyber risk, particularly in the Asia Pacific region, and how has that impacted their decision-making?
    • Cybersecurity is rife with jargon. If you could eliminate or redefine one overused term, which would it be and why? How does this overloaded language specifically hinder effective communication and action in the region?
    • The Mandiant Attack Lifecycle is a well-known model. How has your experience in the East Asia region challenged or refined this model? Are there unique attack patterns or actor behaviors that necessitate adjustments?
    • Two years post-acquisition, what's been the most surprising or unexpected benefit of the Google-Mandiant combination?
    • M-Trends data provides valuable insights, particularly regarding dwell time. Considering the Asia Pacific region, what are the most significant factors reducing dwell time, and how do these trends differ from global averages?
    • Given your expertise in Asia Pacific, can you share an observation about a threat actor's behavior that is often overlooked in broader cybersecurity discussions?
    • Looking ahead, what's the single biggest cybersecurity challenge you foresee for organizations in the Asia Pacific region over the next five years, and what proactive steps should they be taking now to prepare?

    Resources:

    • EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant
    • EP156 Living Off the Land and Attacking Critical Infrastructure: Mandiant Incident Deep Dive
    • EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

    Más Menos
    32 m
  • EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
    Apr 7 2025

    Guest:

    • Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst

    Topics:

    • How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
    • ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
    • Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
    • Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
    • We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
    • The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?

    Resources:

    • EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
    • EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
    • EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
    • EP94 Meet Cloud Security Acronyms with Anna Belak
    • EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
    • EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
    • EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
    • “Playing to Win: How Strategy Really Works” book
    • “Open” book

    Más Menos
    30 m
  • EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes?
    Mar 31 2025

    Guest:

    • Alex Polyakov, CEO at Adversa AI

    Topics:

    • Adversa AI is known for its focus on AI red teaming and adversarial attacks. Can you share a particularly memorable red teaming exercise that exposed a surprising vulnerability in an AI system? What was the key takeaway for your team and the client?
    • Beyond traditional adversarial attacks, what emerging threats in the AI security landscape are you most concerned about right now?
    • What trips most clients, classic security mistakes in AI systems or AI-specific mistakes?
    • Are there truly new mistakes in AI systems or are they old mistakes in new clothing?
    • I know it is not your job to fix it, but much of this is unfixable, right?
    • Is it a good idea to use AI to secure AI?

    Resources:

    • EP84 How to Secure Artificial Intelligence (AI): Threats, Approaches, Lessons So Far
    • AI Red Teaming Reasoning LLM US vs China: Jailbreak Deepseek, Qwen, O1, O3, Claude, Kimi
    • Adversa AI blog
    • Oops! 5 serious gen AI security mistakes to avoid
    • Generative AI Fast Followership: Avoid These First Adopter Security Missteps
    Más Menos
    23 m
  • EP216 Ephemeral Clouds, Lasting Security: CIRA, CDR, and the Future of Cloud Investigations
    Mar 24 2025

    Guest:

    • James Campbell, CEO, Cado Security
    • Chris Doman, CTO, Cado Security

    Topics:

    • Cloud Detection and Response (CDR) vs Cloud Investigation and Response Automation(CIRA) ... what’s the story here? There is an “R” in CDR, right?
    • Can’t my (modern) SIEM/SOAR do that? What about this becoming a part of modern SIEM/SOAR in the future?
    • What gets better when you deploy a CIRA (a) and your CIRA in particular (b)?
    • Ephemerality and security, what are the fun overlaps? Does “E” help “S” or hurts it? What about compliance? Ephemeral compliance sounds iffy…
    • Cloud investigations, what is special about them?
    • How does CSPM intersect with this? Is CIRA part of CNAPP?
    • A secret question, need to listen for it!

    Resources:

    • EP157 Decoding CDR & CIRA: What Happens When SecOps Meets Cloud
    • EP67 Cyber Defense Matrix and Does Cloud Security Have to DIE to Win?
    • EP158 Ghostbusters for the Cloud: Who You Gonna Call for Cloud Forensics
    • Cloud security incidents (Rami McCarthy)
    • Cado resources

    Más Menos
    32 m
  • EP215 Threat Modeling at Google: From Basics to AI-powered Magic
    Mar 17 2025

    Guest:

    • Meador Inge, Security Engineer, Google Cloud

    Topics:

    • Can you walk us through Google's typical threat modeling process? What are the key steps involved?
    • Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems?
    • How does Google keep its threat models updated? What triggers a reassessment?
    • How does Google operationalize threat modeling information to prioritize security work and resource allocation? How does it influence your security posture?
    • What are the biggest challenges Google faces in scaling and improving its threat modeling practices? Any stories where we got this wrong?
    • How can LLMs like Gemini improve Google's threat modeling activities? Can you share examples of basic and more sophisticated techniques?
    • What advice would you give to organizations just starting with threat modeling?

    Resources:

    • EP12 Threat Models and Cloud Security
    • EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw
    • EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security
    • EP140 System Hardening at Google Scale: New Challenges, New Solutions
    • Threat Modeling manifesto
    • EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use
    • Awesome Threat Modeling
    • Adam Shostack “Threat Modeling: Designing for Security” book
    • Ross Anderson “Security Engineering” book
    • ”How to Solve It” book
    Más Menos
    26 m
  • EP214 Reconciling the Impossible: Engineering Cloud Systems for Diverging Regulations
    Mar 10 2025

    Guest:

    • Archana Ramamoorthy, Senior Director of Product Management, Google Cloud

    Topics:

    • You are responsible for building systems that need to comply with laws that are often mutually contradictory. It seems technically impossible to do, how do you do this?
    • Google is not alone in being a global company with local customers and local requirements. How are we building systems that provide local compliance with global consistency in their use for customers who are similar in scale to us?
    • Originally, Google had global systems synchronized around the entire planet–planet scale supercompute–with atomic clocks. How did we get to regionalized approach from there?
    • Engineering takes a long time. How do we bring enough agility to product definition and engineering design to give our users robust foundations in our systems that also let us keep up with changing and diverging regulatory goals?
    • What are some of the biggest challenges you face working in the trusted cloud space?
    • Is there something you would like to share about being a woman leader in technology? How did you overcome the related challenges?

    Resources:

    • Video
    • “Compliance Without Compromise” by Jeanette Manfra (2020, still very relevant!)
    • “Good to Great” book
    • “Appreciative Leadership” book
    Más Menos
    29 m
adbl_web_global_use_to_activate_webcro768_stickypopup