

Cloud Security Podcast by Google
Anton Chuvakin
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure.
We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or just for organizational benefit.
We hope you'll join us if you're interested in where technology overlaps with process and bumps up against organizational design. We're hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can't keep as the world moves from on-premises computing to cloud computing.
We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or just for organizational benefit.
We hope you'll join us if you're interested in where technology overlaps with process and bumps up against organizational design. We're hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can't keep as the world moves from on-premises computing to cloud computing.
Episodes
Mentioned books

Aug 29, 2022 • 26min
EP81 Demystify Data Sovereignty and Sovereign Cloud Secrets at Google Cloud
Guest: Christopher "CJ" Johnson, retired Fire Chief, and Global Regulated Cloud Product Lead @ Google Cloud Topics: In political science, they define sovereignty as a local monopoly on the legitimate use of force. Why are we talking about "sovereignty" in IT? What is a sovereign cloud? How much of the term is marketing vs engineering? Who cares or should care about sovereign cloud? Is this about technical controls or paper/policy controls? Or both? What is the role for encryption and key management and key access justifications (like say Google Cloud EKM with KAJ) for sovereign cloud? Is sovereign cloud automatically more secure or at least has better data security? What threat models are considered for sovereign cloud technologies? Resources: Google Cloud External Key Manager (EKM) "Trust Google Cloud more with ubiquitous data encryption" blog "Software-Defined community cloud - a new way to "Government Cloud"" blog

14 snips
Aug 22, 2022 • 29min
EP80 CISO Walks Into the Cloud: Frustrations, Successes, Lessons ... And Does the Risk Change?
Guest: David Stone, Staff Consultant at Office of the CISO, Google Cloud Topics: Speaking as a former CISO, what triggered your organization migration to the cloud? When did you and the security organization get brought in? How did you plan your security organization journey to the cloud? Did you take going to Cloud as an opportunity to change things beyond the tools you were using? As you got going into the cloud, what was the hardest part for your organization ? What was most surprising? Good surprise and bad surprise? How did you design security controls for the cloud? How do you validate and verify security controls in the cloud? How did you incorporate your cloud environment into your SOC's responsibility Having covered all that tactical terrain, one final strategic question: is moving to Cloud a net risk reduction? Can it be? Resources: "How CISOs need to adapt their mental models for cloud security" "Megatrends drive cloud adoption—and improve security for all" "EP47 Megatrends, Macro-changes, Microservices, Oh My! Changes in 2022 and Beyond in Cloud Security" (ep47) "CISO's Guide to Cloud Security Transformation" paper [PDF] Google SRE book GCAT site

9 snips
Aug 15, 2022 • 28min
EP79 Modernize Data Security with Autonomic Data Security Approach
Guest: John Stone, Chaos Coordinator @ Office of the CISO, Google Cloud Topics: So what is Autonomic Data Security, described in our just released paper? What are some notorious data security issues today? Perhaps common data security mistakes security leaders commit? What never worked in data security, like say manual data classification? How should organizations think about securing the data they migrated and the data that was created in the cloud? Do you really believe the cloud can make data security better than data security in traditional environments? Resources: "Modern Data Security: A path to autonomic data security" paper (NEW) "How autonomic data security can help define cloud's future" blog "Megatrends drive cloud adoption—and improve security for all" blog "Modernizing SOC ... Introducing Autonomic Security Operations" blog "Autonomic Security Operations: 10X Transformation of the Security Operations Center" paper "Zero Trust: Fast Forward from 2010 to 2021" (ep8) "Data Security in the Cloud" (ep2) and the resource. "Modern Data Security Approaches: Is Cloud More Secure?" (ep16) "Reflections on Trusting Trust" paper (1984).

7 snips
Aug 8, 2022 • 28min
EP78 Classic SOC Meets Cloud: What Changes? What Stays the Same?
Guest: Gorka Sadowski, Chief Strategy Officer @ Exabeam Topics: How do we get a legacy SOC team to think about the cloud? How to think about cloud threat detection, in general? What is different … threats, the environment, what else? What is the same? How do we know which TTPs are relevant for the new environments? What to bring with us to the cloud? Do content/rules and detection engines need to be different to cover the cloud detection use cases? What cases are appropriate for machine learning (ML) in the cloud? Does cloud threats drive the need for new ML detections? Resources: "11 Strategies of a World-Class Cybersecurity Operations Center" paper "Autonomic Security Operations: How to 10X Your SOC" paper "Indicators Of Compromise Vs. Tactics, Techniques, And Procedures" blog "How to Build and Operate a Modern Security Operations Center" (Gartner subscription required) "A SOC Tried To Detect Threats in the Cloud … You Won't Believe What Happened Next" blog

Aug 1, 2022 • 25min
EP77 Operational Realities of SOAR: Automate and/or Enrich, Playbooks, Magic
Guest: Cyrus Robinson, SOC Director and IR Team lead at Ingalls Information Security Topics: You've been using SOAR tools for years, so what do you think of the technology so far? What is driving SOAR adoption today? And what is inhibiting SOAR adoption? Realistically, how hard is SOAR to operationalize for a typical company? What are your favorite SOAR playbooks to start with? How to build, train and keep the SOAR team? Do they need to code to succeed? We like the SOAR maturity model approach. How would you imagine a SOAR adoption maturity model? How to implement SOAR from scratch in scaling operations? How to start? How to plan? How to not fail? Resources: "A Simple SOAR Adoption Maturity Model" blog "Planning Is Paramount When Adopting SOAR" blog Siemplify community version

9 snips
Jul 25, 2022 • 30min
EP76 Powering Secure SaaS … But Not with CASB? Cloud Detection and Response?
Guest: Ben Johnson, CTO/co-founder @ Obsidian Security Topics: Why is there so much attention lately on SaaS security? Doesn't this area date back to 2015 or so? What do you see as the primary challenges in securing SaaS? What does a SaaS threat model look like? What are the top threats you see? CASB has been the fastest growing security market and it has grown into a broad platform and many assume that "securing SaaS = using CASB", what are they missing? Where would another technology to secure SaaS fit architecturally, inline with CASB or as another API-based system? Securing IaaS spanned a robust ecosystem of vendors (CWPP, CSPM, now CNAPP) and many of these have ambitions for securing SaaS, thus clashing with CASB. Where do you fit in this battle? For a while, you were talking more about CDR - what is it and do we really need a separate CDR technology? Resources: Obsidian Security blog and Resource Center Does the World Need Cloud Detection and Response (CDR)? blog Does the world need Cloud Detection and Response (CDR) as a new market segment? poll MITRE ATT&CK for SaaS matrix CISA SCUBA resource "Essentialism" book.

8 snips
Jul 18, 2022 • 27min
EP75 How We Scale Detection and Response at Google: Automation, Metrics, Toil
Guest: Tim Nguyen, Director of Detection and Response @ Google Topics: I know we don't like to say "SOC" here, so why don't we talk about the role of automation in detection and response (D&R) at Google? One SRE concept we found useful in security operations is "toil" - How do we squeeze toil out of D&R practice at Google? A combined analyst and engineer role (just like an SRE) was critical for both increasing automation and reducing toil, how hard was it to put this into practice? Tell us about that journey? How do we automate security signal analysis, can you give us a few examples? D&R metrics have been a big pain point for many organizations, how does SRE thinking of SLOs and SLIs (and less about SLAs) helps us in our "not SOC"? How do we avoid falling into the "time to respond" trap that rewards fast response, sometimes at the cost of good? Resource: SRE book, Chapter 5 - Eliminating Toil SRE book, Chapter 4 - Service Level Objectives "Building Secure and Reliable Systems" book "Achieving Autonomic Security Operations: Automation as a Force Multiplier" "Achieving Autonomic Security Operations: Reducing toil" "Taking an autonomic approach to security operations" video "Modern Threat Detection at Google" (ep17)

Jul 11, 2022 • 27min
EP74 Who Will Solve Cloud Security: A View from Google Investment Side
Guest: James Luo, Partner @ CapitalG Topics: You've looked at hundreds of security startups at the growth stage - what is getting funded? What is not getting funded? What is the difference? What's your view on the current market environment for security companies? Is security "recession-proof", whatever that means? How do you think about what problems are worth solving with a new venture vs existing vendors (and/or CSPs) expanding to cover the new area? Why do many cloud security vendors get funded and get high valuations while there is a wide perception that CSP (like us at Google) are doing security really well? How do we solve the challenge that many organizations are barely moving off "antivirus and firewalls" security of the 1990s? What is your best advice to cloud security startups trying to get wider adoption? Resources: "Demystifying 'shared Fate' - A New Approach To Understand Cybersecurity" CapitalG blog

11 snips
Jul 5, 2022 • 28min
EP73 Your SOC Is Dead? Evolve to Output-driven Detect and Respond!
Guest: Erik Bloch, Senior Director of Detection and Response at Sprinklr Topics: You recently coined a concept of "output-driven Detection and Response" and even perhaps broader "output-driven security." What is it and how does it work? Detection and response is alive (obviously), but sometimes you say SOC is dead, what do you mean by that? You refer to a federated approach for Detection and Response" ("route the outcomes to the teams that need them or can address them"), but is it workable for any organization? What about the separation of duty concerns that some raise in response to this? What about the organizations that don't have any security talent in those teams? Is the approach you advocate "cloud native"? Does it only work in the cloud? Can a traditional, on-premise focused organization use it? The model of "security team as a decision-maker, not an implementer" has a bit of a painful history, as this is what led to "GRC-only teams" who lack any technical knowledge. Why will this approach work this time? Resources: "RIP SOC. Hello D-IR" "Kill your SOC with a D-IR model" "Security De-Engineering: Solving the Problems in Information Risk Management" book "A SOCless Detection Team at Netflix" "Achieving Autonomic Security Operations: Automation as a Force Multiplier" "Start with Why: How Great Leaders Inspire Everyone to Take Action" book "Think Like a Monk: The Secret of how to Harness the Power of Positivity and be Happy Now" book "On "Output-driven" SIEM" "SOC is Not Dead: How to Grow and Develop Your SOC for Cloud and Beyond" (ep58)

7 snips
Jun 27, 2022 • 32min
EP72 What Does Good Detection and Response Look Like in the Cloud? Insights from Expel MDR
Guests: Dave "Merk" Merkel, CEO @ Expel Peter Silberman, CTO @ Expel Topics: Many MDRs claim to be "security from the cloud", but they actually don't know much about cloud security. What does good looks like for MDR in the cloud (cloud being a full range from IaaS to SaaS)? What are the key challenges for clients picking an MDR for their cloud environments? What are the questions to ask your potential MDR? Do clients want the same security outcomes done in the cloud vs on-premise? Does it mean that MSSP/MDR capabilities must be different for good coverage of the cloud? Is MDR technology different for Cloud detection and response as opposed to on-prem D&R? How do you communicate with clients about the importance and value of cloud specific detection vs detection for endpoints running in the cloud? What are the top threats against client cloud environments that you see, detect and protect from? Which clouds (IaaS?) are easiest for MDR to protect? What makes them easier to handle than the other Clouds? Resources: Who Does What In Cloud Threat Detection? How to Think about Threat Detection in the Cloud Cattle vs Pets reminder Expel Blog - Incident report: Spotting an attacker in GCP Expel Great eXpeltations 2022: Cybersecurity trends and predictions Expel Quarterly Threat Report: Q1 2022


