Cloud Security Podcast

Join your hosts, Anton Chuvakin and Timothy Peacock, as they talk with industry experts about some of the most interesting areas of cloud security. If you like having threat models questioned and a few bad puns, please tune in!

cloud-security-podcast_high_res.png

Episode list

#154
January 8, 2024

EP154 Mike Schiffman: from Blueboxing to LLMs via Network Security at Google

Guest:

29:29

Topics covered:

  • Given your impressive and interesting history, tell us a few things about yourself?
  • What are the biggest challenges facing network security today based on your experience?
  • You came to Google to work on Network Security challenges. What are some of the surprising ones you’ve uncovered here?
  • What lessons from Google's approach to network security absolutely don’t apply to others? Which ones perhaps do?
  • If you have to explain the difference between network security in the cloud and on-premise, what comes to mind first?
  • How do we balance better encryption with better network security monitoring and detection?
  • Speaking of challenges in cryptography, we’re all getting fired up about post-quantum and network security. Could you give us the maybe 5 minute teaser version of this because we have an upcoming episode dedicated to this?
  • We hear you have some interesting insight on LLMs, something to do with blueboxing or something. What is that about?
Read more
#153
December 18, 2023

EP153 Kevin Mandia on Cloud Breaches: New Threat Actors, Old Mistakes, and Lessons for All

Guest:

29:29

Topics covered:

  • When you look back, what were the most surprising cloud breaches in 2023, and what can we learn from them? How were they different from the “old world” of on-prem breaches? 
  • For a long time it’s felt like incident response has been an on-prem specialization, and that adversaries are primarily focused on compromising on-prem infrastructure. Who are we seeing go after cloud environments? The same threat actors or not?
  • Could you share a bit about the mistakes and risks that you saw organizations make that made their cloud breaches possible or made them worse? Conversely, what ended up being helpful to organizations in limiting the blast radius or making response easier? 
  • Tim’s mother worked in a network disaster recovery team for a long time–their motto was “preparing for the inevitable.” What advice do you have for helping security teams and IT teams get ready for cloud breaches? Especially for recent cloud entrants?
Read more
#152
December 11, 2023

EP152 Trust, Security and Google's Annual Transparency Report

Guest:

  • Michee Smith, Director, Product Management for Global Affairs Works, Google
27:27

Topics covered:

  • What is Google Annual Transparency Report and how did we get started doing this? 
  • Surely the challenge of a transparency report is that there are things we can’t be transparent about, how do we balance this? What are those? Is it a safe question?
  • What Access Transparency Logs are and if they are connected to the report –other than in Tim's mind and your career? 
  • Beyond building the annual transparency report, you also work on our central risk data platform. Every business has a problem managing risk–what’s special here? Do we have any Google magic here? 
  • Could you tell us about your path in Product Management here? You have been here eight years, and recently became Director. Do you have any advice for the ambitious Google PMs listening to the show? 
Read more
#151
December 4, 2023

EP151 Cyber Insurance in the Cloud Era: Balancing Protection, Data and Risks

Guest:

  • Monica Shokrai, Head of Business Risk and Insurance for Google Cloud 
29:29

Topics covered:

  • Could you give us the 30 second run down of what cyber insurance is and isn't?
  • Can you tie that to clouds? How does the cloud change it? Is it the case that now I don't need insurance for some of the "old school" cyber risks?
  • What challenges are insurers facing with assessing cloud risks? On this show I struggle to find CISOs who "get" cloud, are there insurers and underwriters who get it?
  • We recently heard about an insurer reducing coverage for incidents caused by old CVEs! What's your take on this? Effective incentive structure to push orgs towards patching operational excellence or someone finding yet another way not to pay out? Is insurance the magic tool for improving security?
  • Doesn't cyber insurance have a difficult reputation with clients? “Will they even pay?” “Will it be enough?” “Is this a cyberwar exception?” type stuff?
  • How do we balance our motives between selling more cloud and providing effective risk underwriting data to insurers?
  • How soon do you think we will have actuarial data from many clients re: real risks in the cloud? What about the fact that risks change all the time unlike say many “non cyber” risks?
Read more
#150
November 27, 2023

EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw

29:29

Topics covered:

  • Gary, you’ve been doing software security for many decades, so tell us: are we really behind on securing ML and AI systems? 
  • If not SBOM for data or “DBOM”, then what? Can data supply chain tools or just better data governance practices help?
  • How would you threat model a system with ML in it or a new ML system you are building? 
  • What are the key differences and similarities between securing AI and securing a traditional, complex enterprise system?
  • What are the key differences between securing the AI you built and AI you buy or subscribe to?
  • Which security tools and frameworks will solve all of these problems for us? 
Read more
#149
November 20, 2023

EP149 Canned Detections: From Educational Samples to Production-Ready Code

Guests:

  • John Stoner, Principal Security Strategist, Google Cloud Security
  • Dave Herrald, Head of Adopt Engineering, Google Cloud Security
29:29

Topics covered:

  • In your experience, past and present, what would make clients trust vendor detection content?
  • Regarding “canned”, default or “out-of-the-box” detections, how to make them more production quality and not merely educational samples to learn from?
  • What is more important, seeing the detection or being able to change it, or both?
  • If this is about seeing the detection code/content, what about ML and algorithms?
  • What about the SOC analysts who don't read the code?
  • What about “tuning” - is tuning detections a bad word now in 2023?
  • Everybody is obsessed about “false positives,” what about the false negatives? How are we supposed to eliminate them if we don’t see detection logic?
Read more
#148
November 13, 2023

EP148 Decoding SaaS Security: Demystifying Breaches, Vulnerabilities, and Vendor Responsibilities

Guest:

29:29

Topics covered:

  • When people talk about “cloud security” they often forget SaaS, what should be the structured approach to using SaaS securely or securing SaaS?
  • What are the incidents telling us about the realistic threats to SaaS tools?
  • Is the Microsoft 365 breach a SaaS breach, a cloud breach or something else?
  • Do we really need CVEs for SaaS vulnerabilities?
  • What are the least understood aspects of securing SaaS?
  • What do you tell the organizations who assume that “SaaS vendor takes care of all SaaS security”?
  • Isn’t CASB the answer to all SaaS security issues? We also have SSPM now too? Do we really need more tools?
Read more
#147
November 8, 2023

EP147 Special: 2024 Security Forecast Report

Guest:

25:25

Topics covered:

  • Can you really forecast threats? Won’t the threat actors ultimately do whatever they want?
  • How can clients use the forecast? Or as Tim would say it, what gets better once you read it?
  • What is the threat forecast for cloud environments? “Cyber attacks targeting hybrid and multi-cloud environments will mature and become more impactful“ - what does it mean?
  • Of course AI makes an appearance as well: “LLMs and other gen AI tools will likely be developed and offered as a service to assist attackers with target compromises.” Do we really expect attacker-run LLM SaaS? What model will they use? Will it be good?
  • There are a number of significant elections scheduled for 2024, are there implications for cloud security?
  • Based on the threat information, tell me about something that is going well, what will get better in 2024?
Read more
#146
November 6, 2023

EP146 AI Security: Solving the Problems of the AI Era: A VC's Insights

27:27

Topics covered:

  • We have a view at Google that AI for security and security for AI are largely separable disciplines. Do you feel the same way? Is this distinction a useful one for you? 
  • What are some of the security problems you're hearing from AI companies that are worth solving? 
  • AI is obviously hot, and as always security is chasing the hotness. Where are we seeing the focus of market attention for AI security?
  • Does this feel like an area that's going to have real full products or just a series of features developed by early stage companies that get acquired and rolled up into other orgs? 
  • What lessons can we draw on from previous platform shifts, e.g. cloud security, to inform how this market will evolve?
Read more
#145
October 30, 2023

EP145 Cloud Security: Shared Responsibility, Shared Fate, Shared Faith?

Guest:

23:23

Topics covered:

  • What are the challenges with shared responsibility for cloud security?
  • Can you explain "shared" vs "separated" responsibility?
  • In your article, you mention “shared faith”, we have “shared fate”, but we never heard of shared faith. What is this? Can you explain?
  • What about the cloud models (SaaS, PaaS, IaaS), how does this sharing model differ?
  • While at it, what is cloud, really? [yes, we really did ask this!]
Read more