Preview Mode Links will not work in preview mode

Cloud Security Podcast by Google

Mar 17, 2025

Guest:

 Topics:

  • Can you walk us through Google's typical threat modeling process? What are the key steps involved?
  • Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems?
  • How does Google keep...


Mar 10, 2025

Guest:

Topics:

  • You are responsible for building systems that need to comply with laws that are often mutually contradictory. It seems technically impossible to do, how do you do this?
  • Google is not alone in being a global company with local...


Mar 3, 2025

Guest:

Topic:

  • Where do you see a gap between the “promise” of LLMs for security and how they are actually used in the field to solve customer pains?
  • I know you use LLMs for anomaly detection. Explain how that “trick” works? What is it good for? How effective do you...


Feb 24, 2025

Guest:

Topics:

  • Tell us about the challenges you're facing as CISO at NuBank and how are they different from your past life at Spotify?
  • You're a big cloud based operation  - what are the key challenges you're tracking in your cloud environments? 
  • What lessons do you wish you knew back...


Feb 17, 2025

Guest:

Topics:

  • Google's Threat Intelligence Group (GTIG) has a unique position, accessing both underground forum data and incident response information. How does this dual perspective enhance your ability to identify and attribute cybercriminal...