How should security teams change their thinking about threats
in the cloud?
Where and when should an organization start in building their
threat model for their cloud environment?
What are the key changes of threat models after cloud
More specifically, when it comes to identity, credentials,
lateral movement, what are the key ways in which cloud security
differs from traditional or on-premises security?
How should users who are leading the cloud migration help their
colleagues think about security in the cloud?
When am I "done" with cloud security planning?
About the Podcast
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure.
We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit.
We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.