48 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
EP183 Cloud Security Journeys: Improve, Evolve, Transform with Cloud Customers
Manage episode 431288599 series 2892548
Guests:
Jaffa Edwards, Senior Security Manager @ Google Cloud
Lyka Segura, Cloud Security Engineer @ Google Cloud
Topics:
Security transformation is hard, do you have any secret tricks or methods that actually make it happen?
Can you share a story about a time when you helped a customer transform their cloud security posture? Not just improve, but actually transform!
What is your process for understanding their needs and developing a security solution that is tailored to them? What to do if a customer does not want to share what is necessary or does not know themselves?
What are some of the most common security mistakes that you see organizations make when they move to the cloud?
What about the customers who insist on practicing in the cloud the same way they did on-premise? What do you tell the organizations that insist that “cloud is just somebody else’s computer” and they insist on doing security the old-fashioned way?
What advice would you give to organizations that are just starting out on their cloud security journey?
What are the first three cloud security steps you recommend that work for a cloud environment they inherited?
References
220 حلقات
Manage episode 431288599 series 2892548
Guests:
Jaffa Edwards, Senior Security Manager @ Google Cloud
Lyka Segura, Cloud Security Engineer @ Google Cloud
Topics:
Security transformation is hard, do you have any secret tricks or methods that actually make it happen?
Can you share a story about a time when you helped a customer transform their cloud security posture? Not just improve, but actually transform!
What is your process for understanding their needs and developing a security solution that is tailored to them? What to do if a customer does not want to share what is necessary or does not know themselves?
What are some of the most common security mistakes that you see organizations make when they move to the cloud?
What about the customers who insist on practicing in the cloud the same way they did on-premise? What do you tell the organizations that insist that “cloud is just somebody else’s computer” and they insist on doing security the old-fashioned way?
What advice would you give to organizations that are just starting out on their cloud security journey?
What are the first three cloud security steps you recommend that work for a cloud environment they inherited?
References
220 حلقات
كل الحلقات
×
1 EP219 Beyond the Buzzwords: Decoding Cyber Risk and Threat Actors in Asia Pacific 31:46

1 EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM 30:10

1 EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes? 23:11

1 EP216 Ephemeral Clouds, Lasting Security: CIRA, CDR, and the Future of Cloud Investigations 31:43

1 EP215 Threat Modeling at Google: From Basics to AI-powered Magic 26:03

1 EP214 Reconciling the Impossible: Engineering Cloud Systems for Diverging Regulations 29:22

1 EP213 From Promise to Practice: LLMs for Anomaly Detection and Real-World Cloud Security 28:01

1 EP212 Securing the Cloud at Scale: Modern Bank CISO on Metrics, Challenges, and SecOps 33:16

1 EP211 Decoding the Underground: Google's Dual-Lens Threat Intelligence Magic 26:02

1 EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments 26:58

1 EP209 vCISO in the Cloud: Navigating the New Security Landscape (and Don’t Forget Resilience!) 29:06

1 EP208 The Modern CISO: Balancing Risk, Innovation, and Business Strategy (And Where is Cloud?) 31:19

1 EP207 Slaying the Ransomware Dragon: Can a Startup Succeed? 32:55

1 EP206 Paying the Price: Ransomware's Rising Stakes in the Cloud 33:01

1 EP205 Cybersecurity Forecast 2025: Beyond the Hype and into the Reality 28:19

1 EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators 30:32

1 EP203 Cloud Shared Responsibility: Beyond the Blame Game with Rich Mogull 37:13

1 EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering 37:09

1 EP201 Every CTO Should Be a CSTO (Or Else!) - Transformation Lessons from The Hoff 36:57

1 EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security 27:38

1 EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them) 29:26

1 EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting Lessons 27:22

1 EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective 29:34

1 EP196 AI+TI: What Happens When Two Intelligences Meet? 28:08

1 EP195 Containers vs. VMs: The Security Showdown! 41:16

1 EP194 Deep Dive into ADR - Application Detection and Response 30:55

1 EP193 Inherited a Cloud? Now What? How Do I Secure It? 30:41

1 EP192 Confidential + AI: Can AI Keep a Secret? 33:04

1 EP191 Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it! 23:36

1 EP190 Unraveling the Security Data Fabric: Need, Benefits, and Futures 30:00
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.