
Cloud Security Podcast by Google
Anton Chuvakin
All episodes
Best episodes
Seasons
Top 10 Cloud Security Podcast by Google Episodes
Goodpods has curated a list of the 10 best Cloud Security Podcast by Google episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cloud Security Podcast by Google for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cloud Security Podcast by Google episode by adding your comments to the episode page.

EP178 Meet Brandon Wood: The Human Side of Threat Intelligence: From Bad IP to Trafficking Busts
Cloud Security Podcast by Google
06/24/24 • 32 min
Guest:
- Brandon Wood, Product Manager for Google Threat Intelligence
Topics:
- Threat intelligence is one of those terms that means different things to everyone–can you tell us what this term has meant in the different contexts of your career? What do you tell people who assume that “TI = lists of bad IPs”?
- We heard while prepping for this show that you were involved in breaking up a human trafficking ring: tell us about that!
- In Anton’s experience, a lot of cyber TI is stuck in “1. Get more TI 2. ??? 3. Profit!” How do you move past that?
- One aspect of threat intelligence that’s always struck me as goofy is the idea that we can “monitor the dark web” and provide something useful. Can you change my mind on this one?
- You told us your story of getting into sales, you recently did a successful rotation into the role of Product Manager,, can you tell us about what motivated you to do this and what the experience was like?
- Are there other parts of your background that inform the work you’re doing and how you see yourself at Google?
- How does that impact our go to market for threat intelligence, and what’re we up to when it comes to keeping the Internet and broader world safe?
Resources:
- Video
- EP175 Meet Crystal Lister: From Public Sector to Google Cloud Security and Threat Horizons
- EP128 Building Enterprise Threat Intelligence: The Who, What, Where, and Why
- EP112 Threat Horizons - How Google Does Threat Intelligence
- Introducing Google Threat Intelligence: Actionable threat intelligence at Google scale
- A Requirements-Driven Approach to Cyber Threat Intelligence

EP171 GenAI in the Wrong Hands: Unmasking the Threat of Malicious AI and Defending Against the Dark Side
Cloud Security Podcast by Google
05/06/24 • 27 min
Guest:
- Elie Bursztein, Google DeepMind Cybersecurity Research Lead, Google
Topics:
- Given your experience, how afraid or nervous are you about the use of GenAI by the criminals (PoisonGPT, WormGPT and such)?
- What can a top-tier state-sponsored threat actor do better with LLM? Are there “extra scary” examples, real or hypothetical?
- Do we really have to care about this “dangerous capabilities” stuff (CBRN)? Really really?
- Why do you think that AI favors the defenders? Is this a long term or a short term view?
- What about vulnerability discovery? Some people are freaking out that LLM will discover new zero days, is this a real risk?
Resources:
- “How Large Language Models Are Reshaping the Cybersecurity Landscape” RSA 2024 presentation by Elie (May 6 at 9:40AM)
- “Lessons Learned from Developing Secure AI Workflows” RSA 2024 presentation by Elie (May 8, 2:25PM)
- EP50 The Epic Battle: Machine Learning vs Millions of Malicious Documents
- EP40 2021: Phishing is Solved?
- EP135 AI and Security: The Good, the Bad, and the Magical
- EP170 Redefining Security Operations: Practical Applications of GenAI in the SOC
- EP168 Beyond Regular LLMs: How SecLM Enhances Security and What Teams Can Do With It
- PyRIT LLM red-teaming tool
- Accelerating incident response using generative AI
- Threat Actors are Interested in Generative AI, but Use Remains Limited
- OpenAI’s Approach to Frontier Risk

EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
Cloud Security Podcast by Google
04/07/25 • 30 min
Guest:
- Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst
Topics:
- How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present?
- ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Management) are emerging areas in IAM. How do you see these fitting into the overall IAM landscape? Are they truly distinct categories or just extensions of existing IAM practices?
- Shouldn’t ITDR just be part of your Cloud DR or maybe even your SecOps tool of choice? It seems goofy to try to stand ITDR on its own when the impact of an identity compromise is entirely a function of what that identity can access or do, no?
- Regarding workload vs. human identity, could you elaborate on the unique security considerations for each? How does the rise of machine identities and APIs impact IAM approaches?
- We had a whole episode around machine identity that involved turtles–what have you seen in the machine identity space and how have you seen users mess it up?
- The cybersecurity world is full of acronyms. Any tips on how to create a memorable and impactful acronym?
Resources:
- EP166 Workload Identity, Zero Trust and SPIFFE (Also Turtles!)
- EP182 ITDR: The Missing Piece in Your Security Puzzle or Yet Another Tool to Buy?
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP94 Meet Cloud Security Acronyms with Anna Belak
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Playing to Win: How Strategy Really Works” book
- “Open” book

EP195 Containers vs. VMs: The Security Showdown!
Cloud Security Podcast by Google
10/21/24 • 41 min
Cross-over hosts:
- Kaslin Fields, co-host at Kubernetes Podcast
- Abdel Sghiouar, co-host at Kubernetes Podcast
Guest:
- Michele Chubirka, Cloud Security Advocate, Google Cloud
Topics:
- How would you approach answering the question ”what is more secure, container or a virtual machine (VM)?”
- Could you elaborate on the real-world implications of this for security, and perhaps provide some examples of when one might be a more suitable choice than the other?
- While containers boast a smaller attack surface (what about the orchestrator though?), VMs present a full operating system. How should organizations weigh these factors against each other?
- The speed of patching and updates is a clear advantage of containers. How significant is this in the context of today's rapidly evolving threat landscape? Are there any strategies organizations can employ to mitigate the slower update cycles associated with VMs?
- Both containers and VMs can be susceptible to misconfigurations, but container orchestration systems introduce another layer of complexity. How can organizations address this complexity and minimize the risk of misconfigurations leading to security vulnerabilities?
- What about combining containers and VMs. Can you provide some concrete examples of how this might be implemented? What benefits can organizations expect from such an approach, and what challenges might they face?
- How do you envision the security landscape for containers and VMs evolving in the coming years? Are there any emerging trends or technologies that could significantly impact the way we approach security for these two technologies?
Resources:
- Container Security, with Michele Chubrika (the same episode - with extras! - at our peer podcast, “Kubernetes Podcast from Google”)
- EP105 Security Architect View: Cloud Migration Successes, Failures and Lessons
- EP54 Container Security: The Past or The Future?
- DORA 2024 report
- Container Security: It’s All About the Supply Chain - Michele Chubirka
- Software composition analysis (SCA)
- DevSecOps Decisioning Principles
- Kubernetes CIS Benchmark
- Cloud-Native Consumption Principles
- State of WebAssembly outside the Browser - Abdel Sghiouar
- Why Perfect Compliance Is the Enemy of Good Kubernetes Security - Michele Chubirka - KubeCon NA 2024

EP187 Conquering SOC Challenges: Leadership, Burnout, and the SIEM Evolution
Cloud Security Podcast by Google
08/26/24 • 29 min
Guest:
- Nicole Beckwith, Sr. Security Engineering Manager, Threat Operations @ Kroger
Topics:
- What are the most important qualities of a successful SOC leader today?
- What is your approach to building and maintaining a high-functioning SOC team?
- How do you approach burnout in a SOC team?
- What are some of the biggest challenges facing SOC teams today?
- Can you share some specific examples of how you have built and - probably more importantly! - maintained a high-functioning SOC team?
- What are your thoughts on the current state of SIEM technology? Still a core of SOC or not?
- What advice would you give to someone who inherited a SOC? What should his/her 7/30/90 day plan include?
Resources:
- EP180 SOC Crossroads: Optimization vs Transformation - Two Paths for Security Operations Center
- EP181 Detection Engineering Deep Dive: From Career Paths to Scaling SOC Teams
- EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud and Beyond
- EP64 Security Operations Center: The People Side and How to Do it Right
- EP73 Your SOC Is Dead? Evolve to Output-driven Detect and Respond!
- EP26 SOC in a Large, Complex and Evolving Organization
- “The first 90 days” book

EP215 Threat Modeling at Google: From Basics to AI-powered Magic
Cloud Security Podcast by Google
03/17/25 • 26 min
Guest:
- Meador Inge, Security Engineer, Google Cloud
Topics:
- Can you walk us through Google's typical threat modeling process? What are the key steps involved?
- Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems?
- How does Google keep its threat models updated? What triggers a reassessment?
- How does Google operationalize threat modeling information to prioritize security work and resource allocation? How does it influence your security posture?
- What are the biggest challenges Google faces in scaling and improving its threat modeling practices? Any stories where we got this wrong?
- How can LLMs like Gemini improve Google's threat modeling activities? Can you share examples of basic and more sophisticated techniques?
- What advice would you give to organizations just starting with threat modeling?
Resources:
- EP12 Threat Models and Cloud Security
- EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw
- EP200 Zero Touch Prod, Security Rings, and Foundational Services: How Google Does Workload Security
- EP140 System Hardening at Google Scale: New Challenges, New Solutions
- Threat Modeling manifesto
- EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use
- Awesome Threat Modeling
- Adam Shostack “Threat Modeling: Designing for Security” book
- Ross Anderson “Security Engineering” book
- ”How to Solve It” book

EP221 Special - Semi-Live from Google Cloud Next 2025: AI, Agents, Security ... Cloud?
Cloud Security Podcast by Google
04/23/25 • 30 min
Guests:
- No guests [Tim in Vegas and Anton remote]
Topics:
- So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year?
- Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends?
- Last year, we pondered the 'Cloud Island' vs. 'Cloud Peninsula'. Based on Next 2025, is cloud security becoming more integrated with general cyber security, or is it still its own distinct domain?
- What wider trends did you observe, perhaps from the expo floor buzz or partner announcements, that security folks should be aware of?
- What was the biggest surprise for you at Next 2025? Something you absolutely didn't see coming?
- Putting on your prediction hats (however reluctantly): based on Next 2025, what do you foresee as the major cloud security focus or challenge for the industry in the next 12 months?
- If a busy podcast listener listening could only take one key message or action item away from everything announced and discussed at Next 2025, what should it be?
Resources:

EP199 Your Cloud IAM Top Pet Peeves (and How to Fix Them)
Cloud Security Podcast by Google
11/18/24 • 29 min
Guests:
- Michele Chubirka, Staff Cloud Security Advocate, Google Cloud
- Sita Lakshmi Sangameswaran, Senior Developer Relations Engineer, Google Cloud
Topics:
- What is your reaction to “in the cloud you are one IAM mistake away from a breach”? Do you like it or do you hate it? Or do you "it depends" it? :-)
- Everyone's talking about how "identity is the new perimeter" in the cloud. Can you break that down in simple terms?
- A lot of people say “in the cloud, you must do IAM ‘right’”. What do you think that means? What is the first or the main idea that comes to your mind when you hear it?
- What’s this stuff about least-privilege and separation-of-duties being less relevant? Why do they matter in the cloud that changes rapidly?
- What are your IAM Top Pet Peeves?
Resources:
- Video (LinkedIn, YouTube)
- EP127 Is IAM Really Fun and How to Stay Ahead of the Curve in Cloud IAM?
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler
- IAM: There and back again using resource hierarchies
- IAM so lost: A guide to identity in Google Cloud
- I Hate IAM: but I need it desperately
- EP33 Cloud Migrations: Security Perspectives from The Field
- EP176 Google on Google Cloud: How Google Secures Its Own Cloud Use
- EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant
- EP188 Beyond the Buzzwords: Identity's True Role in Cloud and SaaS Security
- “Identity Crisis: The Biggest Prize in Security” paper
- “Learn to love IAM: The most important step in securing your cloud infrastructure“ Next presentation

EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant
Cloud Security Podcast by Google
06/17/24 • 30 min
Guests:
- Omar ElAhdan, Principal Consultant, Mandiant, Google Cloud
- Will Silverstone, Senior Consultant, Mandiant, Google Cloud
Topics:
- Most organizations you see use both cloud and on-premise environments. What are the most common challenges organizations face in securing their hybrid cloud environments?
- You do IR so in your experience, what are top 5 mistakes organizations make that lead to cloud incidents?
- How and why do organizations get the attack surface wrong? Are there pillars of attack surface?
- We talk a lot about how IAM matters in the cloud. Is that true that AD is what gets you in many cases even for other clouds?
- What is your best cloud incident preparedness advice for organizations that are new to cloud and still use on-prem as well?
Resources:
- Next 2024 LIVE Video of this episode / LinkedIn version (sorry for the audio quality!)
- “Lessons Learned from Cloud Compromise” podcast at The Defender’s Advantage
- “Cloud compromises: Lessons learned from Mandiant investigations” in 2023 from Next 2024
- EP174 How to Measure and Improve Your Cloud Incident Response Readiness: A New Framework
- EP103 Security Incident Response and Public Cloud - Exploring with Mandiant
- EP162 IAM in the Cloud: What it Means to Do It 'Right' with Kat Traxler

EP220 Big Rewards for Cloud Security: Exploring the Google VRP
Cloud Security Podcast by Google
04/21/25 • 29 min
Guests:
- Michael Cote, Cloud VRP Lead, Google Cloud
- Aadarsh Karumathil, Security Engineer, Google Cloud
Topics:
- Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure?
- How do you determine how much to pay for each vulnerability? What is the largest reward we paid? What was it for?
- What products get the most submissions? Is this driven by the actual product security or by trends and fashions like AI?
- What are the most likely rejection reasons?
- What makes for a very good - and exceptional? - vulnerability report? We hear we pay more for “exceptional” reports, what does it mean?
- In college Tim had a roommate who would take us out drinking on his Google web app vulnerability rewards. Do we have something similar for people reporting vulnerabilities in our cloud infrastructure? Are people making real money off this?
- How do we actually uniquely identify vulnerabilities in the cloud? CVE does not work well, right?
- What are the expected risk reduction benefits from Cloud VRP?
Resources:
Show more best episodes

Show more best episodes
FAQ
How many episodes does Cloud Security Podcast by Google have?
Cloud Security Podcast by Google currently has 224 episodes available.
What topics does Cloud Security Podcast by Google cover?
The podcast is about Cloud, Security, Podcasts, Technology and Cybersecurity.
What is the most popular episode on Cloud Security Podcast by Google?
The episode title 'EP169 Google Cloud Next 2024 Recap: Is Cloud an Island, So Much AI, Bots in SecOps' is the most popular.
What is the average episode length on Cloud Security Podcast by Google?
The average episode length on Cloud Security Podcast by Google is 27 minutes.
How often are episodes of Cloud Security Podcast by Google released?
Episodes of Cloud Security Podcast by Google are typically released every 7 days.
When was the first episode of Cloud Security Podcast by Google?
The first episode of Cloud Security Podcast by Google was released on Feb 11, 2021.
Show more FAQ

Show more FAQ