An AWS Centric View of Google Cloud Identity

An AWS Centric View of Google Cloud Identity

Cloud Security Podcast - Yes - AWS Cloud folks are starting to look after Google Cloud security now in a lot of organisations. Caleb Tennis from Sequoia Capital joins us to share his personal experience on how from being an AWS professional he started looking after Google Cloud Identity and how to secure their Google Cloud Environment.




Episode YouTube Video - https://youtu.be/k1FrVEe1tGc


Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠)

Guest Socials: Caleb Tennis's Linkedin Caleb Tennis⁠

Podcast Twitter - ⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠@CloudSecureNews⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠Cloud Security Newsletter

- ⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠


Spotify TimeStamp for Interview Questions

A word from our sponsors - you can visit them on ⁠⁠⁠⁠⁠snyk.io/csp⁠⁠⁠⁠⁠

  • (00:00) Introduction
  • (04:51) A bit about Caleb Tennis
  • (07:27) Caleb's first impressions of GCP
  • (08:53) Google Cloud Blind Spots
  • (12:35) Where to start security GCP?
  • (15:23) Managing identities in GCP
  • (20:17) Temporary Credential in Google Cloud
  • (24:54) Managing identity with scale
  • (29:59) Is there enough Google Cloud Usage
  • (31:14) Google Cloud logging and monitoring
  • (35:48) What does Scale look like in Google Cloud?
  • (37:53) Hardest things to learn in GCP
  • (41:08) Learning GCP Security
  • (42:58) The Fun Section

  • See you at the next episode!


    Jaksot(344)

    Why Email Breaches Still Happen?

    Why Email Breaches Still Happen?

    Lets talk about the Evolution of Email Security. We have been speaking about Email Security for years but why has it not been solved? We spoke to Abhishek Agrawal, Co-founder of Material Security abou...

    5 Huhti 202430min

    Essential Strategies to master Incident Response in Cloud

    Essential Strategies to master Incident Response in Cloud

    How do you build a Robust Detection Framework? Ashish spoke to Andrew Tabona, SVP of Cyber Threat Management and Incident Response at a Fortune 500 company about challenging the conventional wisdom of...

    2 Huhti 202445min

    From Code Suggestions to Security

    From Code Suggestions to Security

    What is GitHub Copilot? Its a AI-powered coding assistant that's redefining how developers write code. We spoke to Joseph Katsioloudes, a security specialist from the GitHub Security Lab. We spoke abo...

    12 Maalis 202421min

    Cloud Security Operations for Modern Threats

    Cloud Security Operations for Modern Threats

    How is your Cloud Incident Preparedness? Is your CSPM enough? Ashish spoke to Ariel Parnes, Co-Founder and COO at Mitiga about the concept of "Assume Breach" and its importance in developing a proacti...

    8 Maalis 202435min

    Understanding Threat Modeling in Cloud

    Understanding Threat Modeling in Cloud

    Do you need an essential guide for Threat Modeling your Cloud Environment, then this episode is definitely for you. Ashish sat down with Tyson Garrett from TrustOnCloud. We explore why and how organiz...

    1 Maalis 202450min

    Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis

    Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis

    What is the role of AI in Legal Research and Data Security? We spoke to Matt McKeever, CISO and Head of Cloud Engineering at LexisNexis, a company that uses GenAI and Custom LLM models to help its cus...

    23 Helmi 202417min

    Sidecar Container Vulnerability in Kubernetes explained

    Sidecar Container Vulnerability in Kubernetes explained

    Are you familiar with Sidecars in Kubernetes? We spoke to Magno Logan about the complex world of Kubernetes security and the silent but deadly vulnerabilities associated with sidecar containers. Magno...

    16 Helmi 202415min

    Role of application security posture management in cybersecurity

    Role of application security posture management in cybersecurity

    Navigating modern application security in a world of Cloud, DevSecOps and now AI is getting rather complex. We spoke to Idan Plotnik, who has 24 years of cybersecurity experience under his belt and is...

    2 Helmi 202440min