An AWS Centric View of Google Cloud Identity

An AWS Centric View of Google Cloud Identity

Cloud Security Podcast - Yes - AWS Cloud folks are starting to look after Google Cloud security now in a lot of organisations. Caleb Tennis from Sequoia Capital joins us to share his personal experience on how from being an AWS professional he started looking after Google Cloud Identity and how to secure their Google Cloud Environment.




Episode YouTube Video - https://youtu.be/k1FrVEe1tGc


Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠)

Guest Socials: Caleb Tennis's Linkedin Caleb Tennis⁠

Podcast Twitter - ⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠@CloudSecureNews⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠Cloud Security Newsletter

- ⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠


Spotify TimeStamp for Interview Questions

A word from our sponsors - you can visit them on ⁠⁠⁠⁠⁠snyk.io/csp⁠⁠⁠⁠⁠

  • (00:00) Introduction
  • (04:51) A bit about Caleb Tennis
  • (07:27) Caleb's first impressions of GCP
  • (08:53) Google Cloud Blind Spots
  • (12:35) Where to start security GCP?
  • (15:23) Managing identities in GCP
  • (20:17) Temporary Credential in Google Cloud
  • (24:54) Managing identity with scale
  • (29:59) Is there enough Google Cloud Usage
  • (31:14) Google Cloud logging and monitoring
  • (35:48) What does Scale look like in Google Cloud?
  • (37:53) Hardest things to learn in GCP
  • (41:08) Learning GCP Security
  • (42:58) The Fun Section

  • See you at the next episode!


    Episoder(344)

    New Identity Blueprint for a Future with Cloud & AI

    New Identity Blueprint for a Future with Cloud & AI

    Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of...

    22 Aug 202549min

    AI for SOC Automation: A Blueprint for the New world of Incident Response

    AI for SOC Automation: A Blueprint for the New world of Incident Response

    The nature of Security Operations is changing. As cloud environments grow in complexity and data volumes explode, traditional approaches to detection and response are proving insufficient. This episod...

    8 Aug 202552min

    The Truth About Agentic AI in the SOC: Reality vs. Hype

    The Truth About Agentic AI in the SOC: Reality vs. Hype

    What does the integration of AI into a Security Operations Center (SOC) practically look like? This episode explores the concept of the "Agentic SOC," moving beyond marketing terms to discuss its real...

    7 Aug 202552min

    Understanding a $10B Fraud Vector in Cloud-Native Workflows

    Understanding a $10B Fraud Vector in Cloud-Native Workflows

    A $10 billion fraud vector is currently exploiting a common feature in many cloud-native applications: the SMS verification flow. This isn't a traditional breach. Instead of stealing data, adversaries...

    22 Jul 202544min

    How BT Tackled 180 Years of Legacy to Build a Passwordless Future

    How BT Tackled 180 Years of Legacy to Build a Passwordless Future

    How do you modernize security in a 180-year-old company that operates critical national infrastructure? What does it look like when you discover tens or even hundreds of thousands of credentials hidde...

    17 Jul 202519min

    Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI

    Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI

    Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for s...

    15 Jul 202545min

    Guide to Hybrid Cloud & Bare Metal Secret Management

    Guide to Hybrid Cloud & Bare Metal Secret Management

    Is your organization struggling with secret management across bare metal, hybrid, and multi-cloud environments? Standard cloud-native tools often fall short when you need a single, standardized soluti...

    9 Jul 202532min

     "Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control

    "Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control

    Many organizations focus on keeping attackers out, but what happens when one gets in? We spoke to Ramesh Ramani, Staff Security Engineer at Block about the real challenge, which is preventing them fro...

    1 Jul 202540min

    Populært innen Teknologi

    lydartikler-fra-aftenposten
    romkapsel
    teknisk-sett
    tomprat-med-gunnar-tjomlid
    rss-impressions-2
    shifter
    rss-ki-praten
    fornybaren
    rss-alt-vi-kan
    rss-ai-forklart
    smart-forklart
    nasjonal-sikkerhetsmyndighet-nsm
    elektropodden
    pedagogisk-intelligens
    energi-og-klima
    hans-petter-og-co
    rss-teknologioptimistene-energibransjens-it-podcast
    rss-praktisk-proptech
    rss-startup
    rss-polypod