Are you an entrepreneur who feels trapped by the very business you created? If you want to know the secret to breaking through your current ceiling, the answer won’t be found in the shiniest new AI tool or the latest online course guaranteed to 10X your revenue. The answer is found in listening to those people who have been exactly where you are today–and have overcome. This is the podcast for Nebraska entrepreneurs who feel stuck navigating the reality of owning a business. Steve Kanne is y ...
…
continue reading
Cloudsecurity Podcasts
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Security on Cloud explores the ups and downs, and ins and outs of cloud security like no other podcast. Hear interviews with industry heavyweights, analysts, and technologists in the cloud security and compliance space. You can receive the insights you need to navigate security and compliance in this new cloud-driven world. Also, hear about high-level trends that face the cloud security industry that you need to be on top of to stay ahead. How to deal with compliance nightmares, how the whol ...
…
continue reading

1
EP241 From Black Box to Building Blocks: More Modern Detection Engineering Lessons from Google
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Guest: Rick Correa,Uber TL Google SecOps, Google Cloud Topics: On the 3rd anniversary of Curated Detections, you've grown from 70 rules to over 4700. Can you walk us through that journey? What were some of the key inflection points and what have been the biggest lessons learned in scaling a detection portfolio so massively? Historically the SecOps …
…
continue reading

1
Essential Strategies to Prepare Your Business for Funding and Freedom
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22How do you position your business to attract the right funding and maximize profit? Mark Hasebroock, founder of Dundee Venture Capital, reveals the core principles of financial health for entrepreneurs. Learn why "cash is oxygen" and how mastering your operating expenses can prevent profit erosion. Discover strategies for proper pricing, understand…
…
continue reading

1
EP240 Cyber Resiliency for the Rest of Us: Making it Happen on a Real-World Budget
29:25
29:25
Play later
Play later
Lists
Like
Liked
29:25Guest: Errol Weiss, Chief Security Officer (CSO) at Health-ISAC Topics: How adding digital resilience is crucial for enterprises? How to make the leaders shift from “just cybersecurity“ to “digital resilience”? How to be the most resilient you can be given the resources? How to be the most resilient with the least amount of money? How to make yours…
…
continue reading

1
EP239 Linux Security: The Detection and Response Disconnect and Where Is My Agentless EDR
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29Guest: Craig H. Rowland, Founder and CEO, Sandfly Security Topics: When it comes to Linux environments – spanning on-prem, cloud, and even–gasp–hybrid setups – where are you seeing the most significant blind spots for security teams today? There's sometimes a perception that Linux is inherently more secure or less of a malware target than Windows. …
…
continue reading

1
Break Through the Ceiling: Reigniting Stagnant Business Growth Now
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09Is your business growth stagnant, feeling like you've hit an invisible ceiling? Steve Kanne and Jamie Bumgardner dive into why businesses plateau and, more importantly, how to break through. They reveal the critical steps to reignite growth, from redefining your company's core mission and vision to the often-overlooked power of process adjustments …
…
continue reading

1
EP238 Google Lessons for Using AI Agents for Securing Our Enterprise
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Guest: Dominik Swierad, Senior PM D&R AI and Sec-Gemini Topics: When introducing AI agents to security teams at Google, what was your initial strategy to build trust and overcome the natural skepticism? Can you walk us through the very first conversations and the key concerns that were raised? With a vast array of applications, how did you identify…
…
continue reading

1
EP237 Making Security Personal at the Speed and Scale of TikTok
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Guest: Kim Albarella, Global Head of Security, TikTok Questions: Security is part of your DNA. In your day to day at TikTok, what are some tips you’d share with users about staying safe online? Many regulations were written with older technologies in mind. How do you bridge the gap between these legacy requirements and the realities of a modern, mi…
…
continue reading

1
Smart Choices for Sustainable Business Growth
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04Confused about the best funding for your business growth? Mark Hasebroock, founder of Dundee Venture Capital, shares invaluable insights on capitalizing your company for sustainable expansion. Discover how to assess your cash needs, the different types of funding available (debt, equity, hybrids), and why building relationships with potential inves…
…
continue reading

1
Beyond the Daily Grind: Practical Steps to Becoming a True Business Leader
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42Are you a business owner constantly frustrated, stuck in the daily grind instead of leading your company? This episode offers a clear roadmap to transition from being a doer to an effective leader. Steve Kanne and Jamie Bumgardner, co-founders of Prime Secured, share their two decades of experience, revealing how emotional control, deliberate pract…
…
continue reading

1
EP236 Accelerated SIEM Journey: A SOC Leader's Playbook for Modernization and AI
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Guest: Manija Poulatova, Director of Security Engineering and Operations at Lloyd's Banking Group Topics: SIEM migration is hard, and it can take ages. Yours was - given the scale and the industry - on a relatively short side of 9 months. What’s been your experience so far with that and what could have gone faster? Anton might be a “reformed” analy…
…
continue reading
Feeling stuck in your business, even at your breaking point? Steve Kanne shares his incredible journey from farm life to co-founding a tech company, facing down a 50% revenue loss, an economic meltdown, and a devastating flood. Discover how a critical mentorship and a relentless focus on rebuilding with discipline and purpose not only saved his bus…
…
continue reading

1
EP235 The Autonomous Frontier: Governing AI Agents from Code to Courtroom
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06Guest: Anna Gressel, Partner at Paul, Weiss, one of the AI practice leads Episode co-host: Marina Kaganovich, Office of the CISO, Google Cloud Questions: Agentic AI and AI agents, with its promise of autonomous decision-making and learning capabilities, presents a unique set of risks across various domains. What are some of the key areas of concern…
…
continue reading

1
EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59Guest: Svetla Yankova, Founder and CEO, Citreno Topics: Why do so many organizations still collect logs yet don’t detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not “winning” against Tier 1 ... or even Tier 5 adversaries? What are the hardest parts about getting the right context into a S…
…
continue reading

1
EP233 Product Security Engineering at Google: Resilience and Security
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Guest: Cristina Vintila, Product Security Engineering Manager, Google Cloud Topic: Could you share insights into how Product Security Engineering approaches at Google have evolved, particularly in response to emerging threats (like Log4j in 2021)? You mentioned applying SRE best practices in detection and response, and overall in securing the Googl…
…
continue reading

1
EP232 The Human Element of Privacy: Protecting High-Risk Targets and Designing Systems
31:37
31:37
Play later
Play later
Lists
Like
Liked
31:37Guest: Sarah Aoun, Privacy Engineer, Google Topic: You have had a fascinating career since we [Tim] graduated from college together – you mentioned before we met that you’ve consulted with a literal world leader on his personal digital security footprint. Maybe tell us how you got into this field of helping organizations treat sensitive information…
…
continue reading

1
EP231 Beyond the Buzzword: Practical Detection as Code in the Enterprise
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40Guest: David French, Staff Adoption Engineer, Google Cloud Topic: Detection as code is one of those meme phrases I hear a lot, but I’m not sure everyone means the same thing when they say it. Could you tell us what you mean by it, and what upside it has for organizations in your model of it? What gets better for security teams and security outcomes…
…
continue reading

1
EP230 AI Red Teaming: Surprises, Strategies, and Lessons from Google
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11Guest: Daniel Fabian, Principal Digital Arsonist, Google Topic: Your RSA talk highlights lessons learned from two years of AI red teaming at Google. Could you share one or two of the most surprising or counterintuitive findings you encountered during this process? What are some of the key differences or unique challenges you've observed when testin…
…
continue reading

1
EP229 Beyond the Hype: Debunking Cloud Breach Myths (and What DBIR Says Now)
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Guest: Alex Pinto, Associate Director of Threat Intelligence, Verizon Business, Lead the Verizon Data Breach Report Topics: How would you define “a cloud breach”? Is that a real (and different) thing? Are cloud breaches just a result of leaked keys and creds? If customers are responsible for 99% of cloud security problems, is cloud breach really ab…
…
continue reading

1
Behind the Scenes at the M365 Community Conference
56:35
56:35
Play later
Play later
Lists
Like
Liked
56:35Live from the M365 Community Conference in Las Vegas, Stephen and Arvind break down the biggest announcements in OneDrive, SharePoint, and Microsoft 365—from mind-blowing Copilot demos to Sync deployment best practices. Plus, guest Vlad Catrinescu shares insights on governance, Copilot readiness, and the power of community. Whether you’re an admin,…
…
continue reading

1
EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Guest Alan Braithwaite, Co-founder and CTO @ RunReveal Topics: SIEM is hard, and many vendors have discovered this over the years. You need to get storage, security and integration complexity just right. You also need to be better than incumbents. How would you approach this now? Decoupled SIEM vs SIEM/EDR/XDR combo. These point in the opposite dir…
…
continue reading

1
EP227 AI-Native MDR: Betting on the Future of Security Operations?
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Guests: Eric Foster, CEO of Tenex.AI Venkata Koppaka, CTO of Tenex.AI Topics: Why is your AI-powered MDR special? Why start an MDR from scratch using AI? So why should users bet on an “AI-native” MDR instead of an MDR that has already got its act together and is now applying AI to an existing set of practices? What’s the current breakdown in labor …
…
continue reading

1
EP226 AI Supply Chain Security: Old Lessons, New Poisons, and Agentic Dreams
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39Guest: Christine Sizemore, Cloud Security Architect, Google Cloud Topics: Can you describe the key components of an AI software supply chain, and how do they compare to those in a traditional software supply chain? I hope folks listening have heard past episodes where we talked about poisoning training data. What are the other interesting and unexp…
…
continue reading

1
EP225 Cross-promotion: The Cyber-Savvy Boardroom Podcast: EP2 Christian Karam on the Use of AI
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Alicja Cade, Director, Office of the CISO, Google Cloud Guest: Christian Karam, Strategic Advisor and Investor Resources: EP2 Christian Karam on the Use of AI (as aired originally) The Cyber-Savvy Boardroom podcast site The Cyber-Savvy Boardroom podcast on Spotify The C…
…
continue reading

1
EP224 Protecting the Learning Machines: From AI Agents to Provenance in MLSecOps
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40Guest: Diana Kelley, CSO at Protect AI Topics: Can you explain the concept of "MLSecOps" as an analogy with DevSecOps, with 'Dev' replaced by 'ML'? This has nothing to do with SecOps, right? What are the most critical steps a CISO should prioritize when implementing MLSecOps within their organization? What gets better when you do it? How do we adap…
…
continue reading

1
EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
31:37
31:37
Play later
Play later
Lists
Like
Liked
31:37Guests: no guests, just us in the studio Topics: At RSA 2025, did we see solid, measurably better outcomes from AI use in security, or mostly just "sizzle" and good ideas with potential? Are the promises of an "AI SOC" repeating the mistakes seen with SOAR in previous years regarding fully automated security operations? Does "AI SOC" work according…
…
continue reading
Olga Dalecka joins Stephen Rice and Arvind Mishra on this month's Sync Up podcast to share how OneDrive’s mobile app is transforming the way users experience and manage their photos. From Moments of Joy and Photo Shuffle to AI-powered editing and seamless sharing, this episode dives into the innovations making OneDrive the trusted home for your mem…
…
continue reading

1
EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19Guests: Kirstie Failey @ Google Threat Intelligence Group Scott Runnels @ Mandiant Incident Response Topics: What is the hardest thing about turning distinct incident reports into a fun to read and useful report like M-Trends? How much are the lessons and recommendations skewed by the fact that they are all “post-IR” stories? Are “IR-derived” secur…
…
continue reading

1
EP221 Special - Semi-Live from Google Cloud Next 2025: AI, Agents, Security ... Cloud?
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26Guests: No guests [Tim in Vegas and Anton remote] Topics: So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year? Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends? Last year, we po…
…
continue reading

1
EP220 Big Rewards for Cloud Security: Exploring the Google VRP
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13Guests: Michael Cote, Cloud VRP Lead, Google Cloud Aadarsh Karumathil, Security Engineer, Google Cloud Topics: Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure? How do you determine how much to pay for each vulnerabili…
…
continue reading

1
EP219 Beyond the Buzzwords: Decoding Cyber Risk and Threat Actors in Asia Pacific
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Guest: Steve Ledzian, APAC CTO, Mandiant at Google Cloud Topics: We've seen a shift in how boards engage with cybersecurity. From your perspective, what's the most significant misconception boards still hold about cyber risk, particularly in the Asia Pacific region, and how has that impacted their decision-making? Cybersecurity is rife with jargon.…
…
continue reading

1
EP218 IAM in the Cloud & AI Era: Navigating Evolution, Challenges, and the Rise of ITDR/ISPM
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Guest: Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst Topics: How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present? ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Ma…
…
continue reading

1
EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes?
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Guest: Alex Polyakov, CEO at Adversa AI Topics: Adversa AI is known for its focus on AI red teaming and adversarial attacks. Can you share a particularly memorable red teaming exercise that exposed a surprising vulnerability in an AI system? What was the key takeaway for your team and the client? Beyond traditional adversarial attacks, what emergin…
…
continue reading

1
EP216 Ephemeral Clouds, Lasting Security: CIRA, CDR, and the Future of Cloud Investigations
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Guest: James Campbell, CEO, Cado Security Chris Doman, CTO, Cado Security Topics: Cloud Detection and Response (CDR) vs Cloud Investigation and Response Automation(CIRA) ... what’s the story here? There is an “R” in CDR, right? Can’t my (modern) SIEM/SOAR do that? What about this becoming a part of modern SIEM/SOAR in the future? What gets better w…
…
continue reading
In this episode of Sync Up, hosts Stephen Rice and Arvind Mishra sit down with David Johnson, one of Microsoft IT's key architects, to uncover how the company manages OneDrive and SharePoint at scale. From security and automation to self-service with guardrails, they explore the strategies that keep Microsoft’s data secure while enabling seamless c…
…
continue reading

1
EP215 Threat Modeling at Google: From Basics to AI-powered Magic
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03Guest: Meador Inge, Security Engineer, Google Cloud Topics: Can you walk us through Google's typical threat modeling process? What are the key steps involved? Threat modeling can be applied to various areas. Where does Google utilize it the most? How do we apply this to huge and complex systems? How does Google keep its threat models updated? What …
…
continue reading

1
EP214 Reconciling the Impossible: Engineering Cloud Systems for Diverging Regulations
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22Guest: Archana Ramamoorthy, Senior Director of Product Management, Google Cloud Topics: You are responsible for building systems that need to comply with laws that are often mutually contradictory. It seems technically impossible to do, how do you do this? Google is not alone in being a global company with local customers and local requirements. Ho…
…
continue reading

1
EP213 From Promise to Practice: LLMs for Anomaly Detection and Real-World Cloud Security
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01Guest: Yigael Berger, Head of AI, Sweet Security Topic: Where do you see a gap between the “promise” of LLMs for security and how they are actually used in the field to solve customer pains? I know you use LLMs for anomaly detection. Explain how that “trick” works? What is it good for? How effective do you think it will be? Can you compare this to …
…
continue reading

1
EP212 Securing the Cloud at Scale: Modern Bank CISO on Metrics, Challenges, and SecOps
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16Guest: Dave Hannigan, CISO at Nu Bank Topics: Tell us about the challenges you're facing as CISO at NuBank and how are they different from your past life at Spotify? You're a big cloud based operation - what are the key challenges you're tracking in your cloud environments? What lessons do you wish you knew back in your previous CISO run [at Spotif…
…
continue reading

1
EP211 Decoding the Underground: Google's Dual-Lens Threat Intelligence Magic
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Guest: Kimberly Goody, Head of Intel Analysis and Production, Google Cloud Topics: Google's Threat Intelligence Group (GTIG) has a unique position, accessing both underground forum data and incident response information. How does this dual perspective enhance your ability to identify and attribute cybercriminal campaigns? Attributing cyberattacks w…
…
continue reading

1
EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58Guest: Or Brokman, Strategic Google Cloud Engineer, Security and Compliance, Google Cloud Topics: Can you tell us about one particular cloud consulting engagement that really sticks out in your memory? Maybe a time when you lifted the hood, so to speak, and were absolutely floored by what you found – good or bad! In your experience, what's that one…
…
continue reading
Join Stephen Rice and Arvind Mishra as they discuss the ins and outs of OneDrive Sync with legendary Sync expert, Gaia Carini. They cover everything from the basics of OneDrive Sync to more advanced features like Files on Demand and Known Folder Move (KFM). Gaia also shares best practices for deploying OneDrive Sync in organizations and highlights …
…
continue reading

1
EP209 vCISO in the Cloud: Navigating the New Security Landscape (and Don’t Forget Resilience!)
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Guests: Beth Cartier, former CISO, vCISO, founder of Initiative Security Guest host of the CISO mini-series: Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud Topics: How is that vCISO’ing going? What is special about vCISO and cloud? Is it easier or harder? AI, cyber, resilience - all are hot topics these days. In the cont…
…
continue reading

1
EP208 The Modern CISO: Balancing Risk, Innovation, and Business Strategy (And Where is Cloud?)
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Guest host: Marina Kaganovich, Executive Trust Lead, Office of the CISO @ Google Cloud Guest: John Rogers, CISO @ MSCI Topics: Can you briefly walk us through your CISO career path? What are some of the key (cloud or otherwise) trends that CISOs should be keeping an eye on? What is the time frame for them? What are the biggest cloud security challe…
…
continue reading

1
EP207 Slaying the Ransomware Dragon: Can a Startup Succeed?
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55Guest: Bob Blakley, Co-founder and Chief Product Officer of Mimic Topics: Tell us about the ransomware problem - isn't this a bit of old news? Circa 2015, right? What makes ransomware a unique security problem? What's different about ransomware versus other kinds of malware? What do you make of the “RansomOps” take (aka “ransomware is not malware”)…
…
continue reading

1
EP206 Paying the Price: Ransomware's Rising Stakes in the Cloud
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01Guest: Allan Liska, CSIRT at Recorded Future, now part of Mastercard Topics: Ransomware has become a pervasive threat. Could you provide us with a brief overview of the current ransomware landscape? It's often said that ransomware is driven by pure profit. Can you remind us of the business model of ransomware gangs, including how they operate, thei…
…
continue reading

1
EP205 Cybersecurity Forecast 2025: Beyond the Hype and into the Reality
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19Guest: Andrew Kopcienski, Principal Intelligence Analyst, Google Threat Intelligence Group Questions: You have this new Cybersecurity Forecast 2025 report, what’s up with that? We are getting a bit annoyed about the fear-mongering on “oh, but attackers will use AI.” You are a threat analyst, realistically, how afraid are you of this? The report dis…
…
continue reading