Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

EP86 How to Apply Lessons from Virtualization Transition to Make Cloud Transformation Better

EP86 How to Apply Lessons from Virtualization Transition to Make Cloud Transformation Better

FromCloud Security Podcast by Google


EP86 How to Apply Lessons from Virtualization Transition to Make Cloud Transformation Better

FromCloud Security Podcast by Google

ratings:
Length:
23 minutes
Released:
Oct 4, 2022
Format:
Podcast episode

Description

Guest: Thiébaut Meyer, Director at Office of the CISO, Google Cloud Topics: Virtualization's arrival caused a major IT upheaval 20 years ago. What can we learn from that revolution for our current cloud transformation? We talk about our three legged security stool of people/process/technology. How do we balance the technical issues (new technology stack, etc.) with the new processes (agile, etc) and the skills? What are the cultural and people transformation differences between the virtualization and cloud revolutions? We do recall how PCI DSS was disrupted by virtualization.  So, how does regulation play into this change - back then and now with the cloud? How do we change the minds of regulators who still think that cloud is a risk to mitigate, rather than a way to mitigate others risks better? Resources: “8 Megatrends drive cloud adoption—and improve security for all” blog “Demystifying ‘shared Fate’ - A New Approach To Understand Cybersecurity” Transform with Google Cloud  Google Cybersecurity Action Team
Released:
Oct 4, 2022
Format:
Podcast episode

Titles in the series (100)

Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or just for organizational benefit. We hope you’ll join us if you’re interested in where technology overlaps with process and bumps up against organizational design. We’re hoping to attract listeners who are happy to hear conventional wisdom questioned, and who are curious about what lessons we can and can’t keep as the world moves from on-premises computing to cloud computing.