Episodes

  • EP230 AI Red Teaming: Surprises, Strategies, and Lessons from Google
    Jun 16 2025

    Guest:

    • Daniel Fabian, Principal Digital Arsonist, Google

    Topic:

    • Your RSA talk highlights lessons learned from two years of AI red teaming at Google. Could you share one or two of the most surprising or counterintuitive findings you encountered during this process?
    • What are some of the key differences or unique challenges you've observed when testing AI-powered applications compared to traditional software systems?
    • Can you provide an example of a specific TTP that has proven effective against AI systems and discuss the implications for security teams looking to detect it?
    • What practical advice would you give to organizations that are starting to incorporate AI red teaming into their security development lifecycle?
    • What are some initial steps or resources you would recommend they explore to deepen their understanding of this evolving field?

    Resources:

    • Video (LinkedIn, YouTube)
    • Google's AI Red Team: the ethical hackers making AI safer
    • EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes?
    • EP150 Taming the AI Beast: Threat Modeling for Modern AI Systems with Gary McGraw
    • EP198 GenAI Security: Unseen Attack Surfaces & AI Pentesting Lessons
    • Lessons from AI Red Teaming – And How to Apply Them Proactively [RSA 2025]
    Show more Show less
    26 mins
  • EP229 Beyond the Hype: Debunking Cloud Breach Myths (and What DBIR Says Now)
    Jun 9 2025

    Guest:

    • Alex Pinto, Associate Director of Threat Intelligence, Verizon Business, Lead the Verizon Data Breach Report

    Topics:

    • How would you define “a cloud breach”? Is that a real (and different) thing?
    • Are cloud breaches just a result of leaked keys and creds?
    • If customers are responsible for 99% of cloud security problems, is cloud breach really about a customer being breached?
    • Are misconfigurations really responsible for so many cloud security breaches? How are we still failing at configuration?
    • What parts of DBIR are not total “groundhog day”?
    • Something about vuln exploitation vs credential abuse in today’s breaches–what’s driving the shifts we’re seeing? DBIR
    • Are we at peak ransomware? Will ransomware be here in 20 years? Will we be here in 20 years talking about it?
    • How is AI changing the breach report, other than putting in hilarious footnotes about how the report is for humans to read and and is written by actual humans?

    Resources:

    • Video (LinkedIn, YouTube)
    • Verizon DBIR 2025
    • EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends
    • EP205 Cybersecurity Forecast 2025: Beyond the Hype and into the Reality
    • EP112 Threat Horizons - How Google Does Threat Intelligence
    • EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025

    Show more Show less
    35 mins
  • EP228 SIEM in 2025: Still Hard? Reimagining Detection at Cloud Scale and with More Pipelines
    Jun 2 2025

    Guest

    • Alan Braithwaite, Co-founder and CTO @ RunReveal

    Topics:

    • SIEM is hard, and many vendors have discovered this over the years. You need to get storage, security and integration complexity just right. You also need to be better than incumbents. How would you approach this now?
    • Decoupled SIEM vs SIEM/EDR/XDR combo. These point in the opposite directions, which side do you think will win?
    • In a world where data volumes are exploding, especially in cloud environments, you're building a SIEM with ClickHouse as its backend, focusing on both parsed and raw logs. What's the core advantage of this approach, and how does it address the limitations of traditional SIEMs in handling scale?
    • Cribl, Bindplane and “security pipeline vendors” are all the rage. Won’t it be logical to just include this into a modern SIEM?
    • You're envisioning a 'Pipeline QL' that compiles to SQL, enabling 'detection in SQL.' This sounds like a significant shift, and perhaps not to the better? (Anton is horrified, for once) How does this approach affect detection engineering?
    • With Sigma HQ support out-of-the-box, and the ability to convert SPL to Sigma, you're clearly aiming for interoperability. How crucial is this approach in your vision, and how do you see it benefiting the security community?
    • What is SIEM in 2025 and beyond? What’s the endgame for security telemetry data? Is this truly SIEM 3.0, 4.0 or whatever-oh?

    Resources:

    • EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective
    • EP123 The Good, the Bad, and the Epic of Threat Detection at Scale with Panther
    • EP190 Unraveling the Security Data Fabric: Need, Benefits, and Futures
    • “20 Years of SIEM: Celebrating My Dubious Anniversary” blog
    • “RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” blog
    • tl;dr security newsletter
    • Introducing a RunReveal Model Context Protocol Server!
    • MCP: Building Your SecOps AI Ecosystem
    • AI Runbooks for Google SecOps: Security Operations with Model Context Protocol

    Show more Show less
    27 mins
  • EP227 AI-Native MDR: Betting on the Future of Security Operations?
    May 26 2025

    Guests:

    • Eric Foster, CEO of Tenex.AI
    • Venkata Koppaka, CTO of Tenex.AI

    Topics:

    • Why is your AI-powered MDR special? Why start an MDR from scratch using AI?
    • So why should users bet on an “AI-native” MDR instead of an MDR that has already got its act together and is now applying AI to an existing set of practices?
    • What’s the current breakdown in labor between your human SOC analysts vs your AI SOC agents? How do you expect this to evolve and how will that change your unit economics?
    • What tasks are humans uniquely good at today’s SOC? How do you expect that to change in the next 5 years?
    • We hear concerns about SOC AI missing things –but we know humans miss things all the time too. So how do you manage buyer concerns about the AI agents missing things?
    • Let’s talk about how you’re helping customers measure your efficacy overall. What metrics should organizations prioritize when evaluating MDR?

    Resources:

    • Video
    • EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025 (quote from Eric in the title!)
    • EP10 SIEM Modernization? Is That a Thing?
    • Tenex.AI blog
    • “RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” blog
    • The original ASO 10X SOC paper that started it all (2021)
    • “Baby ASO: A Minimal Viable Transformation for Your SOC” blog
    • “The Return of the Baby ASO: Why SOCs Still Suck?” blog
    • "Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles" blog
    Show more Show less
    24 mins
  • EP226 AI Supply Chain Security: Old Lessons, New Poisons, and Agentic Dreams
    May 19 2025

    Guest:

    • Christine Sizemore, Cloud Security Architect, Google Cloud

    Topics:

    • Can you describe the key components of an AI software supply chain, and how do they compare to those in a traditional software supply chain?
    • I hope folks listening have heard past episodes where we talked about poisoning training data. What are the other interesting and unexpected security challenges and threats associated with the AI software supply chain?
    • We like to say that history might not repeat itself but it does rhyme – what are the rhyming patterns in security practices people need to be aware of when it comes to securing their AI supply chains?
    • We’ve talked a lot about technology and process–what are the organizational pitfalls to avoid when developing AI software? What organizational "smells" are associated with irresponsible AI development?
    • We are all hearing about agentic security – so can we just ask the AI to secure itself?
    • Top 3 things to do to secure AI software supply chain for a typical org?

    Resources:

    • Video
    • “Securing AI Supply Chain: Like Software, Only Not” blog (and paper)
    • “Securing the AI software supply chain” webcast
    • EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments
    • Protect AI issue database
    • “Staying on top of AI Developments”
    • “Office of the CISO 2024 Year in Review: AI Trust and Security”
    • “Your Roadmap to Secure AI: A Recap” (2024)
    • "RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check" (references our "data as code" presentation)
    Show more Show less
    25 mins
  • EP225 Cross-promotion: The Cyber-Savvy Boardroom Podcast: EP3 Don Callahan on Emerging Technology
    May 14 2025

    Hosts:

    • David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud
    • Nick Godfrey, Senior Director and Head of Office of the CISO, Google Cloud

    Guests:

    • Don Callahan, Advisor and Board Member

    Resources:

    • EP3 Don Callahan on Emerging Technology (as aired originally)
    • The Cyber-Savvy Boardroom podcast site
    • The Cyber-Savvy Boardroom podcast on Spotify
    • The Cyber-Savvy Boardroom podcast on Apple Podcasts
    • The Cyber-Savvy Boardroom podcast on YouTube
    • Now hear this: A new podcast to help boards get cyber savvy (without the jargon)

    Show more Show less
    25 mins
  • EP224 Protecting the Learning Machines: From AI Agents to Provenance in MLSecOps
    May 12 2025

    Guest:

    • Diana Kelley, CSO at Protect AI

    Topics:

    • Can you explain the concept of "MLSecOps" as an analogy with DevSecOps, with 'Dev' replaced by 'ML'? This has nothing to do with SecOps, right?
    • What are the most critical steps a CISO should prioritize when implementing MLSecOps within their organization? What gets better when you do it?
    • How do we adapt traditional security testing, like vulnerability scanning, SAST, and DAST, to effectively assess the security of machine learning models? Can we?
    • In the context of AI supply chain security, what is the essential role of third-party assessments, particularly regarding data provenance?
    • How can organizations balance the need for security logging in AI systems with the imperative to protect privacy and sensitive data? Do we need to decouple security from safety or privacy?
    • What are the primary security risks associated with overprivileged AI agents, and how can organizations mitigate these risks?
    • Top differences between LLM/chatbot AI security vs AI agent security?

    Resources:

    • “Airline held liable for its chatbot giving passenger bad advice - what this means for travellers”
    • “ChatGPT Spit Out Sensitive Data When Told to Repeat ‘Poem’ Forever”
    • Secure by Design for AI by Protect AI
    • “Securing AI Supply Chain: Like Software, Only Not”
    • OWASP Top 10 for Large Language Model Applications
    • OWASP Top 10 for AI Agents (draft)
    • MITRE ATLAS
    • “Demystifying AI Security: New Paper on Real-World SAIF Applications” (and paper)
    • LinkedIn Course: Security Risks in AI and ML: Categorizing Attacks and Failure Modes
    Show more Show less
    31 mins
  • EP223 AI Addressable, Not AI Solvable: Reflections from RSA 2025
    May 5 2025

    Guests:

    • no guests, just us in the studio

    Topics:

    • At RSA 2025, did we see solid, measurably better outcomes from AI use in security, or mostly just "sizzle" and good ideas with potential?
    • Are the promises of an "AI SOC" repeating the mistakes seen with SOAR in previous years regarding fully automated security operations? Does "AI SOC" work according to RSA floor?
    • How realistic is the vision expressed by some [yes, really!] that AI progress could lead to technical teams, including IT and security, shrinking dramatically or even to zero in a few years?
    • Why do companies continue to rely on decades-old or “non-leading” security technologies, and what role does the concept of a "organizational change budget" play in this inertia?
    • Is being "AI Native" fundamentally better for security technologies compared to adding AI capabilities to existing platforms, or is the jury still out? Got "an AI-native SIEM"? Be ready to explain how is yours better!

    Resources:

    • EP172 RSA 2024: Separating AI Signal from Noise, SecOps Evolves, XDR Declines?
    • EP119 RSA 2023 - What We Saw, What We Learned, and What We're Excited About
    • EP70 Special - RSA 2022 Reflections - Securing the Past vs Securing the Future
    • RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?) [Anton’s RSA 2024 recap blog]
    • New Paper: “Future of the SOC: Evolution or Optimization — Choose Your Path” (Paper 4 of 4.5) [talks about the change budget discussed]
    Show more Show less
    32 mins
adbl_web_global_use_to_activate_webcro805_stickypopup