Listen "Google Cloud Platform around the Hash Table."
Episode Synopsis
Google Cloud Platform (GCP) adoption with cybersecurity first principle strategies.
In this session looking at cloud platforms through the lens of first principle thinking, Rick and the Hash Table review the Google Cloud Platform (GCP). They identify some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust. The Hash Table gives their detailed technical advice about data management and risk assessments through GCP, strategies using GCP to support cybersecurity, and define our new favorite concepts: cyber shenanigans, conditions of weirdness (COWs), and cyber COW tipping.
Bob Turner joins Rick at the Cyberwire’s Hash Table to discuss securing the University of Wisconsin at Madison’s big data lake project using the Google Cloud Platform (GCP) and the GCP zero trust architecture: BeyondCorp.
Cybersecurity professional development and continued education.
You will learn about: GCP networking, GCP security strategy and data management, cyber shenanigans, conditions of weirdness (COWs), and cyber COW-tipping
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
In this session looking at cloud platforms through the lens of first principle thinking, Rick and the Hash Table review the Google Cloud Platform (GCP). They identify some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust. The Hash Table gives their detailed technical advice about data management and risk assessments through GCP, strategies using GCP to support cybersecurity, and define our new favorite concepts: cyber shenanigans, conditions of weirdness (COWs), and cyber COW tipping.
Bob Turner joins Rick at the Cyberwire’s Hash Table to discuss securing the University of Wisconsin at Madison’s big data lake project using the Google Cloud Platform (GCP) and the GCP zero trust architecture: BeyondCorp.
Cybersecurity professional development and continued education.
You will learn about: GCP networking, GCP security strategy and data management, cyber shenanigans, conditions of weirdness (COWs), and cyber COW-tipping
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay.
Learn more about your ad choices. Visit megaphone.fm/adchoices
More episodes of the podcast CISO Perspectives (public)
The existing state of regulation.
23/09/2025
The return of CISO Perspectives.
16/09/2025
Bringing it all together.
08/07/2025
Mid season reflection with Kim Jones.
10/06/2025
Are we a trade or a profession?
22/04/2025
Is the cyber talent ecosystem broken?
15/04/2025
CISO Perspectives is back!
08/04/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.