This website uses Cookies. Click Accept to agree to our website's cookie use as described in our
Privacy Policy
. Click Preferences to customize your cookie settings.
Accept
Reject
Preferences
Browse
Google Cloud
Google Workspace
AppSheet
Looker & Looker Studio
Google Cloud Security
Google Cloud Security
Home
Google Security Operations
Google Security Operations Forums
SIEM Forum
SOAR Forum
Articles & Announcements
News & Announcements
Google Security Operations Best Practices
Onboarding Journey
Mandiant
Mandiant Forums
Analyst Access and Expertise on Demand
Attack Surface Management
Managed Defense
Security Validation
Articles & Information
News & Announcements
Resources
Onboarding Journey
Security Command Center
SCC Forum
Onboarding Journey
reCAPTCHA Enterprise
reCAPTCHA Enterprise
reCAPTCHA Enterprise Best Practices
Community Resources
Account Info & Registration
Using the Community
Community Feedback
General/Misc Q&A
Security Podcast
Events
Community Blog
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
Log in to ask a question
Google Cloud Security
Security Podcast
EP167 Stolen Cards and Fake Accounts: Defending Go...
Log in to ask a question
Topic Options
Subscribe to RSS Feed
Mark Topic as New
Mark Topic as Read
Float this Topic for Current User
Bookmark
Subscribe
Mute
Printer Friendly Page
Solved
EP167 Stolen Cards and Fake Accounts: Defending Google Cloud Against Abuse
Posted on
04-08-2024 09:49 AM
Share this topic
LinkedIn
Twitter
Copy URL
chuvakin
Staff
Post Options
Mark as New
Bookmark
Subscribe
Mute
Subscribe to RSS Feed
Permalink
Print
Report Inappropriate Content
Reply posted on
--/--/---- --:-- AM
Post Options
Mark as New
Bookmark
Subscribe
Mute
Subscribe to RSS Feed
Permalink
Print
Report Inappropriate Content
Guest:
Maria Riaz
, Cloud Counter-Abuse, Engineering Lead, Google Cloud
Subscribe at Spotify
.
Subscribe at Apple Podcasts
.
Subscribe at YouTube
Topics covered:
What is “counter abuse”? Is this the same as security?
What does counter-abuse look like for GCP?
What are the popular abuse types we face?
Do people use stolen cards to get accounts to then violate the terms with?
How do we deal with this, generally?
Beyond core technical skills, what are some of the relevant competencies for working in this space that would appeal to a diverse set of audience?
You have worked in academia and industry. What similarities or differences have you observed?
Resources:
Video
EP165 Your Cloud Is Not a Pet - Decoding 'Shifting Left' for Cloud Security
P161 Cloud Compliance: A Lawyer - Turned Technologist! - Perspective on Navigating the Cloud
“Art of War”
by Sun Tzu
“Dare to Lead”
by Brene Brown
"Multipliers"
by Liz Wiseman
1
0
64
Topic Labels
Labels:
HGD
View All Topics In this Discussion Space
Previous Topic
Next Topic
0 REPLIES
0
Post Reply
Top Labels in this Space
AI
4
CISO
5
Cloud IR and Forensics
7
Cloud Migration
2
Cloud Posture and Hygiene
1
Cloud Security Practices
1
Cloud Threat Detection
1
Compliance
1
Data Security
3
HGD
7
Identity
2
SIEM
2
SOC
5
Threat Intelligence
2
Voices
2
Zero Trust
1
«
Previous
Next
»