Cover image of Heather Adkins

Heather Adkins

8 Podcast Episodes

Latest 6 Aug 2022 | Updated Daily

Episode artwork

Ep. 240 | Getting started with ABM- tips on planning and execution. Ft. Heather Adkins

Sunny Side Up Podcast

In this episode, Heather Adkins discusses account-based marketing, sharing the tips that she's accumulated around planning and execution. She discusses what ABM is, how to practice joint-account planning and what are ABM KPIs, and how to measure them? Contact Heather Adkins| Follow us on LinkedIn.


17 Sep 2021

Episode artwork

#9 - Heather Adkins

Avast Hacker Archives

She doesn’t just talk the talk, she also walks the walk every day in and day out for a service most of the planet has come to depend on,” says Avast CISO Jaya Baloo, introducing Heather Adkins, Senior Director of Information Security and Privacy at Google and founding member of the Google Security Team. That “service” Jaya mentions only happens to be keeping the most popular internet tool in the world safe and secure for all. In Episode 9 of Avast Hacker Archives (AHA), Heather tells Jaya that she didn’t set out looking to work in cybersecurity, cybersecurity just happened to find her. She was studying marine biology at Humboldt University when she took a job at a local ISP. Then something fateful happened that changed the direction of her life – they got hacked. All at once, Heather was intrigued, curious, and excited. This new cyber world fascinated her, and she headed down to Silicon Valley. She was referred to Google, got the job, and spent the next 19 years of her life dedicated to leading the pack in strong cybersecurity, tweaking as necessary to stay on top of the newest tech, tricks, and traps. The old way of deploying cybersecurity was site-specific. A company would have a building full of employees, those employees would work within an internal network, and a firewall would be placed around it. This is known, Heather says, as “the bonbon model” – a hard exterior protecting a soft interior. It seemed a sensible and sound method, and at first it worked. But then, in 2009, Operation Aurora struck. This was a series of cyberattacks that lasted for half a year targeting a variety of organizations like Adobe, Yahoo, Morgan Stanley, and Dow Chemical. The attacks originated from Chinese state-sponsored APT groups, and Heather and her team realized that things needed to change. The problem was that the bonbon model placed too much trust in the internal network. Cybersecurity needed to shift from protecting the building as a whole to protecting the individual machines. The shift would also cater to the emergent trend of remote workers. It required more stringent identity validation and authentication but allowed employees, in theory, to work safely from anywhere. And that is approximately where we stand currently in the evolution of cybersecurity, but more changes are imminent. Cyberspace is experiencing something of a security paradox at the moment, where most people depend on collected data – search engines, trends, etc. – but at the same time, they want more privacy. “If I were to make a prediction,” Heather confides to Jaya, “and this is not a Google opinion, this is a Heather prediction – I think consumers will get very comfortable with the idea that data yields solutions, but they’re going to want more control and more insight in simple ways over this data. And because of that, we will see more computing moving down to the endpoints, we will see more cloud-based storage and use by NCrypted, and more agency for the user.”Heather continues, “It’s all going to come down to the endpoints. That, plus the presidential order that came down in 2021 will really drive this idea of reshaping the ecosystem because we really have to do things differently than we’ve been doing them for the last 30 years or so.”That presidential order from Joe Biden mandates that all government agencies invest in stronger cybersecurity. This will affect the entire world of security, as vendors will find new solutions to meet the president’s order, and those solutions will then trickle down to the consumers.Heather is a female leader in a male-dominated field, and she finds inspiration, even a bit of connection, with another female leader from centuries ago – Mary Queen of Scots. Not only was Mary a strong leader of Scotland in the mid-1500s, but she has a historical footnote that still resonates today with the security industry. She met her end due to lack of privacy. Her messages were intercepted. In a way, it was death by 16th-century data breach. She’s both a model of strength and a reminder of caution.  All this is only part of the info-packed conversation Jaya has with Heather. There’s a lot more, including the increased use of homomorphic encryption, the importance of “cyber hygiene,” and Heather’s secret formula for getting the masses comfortable with a new change. You could say Avast Hacker Archives Episode 9 is our only episode where a thought leader from the Googleplex shares a googolplex of her security insights with us. Click the link below to hear it all for yourself! 


19 Aug 2021

Similar People

Episode artwork

Security Operations, Reliability, and Securing Google with Heather Adkins

Cloud Security Podcast by Google

Guest: Heather Adkins, Sr Director, Information Security @ Google Topics: Your RSA presentation has 3 pillars: zero trust, microservices, automation/zero prod, is this all you need to be secure & reliable in the modern world? Let’s drill down again into the “secure and reliable” concept, are you sure that they are interrelated? Is there a risk that microservices could actually increase attack surface? What are the practical security upsides of “no touch production”?  SRE and DevOps revolutionized IT, can we expect a similar revolution for security? Where would it come from? Resources: “Building Secure and Reliable Systems” RSA 2021 presentation by Heather Adkins “Building Secure and Reliable Systems” book (free) “Modern Threat Detection at Google” (ep 17) Google BeyondCorp Google BeyondProd NIST 800-27 “Zero Trust Architecture”


28 Jun 2021

Episode artwork

Google's Heather Adkins on defenders playing the long game

Security Conversations

Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting. Sponsored by Eclypsium: Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices. Request a demo at Eclypsium.com.


26 May 2021

Most Popular

Episode artwork

Resiliency Solves Any Problem. Build Strong Teams. Heather Adkins, Dir of InfoSec & Privacy, Google.

Cybercrime Magazine Podcast

Heather Adkins has been with Google since 2002 and is a founding member of their security team. As their Director of Information Security & Privacy, she's built a global team responsible for maintaining the safety and security of Google's networks, systems, and applications. Heather was featured in the book Women Know Cyber: 100 Fascinating Females Fighting Cybercrime available on Amazon at https://amazon.com/Women-Know-Cyber-Fascinating-Cybercrime/dp/1733015701 • For more on cybersecurity, visit us at https://cybersecurityventures.com/


2 Dec 2020

Episode artwork

Building Secure & Reliable Systems - Heather Adkins - ESW #187

Paul's Security Weekly TV

Heather will discuss a new book detailing best practices for designing scalable and reliable systems that are fundamentally secure. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode187


12 Jun 2020

Episode artwork

Building Secure & Reliable Systems - Heather Adkins - ESW #187

Enterprise Security Weekly (Video)

Heather will discuss a new book detailing best practices for designing scalable and reliable systems that are fundamentally secure. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode187


11 Jun 2020

Episode artwork

Interview with John "Four" Flynn, Heather Adkins, and Troels Oerting

The Cyberlaw Podcast

In our 151th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Alan Cohn, and Maury Shank discuss: Microsoft calls for a cyber "Geneva Convention;" Chairman Michael McCaul (R-TX) opposes backdoors in encryption; the EU investigates robots; Turmoil in the White House cyber edition: Out like Flynn, in with McMaster; what's the impact on cyber?; White House staff are reportedly using encrypted messaging apps to communicate; Are the Russians Hacking the French election? Our guest interviews are with John "Four" Flynn, Chief Information and Security Officer at Uber, Heather Adkins, Director of Information Security at Google, and Troels Oerting, Group Chief Security Officer and Group Chief Information Security Officer at Barclays Bank. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.


21 Feb 2017