-
What is “counter abuse”? Is this the same as security?
-
What does counter-abuse look like for GCP?
-
What are the popular abuse types we face?
-
Do people use stolen cards to get accounts to then violate the terms with?
-
How do we deal with this, generally?
-
Beyond core technical skills, what are some of the relevant competencies for working in this space that would appeal to a diverse set of audience?
-
You have worked in academia and industry. What similarities or differences have you observed?