Q1. As cloud security threats continue to evolve, what emerging trends or attack vectors should organizations be particularly vigilant about? What are the biggest challenges organizations face in maintaining a strong security posture in the cloud?
Cloud has fundamentally changed the way security teams operate. All of the factors that make it compelling for developers to build in the cloud - the broad range of services available “on tap”, the speed with which they can be deployed – require a new approach for security teams trying to build guardrails and to detect and respond to threats.
At Wiz, one of the most common things we hear from customers when they first approach us is, “if everything is critical, where do I begin?” That really underscores the need for visibility and context in the cloud. Effective collaboration between security, operations, and development teams must be rooted in a common understanding of the environment, how it operates, and how risks are prioritized.
One example of a vector that continues to exemplify these challenges is supply chain attacks. We recently saw how organizations scrambled to respond to the backdoored XZ Utils library. This was among the most sophisticated software supply chain attacks in history, but still required answers to the same fundamental questions that are posed any time a critical risk surfaces in a third-party code or dependency: “Is this present in my environment?” and “What are the attack paths that require the most urgent response?” When teams have consistent and complete coverage of their cloud environments, it becomes far easier to confidently answer those questions and swiftly contain any threats.
Q2. In your opinion, what role can automation and artificial intelligence play in cloud security. How is Wiz leveraging these technologies in its offerings?
Wiz sees some sort of AI service present in over 70% of cloud environments, which tells us that adoption has far outpaced governance – and in many cases, teams are using these powerful technologies regardless of whether it has been explicitly sanctioned by the business. This harkens back to the early days of cloud, where you had explosive growth that forced security to play catch up – not just to understand the technical risks, but to build healthy operating models with new personas racing to bring AI solutions to production: AI engineers and data scientists, cloud operations teams, and legal and compliance teams. These roles are all part of the new cloud operating model, making it even more important to foster a culture of security ownership.
As is always the case for complex systems, security cannot be “bolted on” to AI services in the cloud – it must be embedded into every part of the AI pipeline, including data sources, model management, and the workloads powering training and inference. Wiz calls this holistic approach “AI Security Posture Management” – AI-SPM – to find and eliminate risks end-to-end and help accelerate AI adoption securely.
Wiz also continues to introduce AI-powered features that help its customers use our products more effectively and efficiently. Most recently, that has included Wiz’s AI-powered remediation guidance, which automatically analyzes open security issues and generates clear, easy-to-follow steps to fix them. This helps drive down one of the most critical KPIs for any security function - mean-time-to-respond (MTTR) – despite the increasing complexity of cloud infrastructure and services.
Q3. What key messages around cloud security does Wiz hope to communicate with attendees at Black Hat USA 2024?
2024 is the year of security consolidation. Teams are tired of managing a slew of disparate, siloed tooling. Wiz is solving this pain and helping combat tool sprawl while revolutionizing risk reduction in the cloud through a solution that security and development teams love. Everything we do is for our customers; we will never stop innovating on their behalf.
Recently, Wiz acquired Gem Security to help transform security operations for the cloud era. Gem is a great example of how we are making good on the promise of consolidation while bolstering our Cloud Detection and Response capabilities so that SOC teams have the context and agility needed to identify, investigate, and contain unauthorized activity.