Seven Key Takeaways from the Cloud-Native Security Summit

September 20, 2018

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. Together in one room for a day, 140 security professionals discussed some of the most pressing issues they are facing in their organizations such as Securing Web Applications in the Cloud at Speed and Scale and Zero Trust Networks, among others.

The sessions, which included presentations, as well as series of panels and fireside chats, were led by information security experts with some of the most impressive resumes in the business. Among them were Art Coviello, former Chairman and CEO of RSA Security; Jess Frazelle, Software Engineer, Microsoft; Stephen Fridakis CISO, HBO; Heather Adkins, Director, Information Security & Privacy, Google; John Viega, CEO, Capsule8; Wendy Nather, Director, Advisory CISOs, Duo Security; and Geoff Belknap, CISO, Slack, to name just a few.

The morning kicked off with a discussion of insights gained from a primary research study of senior IT decision-makers from $250M+ companies, which gives us a quantitative look at the state of cloud-native security today to help us understand the cybersecurity challenges and opportunities of the ongoing shift toward cloud-native applications in production environments. Click here to download the report.

The main program of panels and discussions that followed provided insightful commentary and debate around the role of cyber in the world, current practices in use in some of largest companies around the globe, and how people deal when everything goes wrong.  

While it would be impossible to summarize everything we learned that day, here are seven key takeaways from the Cloud-Native Security Summit:

  1. Cloud-native is providing a new level of abstraction to users and developers. It calls for the shift from physical-plus-virtual to serverless environments.
  2. For companies to successfully go cloud native, the role of DevOps as a collaborator with the security team is critical. Only 64% of survey respondents reported that they have a DevOps function.
  3. Business innovation requires increased visibility into the production infrastructure. Companies must demand more immediate and precise detection capabilities and establish strategies that balance security design with deployment scales.
  4. A security-minded culture is needed so that every IT strategy conversation includes security, a shift that promotes accountability and technical controls around security measures for all IT decisions. As one panelist put it, “it takes a village to raise that baby.”
  5. Cloud-Native Security is optimized through a hierarchy of needs that ascends from visibility and detection to investigation and automated response. (We’ll be blogging about that in more detail soon stay tuned).And even more critical than prevention is accurate and actionable detection.
  6. When a security attack does occur, bring people into the circle, but have a process that defines who should be involved and set limitations on who can make decisions. The point above enables this approach whereby quick, accurate detection ignites this process, and advanced telemetry gives you the clarity you need to make these decisions quickly.
  7. Essential to zero-trust is trusting. This sounds contradictory, but in reality, zero-trust is just the starting default point of a process that involves both trust and verifying trust. For example, you may allow a user access to a particular database (trust) and then subsequently limit that access when the user reaches a pre-defined capacity until you can determine his/her reason for requesting access beyond that point (verify trust). This shift from “trusted” to “trustworthy” is key.

While this is a (very) short summary of what transpired at the event, it sets the stage for some deep dives into how companies can shift the perception of security from a barrier to adoption of new and modern processes such as cloud-native, to the technology that enables it. We’ll be sharing what we learned and expanding on those concepts in future posts and hope that you will be able to join us in the live discussion next year.

Interested in a conversation with Capsule8 about how you can implement cloud-native security in your organization? Let’s chat.