WEBVTT 00:00:00.000 --> 00:00:00.500 align:middle line:90% 00:00:00.500 --> 00:00:02.660 align:middle line:90% Is there more risk in the cloud? 00:00:02.660 --> 00:00:04.200 align:middle line:84% So the traditional security model 00:00:04.200 --> 00:00:07.350 align:middle line:84% is a castle that's built with high walls, and guard 00:00:07.350 --> 00:00:10.482 align:middle line:84% towers, and a guard gate, and a moat around it. 00:00:10.482 --> 00:00:13.065 align:middle line:84% And then, the inside are those critical business applications. 00:00:13.065 --> 00:00:16.050 align:middle line:84% Well, as you move to the cloud, there's no castle anymore. 00:00:16.050 --> 00:00:17.240 align:middle line:90% The cloud is out there. 00:00:17.240 --> 00:00:19.878 align:middle line:84% The king and the queen are standing on the field waiting 00:00:19.878 --> 00:00:20.670 align:middle line:90% back at the castle. 00:00:20.670 --> 00:00:21.810 align:middle line:90% And they're exposed. 00:00:21.810 --> 00:00:23.550 align:middle line:84% And so the risk profile is different. 00:00:23.550 --> 00:00:27.000 align:middle line:84% We found that about 7 out of 10 organizations, 00:00:27.000 --> 00:00:29.940 align:middle line:84% they are using more business-critical services 00:00:29.940 --> 00:00:31.990 align:middle line:90% than they did in years prior. 00:00:31.990 --> 00:00:35.250 align:middle line:84% And with that, there's a need and really a hard look 00:00:35.250 --> 00:00:37.470 align:middle line:84% organizations are having to make internally 00:00:37.470 --> 00:00:40.500 align:middle line:84% about how do we move from this thin layer 00:00:40.500 --> 00:00:45.180 align:middle line:84% or building blocks of security to much deeper controls 00:00:45.180 --> 00:00:47.370 align:middle line:84% of security within their organization. 00:00:47.370 --> 00:00:49.565 align:middle line:90% It's real simple-- visibility. 00:00:49.565 --> 00:00:52.230 align:middle line:84% The average practitioner and leader 00:00:52.230 --> 00:00:54.870 align:middle line:84% just doesn't have the awareness of what's being 00:00:54.870 --> 00:00:56.790 align:middle line:90% used inside the organization. 00:00:56.790 --> 00:01:00.250 align:middle line:84% And a lot of this leads back to shared responsibility. 00:01:00.250 --> 00:01:00.810 align:middle line:90% So-- 00:01:00.810 --> 00:01:01.477 align:middle line:90% What do we know? 00:01:01.477 --> 00:01:03.227 align:middle line:84% It's 10% of the CISOs actually understand, 00:01:03.227 --> 00:01:05.477 align:middle line:84% feel comfortable with the shared responsibility model? 00:01:05.477 --> 00:01:07.320 align:middle line:84% Yeah, but I look at it the other way around. 00:01:07.320 --> 00:01:10.710 align:middle line:84% It's more like 90% of CISOs don't 00:01:10.710 --> 00:01:12.660 align:middle line:84% know what share of responsibility 00:01:12.660 --> 00:01:14.230 align:middle line:90% is in their environment. 00:01:14.230 --> 00:01:15.700 align:middle line:90% That's an alarming statistic. 00:01:15.700 --> 00:01:16.275 align:middle line:90% It is. 00:01:16.275 --> 00:01:18.480 align:middle line:84% Cloud is an exciting business enabler. 00:01:18.480 --> 00:01:20.730 align:middle line:84% When you start putting all that business critical data 00:01:20.730 --> 00:01:23.280 align:middle line:84% in there, you want to make sure you have checked off 00:01:23.280 --> 00:01:27.190 align:middle line:84% on your list all these security controls along the way. 00:01:27.190 --> 00:01:32.030 align:middle line:84% And this is a tremendous tool set to prepare you for that. 00:01:32.030 --> 00:01:34.251 align:middle line:90%