Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Varonis: Cloud Security Insights from Microsoft Israel's CTO

Varonis
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cloud security requires understanding the shared responsibility model—organizations cannot simply replicate on-premises security approaches when migrating to public cloud environments.
  • AI-enabled attacks and data poisoning represent the most concerning emerging threats, with attackers using AI for sophisticated phishing and manipulating training data to corrupt model outputs.
  • Nation-state actors pose significant risks due to their resources, time, and expertise, requiring organizations to implement comprehensive defense mechanisms.
  • Security fundamentals like regular patching and multi-factor authentication across all applications, including legacy systems, remain the most effective defensive measures.

Cloud Migration and Shared Responsibility

Avi Yoshi draws on his extensive background spanning network security, VMware's private cloud era, and his current role at Microsoft to explain why organizations struggle with cloud security transitions. The core challenge lies in attempting to replicate on-premises security methodologies in cloud environments, which fundamentally operate on a shared responsibility model. Organizations must recognize that hyperscalers control portions of the infrastructure and implement their own security controls, requiring customers to understand the division of responsibilities rather than assuming either full control or complete provider coverage.

Emerging Threats and AI-Enabled Attacks

The conversation identifies three critical threat categories demanding attention from security leaders. AI-enabled attacks represent the most significant evolution, with artificial intelligence enabling sophisticated phishing campaigns that can convincingly mimic legitimate communications. Data poisoning emerges as a particularly insidious threat where attackers manipulate training data to corrupt AI model outputs without actually stealing information. Nation-state actors round out the threat landscape, bringing substantial resources, time, and expertise to target both countries and critical institutions with persistent, well-funded campaigns.

Foundational Security and Professional Development

Despite the sophistication of modern threats, Yoshi emphasizes that security fundamentals remain the most effective defense. Regular patching and software updates, while seemingly basic, represent areas where many organizations underperform. Multi-factor authentication should extend to all applications, including legacy systems through available integration solutions. For security professionals, success requires analytical thinking to distinguish genuine incidents from noise, strong collaboration skills since security is inherently a team effort, meticulous attention to detail, and adaptability to continuously evolving threats and technologies.

Chapters

0:00 - Introduction and Background
1:11 - Career Journey to Cloud Security
3:14 - Cloud Security Misconceptions
5:17 - Biggest Threats on the Horizon
7:55 - Defending Against AI Attacks
9:43 - Responding to Vulnerabilities
10:48 - Skills for Security Professionals
12:34 - Advice for Future Professionals
13:36 - Personal Interests and Closing

Key Quotes

3:54 "The customers are trying to mimic and replicate not just the same technologies and solutions, but somewhat the same methodologies from the on-prem to the cloud, which unfortunately cannot be mimicked."
7:09 "It's not just grabbing my data or stealing my data. It's actually manipulating my data, my training data for AI. And then the attacker can manipulate the outcome without stealing the data."
8:01 "At the end, it all starts with hygiene. Patching and updating regularly with system, I think that this is the most important part."
11:37 "The attacker is always trying to be very unique and to create attacks that has never seen before. And the defenders, those security professionals needs always to be in advance."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • AI & Machine Learning
  • Identity & Access
  • Threat Intelligence
  • Interview
  • Executive Briefing
  • Shared Responsibility Model
  • AI-Enabled Attacks
  • Data Poisoning
  • Nation-State Threats
  • Multi-Factor Authentication
  • Security Hygiene
  • Patch Management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Varonis: Cloud Security Insights from Microsoft Israel's CTO

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version