Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Varonis: Cloud Security Insights from Microsoft Israel's CTO

Varonis
03/20/2026
6
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cloud security requires understanding the shared responsibility model—organizations cannot simply replicate on-premises security approaches when migrating to public cloud environments.
  • AI-enabled attacks and data poisoning represent the most concerning emerging threats, with attackers using AI for sophisticated phishing and manipulating training data to corrupt model outputs.
  • Nation-state actors pose significant risks due to their resources, time, and expertise, requiring organizations to implement comprehensive defense mechanisms.
  • Security fundamentals like regular patching and multi-factor authentication across all applications, including legacy systems, remain the most effective defensive measures.

Cloud Migration and Shared Responsibility

Avi Yoshi draws on his extensive background spanning network security, VMware's private cloud era, and his current role at Microsoft to explain why organizations struggle with cloud security transitions. The core challenge lies in attempting to replicate on-premises security methodologies in cloud environments, which fundamentally operate on a shared responsibility model. Organizations must recognize that hyperscalers control portions of the infrastructure and implement their own security controls, requiring customers to understand the division of responsibilities rather than assuming either full control or complete provider coverage.

Emerging Threats and AI-Enabled Attacks

The conversation identifies three critical threat categories demanding attention from security leaders. AI-enabled attacks represent the most significant evolution, with artificial intelligence enabling sophisticated phishing campaigns that can convincingly mimic legitimate communications. Data poisoning emerges as a particularly insidious threat where attackers manipulate training data to corrupt AI model outputs without actually stealing information. Nation-state actors round out the threat landscape, bringing substantial resources, time, and expertise to target both countries and critical institutions with persistent, well-funded campaigns.

Foundational Security and Professional Development

Despite the sophistication of modern threats, Yoshi emphasizes that security fundamentals remain the most effective defense. Regular patching and software updates, while seemingly basic, represent areas where many organizations underperform. Multi-factor authentication should extend to all applications, including legacy systems through available integration solutions. For security professionals, success requires analytical thinking to distinguish genuine incidents from noise, strong collaboration skills since security is inherently a team effort, meticulous attention to detail, and adaptability to continuously evolving threats and technologies.

Chapters

0:00 - Introduction and Background
1:11 - Career Journey to Cloud Security
3:14 - Cloud Security Misconceptions
5:17 - Biggest Threats on the Horizon
7:55 - Defending Against AI Attacks
9:43 - Responding to Vulnerabilities
10:48 - Skills for Security Professionals
12:34 - Advice for Future Professionals
13:36 - Personal Interests and Closing

Key Quotes

3:54 "The customers are trying to mimic and replicate not just the same technologies and solutions, but somewhat the same methodologies from the on-prem to the cloud, which unfortunately cannot be mimicked."
7:09 "It's not just grabbing my data or stealing my data. It's actually manipulating my data, my training data for AI. And then the attacker can manipulate the outcome without stealing the data."
8:01 "At the end, it all starts with hygiene. Patching and updating regularly with system, I think that this is the most important part."
11:37 "The attacker is always trying to be very unique and to create attacks that has never seen before. And the defenders, those security professionals needs always to be in advance."

Categories:
  • » Webinar Library » Varonis
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • AI & Machine Learning
  • Identity & Access
  • Threat Intelligence
  • Interview
  • Executive Briefing
  • Shared Responsibility Model
  • AI-Enabled Attacks
  • Data Poisoning
  • Nation-State Threats
  • Multi-Factor Authentication
  • Security Hygiene
  • Patch Management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Varonis: Cloud Security Insights from Microsoft Israel's CTO

              Upcoming Webinar Calendar

              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/16/2026
                11:00 AM
                04/16/2026
                Beyond the Alert – Building the Human Centric Agentic SOC
                https://www.truthinit.com/index.php/channel/1372/beyond-the-alert-–-building-the-human-centric-agentic-soc/
              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                15

                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                04/15/202601:00 PM ET
                • Apr
                  16

                  Beyond the Alert – Building the Human Centric Agentic SOC

                  04/16/202611:00 AM ET
                  • Apr
                    21

                    How Purpose Brands scales IT with Zendesk ITAM

                    04/21/202602:00 PM ET
                    • Apr
                      30

                      Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                      04/30/202610:00 AM ET
                      • Apr
                        30

                        The New Economics of VMware Exit

                        04/30/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version