Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Varonis: Cloud Security Insights from Microsoft Israel's CTO

Varonis
03/20/2026
9
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cloud security requires understanding the shared responsibility model—organizations cannot simply replicate on-premises security approaches when migrating to public cloud environments.
  • AI-enabled attacks and data poisoning represent the most concerning emerging threats, with attackers using AI for sophisticated phishing and manipulating training data to corrupt model outputs.
  • Nation-state actors pose significant risks due to their resources, time, and expertise, requiring organizations to implement comprehensive defense mechanisms.
  • Security fundamentals like regular patching and multi-factor authentication across all applications, including legacy systems, remain the most effective defensive measures.

Cloud Migration and Shared Responsibility

Avi Yoshi draws on his extensive background spanning network security, VMware's private cloud era, and his current role at Microsoft to explain why organizations struggle with cloud security transitions. The core challenge lies in attempting to replicate on-premises security methodologies in cloud environments, which fundamentally operate on a shared responsibility model. Organizations must recognize that hyperscalers control portions of the infrastructure and implement their own security controls, requiring customers to understand the division of responsibilities rather than assuming either full control or complete provider coverage.

Emerging Threats and AI-Enabled Attacks

The conversation identifies three critical threat categories demanding attention from security leaders. AI-enabled attacks represent the most significant evolution, with artificial intelligence enabling sophisticated phishing campaigns that can convincingly mimic legitimate communications. Data poisoning emerges as a particularly insidious threat where attackers manipulate training data to corrupt AI model outputs without actually stealing information. Nation-state actors round out the threat landscape, bringing substantial resources, time, and expertise to target both countries and critical institutions with persistent, well-funded campaigns.

Foundational Security and Professional Development

Despite the sophistication of modern threats, Yoshi emphasizes that security fundamentals remain the most effective defense. Regular patching and software updates, while seemingly basic, represent areas where many organizations underperform. Multi-factor authentication should extend to all applications, including legacy systems through available integration solutions. For security professionals, success requires analytical thinking to distinguish genuine incidents from noise, strong collaboration skills since security is inherently a team effort, meticulous attention to detail, and adaptability to continuously evolving threats and technologies.

Chapters

0:00 - Introduction and Background
1:11 - Career Journey to Cloud Security
3:14 - Cloud Security Misconceptions
5:17 - Biggest Threats on the Horizon
7:55 - Defending Against AI Attacks
9:43 - Responding to Vulnerabilities
10:48 - Skills for Security Professionals
12:34 - Advice for Future Professionals
13:36 - Personal Interests and Closing

Key Quotes

3:54 "The customers are trying to mimic and replicate not just the same technologies and solutions, but somewhat the same methodologies from the on-prem to the cloud, which unfortunately cannot be mimicked."
7:09 "It's not just grabbing my data or stealing my data. It's actually manipulating my data, my training data for AI. And then the attacker can manipulate the outcome without stealing the data."
8:01 "At the end, it all starts with hygiene. Patching and updating regularly with system, I think that this is the most important part."
11:37 "The attacker is always trying to be very unique and to create attacks that has never seen before. And the defenders, those security professionals needs always to be in advance."

Categories:
  • » Webinar Library » Varonis
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • AI & Machine Learning
  • Identity & Access
  • Threat Intelligence
  • Interview
  • Executive Briefing
  • Shared Responsibility Model
  • AI-Enabled Attacks
  • Data Poisoning
  • Nation-State Threats
  • Multi-Factor Authentication
  • Security Hygiene
  • Patch Management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Varonis: Cloud Security Insights from Microsoft Israel's CTO

              Upcoming Webinar Calendar

              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Attacks Before They Escalate into Breaches with AI's Help
                https://www.truthinit.com/index.php/channel/1886/detecting-attacks-before-they-escalate-into-breaches-with-ais-help/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: What to Do Now That You Still Have Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-what-to-do-now-that-you-still-have-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Existing Passwords.
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Insights into Our New Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-insights-into-our-new-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/

              Upcoming Events

              • May
                06

                Detecting Attacks Before They Escalate into Breaches with AI's Help

                05/06/202602:00 AM ET
                • May
                  06

                  World Password Day: What to Do Now That You Still Have Passwords

                  05/06/202610:00 PM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Passwords Effectively.

                    05/07/202605:00 AM ET
                    • May
                      07

                      World Password Day: Strategies for Managing Your Existing Passwords.

                      05/07/202601:00 PM ET
                      • May
                        12

                        Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                        05/12/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version