123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Cloud Security Innovators – Q+a With Jeff Blair, Ciso, Caa

Profile Picture
By Author: Tomas Cohen
Total Articles: 16
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

We are thrilled to feature a Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month’s installment of the Cloud Security Innovators blog series. Jeff works for CAA, which represents the world’s most biggest athletes and movie stars. In this fast-paced and creative enviornment, Jeff is a maverick, helping lead the movement to the cloud with an innovative approach to securing cloud data and systems.

Q. How do you view the cloud? Friend? Foe? Necessary evil?
A. For us, the cloud is certainly a friend. That friendship helps to make us a better IT department and a better organization overall, but you have to build and validate the trust given to service providers over time.

Q. Are there any advantages to using cloud apps as it relates to security?
A. Advantages start with the level of trust you have in your providers. There’s a foundation of infrastructure comprising hardware and network services that you’re going to be completely abstracted from. Once you’ve established that trust, you see advantages ...
... with APIs and access to logging information that previously wasn’t easy to get from on premise solutions.

Q. It was a while back but still an important security event: How did your IT department respond to the Heartbleed breach?
A. Externally our exposure was limited to a few appliance servers that were quickly updated. Our efforts primarily focused on employee education. How do we rapidly understand impact to our employees? How do we communicate to employees what is secure and what isn’t, and what are the steps they should take? We sent out an email instructing them on an approach for changing passwords and implementing two-factor authentication. During this process we used Skyhigh to help us understand what vulnerable services were in use at the company and provide appropriate instruction to our employees on when to update their passwords.

Q. There is a lot of press around “encryption” as the silver bullet to address security issues relating to the cloud. Do you see encryption as the panacea?
A. I don’t see encryption as a silver bullet. It’s certainly one piece of the puzzle to protect your most sensitive information but usability has to improve significantly before broad adoption takes hold. Starting with a strategy of transparent encryption where keys are controlled by the enterprise is a great first step. This keeps your IaaS provider honest, protecting in those areas where you’re abstracted from the providers’ operations.

Q. What exactly do you mean when you say “transparent encryption”?
A. The application doesn’t know about the encryption. If you’re running workloads in Amazon, Microsoft or some other Iaas, then you need to own the key that encrypts the data on those disks. If information is mishandled by the provider, we need to ensure that data isn’t accessible. There’s a lot of complexity and management overhead that comes with encryption, and the higher up in the stack you move encryption, the more likely it impacts usability of the system. Initially you want to focus at the lower layers where it’s transparent to users and the applications and as the technology matures move further up the stack to provide additional protections where needed.

Q. There’s a phrase going around in the press right now: “user-centric IT.” Your department seems very user-centric.
A. We have to be; we have seen many examples where an IT-centric approach has resulted in low adoption of our applications. Usage of these systems quickly declines following deployment and users find other ways to get their job done outside of the managed systems. We’re not into building applications that people don’t use, and, with so much choice available today, we know employees will go around IT. Our efforts to build usage monitoring directly into our systems has allowed us to trial changes and has focused us on building features that are truly used and wanted. This direct monitoring of application usage combined with our use of Skyhigh to highlight gaps in our application coverage have been core elements in guiding user centric IT.

Q. As you look into your crystal ball, how will Cloud Security evolve over the next two or three years?
A. One of the greatest challenges around cloud right now is ensuring consistent identity. I see identity provisioning and authentication standards becoming far more solid over the next two to three years to the point where you can ensure your on premise directories and access policies are going to match up exactly with what is available in the cloud. Along with that, you will see mature, consistent APIs to allow logging data to be centralized and correlated across cloud providers. The biggest challenge today is most services provide the ability to collect usage and administrative information, but each service provides different logging APIs or forces you to access this information through their administrative portal; creating significant up front costs for integration. Increased standardization across security and identity integration models will bring us to new levels of security in the cloud in the next two to three years.

Author:
Tomas Cohen is a security enthusiast and analyst covering the most significant security topics and trends prevalent worldwide. He also involves in the technology related to Cloud Security, Data Loss Prevention, Cloud Data Security etc.,

Total Views: 553Word Count: 876See All articles From Author

Add Comment

Computers Articles

1. 10 Dropshipping Shopify Apps For Shopify Stores 2025
Author: Elightwalk Technology

2. How To Write A Great Creative Ux Brief For A Design Consultancy
Author: goodcoders

3. How To Market Your Gojek Clone App Effectively
Author: simonharris

4. Scrape Restaurant Guru Review Data: Unlock Actionable Insights
Author: DataZivot

5. How To Make A Rental Search App To Solve Tenants’ Problems?
Author: goodcoders

6. Is The Is200ehpag1d Exciter Gate Pulse Amplifier Board The Ideal Choice For Your Power System Needs?
Author: Alex Zilk

7. Document Management System For Clinical Trials
Author: Giselle Bates

8. Vupico Sdp
Author: Lorenzoe Taala

9. An Extensive Guide On E-commerce Application Development
Author: goodcoders

10. Why Do Your Businesses Need Vehicle Rental Management Software In 2025?
Author: RentAAA

11. Exploring Bigpond A Reliable Choice For Your Internet Needs
Author: james smith

12. Elevate Your Online Presence With Leading Digital Marketing Solutions In Surat
Author: sassy infotech

13. How To Power Several Appliances Together Safely?
Author: Jennifer Truong

14. Web Scraping Zomato Restaurant Customer Reviews
Author: DataZivot

15. Why Every Coworking Space Needs Management Software To Thrive
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: