Ben Johnson | Co-Founder & CTO
OWASP OC 2018-03-22
SEEING THROUGH THE FOG
@chicagoben | @obsidiansec
Background Check // Ben Johnson
Co-Founder and CTO, Obsidian
Co-Founder and Former CTO, Carbon Black
Former CNO/Cyber // NSA, CIA, DoD
@chicagoben | @obsidiansec
Today’s Goal?
TO SPARK CONTEMPLATION
(and give you something to remember!)
@chicagoben | @obsidiansec
Transformation
@chicagoben | @obsidiansec
Digital Transformation
@chicagoben | @obsidiansec
Race to the Cloud!
Lots of benefits of cloud adoption … we aren’t really here for that.
@chicagoben | @obsidiansec
Observation
@chicagoben | @obsidiansec
IT and the Cloud
“IT is the broad subject concerned with all aspects
of managing and processing information,
especially within a large organization or company.”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
IT
Cloud
@chicagoben | @obsidiansec
IT and the Cloud (Reality)
“Let’s stop managing hardware and a lot of the software”
“Let’s scale up and down as necessary”
“Let’s get access to cool new technologies more quickly”
“Uptime is [mostly] someone else’s problem”
@chicagoben | @obsidiansec
Information Security and the Cloud
“Information security, sometimes shortened to InfoSec, is the practice
of preventing unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information. ”
Cloud computing is an information technology (IT) paradigm that
enables ubiquitous access to shared pools of
configurable system resources and higher-level services that can
be rapidly provisioned with minimal management effort, often over
the Internet. Cloud computing relies on sharing of resources to
achieve coherence and economies of scale, similar to a public utility.
InfoSec
Cloud
@chicagoben | @obsidiansec
Information Security and the Cloud (Reality)
“IT is going from 0 to 100 in the cloud and leaving security in the dust”
- Fmr. CISO, Lending Club
“We’re blind to all these new SaaS accounts”
- Director, Cyber Intelligence, Top Athletics Brand
“We don’t know what users are doing on our AWS/Azure accounts”
- Too Many Organizations
“Hackers don’t break in, they login.”
- CISO, Cisco
@chicagoben | @obsidiansec
Modern Times are Leaky
Booz Allen
OneLogin
The RNC
Verizon
Accenture
Dow Jones
Viacom
Deloitte
Sweden
California
@chicagoben | @obsidiansec
Recent Headlines
@chicagoben | @obsidiansec
Data Breaches
@chicagoben | @obsidiansec
Data Breaches: Not Just IaaS
As of now, Deloitte cannot be "100% sure what was taken" by the hackers
https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
@chicagoben | @obsidiansec
Breach Fatigue Anyone?
Anyone getting CLOUD breach fatigue?
If not you, do you think others are?
@chicagoben | @obsidiansec
Causation
@chicagoben | @obsidiansec
Confusion Over Responsibility
@chicagoben | @obsidiansec
Providers Have Challenges
Goals are Misaligned
Focus is on availability of variety of services with a minimum layer of security built-in
Failure Can Be Easy
A simple click can share huge amounts of data publicly (e.g. S3)
Monitoring is Extra Work
Logging & monitoring often have to be enabled separately
Mo’ People, Mo’ Complexity
Identities and policies are often complex to manage (maybe an understatement?)
Sweet Spot is Elusive
Policy and control options either feel too flexible or too rigid
@chicagoben | @obsidiansec
Customers Have Challenges
Lack of Understanding
The notion of shared responsibility and the differences in built-in security are often foreign.
Taking the Plunge
Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?)
Bending the Rules
Unsanctioned cloud use or lack of reporting to security what is in use.
New Environment, Same Security Team
Surface area is expanding, changing, and dynamic, yet security team isn’t as agile.
“Operators think that once it’s in the cloud it’s no longer their responsibility”
- Fmr. CIO of the Air Force
@chicagoben | @obsidiansec
Current Trends Making Things Harder
@chicagoben | @obsidiansec
IT and Security Disconnect
IT Security
Authentication
Authorization
Activity
Enablement Threat Management
DISCONNECTED
Provisioning Anomaly Detection
@chicagoben | @obsidiansec
Obligation
@chicagoben | @obsidiansec
Cloud Security: “Of” Versus “In”
Cloud Service Provider:
responsible for security OF the cloud
Customer:
responsible for security IN the cloud
@chicagoben | @obsidiansec
AWS Responsibilities?
@chicagoben | @obsidiansec
AZURE Responsibilities?
@chicagoben | @obsidiansec
SaaS: “Of” Versus “In”
The SaaS Provider handles all aspects except
for identity and access management, client
devices controls, and data accountability.
The Customer, therefore, must understand
users, devices & data related to that service.
@chicagoben | @obsidiansec
Office 365?
Microsoft handles the underlying infrastructure,
including patching and updating, and handles
accessibility of the service.
You are responsible for what is emailed, who
accesses the email, and how they access the
email.
@chicagoben | @obsidiansec
AZURE Responsibilities?Hackers want this!
@chicagoben | @obsidiansec
AWS Responsibilities?
Hackers want this!
@chicagoben | @obsidiansec
Amelioration
@chicagoben | @obsidiansec
OWASP TOP 10?
@chicagoben | @obsidiansec
Awareness, Auditing, Adaptation, Automation
@chicagoben | @obsidiansec
Awareness
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
@chicagoben | @obsidiansec
Auditing
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
@chicagoben | @obsidiansec
Adaptation
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets, etc.
@chicagoben | @obsidiansec
Automation
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use integrations to
automate the collection of data, the taking of actions, the verification
of changes.
๏Avoid manual activities.
@chicagoben | @obsidiansec
Hygiene
@chicagoben | @obsidiansec
Triple-A!
Authentication AccountingAuthorization
Industry focus Neglected Forgotten
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
๏Change your processes to reduce risk!
๏Security audits should be automated.
๏Cloud Providers have APIs – write code or use
integrations to automate the collection of data,
the taking of actions, the verification of changes.
๏Avoid manual activities.
๏Where are you using the cloud?
๏What “clouds” are you using?
๏Why are you using the cloud?
๏How are you using the cloud?
๏Who’s responsible for what’s in the cloud?
๏Understand current state (IT)…assets, users, devices.
๏Understand current state (Security).
๏Understand initiatives that involve cloud.
๏Understand security capabilities related to cloud.
๏Put policies and checks in place for new deployments
๏Update security scans and tests to account for cloud
๏Enable tracking of all changes from current state
๏Have a process for monitoring all new accounts, assets,
etc.
@chicagoben | @obsidiansec
IT and Security: Hand-in-Hand
Automate Change to Reduce Error and Risk
Understanding Surface Area
Understand Details and Processes
Update processes and policies
@chicagoben | @obsidiansec
Journey vs. Outcomes
Security teams often focus where they
have the most autonomy; they get
comfortable in this never-ending journey
vs. driving toward new destinations.
@chicagoben | @obsidiansec
Engineering vs. Analysis
@chicagoben | @obsidiansec
Take-Aways
Understand where, how, and why you are using cloud.
Understand who is responsible.
Providers need to do more.
They could reduce users shooting themselves in the foot, improve default security levels, and
better show surface area.
(Please encourage them to do more!)
The rest is on you:
(Awareness, Auditing, Adaptation, Automation)!
Oh, yeah, Triple-A:
(Authentication, Authorization, Accounting)!
(and don’t forget hygiene.)
@chicagoben | @obsidiansec
Cloud: Massive Opportunity for Unifying IT & Security
IT Security
Enablement Enablement
Provides Appropriate Tech Provides Appropriate Risk
CONNECTED?
Ben Johnson, CTO
ben@obsidiansecurity.com
@chicagoben | @obsidiansec
THANK YOU!

More Related Content

PPTX
Detection + 1 in the Cloud Age
PPTX
Cybersecurity as MIS
PPTX
Not Actually a DevOps Talk, or, Beyond “Survival is Not Mandatory”
PDF
Pivotal Digital Transformation Forum: Accelerate Time to Market with Business...
PPTX
SPSUK2013 - Matt Groves - Cloud Readiness
PPTX
Codeless Security for the Apps You Buy & Build on AWS
PDF
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
PPTX
CAMP IT Slides - Skytap - Brian White
Detection + 1 in the Cloud Age
Cybersecurity as MIS
Not Actually a DevOps Talk, or, Beyond “Survival is Not Mandatory”
Pivotal Digital Transformation Forum: Accelerate Time to Market with Business...
SPSUK2013 - Matt Groves - Cloud Readiness
Codeless Security for the Apps You Buy & Build on AWS
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
CAMP IT Slides - Skytap - Brian White

What's hot (18)

PDF
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
PDF
Big Data beyond Apache Hadoop - How to integrate ALL your Data
PPTX
How to plan your Modern Workplace Project - SPS Denver October 2018
PDF
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
PDF
Not actually a DevOps Talk
PPTX
Scenarios for building Hybrid Cloud
PDF
Framework and Product Comparison for Big Data Log Analytics and ITOA
PPTX
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
PDF
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
PPTX
Azure Cloud Security
PDF
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
PDF
How a social intranet can be used to drive employee engagement and usage of I...
PPTX
UAE Microsoft MVPs - How To become Microsoft MVP
PPT
Securing your esi_piedmont
PPTX
Microsoft 365 Threat Management and security - EMS E5
PDF
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
PDF
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
PPTX
Working With Containers In The Enterprise
R, Spark, Tensorflow, H20.ai Applied to Streaming Analytics
Big Data beyond Apache Hadoop - How to integrate ALL your Data
How to plan your Modern Workplace Project - SPS Denver October 2018
"Big Data beyond Apache Hadoop - How to Integrate ALL your Data" - JavaOne 2013
Not actually a DevOps Talk
Scenarios for building Hybrid Cloud
Framework and Product Comparison for Big Data Log Analytics and ITOA
Analytics in the Cloud: Getting The Most Out Of Analytics Deployments
Webinar: Hybrid Cloud Integration - Why It's Different and Why It Matters
Azure Cloud Security
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
How a social intranet can be used to drive employee engagement and usage of I...
UAE Microsoft MVPs - How To become Microsoft MVP
Securing your esi_piedmont
Microsoft 365 Threat Management and security - EMS E5
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
TDC2020 - The microservice architecture: enabling rapid, reliable, frequent a...
Working With Containers In The Enterprise
Ad

Similar to Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World (20)

PPTX
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
PPT
Your clouds must be transparent - an intro to Cloud Security Alliance
PDF
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
PPTX
Netskope — Shadow IT Is A Good Thing
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PDF
The Components of Cyber Security.pptx.pdf
PDF
Cloud security: Accelerating cloud adoption
PPTX
Securing your Cloud Deployment
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
What is Cloud Security, and Can I Have Some?
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Cloud Security Summit - InfoSec World 2014
PDF
Resetting Your Security Thinking for the Public Cloud
PPT
Presentation to Irish ISSA Conference 12-May-11
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PPTX
security and compliance in the cloud
PPTX
Webinar bitglass - complete deck-2
PDF
The 3 Recommendations for Cloud Security
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
CIS13: Security's New Normal: Is Cloud the Answer?
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Your clouds must be transparent - an intro to Cloud Security Alliance
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Netskope — Shadow IT Is A Good Thing
Cloud security for banks - the central bank of Israel regulations for cloud s...
The Components of Cyber Security.pptx.pdf
Cloud security: Accelerating cloud adoption
Securing your Cloud Deployment
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
What is Cloud Security, and Can I Have Some?
Securing the Cloud by Matthew Rosenquist 2016
Cloud Security Summit - InfoSec World 2014
Resetting Your Security Thinking for the Public Cloud
Presentation to Irish ISSA Conference 12-May-11
Cloud_security_v2_chpater_9_s_version.pdf
security and compliance in the cloud
Webinar bitglass - complete deck-2
The 3 Recommendations for Cloud Security
Avoiding Limitations of Traditional Approaches to Security
CIS13: Security's New Normal: Is Cloud the Answer?
Ad

Recently uploaded (20)

PDF
August Patch Tuesday
PPTX
Modernising the Digital Integration Hub
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
The various Industrial Revolutions .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Geologic Time for studying geology for geologist
PPTX
Tartificialntelligence_presentation.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Five Habits of High-Impact Board Members
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
August Patch Tuesday
Modernising the Digital Integration Hub
Assigned Numbers - 2025 - Bluetooth® Document
Final SEM Unit 1 for mit wpu at pune .pptx
Getting Started with Data Integration: FME Form 101
Hindi spoken digit analysis for native and non-native speakers
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
O2C Customer Invoices to Receipt V15A.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
CloudStack 4.21: First Look Webinar slides
The various Industrial Revolutions .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Geologic Time for studying geology for geologist
Tartificialntelligence_presentation.pptx
Hybrid model detection and classification of lung cancer
Five Habits of High-Impact Board Members
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Benefits of Physical activity for teenagers.pptx
WOOl fibre morphology and structure.pdf for textiles

Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World

  • 1. Ben Johnson | Co-Founder & CTO OWASP OC 2018-03-22 SEEING THROUGH THE FOG
  • 2. @chicagoben | @obsidiansec Background Check // Ben Johnson Co-Founder and CTO, Obsidian Co-Founder and Former CTO, Carbon Black Former CNO/Cyber // NSA, CIA, DoD
  • 3. @chicagoben | @obsidiansec Today’s Goal? TO SPARK CONTEMPLATION (and give you something to remember!)
  • 6. @chicagoben | @obsidiansec Race to the Cloud! Lots of benefits of cloud adoption … we aren’t really here for that.
  • 8. @chicagoben | @obsidiansec IT and the Cloud “IT is the broad subject concerned with all aspects of managing and processing information, especially within a large organization or company.” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. IT Cloud
  • 9. @chicagoben | @obsidiansec IT and the Cloud (Reality) “Let’s stop managing hardware and a lot of the software” “Let’s scale up and down as necessary” “Let’s get access to cool new technologies more quickly” “Uptime is [mostly] someone else’s problem”
  • 10. @chicagoben | @obsidiansec Information Security and the Cloud “Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. ” Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. InfoSec Cloud
  • 11. @chicagoben | @obsidiansec Information Security and the Cloud (Reality) “IT is going from 0 to 100 in the cloud and leaving security in the dust” - Fmr. CISO, Lending Club “We’re blind to all these new SaaS accounts” - Director, Cyber Intelligence, Top Athletics Brand “We don’t know what users are doing on our AWS/Azure accounts” - Too Many Organizations “Hackers don’t break in, they login.” - CISO, Cisco
  • 12. @chicagoben | @obsidiansec Modern Times are Leaky Booz Allen OneLogin The RNC Verizon Accenture Dow Jones Viacom Deloitte Sweden California
  • 15. @chicagoben | @obsidiansec Data Breaches: Not Just IaaS As of now, Deloitte cannot be "100% sure what was taken" by the hackers https://www.ciodive.com/news/deloitte-hack-email-migration-microsoft-office-365/506946/
  • 16. @chicagoben | @obsidiansec Breach Fatigue Anyone? Anyone getting CLOUD breach fatigue? If not you, do you think others are?
  • 19. @chicagoben | @obsidiansec Providers Have Challenges Goals are Misaligned Focus is on availability of variety of services with a minimum layer of security built-in Failure Can Be Easy A simple click can share huge amounts of data publicly (e.g. S3) Monitoring is Extra Work Logging & monitoring often have to be enabled separately Mo’ People, Mo’ Complexity Identities and policies are often complex to manage (maybe an understatement?) Sweet Spot is Elusive Policy and control options either feel too flexible or too rigid
  • 20. @chicagoben | @obsidiansec Customers Have Challenges Lack of Understanding The notion of shared responsibility and the differences in built-in security are often foreign. Taking the Plunge Departments race to the cloud, leaving security scrambling. (Is security slowing down adoption?) Bending the Rules Unsanctioned cloud use or lack of reporting to security what is in use. New Environment, Same Security Team Surface area is expanding, changing, and dynamic, yet security team isn’t as agile. “Operators think that once it’s in the cloud it’s no longer their responsibility” - Fmr. CIO of the Air Force
  • 21. @chicagoben | @obsidiansec Current Trends Making Things Harder
  • 22. @chicagoben | @obsidiansec IT and Security Disconnect IT Security Authentication Authorization Activity Enablement Threat Management DISCONNECTED Provisioning Anomaly Detection
  • 24. @chicagoben | @obsidiansec Cloud Security: “Of” Versus “In” Cloud Service Provider: responsible for security OF the cloud Customer: responsible for security IN the cloud
  • 25. @chicagoben | @obsidiansec AWS Responsibilities?
  • 26. @chicagoben | @obsidiansec AZURE Responsibilities?
  • 27. @chicagoben | @obsidiansec SaaS: “Of” Versus “In” The SaaS Provider handles all aspects except for identity and access management, client devices controls, and data accountability. The Customer, therefore, must understand users, devices & data related to that service.
  • 28. @chicagoben | @obsidiansec Office 365? Microsoft handles the underlying infrastructure, including patching and updating, and handles accessibility of the service. You are responsible for what is emailed, who accesses the email, and how they access the email.
  • 29. @chicagoben | @obsidiansec AZURE Responsibilities?Hackers want this!
  • 30. @chicagoben | @obsidiansec AWS Responsibilities? Hackers want this!
  • 33. @chicagoben | @obsidiansec Awareness, Auditing, Adaptation, Automation
  • 34. @chicagoben | @obsidiansec Awareness ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud?
  • 35. @chicagoben | @obsidiansec Auditing ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud.
  • 36. @chicagoben | @obsidiansec Adaptation ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 37. @chicagoben | @obsidiansec Automation ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities.
  • 39. @chicagoben | @obsidiansec Triple-A! Authentication AccountingAuthorization Industry focus Neglected Forgotten
  • 40. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand ๏Change your processes to reduce risk! ๏Security audits should be automated. ๏Cloud Providers have APIs – write code or use integrations to automate the collection of data, the taking of actions, the verification of changes. ๏Avoid manual activities. ๏Where are you using the cloud? ๏What “clouds” are you using? ๏Why are you using the cloud? ๏How are you using the cloud? ๏Who’s responsible for what’s in the cloud? ๏Understand current state (IT)…assets, users, devices. ๏Understand current state (Security). ๏Understand initiatives that involve cloud. ๏Understand security capabilities related to cloud. ๏Put policies and checks in place for new deployments ๏Update security scans and tests to account for cloud ๏Enable tracking of all changes from current state ๏Have a process for monitoring all new accounts, assets, etc.
  • 41. @chicagoben | @obsidiansec IT and Security: Hand-in-Hand Automate Change to Reduce Error and Risk Understanding Surface Area Understand Details and Processes Update processes and policies
  • 42. @chicagoben | @obsidiansec Journey vs. Outcomes Security teams often focus where they have the most autonomy; they get comfortable in this never-ending journey vs. driving toward new destinations.
  • 44. @chicagoben | @obsidiansec Take-Aways Understand where, how, and why you are using cloud. Understand who is responsible. Providers need to do more. They could reduce users shooting themselves in the foot, improve default security levels, and better show surface area. (Please encourage them to do more!) The rest is on you: (Awareness, Auditing, Adaptation, Automation)! Oh, yeah, Triple-A: (Authentication, Authorization, Accounting)! (and don’t forget hygiene.)
  • 45. @chicagoben | @obsidiansec Cloud: Massive Opportunity for Unifying IT & Security IT Security Enablement Enablement Provides Appropriate Tech Provides Appropriate Risk CONNECTED?