CLOUD SECURITY
THROUGH EFFECTIVE
GOVERNANCE
Adam Schepis
@aschepis
adam@cloudhealthtech.com
Adam has 15+ years of experience building high-
quality, secure software for consumers and
enterprises and nearly a decade of experience
working in the security industry.
At CloudHealth Technologies, Adam focuses on
providing enterprises with an exceptional platform
for enabling governance, policies, automation, and
security in the cloud.
Who am I?
Who is CloudHealth Technologies?
• Deep Domain Expertise
• $86 Million in Venture Capital Raised
• 600+ Direct Customers
• 1,500+ Channel Customers through
85+ Partners
• 200+ Employees
• Headquartered in Boston, MA
• Offices located in San Francisco,
Washington DC, London, Amsterdam, Tel
Aviv, Sydney, & Singapore
million
1.1
99.99%
yearly platform
uptime
600
assets
PER MONTH…
$50 million in monthly
RI purchases
1.2 million policies
evaluated
365,000 emails sent
PER DAY…
14 million instances
600PB S3 usage
8TB bills processed
400,000 perspectives / groups
305,000 cubes generated
3,000 reports generated
billion
API calls
$3.8
in cloud spend
managed per year
billion
Our Management Metrics
Customer Success
• Management of resources
has been decentralized
• Growing complexity gap
necessitates new tools.
• Centralized governance has
never been more important
Decentralized management
Centralized Governance
Security Policies
We know the tools, BUT
• WHAT are the things I need to inspect?
• WHERE are they?
• WHO owns them?
• HOW do we ensure they are tested
frequently and monitored continuously?
• Centralized Governance Tools
- Discover surface area
- Aid in definition of attack vectors
- Help identify owners
• Policies
- Automatically discover new assets
- Continuously evaluate
• Identify scenarios that aren’t directly
security related but may indicate a problem
• Anomaly detection
- Types of assets being used
- Patterns of create/destroy for assets
- Network connectivity patterns (in/out)
- Disk I/O patterns
Indicators
Operation Policies
• Continuous Scanning for compliance to IT standards
- Tagging compliance
- Configuration changes
• security groups
• user privileges
• blob store exposure
- API key usage/rotation
• Patching
• Required software (firewalls, etc)
Keeping things in line
Compliance Policies
Storing and Analyzing Policy Results
• Great security tools will detect an issue, fix it, and then tell
you what happened
• Cloud governance is no different
• Don't constantly hunting for a new needle in the haystack
- Let tools do that for you
• Automation lets you constantly monitor, remediate, and alert
You can't manage by exception
Automation
• Training/Certification
• Metrics driven
• KPIs include:
# of people trained
# of people AWS certified
# of workloads moved to the cloud
# of assets and cost
# of policies in compliance
Cloud Center of Excellence
Cloud Steward Role
• Cross-functional role
• Responsible for ongoing optimization
and governance
• Help to bring groups together to and
define and manage security
automation policies, cost, usage, and
performance across environments
• Make recommendations on capacity
planning, modeling, and forecasting
• This is the person who wakes up
every morning thinking about ways to
improve how the organization utilizes
the cloud in a secure, low-friction,
cost-effective way.
Operations
Cloud
Steward
Finance
Engineering/
IT/Ops
LOBs
• Complexity gap has made cloud security and governance a challenge.
• Effective governance contributes to improving overall security posture in the cloud
• Having a corporate Cloud Steward is a critical role when building out a large, efficient,
secure, dynamic cloud infrastructure.
In Summary
Questions?
Thank you!
Adam Schepis
@aschepis
adam@cloudhealthtech.com

More Related Content

PPTX
Webinar: Accelerate Your Cloud Business With CloudHealth
PDF
Bootcamp Recap: EC2 Reserved Instances
PDF
4 Phases of Cloud Optimization
PPTX
Visibility, Optimization & Governance for Cloud Services
PDF
AWS re:Invent 2017 | CloudHealth Tech Session
PPTX
JetSweep & CloudHealth Tech: Journey to the Cloud
PPTX
Cost Star Ratings to score team's AWS optimization at Morningstar" - Katelyn ...
PPTX
"Introduction to FinOps" – Greg VanderWel at Chicago AWS user group
Webinar: Accelerate Your Cloud Business With CloudHealth
Bootcamp Recap: EC2 Reserved Instances
4 Phases of Cloud Optimization
Visibility, Optimization & Governance for Cloud Services
AWS re:Invent 2017 | CloudHealth Tech Session
JetSweep & CloudHealth Tech: Journey to the Cloud
Cost Star Ratings to score team's AWS optimization at Morningstar" - Katelyn ...
"Introduction to FinOps" – Greg VanderWel at Chicago AWS user group

What's hot (8)

PPTX
New AWS Regional RIs Explained
PPTX
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
PPTX
Practical FinOps in Practice
PDF
Architecting your Cloud Strategy - Part One.vsdx
PDF
Business impact of cloud computing
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PDF
Creating an Operating Model to enable a high frequency organization
PDF
AWS CAF overview 2017
New AWS Regional RIs Explained
Be Proactive, Not Reactive: Cloud Governance for Fast, Accurate Decision Making
Practical FinOps in Practice
Architecting your Cloud Strategy - Part One.vsdx
Business impact of cloud computing
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Creating an Operating Model to enable a high frequency organization
AWS CAF overview 2017
Ad

Similar to CloudHealth Boston Presentation (20)

PDF
Security & Compliance in the Cloud [2019]
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PPTX
Mark Willemse - Strategy & Deployment Journey
PPTX
Building cybersecurity transparency with clients using compliance automation...
PPTX
ISACA Ireland Keynote 2015
PPTX
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
PDF
Cloud Service Provider in India | Cloud Solution and Consulting
PPTX
Cloud Adoption Framework - Walking Deck (L100).pptx
PPTX
DSPL Managed Services 09_05_22.pptx
PDF
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
PDF
System Security on Cloud
PPTX
Security architecture best practices for saas applications
PPTX
Security Architecture Best Practices for SaaS Applications
PDF
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
AI Planning Workshop overview
PPTX
Micro Focus Corporate Overview
PPTX
Fort Lauderdale Tech Talks - The Future is the Cloud
PPTX
Cloud Applications Management Nirvana
Security & Compliance in the Cloud [2019]
DevSecCon Keynote
DevSecCon KeyNote London 2015
Mark Willemse - Strategy & Deployment Journey
Building cybersecurity transparency with clients using compliance automation...
ISACA Ireland Keynote 2015
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
Cloud Service Provider in India | Cloud Solution and Consulting
Cloud Adoption Framework - Walking Deck (L100).pptx
DSPL Managed Services 09_05_22.pptx
For SMBs using MSPs (and VARs) | How to Save Money with Managed IT Services
System Security on Cloud
Security architecture best practices for saas applications
Security Architecture Best Practices for SaaS Applications
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
BATbern48_How Zero Trust can help your organisation keep safe.pdf
AI Planning Workshop overview
Micro Focus Corporate Overview
Fort Lauderdale Tech Talks - The Future is the Cloud
Cloud Applications Management Nirvana
Ad

More from Alert Logic (20)

PDF
Managed Threat Detection & Response for AWS Applications
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface
PDF
Reality Check: Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Rent-A-Center
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
Managed Threat Detection & Response for AWS Applications
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
Security Implications of the Cloud
Reducing Your Attack Surface
Reality Check: Security in the Cloud
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Rent-A-Center
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud

Recently uploaded (20)

PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
SaaS reusability assessment using machine learning techniques
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
LMS bot: enhanced learning management systems for improved student learning e...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
Enhancing plagiarism detection using data pre-processing and machine learning...
SaaS reusability assessment using machine learning techniques
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Convolutional neural network based encoder-decoder for efficient real-time ob...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Co-training pseudo-labeling for text classification with support vector machi...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Auditboard EB SOX Playbook 2023 edition.
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
MuleSoft-Compete-Deck for midddleware integrations
LMS bot: enhanced learning management systems for improved student learning e...

CloudHealth Boston Presentation

  • 2. @aschepis [email protected] Adam has 15+ years of experience building high- quality, secure software for consumers and enterprises and nearly a decade of experience working in the security industry. At CloudHealth Technologies, Adam focuses on providing enterprises with an exceptional platform for enabling governance, policies, automation, and security in the cloud. Who am I?
  • 3. Who is CloudHealth Technologies? • Deep Domain Expertise • $86 Million in Venture Capital Raised • 600+ Direct Customers • 1,500+ Channel Customers through 85+ Partners • 200+ Employees • Headquartered in Boston, MA • Offices located in San Francisco, Washington DC, London, Amsterdam, Tel Aviv, Sydney, & Singapore
  • 4. million 1.1 99.99% yearly platform uptime 600 assets PER MONTH… $50 million in monthly RI purchases 1.2 million policies evaluated 365,000 emails sent PER DAY… 14 million instances 600PB S3 usage 8TB bills processed 400,000 perspectives / groups 305,000 cubes generated 3,000 reports generated billion API calls $3.8 in cloud spend managed per year billion Our Management Metrics
  • 6. • Management of resources has been decentralized • Growing complexity gap necessitates new tools. • Centralized governance has never been more important Decentralized management Centralized Governance
  • 7. Security Policies We know the tools, BUT • WHAT are the things I need to inspect? • WHERE are they? • WHO owns them? • HOW do we ensure they are tested frequently and monitored continuously? • Centralized Governance Tools - Discover surface area - Aid in definition of attack vectors - Help identify owners • Policies - Automatically discover new assets - Continuously evaluate
  • 8. • Identify scenarios that aren’t directly security related but may indicate a problem • Anomaly detection - Types of assets being used - Patterns of create/destroy for assets - Network connectivity patterns (in/out) - Disk I/O patterns Indicators Operation Policies
  • 9. • Continuous Scanning for compliance to IT standards - Tagging compliance - Configuration changes • security groups • user privileges • blob store exposure - API key usage/rotation • Patching • Required software (firewalls, etc) Keeping things in line Compliance Policies
  • 10. Storing and Analyzing Policy Results
  • 11. • Great security tools will detect an issue, fix it, and then tell you what happened • Cloud governance is no different • Don't constantly hunting for a new needle in the haystack - Let tools do that for you • Automation lets you constantly monitor, remediate, and alert You can't manage by exception Automation
  • 12. • Training/Certification • Metrics driven • KPIs include: # of people trained # of people AWS certified # of workloads moved to the cloud # of assets and cost # of policies in compliance Cloud Center of Excellence
  • 13. Cloud Steward Role • Cross-functional role • Responsible for ongoing optimization and governance • Help to bring groups together to and define and manage security automation policies, cost, usage, and performance across environments • Make recommendations on capacity planning, modeling, and forecasting • This is the person who wakes up every morning thinking about ways to improve how the organization utilizes the cloud in a secure, low-friction, cost-effective way. Operations Cloud Steward Finance Engineering/ IT/Ops LOBs
  • 14. • Complexity gap has made cloud security and governance a challenge. • Effective governance contributes to improving overall security posture in the cloud • Having a corporate Cloud Steward is a critical role when building out a large, efficient, secure, dynamic cloud infrastructure. In Summary