Cloud Security , Fraud Management & Cybercrime , Security Operations

Arctic Wolf's Dan Schiappa on Cloud Security in a Recession

CPO on How Higher Cloud Spending Introduces a New Set of Security Challenges
Arctic Wolf's Dan Schiappa on Cloud Security in a Recession
Dan Schiappa, chief product officer, Arctic Wolf (Image: Arctic Wolf)

The impending economic recession should accelerate cloud adoption as organizations look to reduce infrastructure costs, but those moves will introduce a new set of security challenges.

Arctic Wolf Chief Product Officer Dan Schiappa predicts many organizations will start building security into their applications earlier in the life cycle as cloud adoption increases. He also says security operations teams will need to ensure they have visibility into all cloud environments so that they can monitor and react to any potential threats (see: Looking Beyond Silicon Valley for Cybersecurity Talent).

"Organizations are going to run into the challenge where they don't have that skill set in house," says Schiappa, who joined Arctic Wolf from Sophos in January. "They're going to need to turn to organizations to help provide that security expertise to now monitor their workloads in the cloud."

In an audio interview with Information Security Media Group, Schiappa also discusses:

  • What companies must do to secure the cloud;
  • How buying behavior changes during a recession;
  • The biggest cybersecurity trends to watch for at Black Hat.

Schiappa is responsible for driving innovation across product, engineering, alliances and business development teams to help meet demand for security operations through Arctic Wolf's growing customer base - especially in the enterprise sector. Before joining Arctic Wolf, Schiappa was CPO with Sophos and senior vice president and general manager of the Identity and Data Protection Group at RSA, the Security Division of EMC.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.